Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...
A JavaScript Function That Returns a Function
Its a fad now in JavaScript to code functions that return functions in order to avoid declaring global variables but the procedure is inefficient and unnecessary. More ...
Windows 10 Shortcut to Turn Laptop Camera On or Off
To prevent hackers from sneaking a look at you, turn your laptop camera off. This article shows you how to place a shortcut on your desktop that you can use to quickly turn your laptop camera on or off. More ...
Processor Interrupts
An interrupt is a signal to the processor indicating an event has occurred that needs immediate attention. When an interrupt occurs, the processors normal path of execution is interrupted in order to run a routine to service the interrupt requester. More ...
Gift Giving in the Workplace
One thing that can add to the stress of the holiday season is workplace gift giving. giving a gift to a supervisor or manager sets up a conflict of interest and an ethics problem. In my opinion, holiday gifts should be given only to children. More ...
Html5 section vs article Element Best Practices
Many new semantic elements where added to HTML5. The purpose of most of these new elements was easily discernible. But a web search reveals that there is much confusion about the relationship between the article and the section element. More ...
Understanding Modern PC Specifications
There is a huge variety of different PCs available out there. Its no wonder that consumers are confused about what to buy. This article explains modern PC specifications. More ...
Introduction to Operating Systems
An operating system is software that acts as an intermediary between a computer user and the computer's applications and hardware. An operating system can be viewed as a resource allocator. Resources might be CPU time, memory space, file storage space, and input/output (I/O) devices. More ...
Self-Esteem and Success
A person with high self-esteem believes that they are a worthwhile and important person. A person with low self-esteem believes that others are better than them, and that they deserve to treated badly by others. More ...
IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...
How to Draw an Airplane
Drawing an airplane is much easier if you first construct two-point perspective guidelines. This article shows you how to draw an airplane in ten easy steps. More ...
How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...
Fiber Optic Bend Radius Standards
Fiber optic cable can be damaged by placing too much tension on the cable or bending the cable excessively during installation. Excessive bending or too much pulling force can permanently damage the fiber by causing micro cracks. More ...
Inkscape Shadows and Highlights
Adding shadows and highlights to your drawings can create a touch of realism. In this article you learn how to add shadows and highlights to your Inkscape drawings. More ...
Easy JavaScript FileReader Code
The JavaScript FileReader object allows web pages to read files stored on the user's computer. Files may be selected using the input element, or selected with a drag and drop operation. More ...
Regular Expressions Boundaries
In this article you learn how to controls where a regular expression matches a string, on a word or non-word boundary, at the beginning or end of a string. You also learned about multiline mode. More ...

