Search Results

Search found 19747 results on 790 pages for 'internet cafe'.

Page 438/790 | < Previous Page | 434 435 436 437 438 439 440 441 442 443 444 445  | Next Page >

  • Purchasing Laptop Case Online

    "Laptops are meant to be carried around but to achieve the ultimate ease of carrying it from one place to another and to protect the computer as well as precious information on it you need a quality ... [Author: Jeremy Mezzi - Computers and Internet - May 29, 2010]

    Read the article

  • Save programmatically created Mesh to .X Files using SlimDX throw null exception

    - by zionpi
    Mesh has been created properly using SlimDX,but when I use the following line: Mesh.ToXFile(barMesh, "foo.x", XFileFormat.Text,CharSet.Unicode); It throws NullReferenceException,through monitor window I can see barMesh is not null, inside the mesh structrue, SkinInfo is null. If SkinInfo is the problem,then how can I initialize it properly?Internet doesn't seems have much information on this.

    Read the article

  • Forget PPC Try SEO

    Today we are living in a online world, where we can make any purchase sitting at home using the Internet. Thus the online business and the consumer who are making online purchase are increasing day by day. So now the companies have already started thinking seriously and implementing the means and methods of search engine marketing. Using this technique web-masters try to attract quality and quantity traffic to their website, so that they can earn business from them.

    Read the article

  • Magento: An Open Source Miracle?

    A feature-rich and professional open-source platform, Magento is an Ecommerce solution which aims to provide online businesses and merchants with flexible and intuitive tools to control the appearanc... [Author: Angela Smythe - Computers and Internet - May 22, 2010]

    Read the article

  • Network Inventory Software

    The necessary condition of a company successful operation is a good state of computer assets. That is why all the company?s software and hardware should be inventoried on the regular basis. A system ... [Author: Dmitriy Stepanov - Computers and Internet - March 21, 2010]

    Read the article

  • Are You Drowning in E-mail ?

    Learn to Reduce Email Overload By 54% E-mail is Making You Stupid! At least, that';s what a headline in the March edition of Entrepreneur Magazine claims. But that';s not all... a survey from the Radi... [Author: Ted Gulas - Computers and Internet - June 07, 2010]

    Read the article

  • How Does Microsoft Office 2010 Compare?

    The release of the new Microsoft Office suite isn';t the most exciting thing in the world, the fact that it is used nearly every day on my work computer doesn';t help matters. Nevertheless, I thought i... [Author: Chris Holgate - Computers and Internet - April 14, 2010]

    Read the article

  • Search Engine Discussion - The Debate About the Future

    The last few years we have witnessed the Internet world being ruled by Search Engine Optimization and Search Engine Marketing. However the debate is clearly on when it comes to the future of these two concepts. There are many who believe that the next five years will go through major changes as far as the SEO concept is concerned.

    Read the article

  • empirical studies about the benefit of q&a sites on programming [on hold]

    - by nico1510
    I'm looking for empirical papers which investigate if a user can benefit from q&a sites like Stack Overflow. I welcome any papers related to this topic e.g: an experiment, investigating if a specific task can be executed faster, an analysis, investigating if a user understands the solutions on q&a sites or if he just does copy&paste without thinking about it, a comparative analysis of the code quality of users with access to q&a sites in contrast to users without internet access (but just offline documentation of APIs)

    Read the article

  • How Does a PC Virus Work?

    Surfing the web, using email, and gaming online are things you have probably done at some point. Most do them on a daily basis. Everyone has heard the term "computer virus" but don';t necessarily unde... [Author: Michele Wallace - Computers and Internet - May 21, 2010]

    Read the article

  • SEO and new site - visibility best practices

    - by Ispuk
    Since i launched a new web site, i was wondering which are the best practices to let the visibility of the site grow up faster then just leaving the site online? I mean which internet channels are good to speed up visibility of a new site? Can anyone show some tricks he do when launching new site? I'm not talking about spam, advertising and SEO tech tips (the site is well done with all the main SEO tech tricks).

    Read the article

  • How to Build a Website Into a Cash Cow

    There are myriads of people who have all discovered that a lot of money stands to be made on the internet. Their main problem however is that they do not know how to build a website from the ground up, and turn it into a prospective business.

    Read the article

  • ECMA International adopte JSON comme standard, le format d'échange de données continue son ascension

    ECMA International adopte JSON comme standard, le format d'échange de données continue son ascension JSON (JavaScript Object Notation) a été adopté comme standard ECMA suite à un vote de l'Assemblée Générale. Cette nouvelle norme s'est vue attribuer le numéro 404, ce qui ne manque pas de rappeler celui du code d'erreur du protocole de communication HTTP sur le réseau Internet, renvoyé par un serveur HTTP pour indiquer que la ressource demandée (généralement une page web) n'existe pas.Rappelons...

