You can download basic needed software from a place. This website has more WINDOWS' and MAC'S soft wares. Click here go there!.
Monday, July 27, 2015
- July 27, 2015
- Unknown
- General
- No comments
Shareware is software that is distributed free on a trial
basis with the understanding that the user may need or want to pay for it
later. Some software developers offer a shareware version of their program with
a built-in expiration date (after 30 days, the user can no longer get access to
the program). Other shareware (sometimes called liteware) is offered with
certain capabilities disabled as an enticement to buy the complete version of
the program.
Tuesday, July 21, 2015
- July 21, 2015
- Unknown
- General
- No comments
You want to download Bamini font. Here you can
download Bamini font free of cost. Click the following link.
Tamil Fonts
Tamil Fonts
Microsoft Windows users:
Way 1: Open the Bamini font and click
the install button.
- July 21, 2015
- Unknown
- Networking
- No comments
PING
- Packet INternet Groper
Packet
Internet or Inter-Network Groper (PING)
Ping
is a network diagnostic tool used primarily to test the connectivity between
two nodes or device.
To
ping a destination node, an Internet Control Message Protocol (ICMP) echo
request packet is sent to that node.
If
a connection is available, the destination node responds with an echo reply.
Ping
calculates the round-trip time of the data packet's route from its source to
the destination and back, and determines whether any packets were lost
during the trip.
The
network ping tool was created by Mike Muuss in 1983. It contains
almost one thousand lines of code and has become the standard packaged tool for
various network applications and operating systems.
The
ping utility works by generating an ICMP data unit that is then encapsulated
into IP datagrams and transmitted over the network. After receiving the echo
request, the destination node copies its payload, destroys the original packet
and generates an echo reply with the same payload it received.
The
payload of the echo request packet often consists of American Standard Code for
Information Interchange (ASCII) characters with variable adjustable lengths.
Round-trip time is calculated by noting the local time of the source node clock
when the IP datagram leaves the source node, then subtracting that time from
the time at which the echo reply arrives.
Depending
on the operating system, ping utility output varies. However, almost all ping
outputs display the following:
Destination
IP address
ICMP
sequence number
Time
to live (TTL) - TTL is used in IP (TCP/UDP are on top of IP) to kill
off a packet if it travels too far.
Round-trip
time
Payload
size
The
number of packets lost during transmission
The
ping tool displays various error messages if a round trip is not completed
successfully. They include the following:
TTL
Expired in Transit: Determines the maximum amount of time an IP packet may live
over the network before being discarded if it has not reached its destination.
To address this error, try to increase TTL value by using the ping -i
switch.
Destination
Host Unreachable: Indicates that the destination node is down or is not
operating on the network. It may even occur due to the non-existence of a local
or remote route for the destination host. To address
this error, modify the local route table or switch the node on.
Request
Timed Out: Indicates that the ping command timed out because there was no reply
from the host. It indicates that no echo reply messages were received due to
network traffic, failure of Address Resolution Protocol (ARP) request packet
filtering or a router error. Increasing the wait time using the ping –w switch
may address this problem.
Unknown
Host: Indicates that the IP address or the host name does not exist in the
network or that the destination host name cannot be resolved. To address this
issue, verify the name and availability of the domain name system (DNS) servers
- July 21, 2015
- Unknown
- Linux
- No comments
The GNU General Public License (GNU GPL or GPL) is the most widely used free software license, which guarantees end users (individuals, organizations, companies) the freedoms to run, study, share (copy), and modify the software.
- July 21, 2015
- Unknown
- General
- No comments
Proprietary software (non-free software/closed-source software) is software that is owned by an individual or a company (usually the one that developed it). There are almost always major restrictions on its use, and its source code is almost always kept secret.
Wednesday, July 15, 2015
- July 15, 2015
- Unknown
- General
- No comments
There are many different types of domain extensions you
can choose for your domain name. This depends on your business nature. If you
are going to register a domain name for educational site purpose then you can
go for .edu extension. Below is a reference of the correct usage of
certain extensions. But there is no hard and fast rule to go for any extension.
Most commonly used is .com
1).com - Stands for company/commercial, but
it can be used for any web site.
2).net - Stands for network and is usually
used for a network of sites.
3).org - Stands for organization and is
supposed to be for non-profit bodies.
4).us, .in - They are based on your country
names so that you can go for country specific domain extensions.
5).biz - A newer extension on the Internet
and can be used to indicate that this site is purely related to business.
6).info - Stands for information. This domain
name extension can be very useful, and as a new comer it's doing well.
7).tv - Stands for Television and are more
appropriate for TV channel sites.
Newer domain extensions such as .biz .info and .us etc. have more name choices
available as many of the popular domains have yet to be taken and most of them are available at very nominal prices.
Friday, July 10, 2015
- July 10, 2015
- Unknown
- General
- No comments
CC means carbon copy and BC means blind copy. If you are sending an email out to some one why would you CC them if you can just put there email in the "TO" space along with everyone your sending it to? and blind copy is just dumb. Explain it?
In a business environment To: is used for the main persons you're communicating with on a matter. Cc: would be used for other names who just need to know about the issue, but who are not actually in the conversation.
Some people use Bcc: to send to many people without each seeing the other's address, but it could also be used to cause mischief by copying an active conversation to someone else secretly.
BCC is a very good thing to use.
You can send the email to many people, but they cant see the email addresses of the other people, to whom it was sent.
BCC is a very good thing to use.
You can send the email to many people, but they cant see the email addresses of the other people, to whom it was sent.
Wednesday, July 8, 2015
- July 08, 2015
- Unknown
- General
- No comments
What is SLT Broadband (ADSL)?
SLT Broadband provides you
consistent, uninterrupted, high speed internet access through ADSL technology.
It converts your regular phone line into a high-speed digital link, enabling
simultaneous transmission of voice and data, as opposed to dial-up internet. As
a result of switching to Broadband ADSL, data can be transferred at greatly
increased speeds. and above.
What does the terms "ADSL" and "BROADBAND" refer
to?
Broadband refers to a form of
telecommunication that allows higher data transfer rates. Broadband transfers
data at least 10 times faster than standard dial-up, because it provides wide
band of frequencies to transfer data at the same time.
ADSL (Asymmetric Digital
Subscriber Line) is a broadband connection technology which utilizes existing
copper wired telephone networks. ADSL is ‘asymmetric’ because it facilitates
different speeds for downloading and uploading, for optimized performance. This
is the reason why ADSL packages always quote higher download speeds compared to
upload speeds
Monday, July 6, 2015
- July 06, 2015
- Unknown
- General
- No comments
Displays, sets, or removes the read-only, archive, system, and hidden attributes assigned to files or directories. Used without parameters, attrib displays attributes of all files in the current directory.
+r : Sets the read-only file attribute.
-r : Clears the read-only file attribute.
+a : Sets the archive file attribute.
-a : Clears the archive file attribute.
+s : Sets the system file attribute.
-s : Clears the system file attribute.
+h : Sets the hidden file attribute.
-h : Clears the hidden file attribute.
/s : Applies attrib and any command-line options to matching files in the current directory and all of its subdirectories.
/d : Applies attrib and any command-line options to directories.
/? : Displays help at the command prompt.
Ex : attrib -s -h /s /d
Ex : attrib -s -h /s /d
- July 06, 2015
- Unknown
- General
- No comments
- In computer networking, a wireless access point (AP) is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself.
Subscribe to:
Posts (Atom)