Search and Replace Strings
To search a string for a substring and replace the substring use the .substring method to
find the substring and break up the string, and use the concatenation operator to reconstruct
the string with the replacement substring. More ...
right on your local computer, not on the web server, and it's a scripting language meaning
it's run by an interpreter. More ...
Fiverr Money Making Tips
Anyone can make money from Fiverr gigs. Though, some people find it difficult to actually
keep making money, to help out, here are tips from Fiverr experts. More ...
Direct Memory Access (DMA)
In early computers, all data transfers required the processor to read and write single
words from memory until the entire transfer is complete. With DMA, the DMA controller
takes control of the system buses to move data between the device and main memory. More ...
Start Your Own Business Mind Map
This mind map gives you an overview of the different business models you can use to start
a business online or offline. Use the mind map to choose a general business category. More ...
What is a SQL Injection Attack?
SQL injection can be used by an attacker to inject code into a website in order to
access and manipulate the database behind the site. More ...
Five Free Tools Every Network Administrator Should Have
Every network administrator has their own set of tools that they like to use on a daily basis.
Here's my list and why each one of these free programs are in my toolbox. More ...
Five Things You Can Do To Improve Your Company's Security
As security issues grow more and more prevalent, we CIOs need to improve our environments.
Here are some quick things that can be done in short order to help improve security at your business. More ...
How to Repair Low Memory Errors
A low memory error is a reflection of low memory problems with RAM or Virtual memory.
Often, this error can be easily reversed by freeing up memory for your system's use.
This article will show you to speed up your memory with just a few clicks. More ...
onmouseup, and onmouseout events with example code. More ...
Understanding Optical Fiber Types
Two major types of optical fibers exist for communication systems: multimode and single mode.
Multimode fiber can carry many modes of light rays, while single mode fiber can only carry one mode of light ray. More ...
Get Paid Writing For The Yahoo! Contributor Network
Yahoo! Contributor Network is a system that allows you to submit your own reviews,
news, articles and other material to Yahoo! If they use it on their network of websites you get paid for it. More ...
Pentium P5 Processor
The Pentium P5 processor was introduced in 1993 was the first superscalar processor. It featured
two integer pipelines and a pipelined floating-point unit. This article describes other innovations introduced in the P5. More ...
Network Topology Diagram
An IT manager must know the network topology and should always have it in front of his eyes.
Here, we review the process of the network topology discovery and network diagram creation using the specialized software. More ...
Workgroups and Domains
A LAN can be configured as a workgroup or a domain. In a workgroup a user's login account
is located on their individual computer. In a domain, a user's login account is located on the domain controller. More ...
Degree verses Computer Certifications
MCSE, CCNA or CCNP, Linux, Netware and Unix, these are all good certifications to have, but in today's job market,
certifications are the basic minimum required by employers. Most positions require a degree. More ...
Fix Windows 7 Boot Errors
Are you encountering Windows 7 boot errors. This article we will show you how to fix
Windows 7 boot error and enhance the functionality of the entire boot process. More ...
Built-in Utilities for Network Troubleshooting
One of the most important responsibilities of a network administrator is to fix any problems
that arise with the network. Most operating systems come with built-in utilities that can be
used in the troubleshooting process. Described here are the most useful of these utilities. More ...
How to Strengthen Website Authentication
To achieve strong authentication on the Web, IT professionals must find a balance among three
separate forces whose goals are often at odds: the cost and security needs of the company, the
impact on user behavior, and the motivations of the would-be attacker. More ...