• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Computer and Internet » Internet

Internet

Description and explanation of different terminologies used in web and Internet.

How does a modem work?

There are main two types of modems The modem is a device used to connect the Internet using a telephone or dedicated line. There are two types of modems, one that is most widespread is the internal modem. It is located inside the casing and is located on a PCI slot. The second is the external modem that is located outside the computer. It is connected to the PC via a cable. The advantage is that … [Read more...]

Firewall: Secure your Internet connection

Data exchange on Internet Some software uses the Internet connection to exchange data. A browser sends requests to a server and receives and  return to web pages. But meanwhile, you can be chatting with messaging software, and you might receive messages. The question we must ask is how your computer knows that this or that information received through the Internet is for a browser or other … [Read more...]

What are hub,switch and router

Network equipments   These three components are used to connect computers together and create networks. For that, we must be able to connect to computers using Ethernet cables RJ45 or USB cables. It is also possible to connect to WiFi.   Hub   The hub unit is the simplest and cheapest way to create a network. It has multiple ports for RJ45 cables. When sending data, it sends … [Read more...]

What are ASCII art and emoticons

Emoticons   Internet is an indirect exchange zone, when you talk to someone or writing something, you can not express your emotions because you are not in front of you. That is why we use emoticons (or smiley). They may consist of a sequence of characters or simply a picture or sequence of pictures (animated gif format). Most forums or blog often provide a list of clickable smileys those … [Read more...]

Differences between FTP and SSH

SSH   SSH (Secure Shell) is a secure communications protocol that allows you to connect to a remote computer via a Linux shell (the equivalent of the command prompt on Windows). The default port is 22. This ability to work remotely and to exchange data in encrypted form between two PCs. It is possible for example to log in from her workplace to her personal computer (it is necessary to keep … [Read more...]

What is a Network Address Translation (NAT) server?

Usefulness of the NAT server The number of IP (Internet Protocol) on the Internet is limited. A router will reduce this number through NAT (Network Address Translation). The computers will have different addresses on the local network and will use a NAT gateway with the router, which has a unique IP address visible on the Web. This router makes it possible to hide the local IP addresses. Consider … [Read more...]

What Peer-to-Peer (P2P) and what are the risks of using it?

Overview of P2P For starters, the basic download a file is as follows: The file is stored on a server, people who want this file (clients) need to connect to this server to download. So there is only one server and multiple clients. But there is a problem. If many people want to download a file on the same server at the same time, it will quickly saturated, and so the download will be … [Read more...]

Turning an old computer into a web server of your own

Principle of a server If you do not know what to do with your old computer, you must know that you can give it a new feature : turning it to a server. The principle of the server is to be permanently connected to the Internet to provide a particular service. This can be for example a Web server that will store your pages and make them accessible on the net. Indeed, it is not necessary to have a … [Read more...]

Simple tricks to enhance your password’s strength

Do you know that it is possible to insert a space in your username and password to login in to your Windows 7 user account. A simple way to secure access to your computer. Have you thought of this possibility so far? No, your answer gives you a negative view of the strength of this tip. By definition, a password is a string and a space is a character is not considered by most people. Tested under … [Read more...]

What is the direct download (DDL)?

Direct download (DDL) in English corresponds to the dissemination and downloading of audio or video depending on client-server model, that is to say directly using your browser. In fact, you do not need to install additional software, it is possible to download a video easily. This distribution method has gained momentum with the arrival of Internet Piracy and monitoring of P2P networks. Indeed, … [Read more...]

Methodology hackers use for an intrusion to a network

This article aims to explain the methodology generally used by hackers to break into a computer system. It does not explain how to compromise a system but to understand how it may be better able to withstand them. Indeed, the best way to protect your system is to proceed in the same way that hackers to map the vulnerabilities of the system. So this article gives no details on how vulnerabilities … [Read more...]

  • « Previous Page
  • 1
  • …
  • 61
  • 62
  • 63
  • 64
  • Next Page »

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025

Popular in This Category

  • http error codes
  • network protocol
  • network protocols
  • html error codes
  • microformats
  • http error code
  • guru meditation error
  • what is a network protocol
  • what is sdk
  • Guru Meditation
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy