Your are here:hacking technology > network management > Article list

How to avoid the Windows screen freezesHits:1
Do not need any power pushed wave, especially when a key holes can affect Windows at 7, message itself enough FUD (fear, not sure, doubt and against Microsoft). Sources said that Microsoft update causing personal computer use...2010-12-04
Webmasters with Windows 7 built-in function teach you adjust partitionHits:1
Constantly netizens asked how large Windows 7 partition installed capacity, after how to adjust system zones. Indeed, vista after the system zoning need more space than ever, for just system for Windows7 friend contact is needed groping....2010-12-03
How to modify IP and DNSHits:2
Because of the special needs of our IP address sometimes is fixed, sometimes is dynamic allocation, has been used in online neighbor right-click modify actually very inconvenient, but would also card into computer feign death state. So I...2010-12-02
Future IPv6 network security strategyHits:2
From the transition to IPv4 IPv6 bound forced many enterprise to rethink their done for network security measures. The result will be, from a certain security confirmed previously believed all the information flow are unsafe this...2010-12-01
Windows Server 2003 the local user account of safety managementHits:2
The Windows Server 2003 operating systems, each user must have one account, can login to computers and servers, and access to the network of resources. Windows Server 2003 supported by a user account is divided into two types: the local...2010-11-30
Windows operating system folder in secret 7 is introducedHits:5
If you install the the most popular Microsoft Windows operating system, whether can 7 think Microsoft Windows operating system under 7 winsxs folder huge frightening, some people pack X said Windows operating system...2010-11-29
How better to strengthen data securityHits:1
Use computer users have their own secret files, especially for business users, naturally reluctant to let others use your own computer, lest cause commercial secrets of leakage. But sometimes not let others use your own computer, is really...2010-11-27
Teach everybody understanding Windows XP system tabooHits:1
In the use of computer process, often encounter system crash, underneath we together with everybody know Windows XP system taboos, share avoid system crash skills. First, avoid virtual drives Now most virtual drives in XP is unstable, it...2010-11-26
Avoid tricks online conflictHits:1
In network management, the IP address theft phenomena happen often, not only to affect the normal use of the network, at the same time because stolen address often has higher privileges, thus to users caused a large number of economic loss...2010-11-25
Korenix launches computer JetBox 9562 Router vehicle monitoringHits:1
Korenix PoE expanded its range of computers built vehicle router for the release of the new Series 9562 JetBox layer3 Linux-based VPN platforms, design townhouse with serial ports for more flexibility?t for the remote management of...2010-11-24
IDC virtualization technology development trendHits:13
IDC virtualization trends: In recent years, the rapid development of Internet, Internet Data Center for IDC (Internet Data Center) has contributed greatly to the development of promotion. But as IDC business development, zhuhai IDC...2010-11-23
BT4 Internet Settings skillsHits:30
BT4 installed the default build in wicd just by default doesn't open. We can open wicd to realize the wireless networking. A, open wireless support # : / etc/init. D/wicd start Then in the bottom right hand corner...2010-11-20
Win seven remote assist general stepsHits:1
Sep Win seven remote assist steps, roughly three steps (for remote atmosphere preparation, create invited to assist problem, application invite documents) specific we downwards see: For remote assist preparation Step1: in the...2010-11-19
Border router security Settings skillsHits:1
With the connection of safety protection road origin, it's not too new topic. So how to add a effectively the connection protective barrier? For most enterprise LAN speaking, the router has become the most important is being used in one of...2010-11-18
Webmasters initial set switch teach youHits:1
Although say now switches are not required to pass the initial configuration, direct access to network can work normally. But really what we may face the situation is, not after initialization configuration switches, its subsequent...2010-11-17

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:6 , Total 29 Pages, Every Page 15 Records, Total Records: 432

Hot Articles
Recommend Articles
New Articles
Sub category