IPv6 Address Compressor Expander
Enter the IPv6 address in the top text box. Click on the appropriate button: Omit Leading Zeros, Consolidate Zeros Segments, Expand Zeros Segments, Replace Leading Zeros. The formatted address will appear in the bottom text box. More ...
Minispreadsheet Instructions
This is the instructions for Minispreadsheet. Minispreadsheet is a tiny extremely easy to use spreadsheet. You can type text or a number into a cell, that's it. You can also apply simple formulas to a cell. More ...
Minispreadsheet
Minispreadsheet is a tiny extremely easy to use spreadsheet, You can type text into a cell, you type a number into a cell. A formula is a simple list of cells with basic mathematical operators between them. If you change the number in a cell used in a formula in a different cell, the value in the cell with the formula will be updated. More ...
Inkscape Text Kerning
Although Inkscape might be considered a vector drawing application, it is also a powerful typographical design program. Actually Text Kerning is not a good title for this article because in it I will cover all the different typographical adjustments you can make in Inkscape. More ...
Windows 10 Disable Aero Snap and Shake
With Aero Snap and Shake Windows does what it wants to do, not what you want it to do. More ...
Processor Interrupts
An interrupt is a signal to the processor indicating an event has occurred that needs immediate attention. When an interrupt occurs, the processors normal path of execution is interrupted in order to run a routine to service the interrupt requester. More ...
Introduction to HTML
A Web server sends the response to the client browser with a set of instructions written in HTML (HyperText Markup Language). HTML consists of tags that define the structure of a web page. It is the standard markup language for documents to be displayed in a web browser. More ...
How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...
What is a Regular Expression?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. Regular expressions are very powerful, but also difficult to understand and complicated to use. More ...
Create a Cool Picture Frame Effect with CSS
By setting the CSS border-color property to a transparent color, and setting the background-origin property to border-box you can create a cool picture frame effect. More ...
IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...
Easy JavaScript FileReader Code
The JavaScript FileReader object allows web pages to read files stored on the user's computer. Files may be selected using the input element, or selected with a drag and drop operation. More ...
Access Useful Laptop Settings in the Windows Mobility Center
Some useful laptop settings are collected together in a group called the Windows Mobility Center. Near the top of the secret menu, select Mobility Center. Here you'll find controls for setting the screen brightness, sound volume, screen orientation, and such. More ...
Inkscape Shadows and Highlights
Adding shadows and highlights to your drawings can create a touch of realism. In this article you learn how to add shadows and highlights to your Inkscape drawings. More ...
The Evolution of Hard Disk Bit Recording
Hard drive technology has continuously improved over the decades, that includes higher storage capacity performance. Part of this improvement has been higher access speeds, but most of the higher storage capacity has been the result of changes in the bit recording methods. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...

