Learn web design, computer maintenance, programming, computer architecture, computer networking, electronics, mathematics, art and graphic design.

The Mechanical Universe

Draw with your finger


Learn more at amazon.com

Windows Event Logs for Maintaining or Troubleshooting Your PC
Your PC keeps logs of everything that happens. You can use the information in these logs to help maintain and troubleshoot and your PC. More ...

The Difference Between EoP and PoE
Ethernet over Power (EoP) is a technology for sending network data over power lines. Power over Ethernet (PoE) is a technology for sending power over Ethernet network cables. More ...

Self-Esteem and Success
A person with high self-esteem believes that they are a worthwhile and important person. A person with low self-esteem believes that others are better than them, and that they deserve to treated badly by others. More ...

How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...

What is a Regular Expression?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. Regular expressions are very powerful, but also difficult to understand and complicated to use. More ...

PowerShell Script to Show Last 5 Errors in Event Log
The Windows System eventlog is one of the most powerful components of the operating system because it keeps a log of everything that happens. Here I provide a powershell script to display the last 5 error entries in the log. More ...

The Evolution of Hard Disk Bit Recording
Hard drive technology has continuously improved over the decades, that includes higher storage capacity performance. Part of this improvement has been higher access speeds, but most of the higher storage capacity has been the result of changes in the bit recording methods. More ...

How to Check Your PCs TPM
One of the requirements for Windows 11 is TPM version 2.0. If you have Windows 10 and you have TPM version 2.0 module, and it's enabled, then you can install and run Windows 11. More ...

Easy CSS 3D Mouse-over Pressed Text Effect
I provide easy CSS code for 3d text when you move your mouse pointer over the 3D text shown above, the text will appear to be pressed. In this example, I configured the 3d text in a link. More ...

Html5 section vs article Element Best Practices
Many new semantic elements where added to HTML5. The purpose of most of these new elements was easily discernible. But a web search reveals that there is much confusion about the relationship between the article and the section element. More ...

A JavaScript Function That Returns a Function
Its a fad now in JavaScript to code functions that return functions in order to avoid declaring global variables but the procedure is inefficient and unnecessary. More ...

IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...

Inkscpe Snap Controls Bar
some Inkscape users find snap annoying and so they disable it. Other Inkscape user's could not possibly work without snap. You can convert SVG to STL to print 3D models. But to do that you need accuracy that you cannot achieve without snap. More ...

Regular Expressions Lookarounds
In this article you learn how to match a pattern only when it comes after another pattern (or after not that pattern) or only when it comes before another pattern (or before not that pattern). More ...

IPv6 Address Compressor Expander
Enter the IPv6 address in the top text box. Click on the appropriate button: Omit Leading Zeros, Consolidate Zeros Segments, Expand Zeros Segments, Replace Leading Zeros. The formatted address will appear in the bottom text box. More ...

Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...


See it at amazon.com

Custom Search