4,892 articles related to "computers and internet"

Blogging Communities Turn Faceless Strangers into Close Friends

Blogging Communities Turn Faceless Strangers into Close Friends by: Jesse S. Somer I’ve been searching the Internet for blogging sites for a fair while now and recently I came across a whole blogging community, which has grabbed my interest gr...

Computers And Internet  computers internet people blogging sites
Meta Tags- What Are They and Which Search Engines Use Them?

Meta Tags- What Are They and Which Search Engines Use Them? by: Richard Zwicky Defining Meta Tags is much easier than explaining how they are used, and by which engines. The reason is very few engines clearly lay out what they do and do not look...

Computers And Internet  computers internet engines tags search meta they
Email List Proposal

Email List ProposalList owner: < Who has collated the file? >List name: < What is the file known as? >?Description: < Description of the recipients on the file including lifestyle demographics, age, gender etc for consumer lists, and job function, co...

Computers And Internet  computers internet file available list details rates description
Best Adult Awards 2004 The Winners

(Cyberspace) September 10, 2004 - The Best Adult Awards' Michel Plante deserves an award of his own for singlehandedly engineering a small but robust first tradeshow with the Qwebec Expo, as well as the very first adult award ceremony honoring w...

Computers And Internet  computers internet adult winners award were
Is the Internet the World's Largest Midway

Why do I call the Internet the "World's Largest Midway"? Ispent 16 years in the carnival business and I was prettysuccessful at it. If you've ever been to the fair, you mightrelate to some of my reasons.Did you ever notice how they set up t...

Computers And Internet  computers internet carnival walk
They're Phishing Your Identity Online

Identity Theft even though punishable by law with up to 15 years in prison, continues to flourish. And one increasingly popular way of capturing personal data is the form of phishing, which happens online.Many innocent computer users fall victim to t...

Computers And Internet  computers internet personal victim phishing scam
Search Technologies

Search Technologies by: Max Maglias Each of us has been faced with the problem of searching for information more than once. Irregardless of the data source we are using (Internet, file system on our hard drive, data base or a global information ...

Computers And Internet  computers internet search data technology similar systems
Capturing IP Addresses Effective Marketing or Invasion of Privacy

In an effort to discover who is visiting their website, many companies install software that allows them to capture the IP addresses of everyone who comes to the website. In turn this allows them to locate Email addresses and thus know who visits and...

Computers And Internet  computers internet visited
What ISDN Business Phone Line Options Are Available?

However even with ISDN there are a range of options available that should be considered when making your choice between ISDN 2, ISDN 102030 or Multi Line Services. One thing that needs to be remembered is that ADSL or SHDSL Broadband services are not...

Computers And Internet  computers internet isdn phone lines line services
Difference Between Linux And Windows Shared Hosting

In the world of share hosting, Linux server hosting and Windows server hosting emerge as two contenders for the top position. Though you might think that both are same at the first glance, there is a difference between linux and windows shared hostin...

Computers And Internet  computers internet hosting linux windows server operating shared