IPv6 Address Compressor Expander
Enter the IPv6 address in the top text box. Click on the appropriate button: Omit Leading Zeros, Consolidate Zeros Segments, Expand Zeros Segments, Replace Leading Zeros. The formatted address will appear in the bottom text box. More ...
How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...
Inkscape Grouping
One function in Inkscape that is very handy is grouping. Without grouping in order to reposition an object we would need to select all its pieces. With grouping, all an object's pieces behave as a single object. More ...
Fiber Optic Bend Radius Standards
Fiber optic cable can be damaged by placing too much tension on the cable or bending the cable excessively during installation. Excessive bending or too much pulling force can permanently damage the fiber by causing micro cracks. More ...
Access Useful Laptop Settings in the Windows Mobility Center
Some useful laptop settings are collected together in a group called the Windows Mobility Center. Near the top of the secret menu, select Mobility Center. Here you'll find controls for setting the screen brightness, sound volume, screen orientation, and such. More ...
A Brief Introduction to 3D Printing
Previously, the only ways to create 3D objects was casting and molding. 3D printing involves creating an object by laying down layer over layer of material, building the object from the bottom up. 3d printing is great for rapid prototyping. 3d printing is also a great way for a home artist to express their creativity. More ...
EMI, RFI, EMC, EMS, What's the Difference?
EMI, RFI, EMC, and EMS all refer to different aspects of radio frequency interference which may cause elecronic devices to malfunction. Correcting these problems can be an art and a science. More ...
Create a Cool Picture Frame Effect with CSS
By setting the CSS border-color property to a transparent color, and setting the background-origin property to border-box you can create a cool picture frame effect. More ...
The Difference Between EoP and PoE
Ethernet over Power (EoP) is a technology for sending network data over power lines. Power over Ethernet (PoE) is a technology for sending power over Ethernet network cables. More ...
A JavaScript Function That Returns a Function
Its a fad now in JavaScript to code functions that return functions in order to avoid declaring global variables but the procedure is inefficient and unnecessary. More ...
What is a Regular Expression?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. Regular expressions are very powerful, but also difficult to understand and complicated to use. More ...
Introduction to Draw SVG Free Online SVG Drawing Application
A drawing created on a computer can be posted directly on the Web. Drawing on a computer with a vector drawing program is the best way to go. Draw SVG seems to meet the need. In this article I touched on only a tiny part of what Draw SVG can do. More ...
Regular Expressions Lookarounds
In this article you learn how to match a pattern only when it comes after another pattern (or after not that pattern) or only when it comes before another pattern (or before not that pattern). More ...
JavaScript to Copy and Paste Text to the Clipboard
In some applications, rather than the user's selection, you may want to copy the contents of a specific html element to the clip board. Or when the user initiates a Paste, you may want to direct the contents of the user's clipboard to a specific html element on the webpage. Here is the code for this. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...
Understanding Modern PC Specifications
There is a huge variety of different PCs available out there. Its no wonder that consumers are confused about what to buy. This article explains modern PC specifications. More ...

