IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...
Inkscape Exercise: Draw Photorealistic Sphere
Although Inkscape is a 2D drawing application, it is quite capable of drawing photorealistic 3D images. To demonstrate this capability, in this article I show you, step-by-step how to draw a photorealistic sphere. More ...
Inkscape Basic Fill
In Inkscape you can fill a shape with just about any color, texture, or pattern that you desire. In this article we discuss how to fill a shape with a basic color. More ...
Access Useful Laptop Settings in the Windows Mobility Center
Some useful laptop settings are collected together in a group called the Windows Mobility Center. Near the top of the secret menu, select Mobility Center. Here you'll find controls for setting the screen brightness, sound volume, screen orientation, and such. More ...
The Power of a Positive Attitude
One of the most important personality traits required for the achievement of a successful life is a positive attitude. What I mean when I say positive attitude might be more accurately described as a realistic attitude. More ...
Regular Expressions Intervals
Regular expression intervals tell us about the number of occurrences of a character in a string. Curly braces are used to define a precise count of how many occurrences you are checking for. More ...
Use PowerShell and WMI to Get CPU Information
Suppose you want to get some information about the CPU in your computer. Can you remember which Control Panel utility will provide that information? If you use a PowerShell script to access WMI you can always get the information you want no mater how they rearrange Control Panel. More ...
Easy CSS 3D Mouse-over Pressed Text Effect
I provide easy CSS code for 3d text when you move your mouse pointer over the 3D text shown above, the text will appear to be pressed. In this example, I configured the 3d text in a link. More ...
Html5 section vs article Element Best Practices
Many new semantic elements where added to HTML5. The purpose of most of these new elements was easily discernible. But a web search reveals that there is much confusion about the relationship between the article and the section element. More ...
Regular Expression: Alternation
In this article you learn how to create an alternation regular expression that will match alternate patterns in a string. More ...
Create a Cool Picture Frame Effect with CSS
By setting the CSS border-color property to a transparent color, and setting the background-origin property to border-box you can create a cool picture frame effect. More ...
JavaScript to Copy and Paste Text to the Clipboard
In some applications, rather than the user's selection, you may want to copy the contents of a specific html element to the clip board. Or when the user initiates a Paste, you may want to direct the contents of the user's clipboard to a specific html element on the webpage. Here is the code for this. More ...
Gift Giving in the Workplace
One thing that can add to the stress of the holiday season is workplace gift giving. giving a gift to a supervisor or manager sets up a conflict of interest and an ethics problem. In my opinion, holiday gifts should be given only to children. More ...
Regular Expression Basics : How many Matches?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. In this article you'll learn how to use regular expressions to count the number of matches. More ...
Installing IIS on Windows 10
If you want to test your Classic ASP scripts, IIS (Internet Information Services) is a feature that included with every Windows 10 operating system, but it is an option, so you do have to install it first. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...

