Search Results

Search found 4374 results on 175 pages for 'computers'.

Page 50/175 | < Previous Page | 46 47 48 49 50 51 52 53 54 55 56 57  | Next Page >

  • Lightweight Projectors That Pack A Punch

    Lightweight projectors are made for people on the go. If you need to make presentations in a variety of locations, then a lightweight LCD or DLP projector is a must for you. There are several types o... [Author: Danny Davidson - Computers and Internet - May 23, 2010]

    Read the article

  • Using of EPOS Touch Screen and Its Benefit

    EPOS stands for Electronic Point of Sale and is modern cash registers. Its usually used by retail and hospitality businesses in their POS stations as staff reacts well to them as they are similar to ... [Author: Alan Wisdom - Computers and Internet - April 05, 2010]

    Read the article

  • Brief About Dedicated Server Hosting in India

    Dedicated server hosting is a phenomena. The kind of privacy and the sense of authority that the organization buying this form of hosting gets are simply amazing and augur well for a lot of things. A... [Author: John Anthony - Computers and Internet - June 17, 2010]

    Read the article

  • How To Spot An Online Ticket Scam

    Police have shut down 100 online ticket scam websites this month, by taking action through the organisation in charge of registering all web addresses; Icann (Internet Corporations of Assigned Names ... [Author: Chris Holgate - Computers and Internet - May 15, 2010]

    Read the article

  • Stuxnet - how it infects

    - by Kit Ong
    Except from the CNET article.http://news.cnet.com/8301-13772_3-57413329-52/stuxnet-delivered-to-iranian-nuclear-plant-on-thumb-drive/?part=propeller&subj=news&tag=linkvThe Stuxnet worm propagates by exploiting a hole in all versions of Windows in the code that processes shortcut files, ending in ".lnk," according to...[the] Microsoft Malware Protection Center....Merely browsing to the removable media drive using an application that displays shortcut icons, such as Windows Explorer, will run the malware without the user clicking on the icons. The worm infects USB drives or other removable storage devices that are subsequently connected to the infected machine. Those USB drives then infect other machines much like the common cold is spread by infected people sneezing into their hands and then touching door knobs that others are handling.The malware includes a rootkit, which is software designed to hide the fact that a computer has been compromised, and other software that sneaks onto computers by using a digital certificates signed two Taiwanese chip manufacturers that are based in the same industrial complex in Taiwan--RealTek and JMicron, according to Chester Wisniewski, senior security advisor at Sophos.... It is unclear how the digital signatures were acquired by the attacker, but experts believe they were stolen and that the companies were not involved.Once the machine is infected, a Trojan looks to see if the computer it lands on is running Siemens' Simatic WinCC software. The malware then automatically uses a default password that is hard-coded into the software to access the control system's Microsoft SQL database. The Stuxnet worm propagates by exploiting a hole in all versions of Windows in the code that processes shortcut files, ending in ".lnk," according to...[the] Microsoft Malware Protection Center....Merely browsing to the removable media drive using an application that displays shortcut icons, such as Windows Explorer, will run the malware without the user clicking on the icons. The worm infects USB drives or other removable storage devices that are subsequently connected to the infected machine. Those USB drives then infect other machines much like the common cold is spread by infected people sneezing into their hands and then touching door knobs that others are handling.The malware includes a rootkit, which is software designed to hide the fact that a computer has been compromised, and other software that sneaks onto computers by using a digital certificates signed two Taiwanese chip manufacturers that are based in the same industrial complex in Taiwan--RealTek and JMicron, according to Chester Wisniewski, senior security advisor at Sophos.... It is unclear how the digital signatures were acquired by the attacker, but experts believe they were stolen and that the companies were not involved.Once the machine is infected, a Trojan looks to see if the computer it lands on is running Siemens' Simatic WinCC software. The malware then automatically uses a default password that is hard-coded into the software to access the control system's Microsoft SQL database.

    Read the article

  • Beware & Be Aware Of Internet Scams

    Internet has many advantages. It provides mankind all the information he needs right from the dust to the boundless sky. It has brought mankind together, which helped eliminating distances between pe... [Author: Francis Regan - Computers and Internet - April 10, 2010]

    Read the article

  • Want To Know Of The Classic IBM InfoPrint Printer

    Things to know about the IBM InfoPrint 1601 printer begin with understanding what this monochrome laser printer has to offer. It is specifically designed to meet the needs of the small business and i... [Author: Ben Pate - Computers and Internet - March 31, 2010]

    Read the article

  • The Real Reason for CRM implementation Failure

    You can search the Internet and look at technology trade magazines and find list after list of why CRM (Customer Retention Management) implementations fail. To me, most of these "articles" are laundr... [Author: Chuck Lewis - Computers and Internet - September 03, 2009]

    Read the article

  • Rating Sites Development with ASPDOTNET

    Rating people, their skills, their abilities, their look, etc. are very old activity in human being history. It goes date back in 19th century that people used such rating system. The best use of rat... [Author: Jessica Woodson - Computers and Internet - May 10, 2010]

    Read the article

  • Are You Looking For Windows Web Hosting Services?

    Windows web hosting services have become the need of the day with companies all across all industry verticals thronging over each other to hire them. The services have become so sought after that win... [Author: John Anthony - Computers and Internet - May 11, 2010]

    Read the article

  • How to Get the Best Value with Printer Cartridges

    You';re no doubt aware that printer cartridges are a major expense when it comes to printing. Luckily, there are many strategies you can use to be the maximum value from your printer cartridge. These ... [Author: Kathryn Dawson - Computers and Internet - May 31, 2010]

    Read the article

  • Advantages of Locking Laptop Cases

    A laptop is meant to be carried around from one place to another and should be never let out of sight when being away from home but this is unfortunately not always possible. "Many of us store valu... [Author: Jeremy Mezzi - Computers and Internet - May 29, 2010]

    Read the article

  • How Important is the Domain Name?

    The domain you use for a your web site can have a huge impact in the way that humans and search engine spiders perceive it. Domain names were once so expensive that only those wanting to protect a br... [Author: John Anthony - Computers and Internet - May 28, 2010]

    Read the article

  • Blog Web Hosting Services in India

    Blog Hosting Services in India are quite new in comparison to the new trend that has started across the world of service providers providing services to host blogs. Blogs get written to describe thin... [Author: John Anthony - Computers and Internet - May 24, 2010]

    Read the article

  • About Domain Name Registration Companies in Delhi

    Companies in India registering domain names or registrars as a matter of fact are independent organizations providing domain name registration services by helping out companies to cement the names. T... [Author: John Anthony - Computers and Internet - May 18, 2010]

    Read the article

  • Is The Apple iPad The Perfect Student Laptop?

    Unless you have been locked away in an underground bunker for the last six months, you will have probably heard about the Apple iPad. This new lightweight portable "slate computer" from Steven Jobs, ... [Author: Titus Hoskins - Computers and Internet - May 09, 2010]

    Read the article

  • Advantages Of Nearshoring To Eastern Europe

    ..or why Ukraine is the perfect outsourcing country for Western Europe. This article describes reasons why one should seriously consider Ukraine when choosing the outsourcing location for his softw... [Author: Anna Shevchenko - Computers and Internet - May 20, 2010]

    Read the article

< Previous Page | 46 47 48 49 50 51 52 53 54 55 56 57  | Next Page >