Latest Posts

Session Control Protocols – SCP


This degree of performance is accomplished by modifying the conventional TCP flow control systems in quite a few ways. It remains to be viewed whether the utility supplied by this protocol will wind up widely deployed within the online environment, or whether it is going to function as a catalyst for more growth of transport…

Read More

Protocol Verification Techniques


Any generic tunneling which happens at the circuit level such as SOCKS and SSL will allow any protocol to pass through proxies and VPN server gateways.   The implication is though that the proxy server itself does not either understand the protocol or how it actually works.  One important example is the SSL tunneling protocol,…

Read More

HTTP Requests and XML


The XMLHttpRequest object is employed to exchange data using a server. That’s the fundamental structure of HTTP. In case there’s an issue with the request, a HTTP error is going to be displayed within the browser. The remainder of this document tells the best way to upgrade your buyers and servers to utilize HTTP 1.1….

Read More

SGML and Multimedia Development


SGML can execute vast complicated troubles but simple identification of structure requires an excessive amount of effort which could be avoided by using XML. Unlike HTML, XML does not have any fixed tags. The subsequent document has got the advantage it can be validated by means of a SGML parser. Otherwise, SGML is frequently converted…

Read More

ISGMLUG Newsletter


SGML and XML are both languages that are used for defining markup languages. More specifically, they are metalanguage formalisms that facilitate the definition of descriptive markup languages for the purpose of electronic information encoding and interchange. SGML and XML support the definition of markup languages that are hardware- and software-independent, as well as application-processing neutral….

Read More

Switching your IP Address Online


There might be several reasons regarding why you may want to change IP. All you have to accomplish is to define the many network connections and IP addresses. There are a few utility applications accessible in the market which assist you to toggle addresses and connections. Therefore every gadget is offered with a distinctive address….

Read More

A Brief History of Linux


A Linux server was known to become more robust and respectable. In reliability, Linux is well known among the most dependable operating structure, since the system itself don’t have some bugs and hence, secures your site. Usually, Linux systems find it impossible to access NTFS file structures, but with assistance from add-on software, it can….

Read More

Evolution of Design and Style Sheets


First evolution of site design, the Internet was initially introduced only as a means to rapidly share information, mainly stuff like scientific documents and research papers, throughout the world. There were several issues though and the context and format of how that information was delivered was  Several have cited the mix of XSLT and XSL-FO…

Read More

Start of the VPN Wars


The use of VPNs has grown exponentially in the last few years.  Of course they have always been used particularly in the context of the internet, the virtual private network provided a simple and secure way to traverse the insecure infrastructure of the internet back to a specific point. For people who worked internationally it…

Read More

Using TCP Dump Filters


TCPDump is a Unix tool, which can be used to collect data from networks and can help decipher the output in an easy to understand manner.  At first trying to make sense of any amount of data can be a real trial yet that’s where using the analyser and it’s filters is so important. If…

Read More

← OLDER POSTS