JavaScript to Copy and Paste Text to the Clipboard
In some applications, rather than the user's selection, you may want to copy the contents of a specific html element to the clip board. Or when the user initiates a Paste, you may want to direct the contents of the user's clipboard to a specific html element on the webpage. Here is the code for this. More ...
Inkscpe Snap Controls Bar
some Inkscape users find snap annoying and so they disable it. Other Inkscape user's could not possibly work without snap. You can convert SVG to STL to print 3D models. But to do that you need accuracy that you cannot achieve without snap. More ...
Windows 10 Shortcut to Turn Laptop Camera On or Off
To prevent hackers from sneaking a look at you, turn your laptop camera off. This article shows you how to place a shortcut on your desktop that you can use to quickly turn your laptop camera on or off. More ...
Easy CSS Animated Flaming Text
I provide easy code to create CSS flaming text animations. You are free to experiment with your own CSS property values. I bet you can create even better flaming text. CSS3 flaming text animations are fun and easy to create. More ...
IPv6 Address Compressor Expander
Enter the IPv6 address in the top text box. Click on the appropriate button: Omit Leading Zeros, Consolidate Zeros Segments, Expand Zeros Segments, Replace Leading Zeros. The formatted address will appear in the bottom text box. More ...
Introduction to Windows PowerShell
PowerShell is a more powerful replacement for the command shell. this article explains how to run PowerShell and how to create and run PowerShell scripts. More ...
Introduction to Operating Systems
An operating system is software that acts as an intermediary between a computer user and the computer's applications and hardware. An operating system can be viewed as a resource allocator. Resources might be CPU time, memory space, file storage space, and input/output (I/O) devices. More ...
Regular Expressions Intervals
Regular expression intervals tell us about the number of occurrences of a character in a string. Curly braces are used to define a precise count of how many occurrences you are checking for. More ...
Regular Expressions Subexpressions
In this article you learned how to use subexpressions to rearrange matches in a regular expression and how to replace the value of a subexpression match in the results. More ...
How to Check Your PCs TPM
One of the requirements for Windows 11 is TPM version 2.0. If you have Windows 10 and you have TPM version 2.0 module, and it's enabled, then you can install and run Windows 11. More ...
A Handful of Useful Run Commands: calc, notepad, wordpad, voice recorder, control
The Run dialog box which can be opened by pressing the [Windows] + [R] keys. Run dialog box is a rapid way to open programs. Here are some quick and useful Run commands. More ...
Introduction to Draw SVG Free Online SVG Drawing Application
A drawing created on a computer can be posted directly on the Web. Drawing on a computer with a vector drawing program is the best way to go. Draw SVG seems to meet the need. In this article I touched on only a tiny part of what Draw SVG can do. More ...
Minispreadsheet
Minispreadsheet is a tiny extremely easy to use spreadsheet, You can type text into a cell, you type a number into a cell. A formula is a simple list of cells with basic mathematical operators between them. If you change the number in a cell used in a formula in a different cell, the value in the cell with the formula will be updated. More ...
What is an Ethernet Crossover Cable?
When connecting two computers together without a switch or router in between you need a special cable, called a crossover cable, that has the transmit wire pair swapped with the receive wire pair. More ...
Area of a Triangle Calculator
There are three different methods to calculate the area of a triangle depending upon what information you have about the triangle. This application combines all three. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...

