Home Categories Other Resources articles

WebKnowhow Categories

How to Improve Your Computer Operations with Reg Cleaners

by Patricia Stevens December 18, 2006
If you ever experience slow times on your computer, error messages or other malfunctioning of your systems, you could need your registry cleaned. What happens is that the Windows registry in your computer acts as a central database, with information classified according to various data and / or criteria in successive layers or levels. And Windows uses this stored data to configure your system for not only users but software applications and hardware devices.

WCAG 2.0: The New W3C Web Accessibility Guidelines Evaluated

by Trenton Moss December 15, 2006
The second version of the Web Content Accessibility Guidelines (WCAG) is in final working draft and will soon be officially released. Version 1 of the guidelines came under much criticism for being vague, full of jargon and extremely difficult to use. The

Why "Trojan Horses" Are So Dangerous for Internet Users

by Kira Foster December 06, 2006
Trojan Horses are one of the most dangerous threats for a PC and its owner. These malicious programs can be completely different. Major worms can also be related to Trojan Horses. Describing and classifying them is very difficult. However, there is one parameter by which all Trojan Horses can be classified to different groups. This parameter is a target of the virus, or in other words, the harm that they cause on the victim-PC. There are six groups of malicious programs that exert influence upon the victim.

An Overview of Computer Network Devices & Components

by Fiza Ali December 04, 2006
A Computer network is comprised of different devices to share, transmit, and boost the signal, voice and data. Network devices or components are the physical parts connected to a network. There is a large number of the network devices and are increasing daily. The basic network devices are: Individual Computers, Server, Hub, Switch, Bridges, Routers, Modems, Printers, DSL Modems & Routers, Gateways, Network Interface Cards, Cabling & Wireless access point. The following is a overview of each of these network devices.

How to Customize Your Own 404 File Not Found Page

by Mark Nenadic November 28, 2006
We've all run into them, the dreaded "404 File Not Found" error page. When you land there, there are a few things that you can do next. On average, what do you usually do first when you hit one of those pages: Immediately click your browser’s “back” button so that you can try somewhere else, try to edit the URL you’re attempting to visit and then see if you can head back a step and work your way to where you want to go, or write an email to the web designer of the website to inform them of the issue that you’ve spotted while navigating their site.

What Are Temporary Internet Files?

by Mil Incorporated November 27, 2006
Temporary Internet Files explained. There is also information how to delete temporary internet files and corresponding index.dat files.

Joomla, Easy Open Source CMS

by John Childs November 23, 2006
Joomla is an open source CMS system (CMS stands for Content Management System). I'm currently using Joomla to develop a number of themed web sites. There is a Christmas site, a recipe site and a travel site. Joomla has adapted nicely to each of these themes.

3 Critical Truths About P2P File Sharing Networks

by Anna Rowe November 21, 2006
Confused about file sharing networks and the risks involved? If so, you're not alone. Many people looking to download free music online have unanswered questions about the hazards involved when using a p2p site - and are equally unsure about possible RIAA lawsuit risks.

IP Address Classes and Private Networks

by Vijayanand Yadla November 20, 2006
A detailed view of different IP classes is provided with examples.

Top Ten Spyware And Adware Threats

by Karl Smith November 14, 2006
Estimates suggest that 90% of computers are infected with malicious software (malware) of some type. They take over your computer, infest it with pop-ups and other junk, or even worse, steal your private information. Although there are countless types of spyware and adware, these are the ones generally considered the biggest threats to your computer.

Go to Previous  1, 2, 3, 4, 5, 6, 7  Next



Other Resources