Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Replies
Views
Introduction Multithreading is a concept where a program is broken into two or more parts called threads and all these threads run in parallel. Multithreading can make programs more responsive and effective and it increases its performance too. For example, today web pages need to display...
0
4,971
Packet sniffing is listening (with software) to the raw network device for packets that interest you. When your software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password." ...
0
11,945
TLS (Transport Layer Security), defined in RFC 2246, is a protocol for establishing a secure connection between a client and a server. TLS (Transport Layer Security) is capable of authenticating both the client and the server and creating a encrypted connection between the two. The TLS...
0
4,368
Using authoritative name service, DNS servers primarily advertise to the world the various records associated with the domain they serve. Because users prefer common names and networks prefer numbers, DNS servers handle the translation between what a user types in a browser—such as...
0
5,278
In this article we will explore the two main choices of graphic format that can be used on the Web to represent simple graphics, schemas or logos: · GIF (stands for Graphics Interchange Format) was developed in the late 1980's and it is still widely used. · PNG (Portable Network Graphics) was...
1
3,160
If you have used a computer for more than five minutes, then you have heard the words bits and bytes. Both RAM and hard disk capacities are measured in bytes, as are file sizes when you examine them in a file viewer. You might hear an advertisement that says, "This computer has a 32-bit...
1
8,600
DoS Attack DoS stand for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. DDoS Attack DDoS stands for Distributed Denial of Service. It is an attack where multiple...
4
9,388
I have nothing to say the guide is self explanatory about itself, if a m confusing u read on.... lol BIOS Beep Codes When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's...
1
4,673
ADSL (Asymmetrical Digital Subscriber Line) - A means of delivering high communication speeds over existing copper phone lines. Analog - The technology used by the original mobile phones. Like traditional radio broadcasts, phone conversations and information are transmitted in the form of a...
0
3,337
Direct Attached Storage (DAS) Today, greater than 95% of all computer storage devices such as disk drives, disk arrays and RAID systems are directly attached to a client computer through various adapters with standardized software protocols such as SCSI, Fibre Channel and others. This type of...
0
2,848
What is a firewall? A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It may be a hardware device running on a secure host computer. In either case, it must have at least...
3
6,434
Q: What are the seven layers of the OSI model? A: The layers are physical, data link, network, transport, session, presentation, and application layers. Q: In the TCP client-servel model, how does the three-way handshake work in opening connection? A: The client first sends a...
0
2,760
Imagine a network based on inexpensive, high volume chipsets, with data rates up to 12Mbit/second and a 25 meter distance capacity, designed from the start with “plug and play” in mind. Add 5 Volt power, with up to 500mA current capacity, and compatibility with many consumer products. ...
1
13,891
Hard Drives are one of the most important parts on your computer. They are also one of the most expensive. All hard drives share a basic structure and are composed of the same physical features. However, not all hard drives perform the same way, as the quality of the parts of the hard drive will...
0
5,925
Routing and switching can be two terms that are difficult to differentiate, so here is a simple explanation that may help to clarify things. First of all switching and routing are not the same thing. Switching involves moving packets between devices on the same network. Conversely, routing involves...
0
15,926
The term Web services describe a standardized way of integrating Web-based applications. Web services technology represents an important way for businesses to communicate with each other and with clients as well. It is a truly distributed computing model in which applications talk to one another....
0
3,605
So, what is a cipher anyway? A cipher is an algorithm or set of algorithms that systematically convert a sender's intended message text to what appears to be meaningless text, which can be converted back to the sender's original message only by authorized recipients. The following terms and...
0
10,578
Adware Adware is any computer program or software package in which advertisements or other marketing material are included with or automatically loaded by the software and displayed or played back after installation. The justification for adware is that it helps recover programming...
0
3,759
WAP stands for Wireless Application Protocol, a secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators. The idea comes from the wireless industry, from companies such as...
0
3,781
Newspapers Internet magazines came with cover stories when Denial of service (DoS) attacks assaulted a number of large and very successful companies' websites last year. Those who claim to provide security tools were under attack. If Yahoo, Amazon, CNN and Microsoft feel victim to DoS attacks, can...
0
9,372