IPv6 Address Compressor Expander
Enter the IPv6 address in the top text box. Click on the appropriate button: Omit Leading Zeros, Consolidate Zeros Segments, Expand Zeros Segments, Replace Leading Zeros. The formatted address will appear in the bottom text box. More ...
How to Check Your PCs TPM
One of the requirements for Windows 11 is TPM version 2.0. If you have Windows 10 and you have TPM version 2.0 module, and it's enabled, then you can install and run Windows 11. More ...
The Evolution of Hard Disk Bit Recording
Hard drive technology has continuously improved over the decades, that includes higher storage capacity performance. Part of this improvement has been higher access speeds, but most of the higher storage capacity has been the result of changes in the bit recording methods. More ...
Inkscape Basic Fill
In Inkscape you can fill a shape with just about any color, texture, or pattern that you desire. In this article we discuss how to fill a shape with a basic color. More ...
Inkscape Exercise: Draw Photorealistic Sphere
Although Inkscape is a 2D drawing application, it is quite capable of drawing photorealistic 3D images. To demonstrate this capability, in this article I show you, step-by-step how to draw a photorealistic sphere. More ...
The Power of a Positive Attitude
One of the most important personality traits required for the achievement of a successful life is a positive attitude. What I mean when I say positive attitude might be more accurately described as a realistic attitude. More ...
Inkscape Preferences
Inkscape is a highly configurable application. Many of these configuration options can be set through the Preferences dialog box. There is probably a hundred things you can configure through the Preferences dialog box. Here I'll describe a couple of the most important ones. More ...
Find Your WiFi Password on Windows 10
One of the most common reasons to find your Wi-Fi password is to use it on another PC or device to connect to your Wi-Fi network. Here's how. More ...
HTML5 Header Element
The header element is one of HTML5's semantic elements. It provides a container for header information. A header element may contain ,logo author, navigation, search, version, copyright, and other such information. More ...
Network on a Chip (NoC)
NoC (Network on a Chip) is a method of placing a much larger number of processors on a multi-core chip. Much like a regular network, NoC has multiple point-to-point data links that are interconnected by routing switches. More ...
Easy CSS Animated Flaming Text
I provide easy code to create CSS flaming text animations. You are free to experiment with your own CSS property values. I bet you can create even better flaming text. CSS3 flaming text animations are fun and easy to create. More ...
Use PowerShell and WMI to Get CPU Information
Suppose you want to get some information about the CPU in your computer. Can you remember which Control Panel utility will provide that information? If you use a PowerShell script to access WMI you can always get the information you want no mater how they rearrange Control Panel. More ...
Access Useful Laptop Settings in the Windows Mobility Center
Some useful laptop settings are collected together in a group called the Windows Mobility Center. Near the top of the secret menu, select Mobility Center. Here you'll find controls for setting the screen brightness, sound volume, screen orientation, and such. More ...
Installing IIS on Windows 10
If you want to test your Classic ASP scripts, IIS (Internet Information Services) is a feature that included with every Windows 10 operating system, but it is an option, so you do have to install it first. More ...
Inkscape Text Kerning
Although Inkscape might be considered a vector drawing application, it is also a powerful typographical design program. Actually Text Kerning is not a good title for this article because in it I will cover all the different typographical adjustments you can make in Inkscape. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...

