• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Computer

By Abhishek Ghosh November 9, 2014 8:07 am Updated on November 9, 2014

Filename Extension : Basics

Filename Extension Holds Variable Number of Words From Two Worded Like .pl, .sh Through Three, Like .png, .gif, Can Be Four Like .jpeg or Longer. Why They Varies in Number? In other words, is not it would e great if all the file extensions had an universal number of words to avoid typographical errors? There is a long history behind these Filename Extension.   Filename Extension : … [Read more...]

By Abhishek Ghosh July 20, 2014 12:17 pm Updated on July 20, 2014

Why WWW Prefix Was Introduced

There is historical reason why WWW was appended before the domain nearly 2 decades back from today. Confusion is common among the common users. It is quite sad that, at the age of Internet of Things (IoT), most still never understand a practical fact - appending www has no value anymore because today domains are registered as bare domain, like example.com, wordpress.org, abhishekghosh.net via the … [Read more...]

By Abhishek Ghosh July 18, 2014 6:36 am Updated on July 18, 2014

What is Time Synchronized Mesh Protocol (TSMP)?

What is Time Synchronized Mesh Protocol (TSMP)? TSMP has similarities with Time-division multiplexing and now in focus due to IoT and Wireless Sensor Network. In our previously published article; we have discussed about the Protocols Related to Internet of Things (IoT) and we have mentioned about this Time Synchronized Mesh Protocol (TSMP). In this article, we will discuss about Time Synchronized … [Read more...]

By Abhishek Ghosh November 7, 2013 4:33 am Updated on November 7, 2013

Technical Aspects of Data Security in the Cloud

Technical aspects of data security in the cloud is one of the main reason why the companies or the end users thinks to be in the cloud. Here is a discussion. Cloud computing is no longer just a buzzword, over the years cloud computing has established itself as a serious technology as alternative resource for infrastructure, platforms and applications. Cloud computing now offers own cloud based … [Read more...]

By Abhishek Ghosh November 5, 2013 11:32 am Updated on November 5, 2013

Zoom Lens : Design and Technical Details

Zoom Lens contains the word zoom, means a quick motion indicating the capability of changing focal length. Technical know how of zoom lens is discussed in this article. We have a basic article on Zoom Lens too - Zoom Lens and Digital Photography. Also common designations such as varifocal lens or Vario system are used to indicate this Zoom Lens. While the zoom and varifocal lenses hold constant … [Read more...]

By Abhishek Ghosh November 4, 2013 5:14 am Updated on November 4, 2013

WebRTC or Web Real-Time Communication

WebRTC or Web Real-Time Communication is a programming interface which is currently at the stage of draft in the W3C for voice call, video chat, file sharing. Programming interface here means API which was discussed before.WebRTC or Web Real-Time Communication is a dedicated list, which was created in April 2011 and a working group within the IETF created in May 2011. It is an example of software … [Read more...]

By Abhishek Ghosh November 2, 2013 9:41 am Updated on November 2, 2013

Cloud Computing in Small Business : Outlook

Cloud Computing in Small Business such as ERP, also shows expected competitive advantages through cloud until the competitor has implemented a similar model. This article is an outlook based on our previous three articles - Strategic Requirements for Including Cloud computing for Small Businesses, Opportunities and Risks of Cloud Computing for Small Business and Use of Cloud Computing in Small … [Read more...]

By Abhishek Ghosh November 2, 2013 4:42 am Updated on November 2, 2013

Command and Control Server and Technologies

Command and Control Server are centralized servers which are able to send commands and a part of Botnet. Botnet is group of computers to run automated program. The bots (came from the English words - "robots") can run on the networked computers whose network connections are available as well as on local resources and collect the available data. So, as can be understood, Command and Control Server … [Read more...]

By Abhishek Ghosh October 31, 2013 8:05 pm Updated on October 31, 2013

Sandbox in Computer Security

Sandbox allows the execution of software(s) with less risk to the operating system. These are often used to execute untested code of dubious origin. We talked about Advanced Persistent Threats or APT in an older article, also we mentioned we use Sandbox mode to check them. The term Sandbox is also used in a broader sense to refer to a test environment for software or websites - we are not talking … [Read more...]

By Abhishek Ghosh October 31, 2013 11:34 am Updated on October 31, 2013

Advanced Persistent Threat

Advanced Persistent Threat (APT) is a terminology which is often used in the area of cyber threats (cyber attack) for describing the complex, purposeful and effective attack on critical IT infrastructures and confidential data from public authorities, large- and medium-sized enterprises from all sectors, which represent potential victims because of their technological lead. In the course of such … [Read more...]

By Abhishek Ghosh October 30, 2013 9:53 pm Updated on October 30, 2013

How to Analyze Network Traffic to Detect Advanced Persistent Threats

Many IT workers feel more like firemen than like networking professionals. They detect network attacks, respond to them and move on to the next problem. However, putting out fires is an ineffective approach because research has shown that most cyber attacks are not one-time events. They are a series of ongoing attacks designed to probe a network's weakness and compromise it. While knowing that … [Read more...]

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 82
  • Next Page »

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy