Nov 28, 2008 | Computer |
With the amount of information available for download on the Internet, it’s easy to quickly fill up your valuable hard drive space and turn your computer into a sluggish, unresponsive monster. Keeping your hard drive clean is essential to the high performance...
Aug 28, 2008 | Computer |
Any malicious attack that targets any computer other than the computer the attacker is currently logged on to. For example, the attacker can log on to a system but actually attack any computer or server on the same network.
Aug 28, 2008 | Computer |
An SLA is a formally negotiated agreement between two parties. It is a contract that exists between customers and their service provider, client or between service providers. It records the common understanding about services, priorities, responsibilities, guarantee,...
Aug 28, 2008 | Computer |
A rogue peer is an end-user computer—usually a laptop—that has both bridging and wireless enabled. Since the basic functions of an access point are bridging and wireless access, any laptop that has these capabilities presents a similar vulnerability or worse. The...
Aug 21, 2008 | Computer |
Perkembangan industri printer pada hari-hari terakhir memaksa kita untuk lebih serius mempelajari karakter-karakter printer terbaru sehingga gangguan-gangguan pada penggunaan printer yang diakibatkan oleh modifikasi ataupun hal-hal yang lain dapat kita cermati dan...
KOMENTAR