JavaScript to Copy and Paste Text to the Clipboard
In some applications, rather than the user's selection, you may want to copy the contents of a specific html element to the clip board. Or when the user initiates a Paste, you may want to direct the contents of the user's clipboard to a specific html element on the webpage. Here is the code for this. More ...
Inkscape Exercise: Draw Photorealistic Sphere
Although Inkscape is a 2D drawing application, it is quite capable of drawing photorealistic 3D images. To demonstrate this capability, in this article I show you, step-by-step how to draw a photorealistic sphere. More ...
What is an Ethernet Crossover Cable?
When connecting two computers together without a switch or router in between you need a special cable, called a crossover cable, that has the transmit wire pair swapped with the receive wire pair. More ...
How to Check Your PCs TPM
One of the requirements for Windows 11 is TPM version 2.0. If you have Windows 10 and you have TPM version 2.0 module, and it's enabled, then you can install and run Windows 11. More ...
Online Color Coded Resistor Calculator
To determine the resistance value of a color-coded resistor, select the colors matching each band from the drop-down lists. More ...
Installing IIS on Windows 10
If you want to test your Classic ASP scripts, IIS (Internet Information Services) is a feature that included with every Windows 10 operating system, but it is an option, so you do have to install it first. More ...
Network on a Chip (NoC)
NoC (Network on a Chip) is a method of placing a much larger number of processors on a multi-core chip. Much like a regular network, NoC has multiple point-to-point data links that are interconnected by routing switches. More ...
Self-Esteem and Success
A person with high self-esteem believes that they are a worthwhile and important person. A person with low self-esteem believes that others are better than them, and that they deserve to treated badly by others. More ...
IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...
Inkscape Text Kerning
Although Inkscape might be considered a vector drawing application, it is also a powerful typographical design program. Actually Text Kerning is not a good title for this article because in it I will cover all the different typographical adjustments you can make in Inkscape. More ...
Easy CSS 3D Mouse-over Pressed Text Effect
I provide easy CSS code for 3d text when you move your mouse pointer over the 3D text shown above, the text will appear to be pressed. In this example, I configured the 3d text in a link. More ...
Area of a Quadrilateral Calculator
If you have a regular quadrilateral there are simple formulas to calculate the area. But if you have an irregular quadrilateral you can calculate its area by viewing it as two triangles bucked up against one another. Find the area of each triangle, and then add them together. More ...
What is a Regular Expression?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. Regular expressions are very powerful, but also difficult to understand and complicated to use. More ...
Regular Expressions Boundaries
In this article you learn how to controls where a regular expression matches a string, on a word or non-word boundary, at the beginning or end of a string. You also learned about multiline mode. More ...
Windows 10 Shortcut to Turn Laptop Camera On or Off
To prevent hackers from sneaking a look at you, turn your laptop camera off. This article shows you how to place a shortcut on your desktop that you can use to quickly turn your laptop camera on or off. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...
