5,085 articles on "computer"

How to Know if You are Vulnerable to Hacker Attacks

You are in the crosshairs as a primary target of computer hackers if you own a computer or operate on un-secure VoIP (computer phone) services.John Ashcroft, Attorney General, in remarks at the High Technology Crime Investigation Association 2004 In...

Business And Finance  business finance computer services voip internet voice operate
CommunityServer.org installation at ORCSWeb.com

CommunityServer.org installation at ORCSWeb.comSteve SchofieldMarch, 7 2005IntroductionThis article describes how you can easily set up a community-related site using CommunityServer.org at orcsweb.com. This article covers the necessary steps to usin...

Computers And Internet  computers internet server community database installer files
LookSmart to acquire WiseNut

The focus of LookSmart so far, has been to provide it's directory results to other search sites and portals. In what could be considered a wise move, LookSmart will now compete with Inktomi, Fast and Google in providing search engine results as ...

Computers And Internet  computers internet search looksmart results engine will
Using the computer to eat Taking technology one step further!!

A long hard day at work. You get home and need dinner. Nothing in the fridge, nothing in the cupboard. Take-out again, but you just can’t decide what to have as you are tired of ordering from the same old places.Re-wind.Once you arrive at home… o...

Computers And Internet  computers internet local delivery
Mechanical Seals for Zero Leakage

A centrifugal water pump contains a few basic components as follows:1) The housing for containing the water.2) The impeller attached to a rotating shaft that moves the water.3) The coupling that transmits the rotating action of a motor (or other pri...

Computers And Internet  computers internet pump shaft rotating component water leak housing
Internet Firewalls That Hold Back Invaders

Internet Firewalls That Hold Back Invaders by: Stacey Misope Internet Firewalls - Are These Deterrents As Effective As We Presume? If someone sold you a filter for your furnace and said it can trap all dust particles and other pollutants foreve...

Computers And Internet  computers internet firewall firewalls filter computer personal
The Brilliance Of CD-R

The Brilliance Of CD-R by: Mike Waters Last weekend I was in Atlanta with my wife promoting her latest fitness book. It was a fantastic event. We made some really great connections and my wife sold a lot of books. People flocked in from all over...

Computers And Internet  computers internet wife business affordable duplication uses
Cisco Certification: In What Order Should You Take Your CCNP Exams ?

Cisco Certification: In What Order Should You Take Your CCNP Exams ? by: Chris Bryant, CCIE #12933 When you choose to pursue your Cisco Certified Network Professional certification, you've got some decisions to make right at the beginning. ...

Computers And Internet  computers internet exam cisco ccna ccnp path
Import notes contacts to outlook

If you are thinking of migrating your email client from Lotus Notes to MS Outlook due to certain reasons, and now you are planning Import Notes Contacts to Outlook (http://www.nsftopst.com/nsf-to-pst-conversion.html) with other email data. Now the qu...

Computers And Internet  computers internet notes outlook contacts lotus import address book file
Sexual Predators On The Web Can Be Stopped With A Reverse Email Search

Many parents that have children or teenagers that regularly use the family computer for schoolwork, playing games or just for fun, spend a lot of time worrying about the dangerous situations they can get into on the Internet before they even realize ...

Computers And Internet  computers internet email parents trace reverse