Search:

Type: Posts; User: Inigo

Page 1 of 2 1 2

Search: Search took 0.04 seconds.

  1. Replies
    6
    Views
    748

    Better code with onsite optimization

    Many users asked us about an optimization of web presence. So, I thought to take some initiative in providing some notes useful for that topic. With high-quality code and content, as well as simple...
  2. Replies
    2
    Views
    1,090

    Re: Safety Tips for your Twitter Account

    6. Stay logged out on the web. When looking at new roles, to avoid possible execution of malicious scripts.
    7. Beware of sexy avatars. This is a trick used by spammers, are almost always the same...
  3. Replies
    2
    Views
    1,090

    Safety Tips for your Twitter Account

    I have observed many users looking out for safety tips that can be useful for twitter account. So lastly, I decided to provide some of them and they are as follows :

    1. Before you log in, check...
  4. Re: Migrating to FCS EFF Forefront EndPoint Protection with SCCM 2010

    The installation of infrastructure Forefront EndPoint Protection 2010 requires certain prerequisites from the following:

    Operating Systems: Windows XP SP3 (x86), Windows Vista RTM or higher (x86...
  5. Re: Migrating to FCS EFF Forefront EndPoint Protection with SCCM 2010

    The prerequisites necessary hardware to install Forefront client EndPoint Protection are:

    CPU:

    Windows XP: 500 MHz or higher
    Windows Vista or Windows 7: 1.0 GHz or higher

    Memory:
    ...
  6. Re: Migrating to FCS EFF Forefront EndPoint Protection with SCCM 2010

    Migrating to 2.4 FCS EFF

    The installation of Forefront EndPoint Protection 2010 (EFF) completed successfully, you can open the management console of System Center Configuration Manager 2007....
  7. Migrating to FCS EFF Forefront EndPoint Protection with SCCM 2010

    Migrating to 2.3 FCS EFF

    Forefront EndPoint Protection 2010 brought a real change in the functioning of the range of antivirus company Microsoft. Unlike Forefront Client Security (FCS) which was...
  8. Replies
    4
    Views
    1,244

    Re: Free SEO tools to choose the best keywords

    Google Insights - Lets you compare search volumes and specify type of search (images, news or products), date, country and city (subregion). It is a much more complete if we want to position for a...
  9. Replies
    4
    Views
    1,244

    Free SEO tools to choose the best keywords

    The basic idea to use these free tools is that they enter one or two key words that we know are related to our subject or business. And then we throw combination tools that people actually find or...
  10. Introduction : Forefront EndPoint Protection with SCCM 2010

    Microsoft has launched in 2006 in the antivirus software with Windows Live OneCare. This software is designed for individuals had a particular licensing mode offers the possibility to install it on 3...
  11. Re: Limited or no connectivity solution for the errors on the socket, SMP and TCP/IP Stack

    If all went well, now becomes available on the Uninstall button you can press to the Internet Protocol (TCP / IP) and when finished, close the window. Returning finally to the property, you reinstall...
  12. Re: Limited or no connectivity solution for the errors on the socket, SMP and TCP/IP Stack

    Manually to resolve the limited or no connectivity, you can go to Start -> Run and type "regedit" thus opening the editor of registry keys. As before touching the registry keys should make a backup...
  13. Re: Limited or no connectivity solution for the errors on the socket, SMP and TCP/IP Stack

    We do not know why, perhaps a virus or a program that bad, but these rules address could be lost thus preventing the programs installed on PCs, as well as the browser to surf the Internet, to access...
  14. Limited or no connectivity solution for the errors on the socket, SMP and TCP/IP Stack

    The common mistake occurs with a notice of limited or no connectivity accompanied, as appropriate, by an error message like "An operation was attempted on something other than the socket". Sometimes,...
  15. Re: Applications (Apps) to install Google Chrome in Chrome Web Store

    There is also another innovation launched yesterday by Google, the online printer of Chrome, which is activated from the menu options, which allow you to use their printers to print remotely from a...
  16. Re: Applications (Apps) to install Google Chrome in Chrome Web Store

