Learn web design, computer maintenance, programming, computer architecture, computer networking, electronics, mathematics, art and graphic design.

The Mechanical Universe

Draw with your finger


Learn more at amazon.com

Understanding Modern PC Specifications
There is a huge variety of different PCs available out there. Its no wonder that consumers are confused about what to buy. This article explains modern PC specifications. More ...

Online Color Coded Resistor Calculator
To determine the resistance value of a color-coded resistor, select the colors matching each band from the drop-down lists. More ...

Find Your WiFi Password on Windows 10
One of the most common reasons to find your Wi-Fi password is to use it on another PC or device to connect to your Wi-Fi network. Here's how. More ...

Inkscape Text Kerning
Although Inkscape might be considered a vector drawing application, it is also a powerful typographical design program. Actually Text Kerning is not a good title for this article because in it I will cover all the different typographical adjustments you can make in Inkscape. More ...

EMI, RFI, EMC, EMS, What's the Difference?
EMI, RFI, EMC, and EMS all refer to different aspects of radio frequency interference which may cause elecronic devices to malfunction. Correcting these problems can be an art and a science. More ...

IPv6 Address Compressor Expander
Enter the IPv6 address in the top text box. Click on the appropriate button: Omit Leading Zeros, Consolidate Zeros Segments, Expand Zeros Segments, Replace Leading Zeros. The formatted address will appear in the bottom text box. More ...

The Evolution of Hard Disk Bit Recording
Hard drive technology has continuously improved over the decades, that includes higher storage capacity performance. Part of this improvement has been higher access speeds, but most of the higher storage capacity has been the result of changes in the bit recording methods. More ...

Windows Event Logs for Maintaining or Troubleshooting Your PC
Your PC keeps logs of everything that happens. You can use the information in these logs to help maintain and troubleshoot and your PC. More ...

Regular Expressions Boundaries
In this article you learn how to controls where a regular expression matches a string, on a word or non-word boundary, at the beginning or end of a string. You also learned about multiline mode. More ...

Introduction to HTML
A Web server sends the response to the client browser with a set of instructions written in HTML (HyperText Markup Language). HTML consists of tags that define the structure of a web page. It is the standard markup language for documents to be displayed in a web browser. More ...

A Brief Introduction to 3D Printing
Previously, the only ways to create 3D objects was casting and molding. 3D printing involves creating an object by laying down layer over layer of material, building the object from the bottom up. 3d printing is great for rapid prototyping. 3d printing is also a great way for a home artist to express their creativity. More ...

Use PowerShell and WMI to Get CPU Information
Suppose you want to get some information about the CPU in your computer. Can you remember which Control Panel utility will provide that information? If you use a PowerShell script to access WMI you can always get the information you want no mater how they rearrange Control Panel. More ...

Regular Expressions Intervals
Regular expression intervals tell us about the number of occurrences of a character in a string. Curly braces are used to define a precise count of how many occurrences you are checking for. More ...

Speed Up Windows 10 by Disabling Trivial Visual Effects
Does your Windows 10 PC perform annoyingly slow? You may be able to get a significant performance boost by disabling unnecessary visual effects. Here's how. More ...

Inkscape Shadows and Highlights
Adding shadows and highlights to your drawings can create a touch of realism. In this article you learn how to add shadows and highlights to your Inkscape drawings. More ...

Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...


See it at amazon.com

Custom Search