Archive
MAC Address
This article will try to cover the basics of MAC addresses as an important aspect in communications on the physical network. What is a MAC address? How is it unique? How does it control the flow of communication? How can you find/alter a MAC address? Are the MAC and the IP address related somehow? These are some of the questions (along with others) which will be covered.
Comparison Of the Cloud Computing Companies
Cloud computing is all set to bring the computing world to a disruptive halt. In fact it has already done so to a large extent. Business organizations now have more flexibility and they can concentrate more on their business rather than worrying about the information needs.The Network Layer
The Network Layer is a providing facility for the source to destination delivery of a packet possibly across a multiple layer. This figure shows how the network layer works. Suppose System A sends packet to system C then sends the packet to intermediate system which is router B. When it reaches router B it sees the destination address and according to this routing table, then decides which path he needs to go. Now router B sends a packet to its final destination which is C. So in the figure, the hop to hop delivery which is A... Read moreWindows Vista
Windows Vista is an operating system with different marketing editions. This Operating System was developed by Microsoft to be used on personal computers including laptops, tablet PC’s, media center PCs, as well as desktops.
Computer networking device
A computer networking device is a component that helps in mediating data within a computer network. They may also be referred to as equipment, networking units or even intermediate systems. Some devices generate data and are known as data terminal equipment or hosts.nr5.jpg)
Load Running 101 (Multi user access)
Load running is a process used when multiple users are accessing a single server; it is used to relieve the burden of load on the server. This process is supported by load runner software. Program running is a more common description for the said software program. Use of computers commonly involve overlapping of certain computer program and task performed by the computer. Computer programs are a sequence of commands encoded for a computer to perform particular tasks.
Networking concepts
A network is a connection of a number of computer and devices to facilitate the exchange of data. Networking is one of the most important features in the IT world; the concept facilitates sharing and communication thus promoting business as well as relations among a number of people. Before anyone thinks of, networking him or her to have the basic knowledge of the requirements and what it entails. These requirements are referred to as networking concepts.
Motherboard (Central component that holds other components)
A motherboard is a central component that holds other components in a computer and also provides their related connectors as well as peripherals. The motherboard is also referred to as a system board or the mainboard. In some computers, like the Apple, it is known as logic board. Generally, a motherboard acts as a connection point for other components facilitating communication in the entire system.
IIS Versions for Your OS
IIS (Internet Information Services) is a web-based server application with extension modules for use with different versions of the Windows operating systems. It is a product of Microsoft and is the second most popular web server after Apache HTTP server. There are several IIS supported protocols like FTPS, FTP, NNTP, HTTP, HTTPS and SMTP which are supported by IIS 7.5Major uses of this feature; why we need it
By definition, a web server is a computer(s) on the internet that hosts a website(s) and serves pages to viewers when they request a page; it serves... Read moreComputer hobbyists
The most common intruders of computer systems are the computer hobbyists and computer experts. They view unauthorized access as an irresistible intellectual game. Computer hobbyists are mostly known as "intruders", but this term is very wide. There are various types of computer hobbyists and include intruders as their commonly known computer hobbyists.








