Archive

Microsoft Security Essentials review

MSE which is an abbreviation of Microsoft Security Essentials, is an antivirus application launched by Microsoft Corporation. It is helpful in providing protection against all kinds of malware such as Trojan horses, root kits, spyware, and numerous others for Windows® XP, Windows® Vista and Windows® 7 operating systems.

The Windows Microsoft Security Essentials was able to replace the Windows Live OneCare component, which was a premium subscription-based antivirus application, and Windows Defender that was useful in just protecting the users from spyware and adware. Contrasting the Microsoft Forefront...

Read more

SNMP: Simple Network Management Protocol

Introduction What does Network Management mean? If you have a network of computers, hardware devices like switches, routers, database servers and workstations, surely you will have to:
  • Keep track of the settings of each device and its functioning.
  • Check whether the network is running smoothly and if it can handle the current workload.
  • Deal with problems and emergencies in the network.

Definitions SNMP is Simple Network Management Protocol. It was defined by IETF RFC1157 in 1989. SNMP is a protocol which allows networked devices (called Agents) and a management workstation...

Read more

Microsoft Publisher

Definition: As the name suggests and hints about the application from the marketing world. MS Publishers a DTP application from Microsoft created which proves to be a big challenge and an option for some of the applications like Adobe and QuarkXPress.

This application has originated with the Windows 95 version and has become a regular support application in the Microsoft office Suite. It advertises any organizations promotional or communication materials with the proper format and options like print, post card, email and web. This application covers and supports almost each and every type of configuration,...

Read more

COMPUTER INTRUDERS

Computers are among the most sophisticated machines around the globe; moreover, they carry very important and vital information. This vital information needs to be secured from both external and  internal attacks. Many people go extra mile to secure their computers using different techniques and methods including passwords, firewalls, and centralized administration of their resources.

The attacks may consist of viruses; which are malicious programs created by people or even generating themselves. Attacks may also consist of malicious people who may want to destroy documents or acquire documents from your computer....

Read more

Rich Internet Application explained in detail

It is an Internet application that contains a number of features from normal desktop applications and is usually abbreviated as RIA. White paper introduced Rich Internet Application in the year 2002 by Macromedia which later advanced to become Adobe. However this principle was in existence for some years in other names including Rich web clients, Rich web application, and also remote scripting.

There are number of ways on utilizing the applications including a browser plug-in, virtual machines, site-specific browser and also independent sandboxes. Other platforms which...

Read more

Microsoft Project Management

The process of project management is a very crucial one for many organizations and individuals. Project management involves the planning, organizing, directing and controlling an organization’s or individual resources for a specified time in order to accomplish a specific short term objective established to complete goals and objectives set.

The project manager is charged with the responsibility of ensuring that the project is a success. He/she has to set specific constraints within which the project that has to be completed and the end product should be of the standard and quality expected. Project...

Read more

MAC Address

This article will try to cover the basics of MAC addresses as an important aspect in communications on the physical network. What is a MAC address? How is it unique? How does it control the flow of communication? How can you find/alter a MAC address? Are the MAC and the IP address related somehow? These are some of the questions (along with others) which will be covered.

Imagine you are a postman and you have to deliver mail all day long, what makes one house different from the other? It could be the appearance,...

Read more

Comparison Of the Cloud Computing Companies

Cloud computing is all set to bring the computing world to a disruptive halt. In fact it has already done so to a large extent. Business organizations now have more flexibility and they can concentrate more on their business rather than worrying about the information needs.

This is particularly true of online businesses. Cloud computing has various levels. You could either use the SAAS, PAAS or IAAS levels or a combination of them. All you need is a web browser with little or no setup. The...

Read more

The Network Layer

The Network Layer is a providing facility for the source to destination delivery of a packet possibly across a multiple layer. This figure shows how the network layer works. Suppose System A sends packet to system C then sends the packet to intermediate system which is router B. When it reaches router B it sees the destination address and according to this routing table, then decides which path he needs to go. Now router B sends a packet to its final destination which is C. So in the figure, the hop to hop delivery which is A...

Read more

Windows Vista

Windows Vista is an operating system with different marketing editions. This Operating System was developed by Microsoft to be used on personal computers including laptops, tablet PC’s, media center PCs, as well as desktops.

Windows Vista was developed in November 2006 despite being announced in the year 2005. Over a period of about 3 years, the Operating System was released in stages to computer software and hardware manufacturers, retail channels, and also business customers. Windows Vista carries a variety of new features which include graphical user interface; which are updated and also visual style dubbed Aero...

Read more