Introduction The RGB color model is an additive model in which red, green, and blue (often used in additive light models) are combined in...
Introduction ROT13 ("rotate by 13 places", sometimes hyphenated ROT-13) is a simple Caesar cipher used in online forums as a means of hiding...
The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers: C:\>set /a 2+2 4...
Goto Start -> Run the type telnet towel.blinkenlights.nl and then press Enter. Note: You need to be connected to the internet to be able to view...
Introduction There's been a lot of publicity about pop-up windows, and most of it hasn't exactly been rave reviews. But it hasn't always been...
Introduction Microsoft Outlook Express is a popular and free e-mail client that comes bundled with most versions of Windows client (except for...
Seagate's Momentus FDE.2 full-disk encrypted hard drives put the reviewer in a quandary. If a product's intent is to be invisible, a...
Introduction XOR encryption is a trivially simple symmetric cipher which is used in many applications where security is not a defined...
The Parental Controls in Windows Vista lets you easily control what your child can or cannot do, and monitor his/her activities using the built-in...
Windows Vista works in the background to automatically index all the files in the Start Menu, user profile folders and files setup for offline...
Introduction Ajax, or AJAX, is a web development technique used for creating interactive web applications. The intent is to make web pages...
Programming errors are a fact of life, but pulling your hair out while tracking down these errors should not be. More robust development languages...
Objects in Java are referred using reference types, and there is no direct way to copy the contents of an object into a new object. The...
Recently, an obscure detail in the way PHP processes strings came to my attention. This is processed by code that checks for simple lists (like...
A binary-safe function is a function or operation that can be performed on a binary file without modifying the contents of the file. This ensures...
Checkout the alphabetical list of linux commands here http://www.oreillynet.com/linux/cmd/
Introduction A random number generator (often abbreviated as RNG) is a computational or physical device designed to generate a sequence of...
Are You Invisible Online? It's true that your IP address is no secret. It's a basic part of internet communication protocols to send your IP...
Introduction The throw statement allows you to create an exception. If you use this statement together with the try...catch statement,...
Introduction Roman numerals are a great way to add a bit of class to a web page. They are often used in official titles, such as the XXXIV...
Separate names with a comma.