    With the extension App Launcher you can open the sites to be installed as a drop-down menu that appears to the Windows Start menu. With the extension Apps List you can instead launch applications by...
  17. Applications (Apps) to install Google Chrome in Chrome Web Store

    When the first two features are more like commercials for products that will be released in 2011, it is interesting to find out what is that Chrome Web Store, that would be similar to an Apple Store,...
  18. Replies
    3
    Views
    1,037

    Information about Autodesk NavisWorks 2011

    The solutions to the review of projects are at the heart of the work processes in Building Information Modeling (BIM). In architecture, building services engineering and plant construction are the...
  19. Replies
    4
    Views
    2,129

    Re: Different types of Proxy Servers

    Reverse Proxy for Performance Optimization

    An entirely different task, a reverse proxy fulfill the requests for a service that takes the to the speed or to improve access to the service rate or...
  20. Replies
    4
    Views
    2,129

    Re: Different types of Proxy Servers

    Reverse Proxy

    A proxy shall in the case of the reverse proxy as a putative target system in appearance, with the address translation is then performed in the opposite direction and so the client...
  21. Replies
    4
    Views
    2,129

    Re: Different types of Proxy Servers

    Proxy Firewall

    A proxy firewall is a firewall that dedicated proxies and circuit level proxy as filter modules relies on. These filter modules are implementing rules by deciding what data to the...
  22. Replies
    4
    Views
    2,129

    Re: Different types of Proxy Servers

    Circuit Level Proxy (generic proxy)

    As a circuit level proxy (also known as generic proxy) packet filter module is a means by which a firewall is any IP addresses and ports to lock or unlock, but...
  23. Replies
    4
    Views
    2,129

    Different types of Proxy Servers

    Dedicated Proxy

    A Dedicated Proxy is a efficacy that traffic among the requesting client and the target system provides the. It concentrates in the communications protocol that the service...
  24. Replies
    4
    Views
    863

    Re: Viewing messages with a batch file

    If echo is turned on, MS-DOS commands from the batch program during its execution. Therefore ("Insert a disk in drive A") the message from the previous example is shown twice: the first time at the...
  25. Replies
    4
    Views
    863

    Viewing messages with a batch file

    If MS-DOS should display a message that you use in your batch program echo command, like this example:

    echo text files are saved to drive A to prevent MS-DOS displays commands as they are...
  26. Replies
    4
    Views
    922

    Information about Ruby on Rails

    Ruby is a scripting language, multi-platform object-oriented purely free software. This means that the more we abstract in the object-oriented paradigm really will notice the complexity of language...
  27. Replies
    3
    Views
    867

    Re: Linux : Users and permissions

    Note that Linux can also be made in plain text files, not necessarily binary. Usually this is similar to DOS batch, these scripts. In DOS text files are the executable. BAT, while the binaries are....
  28. Replies
    3
    Views
    867

    Re: Linux : Users and permissions

    One thing that surprised leaves those accustomed to using the DOS is the fact that certain operations on files can not be done if you do not have appropriate permissions. In DOS there are no permits...
  29. Replies
    3
    Views
    867

    Re: Linux : Users and permissions

    In DOS Linux as there is a concept of current directory. If you are the user foo, after logging in your current directory is (usually) / home / foo (or / usr / foo), known as the home directory (the...
  30. Replies
    3
    Views
    867

    Linux : Users and permissions

    Suppose a Linux system already installed and ready for use. We do not enter in the installation procedures, as differ from system to system and can be complicated. However the latest versions of...
  31. Replies
    3
    Views
    767

    Re: Text handling in CSS

    font

    The font properties can be compared to the background. This is a shorthand property used to set a single statement all the main features of the text. The properties defined in abbreviated...
  32. Replies
    3
    Views
    767

    Re: Text handling in CSS

    font-weight

    Serves to define the size or "weight" of the visual text. It applies to all elements and is inherited. Syntax

    selector {font-weight: <value>;} The weight of a visual character can...
  33. Replies
    3
    Views
    767

    Re: Text handling in CSS

    font-size

    Along with font-family ownership is considered essential in the definition of text, which defines the size. Applicable to all elements and inherited.
    Syntax :

    selector {font-size:...
  34. Replies
    3
    Views
    767

    Text handling in CSS

    If there is an essential aspect of CSS that is the new approach introduced for the management of the text. First there was the <font>: pages heavy and difficult to manage. Today, something that can...
  35. Replies
    3
    Views
    1,005

