• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Computer and Internet » Internet

Internet

Description and explanation of different terminologies used in web and Internet.

What are Trolls on Internet?

What is a troll?   A troll on the Internet has nothing to do with the image that immediately comes to mind, but is a conversation whose sole purpose is to create a controversy. The author wants to establish an atmosphere that can go wrong. It is found on the forums, chats and finally all the places where people can communicate. The problem is that the conversation turns in circles and … [Read more...]

Blocking right click on your website

Protect the contents of a web page   If you have a website with some valuable and unique content, you probably have thought about protecting your images or text from copying. The first thing that comes to mind is to block the right click.     This can be effective for novice users, but we know it will always be possible to retrieve the address of the image file and thus by … [Read more...]

How does a modem work?

There are main two types of modems The modem is a device used to connect the Internet using a telephone or dedicated line. There are two types of modems, one that is most widespread is the internal modem. It is located inside the casing and is located on a PCI slot. The second is the external modem that is located outside the computer. It is connected to the PC via a cable. The advantage is that … [Read more...]

Firewall: Secure your Internet connection

Data exchange on Internet Some software uses the Internet connection to exchange data. A browser sends requests to a server and receives and  return to web pages. But meanwhile, you can be chatting with messaging software, and you might receive messages. The question we must ask is how your computer knows that this or that information received through the Internet is for a browser or other … [Read more...]

What are hub,switch and router

Network equipments   These three components are used to connect computers together and create networks. For that, we must be able to connect to computers using Ethernet cables RJ45 or USB cables. It is also possible to connect to WiFi.   Hub   The hub unit is the simplest and cheapest way to create a network. It has multiple ports for RJ45 cables. When sending data, it sends … [Read more...]

What are ASCII art and emoticons

Emoticons   Internet is an indirect exchange zone, when you talk to someone or writing something, you can not express your emotions because you are not in front of you. That is why we use emoticons (or smiley). They may consist of a sequence of characters or simply a picture or sequence of pictures (animated gif format). Most forums or blog often provide a list of clickable smileys those … [Read more...]

Differences between FTP and SSH

SSH   SSH (Secure Shell) is a secure communications protocol that allows you to connect to a remote computer via a Linux shell (the equivalent of the command prompt on Windows). The default port is 22. This ability to work remotely and to exchange data in encrypted form between two PCs. It is possible for example to log in from her workplace to her personal computer (it is necessary to keep … [Read more...]

What is a Network Address Translation (NAT) server?

Usefulness of the NAT server The number of IP (Internet Protocol) on the Internet is limited. A router will reduce this number through NAT (Network Address Translation). The computers will have different addresses on the local network and will use a NAT gateway with the router, which has a unique IP address visible on the Web. This router makes it possible to hide the local IP addresses. Consider … [Read more...]

What Peer-to-Peer (P2P) and what are the risks of using it?

Overview of P2P For starters, the basic download a file is as follows: The file is stored on a server, people who want this file (clients) need to connect to this server to download. So there is only one server and multiple clients. But there is a problem. If many people want to download a file on the same server at the same time, it will quickly saturated, and so the download will be … [Read more...]

Turning an old computer into a web server of your own

Principle of a server If you do not know what to do with your old computer, you must know that you can give it a new feature : turning it to a server. The principle of the server is to be permanently connected to the Internet to provide a particular service. This can be for example a Web server that will store your pages and make them accessible on the net. Indeed, it is not necessary to have a … [Read more...]

Simple tricks to enhance your password’s strength

Do you know that it is possible to insert a space in your username and password to login in to your Windows 7 user account. A simple way to secure access to your computer. Have you thought of this possibility so far? No, your answer gives you a negative view of the strength of this tip. By definition, a password is a string and a space is a character is not considered by most people. Tested under … [Read more...]

  • « Previous Page
  • 1
  • …
  • 58
  • 59
  • 60
  • 61
  • Next Page »

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (22.1K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • The Future Of Serverless: The Load-Intensive Workload Case May 25, 2022
  • Cutting Out The Coding: Serverless Computing In Action May 24, 2022
  • Types of Blackjack Variants: Discover the Different Versions of the Game May 23, 2022
  • How Cloud, Robotics And Sensor Technologies Are Changing The Business Landscape May 23, 2022
  • Modernizing Your Business With a Hybrid Cloud Strategy May 22, 2022

Popular in This Category

  • http error codes
  • network protocol
  • network protocols
  • html error codes
  • microformats
  • http error code
  • guru meditation error
  • what is a network protocol
  • what is sdk
  • Guru Meditation

About This Article

Cite this article as: Abhishek Ghosh, "," in The Customize Windows, , May 26, 2022, .

Source:The Customize Windows, JiMA.in

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Privacy Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2022 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy