Articles

All About Authenticode

Authenticode is a technology developed by Microsoft to allow computers to verify the origin of programs, documents and other computer files ...

All About Computer Viruses

Computer viruses are a sickness that every computer user encounters sooner or later. In fact, viruses are just one example of a whole group of nuisance programs which are known as ...

Choosing an NTP server reference clock

NTP is the standard protocol for distributing accurate time around the Internet to time clients. There are many public stratum 1 NTP servers that reside on the Internet. However, ...

ClamAV - the free GPL anti-virus

For the last couple of years I have been keeping an eye on ClamAV, the open source virus scanner. This is a cross-platform product. The Windows version requires the ...

Code signing for developers

If you are a software developer then you probably already know that Microsoft Windows and web browsers such as Internet Explorer and Mozilla Firefox use a technology called Authenticode to verify ...

Continuous data protection

You never know when your computer will crash or your hard drive fail. So every computer user should have up to date backups of the files and documents on their computer. ...

Getting the Best from Your Broadband Connection

Confused about Broadband and how to get the best results? Don`t despair - you are not alone. In the world of cyberspeak, marketing frequently beats technology and what is claimed is rarely ...

How to buy gold. A review of BullionVault.com.

I often wished that I could buy gold, but thought that this was only an option for rich people able to afford entire gold bars. For many years it was. Small investors can, of course, buy coins or jewellery. But ...

Introduction to Voice over IP

Voice over IP (Voip, pronounced voyp) is a technology that allows voice conversations to be conducted over the Internet (hence IP, for Internet Protocol) instead of ...

How DNS works

IP addresses are easy for computers to work with, but hard for humans to remember. The Domain Name System (DNS) solves that problem by allowing us to refer to hosts by names like ...

How PCI works

The acronym PCI stands for Peripheral Component Interconnect, which aptly describes what it does. PCI was designed to satisfy ...

How USB works

Today, a PC user expects to be able to connect his or her system to a wide range of external devices: not just printers and modems, but scanners, video cameras, portable storage devices...

.NET Framework - what is it?

The .NET Framework is a Microsoft technology that provides features and functions that can be used by programs which run under Microsoft Windows. It provides extra functionality that is not included ...

TCP/IP 1: TCP/IP basics

TCP/IP is a network protocol which is used on LANs, WANs and the Internet. This article will explain the key concepts of how TCP/IP works. TCP/IP stands for Transmission Control Protocol ...

TCP/IP 2: TCP and UDP

The link layer and network layer protocols of the TCP/IP suite, which are concerned with the basic mechanics of transferring blocks of data across and between networks, are the foundations of ...

TCP/IP 3: Application Layer Protocols

In this article we will examine some of the application-layer protocols, how they work, and how they exploit the characteristics of UDP and TCP. ...

TCP/IP 4: Email protocols: SMTP and POP3

A striking point about many of the application layer protocols is how simple they are. The protocols based on TCP mostly use commands and responses in plain ASCII text, making them easier for a ...

The Windows Registry

Every operating system and application needs a place to store configuration settings and user preferences. As computers have become more complex, ...

Understanding File Systems

A file system is a method for storing and organizing files on a storage medium such as a hard disk, memory card, CD or DVD. ...

Understanding Windows Drivers

Device drivers, usually just called "drivers", are some of the most important components in your computer operating system. ...

Using NTFS for USB Flash pen drive

USB Flash memory drives (also known as pen drives or memory sticks) are normally formatted using the FAT or FAT32 file systems, as are most removable drives. NTFS is generally considered to be ...

Why Registry Maintenance is Important

The registry is the place where Windows keeps information about all the software installed on your computer as well as its settings. The information in the registry can easily get out of step ...

Why Your Computer Needs MagiCure

From time to time every computer user experiences one of these common problems: A needed file is lost or deleted; A file is overwritten or destroyed ...