Technology blogs
I could swear that I posted this. But I can't find any
reference, so I'll try again...
Packet-filter
...more>>
Video conferencing is deep rooting its popularity and it’s
hardly surprising. Video conferencing allo
...more>>
To do this we use the vgexport and vgimport commands.vgexport and
vgimport is not necessary to move disk dr
...more>>
Database security is major issue in global market. OLTP database is
needed to take care by expert and high
...more>>
Please send this in formation to ALL your family & friends, especially
those who have kids in the car with
...more>>
It is highly recommended that a user applies strong passwords to their
accounts! Be it for their Windows
...more>>
Setting up a password on a Windows account has probably been one of
the most significant moves for securi
...more>>
Clipboard Hack Problem - Shocking news about CTRL+C
Ctrl+C may be the most important work we do everyd
...more>>
There are few things that Mac users dread more than the sudden loss of
data, whether it's from a failed har
...more>>
by
Maria Peter
LINUX operating system is popular for its new-age advanced technology
and features. Linux facilitates worki
...more>>
by
Axel Culver
Microsoft Exchange Server may sometimes report errors when an
Exchange-aware backup is running. Not alway
...more>>
System files in Windows 7 or Vista can be corrupted due to various
reasons like operating system malfunctio
...more>>
A computer virus is a program that is specifically designed to copy
itself and damage the host computer. T
...more>>
Soft Aspects of Information Technology
Cognitive Biases
By
VIKRAM KARVE
The term cognition ref
...more>>
by
Maria Peter
A Linux-based hard drive can be divided into primary, logical, swap,
or foreign partitions. These partition
...more>>