Type Title Body Nid Author Replies Last Post Reads Category
Blog Ethical Hacking and its Difference to Ethical Hacking and its Difference to Malicious Hacking Ethical Hacking is also often termed as Intrusion, Penetration Testing, Tiger Teaming, 582 Sharath Reddy 20 2011-06-22 21:29 1,613 Security
Blog Best free 5 audio editors Best free 5 audio editors As we know, no one is expert in anything. So by having multiple options, we may have best solution for the problem we 571 Sharath Reddy 14 2011-06-12 16:27 1,478 Softwares Talk
Blog ICT Overview: Functions and Organization ICT- Overview ICT which refers as the Information and Communications Technology is basically a synonym that is being used for  Information 644 Sharath Reddy 14 2011-06-20 12:26 1,826 Others
Blog Computer Programming Language: Python, Pearl Computer Programming Language: Python, Pearl and Ruby What’s Python, Perl and Ruby? Python is an extraordinarily dominant, vibrant, and 1718 Vincentanthon 14 2012-07-11 23:30 2,468 Programming
Blog Microsoft System Center Virtual Machine Microsoft System Center Virtual Machine Manager “Microsoft System Center Virtual Machine Manager” is quite a mouthful, so let’s 1737 Joseph.mack 15 2011-11-30 13:38 4,056 Softwares Talk
Blog Cloud Computing Cost and Top Providers Cloud Computing Rates One of the latest technological advances that have managed to reap a lot of rewards is cloud computing. Basically, cloud 542 Sharath Reddy 8 2011-06-14 13:44 1,273 Cloud Computing
Blog Dot Net vs. Asp.Net (Server face scripting) Dot Net vs Asp.Net ASP.NET is a server face scripting skill that allows scripts what are entrenched in pages, to be run by an Internet server. 544 Sharath Reddy 10 2011-06-16 18:42 1,594 Programming
Blog Inkjet printers- a brief buyer guide Inkjet printers- a brief buyer guide Even when the laser printers are becoming cheaper, inkjet printers are still holding their position in the 2195 Williams smith 22 2011-06-18 16:07 1,304 Computer Hardware
Blog Hard drives (secondary memory)-buyer guide Hard drives (secondary memory)-buyer guide Speed and storage capacity are constantly increasing, from the past few years. The older technologies 2211 John baris 27 2011-10-31 14:49 1,970 Computer Hardware
Blog Inquisition on SEO - Web Article Writing Web Article Writing : The What, Why and How of SEO? We have all read articles on websites, and there are more and more websites devoted to the 1591 Sheilago 10 2011-07-09 13:16 1,194 Others
Blog What is a Spyware (Collect information) What is a Spyware? Spyware and Adware collect system or personal information from your computer without your knowledge and report about that data 639 Sharath Reddy 29 2011-11-30 23:49 2,023 Virus & Spyware
Blog Digital Media: CD/DVD Burner software CD Burner Software's Nero Burner This software allows users to format DVD/CD/BD to enable them to be used in diskettes. Files can be 705 Sharath Reddy 28 2011-07-19 11:43 1,197 Storage
Blog What is the ExMerge utility? What is the ExMerge utility? ExMerge It all started with Windows 95 windows messaging which was named as Microsoft Exchange. An e-mail client 643 Sharath Reddy 13 2011-06-20 12:36 1,971 Exchange 2003
Blog Best 5 Free CD Ripper Best 5 Free CD Ripper A CD Ripper is software that allows copying of raw digital audio like music from a Compact Disk to a computer. Several 1315 Sharath Reddy 13 2011-06-21 03:57 2,313 Softwares Talk
Blog Computer Network’s Security Systems Computer Network’s Security Systems Penetration Penetration refers to a successful, but an unauthorized breach of security perimeter of a 581 Sharath Reddy 15 2011-08-04 12:11 1,095 Security
Blog Lync server: New Name for New Generation of Lync server: HISTORY Microsoft Office Live Communications Server was initially launched on December 29, 2003 to replace the Exchange Instant 584 Sharath Reddy 9 2011-06-16 00:07 1,271 Software
Blog DNS explained 2000,2003 & 2008 Active DNS explained 2000,2003 & 2008 Active Directory History Contrary to NT that had flat user management service, active directory was 545 Sharath Reddy 7 2011-06-09 18:38 3,782 DNS
Blog Best 5 Free Network Analysis Tool Best 5 Free Network Analysis Tool Network analyzer is a tool used to analyze the properties of electrical circuits, especially those which are 536 Sharath Reddy 12 2011-07-18 12:38 1,685 Networking
Blog Latest Security Updates in different OSes Latest Security Updates in different OS Latest Security Enhancements in windows Vista Following are few of the latest updates, which has been 540 Sharath Reddy 8 2011-06-13 07:24 1,135 Security
Blog Peachtree Accounting Software (All about it) Peachtree Accounting Software There is a lot of accounting software’s being used in different organizations, such as QuickBooks, Instant 1508 Davis 10 2011-06-15 16:11 1,773 Software
Blog Outlook Data Storage and PST Personal Pests: Outlook Data Storage and PST Until the day the glorious cloud descends upon us, and we dispose all our local storage devices in 1658 Feamay 8 2011-07-07 20:38 1,145 Softwares Talk
Blog The Physical Layer of OSI Model The Physical Layer of OSI Model The Physical Layer Physical Layer is first layer of OSI model. It's main function is to carry a bit 1661 Martinmark 9 2011-06-13 08:21 1,582 Networking
Blog DBMS Vs RDBMS - All SQL Related DBMS vs RDBMS - All SQL Related Defining DBMS and RDBMS. DBMS is the abbreviation of ‘Database Management System.’ It is a universal 573 Sharath Reddy 9 2011-07-12 20:45 1,890 Database
Blog Hoist that cloud: Migrating Exchange Servers Hoist that cloud: Migrating Exchange Servers Kudos to Microsoft for refraining from clouding it up. Every old-school service provider is racing 132 Vihaan 7 2011-07-05 17:08 1,369 Exchange 2003
Blog Revealing Top Ten Major Fixes in Service Revealing Top Ten Major Fixes for Overall Released Microsoft Windows XP Service Packs Microsoft Windows XP has been releasing different service 547 Sharath Reddy 11 2011-07-13 22:06 1,507 Networking