    Read the article

  • Secure Your Wireless Router: 8 Things You Can Do Right Now

    - by Chris Hoffman
    A security researcher recently discovered a backdoor in many D-Link routers, allowing anyone to access the router without knowing the username or password. This isn’t the first router security issue and won’t be the last. To protect yourself, you should ensure that your router is configured securely. This is about more than just enabling Wi-Fi encryption and not hosting an open Wi-Fi network. Disable Remote Access Routers offer a web interface, allowing you to configure them through a browser. The router runs a web server and makes this web page available when you’re on the router’s local network. However, most routers offer a “remote access” feature that allows you to access this web interface from anywhere in the world. Even if you set a username and password, if you have a D-Link router affected by this vulnerability, anyone would be able to log in without any credentials. If you have remote access disabled, you’d be safe from people remotely accessing your router and tampering with it. To do this, open your router’s web interface and look for the “Remote Access,” “Remote Administration,” or “Remote Management” feature. Ensure it’s disabled — it should be disabled by default on most routers, but it’s good to check. Update the Firmware Like our operating systems, web browsers, and every other piece of software we use, router software isn’t perfect. The router’s firmware — essentially the software running on the router — may have security flaws. Router manufacturers may release firmware updates that fix such security holes, although they quickly discontinue support for most routers and move on to the next models. Unfortunately, most routers don’t have an auto-update feature like Windows and our web browsers do — you have to check your router manufacturer’s website for a firmware update and install it manually via the router’s web interface. Check to be sure your router has the latest available firmware installed. Change Default Login Credentials Many routers have default login credentials that are fairly obvious, such as the password “admin”. If someone gained access to your router’s web interface through some sort of vulnerability or just by logging onto your Wi-Fi network, it would be easy to log in and tamper with the router’s settings. To avoid this, change the router’s password to a non-default password that an attacker couldn’t easily guess. Some routers even allow you to change the username you use to log into your router. Lock Down Wi-Fi Access If someone gains access to your Wi-Fi network, they could attempt to tamper with your router — or just do other bad things like snoop on your local file shares or use your connection to downloaded copyrighted content and get you in trouble. Running an open Wi-Fi network can be dangerous. To prevent this, ensure your router’s Wi-Fi is secure. This is pretty simple: Set it to use WPA2 encryption and use a reasonably secure passphrase. Don’t use the weaker WEP encryption or set an obvious passphrase like “password”. Disable UPnP A variety of UPnP flaws have been found in consumer routers. Tens of millions of consumer routers respond to UPnP requests from the Internet, allowing attackers on the Internet to remotely configure your router. Flash applets in your browser could use UPnP to open ports, making your computer more vulnerable. UPnP is fairly insecure for a variety of reasons. To avoid UPnP-based problems, disable UPnP on your router via its web interface. If you use software that needs ports forwarded — such as a BitTorrent client, game server, or communications program — you’ll have to forward ports on your router without relying on UPnP. Log Out of the Router’s Web Interface When You’re Done Configuring It Cross site scripting (XSS) flaws have been found in some routers. A router with such an XSS flaw could be controlled by a malicious web page, allowing the web page to configure settings while you’re logged in. If your router is using its default username and password, it would be easy for the malicious web page to gain access. Even if you changed your router’s password, it would be theoretically possible for a website to use your logged-in session to access your router and modify its settings. To prevent this, just log out of your router when you’re done configuring it — if you can’t do that, you may want to clear your browser cookies. This isn’t something to be too paranoid about, but logging out of your router when you’re done using it is a quick and easy thing to do. Change the Router’s Local IP Address If you’re really paranoid, you may be able to change your router’s local IP address. For example, if its default address is 192.168.0.1, you could change it to 192.168.0.150. If the router itself were vulnerable and some sort of malicious script in your web browser attempted to exploit a cross site scripting vulnerability, accessing known-vulnerable routers at their local IP address and tampering with them, the attack would fail. This step isn’t completely necessary, especially since it wouldn’t protect against local attackers — if someone were on your network or software was running on your PC, they’d be able to determine your router’s IP address and connect to it. Install Third-Party Firmwares If you’re really worried about security, you could also install a third-party firmware such as DD-WRT or OpenWRT. You won’t find obscure back doors added by the router’s manufacturer in these alternative firmwares. Consumer routers are shaping up to be a perfect storm of security problems — they’re not automatically updated with new security patches, they’re connected directly to the Internet, manufacturers quickly stop supporting them, and many consumer routers seem to be full of bad code that leads to UPnP exploits and easy-to-exploit backdoors. It’s smart to take some basic precautions. Image Credit: Nuscreen on Flickr     

    Read the article

  • When Using Social Networking Sites Exercise Caution

    With more people using social networking sites there is also an increase in the various threats people may encounter online. Unfortunately population masses tend to attract people with less than nobl... [Author: TJ Philpott - Computers and Internet - April 14, 2010]

    Read the article

  • Multiple Instant Messenger Service

    Formally known as Gaim, the open-source instant messaging program Pidgin allows the simultaneous use of multiple IM services throgh a single application. Available as a free of charge download from ... [Author: Chris Holgate - Computers and Internet - April 05, 2010]

    Read the article

< Previous Page | 434 435 436 437 438 439 440 441 442 443 444 445  | Next Page >