cacti

Search:

Type: Posts; User: clevelandslim

Search: Search took 0.00 seconds.

  1. Replies
    12
    Views
    3,877,447

    You can configure Microsoft Internet Explorer to...

    You can configure Microsoft Internet Explorer to use a proxy server to connect to the Internet. A proxy server acts as a security barrier between your internal network and the Internet, keeping...
  2. Replies
    4
    Views
    3,857,723

    => Either setup your own web server, or get a web...

    => Either setup your own web server, or get a web hosting account. There are many webhosts both free and paid. Any one that allows php, such as awardspace.com, will work.
    => Download the script.
    =>...
  3. Replies
    13
    Views
    10,977

    Are you sure the computer is restarting and not...

    Are you sure the computer is restarting and not just going into standby/sleep mode? That sounds like what it's doing.

    There's a setting that controls how long your computer can sit idle before it...
  4. There's no software that you can use if they are...

    There's no software that you can use if they are all directly connected to the router. It has to be done through the router and the router must have the QoS (Quality of Service) feature. If yours...
  5. Replies
    7
    Views
    3,864,966

    When i highly recommend utilizing...

    When i highly recommend utilizing http://www.vpn******.org to unblock websites. I am using their services for more than 2 years with no troubles.
  6. Replies
    24
    Views
    19,713

    Free web hosting is very bad. I have used it a...

    Free web hosting is very bad. I have used it a few months ago and I lost all data and the owner was not replying my messages. I advise not to go for free hosting.
  7. Like your Google search box history, the search...

    Like your Google search box history, the search history that displays in the address bar on the Google homepage is stored by your browser, not by Google. Instructions appear below for clearing and/or...
  8. Replies
    4
    Views
    7,636

    Encoding allows the perceived item of use or...

    Encoding allows the perceived item of use or interest to be converted into a construct that can be stored within the brain[citation needed] and recalled later from short term or long term memory....
  9. Replies
    2
    Views
    5,809

    There is a password unlock solution named...

    There is a password unlock solution named Password Unlocker Bundles can solve your problem.and, Word Password Unlocker *.0 of the bundle is exactly what you need&#65*06;
    get it here: ...
  10. Microsoft has their latest free one- Microsoft...

    Microsoft has their latest free one- Microsoft Essentials. I put that into a laptop, with XP in it. AND Malwarebytes anti-malware. I think with these two, I can detect "most" things. There will...
  11. Replies
    5
    Views
    15,445

    URL Mapping which redirects user from one url to...

    URL Mapping which redirects user from one url to another after visiting the url, is one type of url redirection.

    For example,

    If user want to visit some particular url/site like abc dot com...
  12. Tips for strong and secure password. ->Never...

    Tips for strong and secure password.
    ->Never give out your password to anyone.
    ->Donít just use one password.
    ->Create passwords that are easy to remember but hard for others to guess.
    ->Make the...
  13. Replies
    6
    Views
    15,977

    To be honest, sending anything as a letterhead...

    To be honest, sending anything as a letterhead can be copied, whether 'locked' or not; all they have to do is a 'print screen' and presto, they'd have it.
  14. Replies
    5
    Views
    14,484

    It's not mandatory that the length of the string...

    It's not mandatory that the length of the string be a square number, but when it is it's a lot easier. Also, it's a much more interesting problem to solve when allowing for any length string.

    To...
  15. Replies
    8
    Views
    18,172

    You can use following code for encryption ...

    You can use following code for encryption

    private string encryptString(string strToEncrypt)
    {
    System.Text.UTF8Encoding ue = new System.Text.UTF8Encoding();
    byte[] bytes =...
  16. Replies
    17
    Views
    27,654

    What is your programming expertise with Java? Are...

    What is your programming expertise with Java? Are you good with swing, threads? How about sql?

    Include more details please.

    But assuming you are good with everything noted above, create a...
  17. Replies
    3
    Views
    6,627

    If you want to create any kind of software, you...

    If you want to create any kind of software, you first have to learn programming in general.

    Your first step should be to get a good book that teaches you the fundamentals. A good book to start...
Results 1 to 17 of 18