In this tutorial we will discuss the concept of Ports and how they work with IP addresses. If you have not read our article on IP addresses and need a brush up, you can find the article here. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.
Every machine on the the Internet has a unique number assigned to it, called an IP address. Without a unique IP address on your machine, you will not be able to communicate with other devices, users, and computers on the Internet. You can look at your IP address as if it were a telephone number, each one being unique and used to identify a way to reach you and only you.
If you have ever worked with computer graphic images, whether they be from digital cameras, found on the web, or you create them yourself, then you know there are a lot of image file formats that are available. This is because each format stores the image in a certain way that makes it the best choice for a given situation. This tutorial will cover the most common image formats that you will find on the Internet or with your devices, such as a digital camera, and how they are used. Before we go into the discussions on the actual image formats it is important to discuss the various attributes that image file formats can have.
Many times you will see software for sale that is listed as OEM , Academic, Upgrades, or Full Versions, all at different prices. This may lead to some confusion making you think that they are all different products. In reality they are all the same products, but are priced differently.
A lot of people are confused when it comes time to upgrade their computer and do not know if they should upgrade to Windows XP Home or Windows XP Professional. For most people the answer is simple, XP home, as it is more than sufficient for their needs. Some people do, though, gain the extra benefit to the features found only in XP Professional.
A very common question I am asked is which is more important, the speed of the processor or the amount memory. This is a difficult question to answer and it would help if we had some understanding of what each component does and how they relate to each other. This article will strive to teach you the fundamental tasks of both memory and the cpu and how they relate to each other. Hopefully at the end of this article, you will be able to answer this question yourself.
When you use the Internet, you use domain name and hostnames all the time. These hostnames and domain names when put together become the Internet address that you search with. The domain name without a hostname is also the most common email address. This article will explore what hostnames and domain names are and how they are used. We will also discuss TLD's, or Top Level Domains, such as .Com, .Net, .Org, etc.
A key component of the Internet and how it works revolves around the Domain Name System, otherwise known as DNS. The underlying technology behind the Internet, is that when a computer needs to talk to another computer on the Internet, they communicate via the computer's IP Address. The IP Address is a unique set of numbers associated with a particular machine, which will be discussed in a separate article. An example of an IP Address is 188.8.131.52, which is the IP Address that corresponds to www.bleepingcomputer.com.
With so much of Computer use these days revolving around the Internet and communicating with others, its important that you understand what exactly a network is. Without networks, all communication between your computer and other computers whether it be instant messaging, email, web browsing, or downloading music could not be achieved. This tutorial will strive to teach you about networks and their importance. We will also explain the equipment necessary for you to set up a network in your home. When you are done with this tutorial, you will hopefully have a much greater knowledge of how the world of computers work.
One of the top questions I see on forums is "How do I know if I have been hacked?". When something strange occurs on a computer such as programs shutting down on their own, your mouse moving by itself, or your CD constantly opening and closing on its own, the first thing that people think is that they have been hacked. In the vast majority of cases there is a non-malicious explanation for these problems such as faulty hardware or problematic software, but it is better to be safe than sorry for not investigating deeper. Unfortunately, the vast majority of computer users have no idea how to go about determining if their computer is hacked. It is for these people, that I am writing this tutorial.