Technology Computer Blog Posts

  • Image Technology Update
    on Jan 20, 2011 in Image Technology Update
    Image Technology UpdateImage Technology UpdateImage Technology UpdateImage Technology UpdateImage Technology UpdateImage Technology UpdateImage Technology UpdateImage Technology UpdateImage Technology UpdateImage Technology Update...
  • Worm Network Tester
    on Jan 16, 2011 in Worm Network Tester
    Similar to the smallpox vaccine made from benign virus, computer worm known damaging it can be used to do something useful.Thanassis Giannetsos the computer security experts from Greece presents interesting findings that can be used to perform testin...
  • Ajax Features
    on Jan 16, 2011 in Ajax Features
    AJAX as a new programming technique has several features. AJAX Privileges include:Make requests to the server without reloading (reloads) the page.Parse (parse) and work with XML documents and / or JSON.The data is sent bit so save bandwidth and conn...
  • Know DBMS
    on Jan 16, 2011 in Know DBMS
    DBMS (DataBase Management System) system was specifically designed to facilitate users in managing databases. This system was designed to overcome weaknesses berkas.Pada processing systems based approach to file-based, general system design based on...
  • History Website
    on Jan 16, 2011 in History Website
    A web site (often shortened to just site; web site, site) is the designation for a group of web pages (web page), which generally is part of a domain name (domain name) or subdomain on the World Wide Web (WWW) on Internet . WWW consists of all the we...
  • Computer networks (LAN / Local Area Network)computer network is a collection of computers, printers and other equipment are connected in one unit. Information and data moving through wires or wireless computer network allowing users to exchange documents and data, print on the printer the same...
  • How VoIP Work
    on Jan 14, 2011 in How VoIP Work
    The interesting thing about VoIP is the many ways to make calls. Currently there are 3 different types of methods most often used to make VoIP layalan, namely:-> ATA (Analog Telephone Adapter)The most simple and most common is to use a device call...
  • Latest Computer Technology
    on Jan 14, 2011 in Latest Computer Technology
    Do you know what is inside your computer? Maybe you peeked when the service technician was installing something for you. When you first open up the CPU and look inside, a computer is a very threatening machine. But once you know about the different p...
  • How The Wi-fi
    on Jan 14, 2011 in How The Wi-fi
    Wi-Fi is short for Wireless Fidelity, which has the sense of a set of standards used for Wireless Local Networks (Wireless Local Area Networks - WLANs) based on IEEE 802.11 specification. The latest standards of specifications 802.11a or b, such as 8...
  • 10 Steps to Securing Your Wireless NetworkThe wireless network or a wireless network is often referred to quite easy to set up, and also feels very comfortable, especially if we want to be able to walk way around the home or office with a portable computer but it can still access the Interne...
  • PROGRESS FROM GENERATION TO GENERATION PROCESSORPCs are designed based on generations of different CPUs. Intel is not the only company that makes the CPU, although that became a pioneer among others. In every generation that dominates the Intel chips, but the fifth generation there are few options...
  • Build IP TV (Internet Protocol Television)Speaking IPTV (Internet Protocol Television) dah two years ago ... now Indonesia dah rame began preparations to move the TV analog to digital TV era by using technology IPTV (Internet Protocol Television). So Inget ama VOIP. But this might be a bit d...
  • Basic Introduction About Computer NetworkingBased on the criteria, computer networks can be divided into four namely:1. Based on the distribution of sources of information / data- Centralized Network This network consists of client and server computer where the client computer that serves as a...
  • Internal Computer Components
    on Jan 12, 2011 in Internal Computer Components
     as I promised that on my writing this time I will explain about the internal components contained on a computer. For more specific internal components which I will explain that there is an internal component inside the CPU.The main components t...
  • Through Install Driver Device ManagerBecause there happens to be a friend to comment on blogs Computer technology is still puzzled how mengistall managar device drivers on your computer through the Windows operating system, then segaja I made with the aim to help the colleagues who are...
  • Beware of viruses on your computerThe rapid development of technology and information easily available from various sources on the internet provides the opportunity for hackers to perform the action. One is the computer viruses they make are only with 1 virus alone they managed to de...
  • Internet as the field of business promotion Use of the Internet turns out not only as a source of information, but also has many other benefits that may not have many people who know about it. On average, most people in Indonesia use the Internet just to find information and communicate...
  • Working Principle of Computer Network SystemsElectrical signal or signals in the form of electromagnetic waves propagating on a computer network / radiate with the working principles of computer networking systems. In order for a network to exchange information data, we need a device called a m...
  • Great New Technology in Home Security SystemsIf you don’t have a home security system in your home in this day and age then you are simply taking chances for no good reason. The fact is that prices have steadily fallen over the past decade, as technological advances have greatly improved t...
  • Browsing Without a Trace
    on Jan 11, 2011 in Browsing Without a Trace
    After a chat with a number of internet users, I finally chose to post the tricks browsing without a trace. Many Internet users are complaining because the browsing activity is always known by other people and complained the lack of privacy in brows...
Close