Latest Posts

Switching your IP Address Online


There might be several reasons regarding why you may want to change IP. All you have to accomplish is to define the many network connections and IP addresses. There are a few utility applications accessible in the market which assist you to toggle addresses and connections. Therefore every gadget is offered with a distinctive address….

Read More

A Brief History of Linux


A Linux server was known to become more robust and respectable. In reliability, Linux is well known among the most dependable operating structure, since the system itself don’t have some bugs and hence, secures your site. Usually, Linux systems find it impossible to access NTFS file structures, but with assistance from add-on software, it can….

Read More

Evolution of Design and Style Sheets


First evolution of site design, the Internet was initially introduced only as a means to rapidly share information, mainly stuff like scientific documents and research papers, throughout the world. There were several issues though and the context and format of how that information was delivered was  Several have cited the mix of XSLT and XSL-FO…

Read More

Start of the VPN Wars


The use of VPNs has grown exponentially in the last few years.  Of course they have always been used particularly in the context of the internet, the virtual private network provided a simple and secure way to traverse the insecure infrastructure of the internet back to a specific point. For people who worked internationally it…

Read More

Using TCP Dump Filters


TCPDump is a Unix tool, which can be used to collect data from networks and can help decipher the output in an easy to understand manner.  At first trying to make sense of any amount of data can be a real trial yet that’s where using the analyser and it’s filters is so important. If…

Read More

Automating Text Creation Using SGML


In 1995, the staff of the HTI began work on the American Verse Project, an electronic archive of American poetry. Although a few eighteenth century works will soon be comprised, the vast majority of the works are from the nineteenth and early twentieth centuries. The collection is both browseable and searchable. Users who just wish…

Read More

Retaining Logs – Legal and Policy Requirements


In most countries, there are legal and policy requirements about log retention. To comply with the leading audit standards like Sarbanes-Oxley, ISO-9000 and VISA CISP, then a corporate policy is a a necessity. One important requirement of this policy is the subject of critical system log archive retention, how these logs are stored and retained….

Read More

Introduction to Object Technologies


Object orientated technology has brought software development past procedural programming and into a world where programmes can be readily reused. This of course vastly simplifies development of applications because any programmer can leverage existing modules quickly and efficiently. OPerating systems and applications are created as multiple modules that are slotted together to create a functional…

Read More

Internet VPNs


An internet VPN can provide a secure way to move data packets across the web if you have the right equipment. There are two basic methods for doing this. Transport Mode – which is the technique of encrypting only the payload section of the IP packet for transport across the internet. Using this method the…

Read More

Different Types of XML Parser


XML parser is a software module to read documents and a way to give access for their content. XML parser generates a structured tree to return the results to the browser. An XML parser resembles a processor that determines the construction and properties of the data. An XML document can be read by an XML…

Read More

← OLDER POSTS