Before proceeding to Sub domains, let us revise what domain names are. In simple words, Domain name is an identification string that defines a realm of administrative autonomy, authority, or control on the Internet. In simple words, it is the name of the website. It is difficult for a user to memorize the numeric values (IP) for accessing a website like 188.8.131.52 so we give it an English name which is easy to memorize like catchupdates.com or google.com. Here both catchupdates.com and google.com are domain names. [Read more…]
It is the obvious question that arises in the mind of ones who are using cPanel for managing their websites. The password you will be getting will be consisting of alphanumeric characters. There can be small letter alphabets along with capital letters and special characters. This is because to maintain the strong security level in the password. You may be thinking that it is good if we are given such a strong password by default. Although it is, by using such passwords it is hard for anyone to crack our password. [Read more…]
You have come across the computer panel in the computer. What does control panel in the computer do? Obviously it helps us to manage the overall working of the computers by installing and uninstalling the different computers. Similarly cPanel abbreviated as control panel can be used to manage the online website. [Read more…]
Introduction to Domain Name
You may have heard this term, but many of you do not know it properly. Let us start studying this topic. Domain name is an identification string that defines a realm of administrative autonomy, authority, or control on the Internet. In simple words, it is the name of the website. It is difficult for a user to memorize the numeric values (IP) for accessing a website like 184.108.40.206 so we give it an English name which is easy to memorize like catchupdates.com or google.com. Here both catchupdates.com and google.com are domain names. [Read more…]
Honeypots are an information system resource whose value lies in the unauthorized or illicit use of that resources.
In other words, “A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server doing work, but all the data and transactions are phony. Located either in or outside the firewall, these are used to learn about an intruder’s techniques as well as determine vulnerabilities in the real system.” [Read more…]
Tele-immersion is designed and developed to allow users in geographically distributed sites to collaborate in real-time in a shared simulated environment. This enterprise has engaged the skills of researchers in a variety of disciplines, including computer vision, graphics and network communications.
Tele-Immersion (TI) is defined as the integration of audio and video conferencing, via image-based modeling, with collaborative virtual reality (CVR) in the context of data-mining & significant computation. [Read more…]
3 Dimensional printing is the process of making three-dimensional solid objects from a digital model. 3 Dimensional Printing is a process under development at MIT for the rapid and flexible production of prototype parts, end-use parts, and tools directly from a CAD model. 3D printing is achieved using additive processes, where an object is created by laying down successive layers of material. 3D printing is different from traditional machining techniques as they mostly rely on the removal of material by drilling, cutting, etc.
This concept is widely accepted on a very large scale. In a traditional or fat-client environment, applications are stored locally, and data is stored centrally. Whenever we have to open a file, the entire file is transferred to the local PC, with the results being saved back across the LAN/WAN to the central storage area. Server/client architecture handle this process slightly differently, but processing still takes place at the local PC. [Read more…]