    Re: How to construct Layout in Photoshop CS

    Reconstructing the structure and correct the code in Dreamweaver MX :

    We have seen how the product code from the default publication ImageReady CS is not standards-compliant HTML 4.01, especially...
  36. Replies
    3
    Views
    1,005

    Re: How to construct Layout in Photoshop CS

    Divide and edit the layout with ImageReady CS :

    The guides arranged in Photoshop will allow us to create our pages more quickly. We make the sections as discussed in previous lessons and add this...
  37. Replies
    3
    Views
    1,005

    How to construct Layout in Photoshop CS

    Macromedia Dreamweaver MX using the shell again to correct the output from ImageReady and get the final page. I would like to suggest you, first sketched an outline of the layout, preferably on...
  38. Bluetooth Basics: Communication and Security

    With numerous upgrades and enhancements of the standard tried the Bluetooth Special Interest Group (Bluetooth SIG or BSIG) to secure a successful future in the standard competition of radio...
  39. Installation of Network Manager Connections in Ubuntu

    Network Manager is the tool for managing network connections Ubuntu. Its use is the creation and configuration of access to various types of networks (Internet, local area network [LAN], virtual...
  40. Specifications for 10 Mbps IEEE 802.3 (Ethernet)

    10base5 Specification: Use coaxial cable, bus topology, digital signage Manchester, maximum length of cable segment (between each pair of repeaters) is 500 meters, there is only one possible path...
  41. Replies
    6
    Views
    4,175

    OpenGL and Real time 3D on HTML5

    The idea of bringing the real-time 3D in a Web page is not new, indeed, since the beginning of the WWW we have seen a succession of pioneering implementations designed to achieve precisely this...
  42. Replies
    6
    Views
    2,960

    Shared Computer Toolkit for Windows XP

    More and more public computers have files and other shared resources, we can actually find this type of machine in internet cafes, schools, libraries or media centers and many other places where the...
  43. Re: How to reset local administrator passwords in a Windows Domain

    Below you can see the structure of a fictitious domain to be taken as a reference for setting the two variables just mentioned:


    http://img413.imageshack.us/img413/5306/ad1le.jpg

    Save and...
  44. Re: How to reset local administrator passwords in a Windows Domain

    Extraction of the computer account from Active Directory - "Change Local Administrator Password On All Computers In A List" needs to have as input a text file named Computers.txt containing the names...
  45. How to reset local administrator passwords in a Windows Domain

    I would like to explain how it works (via WSH) to change / reset the local administrator password of more computers in the domain. First of all, keep in mind that the operations will be performed...
  46. Replies
    4
    Views
    3,085

    Re: How to create self-signed SSL certificate?

    Create Server Certificate

    Since we now have a root certificate, we can begin to create the SSL server certificate for our SSL applications such as https, SPOP, SIMAP or stunnel. The procedure is...
  47. Replies
    4
    Views
    3,085

    Re: How to create self-signed SSL certificate?

    Executes this command. You will be asked for a new password, which you'll have to enter two times. Remember this password! Which it is required to sign your certificates.

    openssl req -new -x509...
  48. Replies
    4
    Views
    3,085

    Re: How to create self-signed SSL certificate?

    Configuration File

    Creates a new configuration file "openssl.cnf".

    vim /home/username/CA/openssl.cnf with the following contents:

    #
    # OpenSSL configuration file.
    #
  49. Replies
    4
    Views
    3,085

    How to create self-signed SSL certificate?

    Many users really like their mail servers or secure web server with SSL, but does not know how to create the SSL certificates. Through the use of SSL communication between client and server is...
  50. Replies
    4
    Views
    6,107

    Re: Mixed SLI - mix different video cards

    What's in it?

    To test the Phenom X4 940 overclocked properly to power the graphics card is sufficient. The following benchmark runs are for better comparability all gone through at 3.76 GHz (16 *...
Results 1 to 50 of 55
Page 1 of 2 1 2
Page generated in 1,713,960,304.51914 seconds with 17 queries