IT

Anything related to information technologies and information systems


Cycle stealing (grid/distributed computing)

Cycle stealing or CPU scavenging is a concept in distributed computing that relates to utilizing networked resources to accomplish a common computational goal. Some computational tasks can easily overwhelm limits of a single dedicated computer, and cycle stealing is a method for providing additional computing horse power to a task.

.


How to break MAC filtering (wifi security)

How to break MAC filtering was probably the first question that followed the invention of the MAC filtering concept and was asked in the same minute when MAC filtering was introduced as a security concept. Many people still use MAC filtering or MAC addressing as a security measure for their wireless networks, but the sad truth is that MAC filtering is very easy to break; it might even be the easiest security measure to break. Luckily, the population of such wireless users has been rapidly decreasing. This page describes the concept of MAC filtering and demonstrates how easily broken it can be.

.


How to crack WEP encryption (wifi security)

Efforts to crack WEP encryption have been around and even publicly discussed since the inception of the WEP protocol, and this page brings you information about how to discover and calculate a WEP key from network traffic. This introduction to WEP cracking may be useful to anyone who intends to investigate network security.

.


IEEE Wireless Wi-Fi networking 802.11 standards

Wireless communication standards IEEE 802.11 are in place to ensure some degree of uniformity and standardization in the wireless industry. IEEE stands for Institute of Electrical and Electronics Engineers. This organization sets standards which manufacturers of computer hardware have to follow to ensure interoperability of their hardware. Nowadays there are several common standards in the wireless industry.

.


How to choose the right wireless router?

One necessary device in the wireless local area network is the wireless access point, also often called wireless router. When making a selection regarding a wireless access point or a wireless router, we need to consider several parameters. So, what to consider when buying a wireless router?

.


Wireless Access Point (WAP)

Wireless Access Point (WAP) is a device that is used to connect one or more computers to an existing physical wired network. Wireless access point is a crucial item in the wireless to wired LAN (Local Area Network) connectivity that is responsible for negotiating a connection between the end user and usually a wired LAN.

.


Windows Server 2008 - What is new?

Windows Server 2008 is the newest release of server operating system from Microsoft. Windows Server 2008 was released on February 27, 2008.

After almost five years of break, Windows Server 2008 is the successor to Windows Server 2003.

.


A script is accessing some software (an ActiveX control) on this page which has been marked safe for scripting

The A script is accessing some software (an ActiveX control) on this page which has been marked safe for scripting. Do you want to allow this? message relates to security settings in Microsoft Internet Explorer. This message deals with what gets executed behind the scenes to display website content on your screen.

.


Scripts are usually safe. Do you want to allow scripts to run?

The Scripts are usually safe. Do you want to allow scripts to run? message in this wording is related to Microsoft Internet Explorer and deals with security settings. This message usually happens after modifying security settings in your Explorer.

.


Drupal cache clean up - cache_clear_all()

We started discussing how to clean up Drupal cache tables on the How to delete or clear Drupal cache tables? page. That page talks about using the Drupal Devel module to clean up Drupal's cache.

.
.