Posts

Showing posts with the label computer

How do I Scan for Viruses in DOS?

How do I Scan for Viruses in DOS? Download and Extract the SDAT Files 1. Click on the following link or type the URL into an Internet browser address bar: http://www.mcafee.com/apps/downloads/security_updates/superdat.asp?region=us&segment=enterprise 2. Click the I Agree button (if needed) to verify you have a current support agreement with McAfee. 3. English users, please click the link named sdatxxxx.exe (where 'xxxx' replaces the current SDAT version number) and save the file to your C:\ Drive. 4. All others please select the appropriate localized language from the drop-down list, click the link named sdatxxxx.exe (where 'xxxx' replaces the current SDAT version number) and save it to your C:\ Drive. 5. From the Taskbar, select Start and then Run. 6. In the Open field, type command and click OK. A DOS command window will open. 7. Type CD\ and press Enter. You should now be at a C:\ prompt. 8. Type SDATXXXX.EXE /E C:\SDAT and press Enter. (Note: The 'x's sh

Top Ten Reasons You Should Quit Facebook

Image
Facebook privacy policies keep going down the drain. That’s enough reason for many to abandon it. Here you will find nine more: After some reflection, I’ve decided to delete my account on Facebook. I’d like to encourage you to do the same. This is part altruism and part selfish. The altruism part is that I think Facebook, as a company, is unethical. The selfish part is that I’d like my own social network to migrate away from Facebook so that I’m not missing anything. In any event, here’s my “Top Ten” reasons for why you should join me and many others and delete your account. 10. Facebook’s Terms Of Service are completely one-sided Let’s start with the basics. Facebook’s Terms Of Service state that not only do they own your data (section 2.1), but if you don’t keep it up to date and accurate (section 4.6), they can terminate your account (section 14). You could argue that the terms are just protecting Facebook’s interests, and are not in practice enforced, but in the context of their ot

Short notes about Radio-Spectrum Management

Radio-Spectrum Management The radio spectrum is a key resource for many new and developing technology-based industries. At the same time, it is a vital input into the delivery of many public services. The management and development of the spectrum will therefore play an important role in creating a knowledge-driven economy and society. To help ensure that the spectrum management framework is at the forefront of change, the Chancellor of the Exchequer and Secretary of State for Trade and Industry commissioned Professor Martin Cave1 in March 2001 to lead an independent review of radio spectrum management. The use of radio spectrum has become an integral part of society’s infrastructure. For decades, viewers have taken for granted the reception of clear TV signals, travellers have relied upon assured communications and radio-location for aircraft, and all citizens have benefited from radio connectivity for the public safety services. More recently, the phenomenal growth in personal mobile

Short notes about WIFI

WiFi: The term "Wi-Fi" suggests "Wireless Fidelity", comparing with the long-established audio recording term "High Fidelity" or "Hi-Fi", and "Wireless Fidelity" has often been used in an informal way, even by the Wi-Fi Alliance itself, but officially the term does not mean anything. "Wi-Fi" was coined by a brand consulting firm called Interbrand Corporation that had been hired by the Alliance to determine a name that was "a little catchier than 'IEEE 802.11b Direct Sequence' Interbrand invented "Wi-Fi" as simply a play-on-words with "Hi-Fi", as well as creating the yin yang style Wi-Fi logo. The Wi-Fi Alliance initially complicated matters by stating that it actually stood for "Wireless Fidelity", as with the advertising slogan "The Standard for Wireless Fidelity", but later removed the phrase from their marketing. The Wi-Fi Alliance's early White Papers still held in t

How do you define Layering in computer programming?

Layering 1) In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it. Communication programs are often layered. The reference model for communication programs, Open System Interconnection (OSI), is a layered set of protocols in which programming at both ends of a communications exchange uses an identical set of layers. In the OSI model, there are seven layers, each reflecting a different function that has to be performed in order for program-to-program communication to take place between computers. TCP/IP is an example of a two-layer (TCP and IP) set of programs that provide transport and network address functions for Internet communication. A set of TCP/IP and other layered programs is sometimes referred to as a protocol stack. 2) In Photoshop and many other graphic applications, a layer is

What do you mean by Payment gateway?

