:TCP\IP: A Mammoth Description By Ankit Fadia firstname.lastname@example.org:
TCP\IP or Transmission Control Protocol \ Internet Protocol is a stack or collection of various protocols. A
protocol is basically the commands or instructions using which two computers with
ADVISORY: TCP packet fragment attacks against firewalls and filters
System: TCP/IP networks
Source: http:/all.net, Dr. Frederick B. Cohen
Packet Fragmentation Attacks
Introduction to Packet Fragmentation
Packet fragmentation is the part of the Int
Is it disturbing to you when every other Web page you visit has a different font size?. One web page's font is too small, and another web page's fonts are too big.
Well here's a way to fix that and set each web page's fonts to just the size you want.
If you wanna make a autorun file for that CD you are ready to burn just read this.
1) You open notepad
2) now you writ: [autorun]
Now save it but not as a .txt file but as a .inf file.
How To Convert File System, fat - fat32 to ntfs
open a dos prompt and give the command
convert d: /fs:ntfs
this command would convert your d: drive to ntfs.
if the system cannot lock the drive, you will be prompted to convert it during next reboot.
How to Add an Option to Print the Contents of a Folder
Would you like to be able to right click any folder in Explorer and print its contents? You can add this option to the context menu by following these steps:
First, you need to create a batch file cal
If you have more then one operating system installed or wish
to remove an operating system from the boot menu, you can use the following information.
1.Click on Start, Control Panel, System, Advanced.
2.Under Startup and Recovery, click Settings.
Get in windows 2000 as Administrator.
> NOTE: Requires a boot disk.
> Get the command prompt and go to C:\winnt\sytem32\config\ and do
the following commands:
> attrib -a -r -h
> copy sam.* a:\
> del Sam.*
> reboot the computer. there should be no a
Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the pr
Computerized Governmental Database Systems
Containing Personal Information
The Right to Privacy
Lewis William Oleinick, M.P.Af.
The University of Texas at Austin, 1993
SUPERVISORS: Chandler Stolp and Philip Doty
This report iden
COMPUTER PRIVACY VS. FIRST AND FOURTH AMENDMENT RIGHTS
(By Michael S. Borella)
<Mike Borella received a bachelor's degree in Computer Science and
Technical Communication from Clarkson University (1991). He is
currently a graduate student and teaching as
COMPUTER ELECTRONIC MAIL AND PRIVACY
Ruel T. Hernandez
801 Cedarbend Way
Chula Vista, California 92010
(619) 421-6517 (voice)
(GEnie Mail: R.HERNANDEZ)
January 11, 1987
Copyright (c) 1986, 1987 by Ruel T. Hernande