Overview of P2P For starters, the basic download a file is as follows: The file is stored on a server, people who want this file (clients) need to connect to this server to download. So there is only one server and multiple clients. But there is a problem. If many people want to download a file on the same server at the same time, it will quickly saturated, and so the download will be … [Read more...]
Turning an old computer into a web server of your own
Principle of a server If you do not know what to do with your old computer, you must know that you can give it a new feature : turning it to a server. The principle of the server is to be permanently connected to the Internet to provide a particular service. This can be for example a Web server that will store your pages and make them accessible on the net. Indeed, it is not necessary to have a … [Read more...]
Glossary of dangerous dll files of Windows operating system
A DLL (Dynamic Link Library) is a resource that is used to run Windows operating systems and various software packages installed. These resources are very vulnerable and often subject to attacks of all kinds. Sometimes a user may accidentally delete a resource. Here is a targeted approach to some problems when calling a resource incorrect or missing. Typically replacing crush, a resource must be … [Read more...]
The principle and how to choose a browser
The principle of the browsers A browser is a software that allows you to view websites through HTTP by typing the addresses. It display pages by interpreting a markup language: XHTML. The appearance of a site may be different from one browser to another as this interpretation is not always the same due to non-compliance. How to choose a browser? A good browser should first have a clear … [Read more...]
What is the direct download (DDL)?
Direct download (DDL) in English corresponds to the dissemination and downloading of audio or video depending on client-server model, that is to say directly using your browser. In fact, you do not need to install additional software, it is possible to download a video easily. This distribution method has gained momentum with the arrival of Internet Piracy and monitoring of P2P networks. Indeed, … [Read more...]
Methodology hackers use for an intrusion to a network
This article aims to explain the methodology generally used by hackers to break into a computer system. It does not explain how to compromise a system but to understand how it may be better able to withstand them. Indeed, the best way to protect your system is to proceed in the same way that hackers to map the vulnerabilities of the system. So this article gives no details on how vulnerabilities … [Read more...]
Keep track of topics of interest on the Internet by using Microsoft Montage
Montage is a new online service by Microsoft Labs that allows everyone to create visual web albums of topics of interest. The information can be supplied from a variety of sources including RSS feeds, YouTube, Twitter or Bing. To make it better, they are updated in realtime so, always the latest and greatest informations are displayed. You can easily get started by visiting the website and … [Read more...]
What is a server?
A Server is generally a computer that makes its files available to other computers (in a network). The great thing about a server is that it stores files centrally and all users of the network can use these files together. Because the server files containing primarily holds, it is also called File Server, at least, especially when a company is operating within the server and saves documents. A … [Read more...]
The risks associated with use of Internet
Internet, the latest technological revolution in communications and certainly the largest since the invention of the telephony, has not finished to surprise us. Its capabilities are almost limitless, as are the dangers that accompany with it. On the other hand this media offers a quick and easy access to information, culture, and countless other riches, but it also opens the way as much overflow … [Read more...]
Risks related to prolonged usage of computers and how to avoid them
Meta analysis with 234 retrospective studies from 1986 to 2007 revealed that 6.3 out of 10 employees working in front of computer screen feel ocular-visual (cons 4 of 10 among other employees) problems, the median age being at 57 years. In DuPont Inc, United States, 535 accidents counted during two years (1999 and 2000), eighty-one percent were related directly or indirectly to CTS (carpal … [Read more...]
Major trends of evolution of the Computer : 1950-2010
The history of mankind is accelerating. Of the four billion years of existence of our planet, all known species are less than one hundred million years, humans have past less than a million years, the oldest picture on the wall of a cave is of 30,000 years. There are just 500 years, the invention of the printing press accelerated the dissemination of knowledge. 200 years separate us from the steam … [Read more...]