For the past couple of years there has been a new threat introduced to your computer that anti virus software does not as of yet remove. This software is developed to track your movements on the Internet, create statistics of what you do on your computer, or even worse, actually hijack your web connections to direct you to pages that you did not ask for. These types of Malware are called Spyware, Browser Hijackers, and Dialers. Malware is the generic category of any programs that perform a detrimental effect on your computer without your knowledge or permission. Other more notorious types of Malware are viruses, Trojans, worms, and backdoors.
Windows XP comes with a built-in firewall called Windows Firewall. For people who do not want to spend the money on a commercial software firewall, this firewall will be more than enough to protect your computer. By default, Windows Firewall disables all incoming traffic to your computer, including ICMP traffic, which consists of pings. Just like all other firewall's you can specify which services/ports you would like to have open so that other computers can connect to yours. This will allow you to open up ports for services like web servers, mail servers, game servers, etc. Windows Firewall comes configured with basic services that you can enable to be opened, and you also have the ability to add other rules for incoming traffic that are not already configured. If you would like, you also have the ability to enable incoming ICMP traffic, so that you can ping and traceroute to your computer.
A very useful tool that comes built-in to Windows XP is the inherent zip support. This allows you to view, create, and extract zip files without having a third party tool. There are times that you will want to use a third-party zip compression program, and at those times, the built-in zip support may conflict. If this is the case, you can follow these steps to disable or re-enable the built-in zip support for Windows XP.
In this tutorial we will discuss the concept of Ports and how they work with IP addresses. If you have not read our article on IP addresses and need a brush up, you can find the article here. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.
Every machine on the the Internet has a unique number assigned to it, called an IP address. Without a unique IP address on your machine, you will not be able to communicate with other devices, users, and computers on the Internet. You can look at your IP address as if it were a telephone number, each one being unique and used to identify a way to reach you and only you.
If you have ever worked with computer graphic images, whether they be from digital cameras, found on the web, or you create them yourself, then you know there are a lot of image file formats that are available. This is because each format stores the image in a certain way that makes it the best choice for a given situation. This tutorial will cover the most common image formats that you will find on the Internet or with your devices, such as a digital camera, and how they are used. Before we go into the discussions on the actual image formats it is important to discuss the various attributes that image file formats can have.
Many times you will see software for sale that is listed as OEM , Academic, Upgrades, or Full Versions, all at different prices. This may lead to some confusion making you think that they are all different products. In reality they are all the same products, but are priced differently.
A lot of people are confused when it comes time to upgrade their computer and do not know if they should upgrade to Windows XP Home or Windows XP Professional. For most people the answer is simple, XP home, as it is more than sufficient for their needs. Some people do, though, gain the extra benefit to the features found only in XP Professional.
A very common question I am asked is which is more important, the speed of the processor or the amount memory. This is a difficult question to answer and it would help if we had some understanding of what each component does and how they relate to each other. This article will strive to teach you the fundamental tasks of both memory and the cpu and how they relate to each other. Hopefully at the end of this article, you will be able to answer this question yourself.
When you use the Internet, you use domain name and hostnames all the time. These hostnames and domain names when put together become the Internet address that you search with. The domain name without a hostname is also the most common email address. This article will explore what hostnames and domain names are and how they are used. We will also discuss TLD's, or Top Level Domains, such as .Com, .Net, .Org, etc.