information

Tue
17
Sep
Dennis Faas's picture

Using Trace Route and Ping to trace pathways on the Internet

Tracert.exe? Ping.exe? What the heck is that? Trace Route (tracert.exe) is a DOS command line utility program that traces connection pathways along the Internet using the TCP / IP protocol. Ping (ping.exe) calculates how long it takes to transfer a ... packet of information from origin [you] to destination [a web site] and back again [to you]. What is TCP / IP? The TCP / IP protocol is a method used to communicate computers on the Internet. Any computer using the TCP / IP protocol has a unique address, referred to as an IP (Internet Protocol) address. An IP address can be thought of as a special ... (view more)

Tue
30
Jul
Dennis Faas's picture

Burning on the fly

Have you ever "burned on the fly?" No -- I'm not talking about burning an insect with a magnifying glass like some of us did when we were younger (kids can be so cruel!) Burning on the fly is a technical term that essentially means writing directly ... to a CD recorder from another source other than your hard drive. Usually when a CD is burned, it is read from the hard drive and then written to the CD burner. The important thing to note here is that a hard drive can retrieve information must faster than any other source-medium of information. An example of burning on the fly might be ... (view more)

Tue
21
May
Dennis Faas's picture

Information Technology Abuse -- Privacy Issues (Part 1 of 2)

Abstract Due to the length of this article, it has been sectioned into two parts. This article presents an overview of current privacy issues, discusses potential methods in which an individual's privacy may be jeopardized, and examines specific ... countermeasures that can be used to protect private information. The focus of this paper is primarily the privacy of individuals using personal computers in a home environment and on the Internet. All software applications referenced herein have been tested by this writer on the Windows 98 Second Edition operating system. Other operating systems may ... (view more)

Tue
21
May
Dennis Faas's picture

Information Technology Abuse -- Privacy Issues (Part 2 of 2)

Abstract This article is a continuation of last week's issue of the Infopackets Gazette. This article presents an overview of current privacy issues, discusses potential methods in which an individual's privacy may be jeopardized, and examines ... specific countermeasures that can be used to protect private information. Information Technology Abuse -- Privacy Issues (Part 1 of 2) -- Third Layer: Firewalls, Web Filters, and Tracking Detection Firewalls: Any computer system that accesses the Internet should be equipped with a firewall to enable the user to detect and prevent unauthorized access to ... (view more)

Tue
07
May
Dennis Faas's picture

Changing Domain Registrars

Last week the last issue of the Infopackets Gazette was sent out. At the same time, a configuration change was made to the web server which hosts infopackets.com. What happened? It's a long story, but I'll try to reiterate in simple mumbo-jumbo ... without too much techy-talk. As you may already know, infopackets.com has experienced a major growth spurt in the last few months and has outgrown its current web server configuration. Therefore, it was decided that infopackets.com should be moved to a dedicated web server which offers unlimited bandwidth to fit the needs of its users. A purchase was ... (view more)

Sun
14
Apr
Dennis Faas's picture

Unlimited Bandwidth Shopping for a New Web Host and Server

Have you ever wondered where you are connected to when you're visiting a web site? Believe it or not, every web site in cyberspace resides on a computer which is physically located somewhere in the world. Each server is "hosted" by a company which ... dictates the configuration of each server, such as: how many web sites reside on each web server, server-to-Internet connection speed, how much information can be transferred per site per month (also known as bandwidth limitations), and the like. Different web-hosting packages are offered by different web-hosting companies and define the ... (view more)

Mon
14
Jan
Dennis Faas's picture

How Buffer Underrun technology hinders CD Recording Performance

If you own a CD Burner, there's a good chance that you've come across a "Buffer Underrun" error message. A buffer underrun happens when information cannot be recorded to the CD because of resource starvation. All CD recorders without buffer underrun ... protection require a constant flow of data to be read from the hard drive to the CD recorder without interruption. If the flow of data is stopped, a buffer underrun will follo w. For example, if your hard drive can only read information at a rate of X and the CD Recording needs information at a rate of X+1, this is referred to resource ... (view more)

Fri
14
Dec
Dennis Faas's picture

CD, CDR, CDRW, DVD and their Hybrid Standards

A CD is an acronym for Compact Disc. It can refer to any media type which is based on CD technology. For example, a CD can be a computer disc, a music disc, or a video CD. Each CD standard is defined by ISSO-9660, a model used by the International ... Standards Organization. Because there are so many different CD formats, there are a number of books describing certain formats and specifications for each type. For example, the ISSO-9660 Red Book defines standards that all devices which play music CDs must follow for 100% compatibility. Here is a quick run-down about ISSO-9660 standards (adapted ... (view more)

Pages

Subscribe to RSS - information