Payment gateway A payment gateway is an e-commerce application service provider service that authorizes payments for e-businesses, online retailers, bricks and clicks, or traditional brick and mortar. It is the equivalent of a physical point of sale terminal located in most retail outlets. Payment gateways encrypt sensitive information, such as credit card numbers, to ensure that information passes securely between the customer and the merchant. How payment gateways work A payment gateway facilitates the transfer of information between a payment portal (such as a website or IVR service) and the Front End Processor or acquiring bank. When a customer orders a product from a payment gateway enabled merchant, the payment gateway performs a variety of tasks to process the transaction: • A customer places order on website by pressing the 'Submit Order' or equivalent button, or perhaps enters their card details using an automatic phone answering service. • If the order is via a websi

Angels Investor

Angels: Venture capital is a fund raising technique for companies who are willing to exchange equity in their company in return for money to grow or expand their business. It can be raised for all types of business, both technology and non-technology businesses. Venture Capital also invests across stages – from the early stage seed venture, to later stage mezzanine financing. Venture capital firms usually require a high rate of return on their investment (20%+ per annum) and finance provided to the business is typically in the range of $500,000 to many millions of dollars. An angel investor generally wants less control of your company and a slower return on investment; however the criteria for investment are likely to be similar. Angel investor groups are great sources of private capital and frequently invest angel money into new companies. It follows that both venture capitalists and angel investors are looking for capital growth and revenue increases and evidence that your business c

Questions important for exam of Internet and intranet Examination

Ques1 What is internet? Discuss circuit switching & packet switching. Ques2 Compare and contrast OSI and TCP/IP. Ques3 Discuss RFCs. Chapter 2 Ques1 what is the function of application layer? Discuss Socket Programming. Ques2 what is HTTP? How apache web server is configured in Linux. Ques3 what is FTP & DNS? How Name-Server is configured in Linux? Ques4 Discuss SMTP & SNMP Chapter 3 Ques1 Differentiate Connection oriented and Connection less. Ques2 What is TCP? How TCP provides the reliable Data Transfer? Ques3 Discuss Session Teardown, TCP flow control and TCP Congestion Control. Ques4 Discuss UDP and its application. Chapter 4 Ques1 What is IP addressing? Discuss all categorization of IP with its implementation and its notation. Ques2 How can you provide best IP Solution in your own ideas (VLSM=>Variable Length of subnet masking)? Ques3 What is autonomous system? Discuss its types. Ques4 What are the types of Routing? Discuss the vector routing in brief Ques5 Wh

ASP.NET Validator Controls

ASP.NET Validator Controls   This tutorial gives a brief overview of how to use the ASP.NET Input Validation Controls. Back when we had only ASP, developers who had to write webpages for forms knew that the most tedious part is writing code to validate the user input. User input had to be validated so that malicious use of the pages couldn't be achieve. User input had to be validated so that an incorrect piece of information would not be entered. User input had to be validated so that the information stored was standardized. Yeah, some people had libraries of ASP functions to validate common things such as postal codes (zip codes for you Americans), e-mail addresses, phone numbers, etc. The developers of ASP.NET saw the tedium in always having to check user input. They decided that to simplify our life by including validation controls. ASP.NET validation controls also provide two ways of validation: Server-side or Clien

Retrieving Schema Information from the Data Source

Image
Retrieving Schema Information from the Data Source Schema information can be retrieved from a data source using the FillSchema( ) method, which retrieves the schema information for the SQL statement in the SelectCommand . The method adds a DataTable to the DataSet and adds DataColumn objects to that table. Finally, it configures the AllowDBNull , AutoIncrement , MaxLength , ReadOnly , and Unique properties of the DataColumn , based on the data source. While it configures the AutoIncrement property, it doesn't set the AutoIncrementSeed and AutoIncrementStep properties. The FillSchema( ) method also configures the primary key and unique constraints for the DataTable . It doesn't configure the DefaultValue property. In addition to an argument specifying the DataSet argument, the FillSchema( ) method takes an argument specifying whether the schema is transformed by the table mappings for the data adapter. Mapping tables and columns

Creating DataAdapter Object

Creating DataAdapter Object The overloaded constructor for the DataAdapter allows four different ways to create the data adapter, of which two are most commonly used. The following example creates a DataAdapter specifying the SELECT statement and connection string in the constructor. String connString = "Data Source=(local);Integrated security=SSPI;" +     "Initial Catalog=Northwind;"; String selectSql = "SELECT * FROM Orders";   SqlDataAdapter da = new SqlDataAdapter(selectSql, connString); While this approach is common, it is awkward when using parameterized queries or stored procedures. The following example creates a DataAdapter specifying a Command object for the SelectCommand property of the DataAdapter in the constructor: // create the Connection String connString = "Data Source = (local);Integrated security = SSPI;" +     "Initial Catalog = Northwind;"; SqlConnection conn = new SqlConn