Data Network Search Results

How To: Create a pivot table in Excel 2007

This video demonstrates how to create a pivot table in Excel 2007. From the people who brought you the Dummies instructional book series, brings you the same non-intimidating guides in video form. Watch this video tutorial to learn how to create a pivot table in Excel 2007, For Dummies.

How To: Remotely Control Computers Over VNC Securely with SSH

VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...

How To: Get By with the Cheaper 16GB Option for iPhone or iPad

There are a few different types of Apple iPhone and iPad users: general household users who largely consume media—e.g. surfing the web, watching movies, listening to music. Other iPhone and iPad owners use their device(s) to produce stuff—written documents, edited movies, blog posts, music tracks, and the like. And then there are those who are very mobile with their devices. They commute to and from work on a regular basis with their iPhone or iPad. Some users may travel a lot on business, or...

News: PostgreSQL Quick Start

Introduction PostgreSQL is a very popular Open-Source database management system. It competes heavily with many proprietary and commercial database management systems. More information on what it is and it's history can be found here and here.

News: Finding Hidden Metadata in Images (Oh, the Possibilities)

Did you know there is hidden data in your digital pictures? Well, there is, and that data might be a security risk to you. Think back at all of those pictures you're in and are connected with. I'm sure some of those you'd like to distance yourself from. And surely you wouldn't mind checking out the metadata in a few of those images. In this article, we'll be going over how to do just that.

WARNING: On Public WiFi? Your News May Be Hacked

Meet Newstweek, a hidden device engineered to hack news items being read at public WiFi hotspots (cafes, libraries, airports, etc.). Both nefarious and tech-saavy, the ingenious mechanism wasn't fathered by a group of web hackers, but rather a pair of Berlin artists, Julian Oliver and Danja Vasiliev. The duo are interested in exploiting the "trustworthiness" of big media outlets in order to demonstrate the vulnerability of relying on just a few dominant networks.

How To: Disable Wi-Fi SSID broadcast on an Apple AirPort

How to disable Wi-Fi SSID broadcast on an Apple AirPort in seven simple steps. Open your AirPort Admin Utility application. Find your network's name and double-click it or press the Configure button on the bottom right of the screen. Enter your password and click OK. The Configure "Apple AirPort Express" Base Station should open. Click on AirPort tab. Select the "Create a closed network" check box. Click OK on the dialogue box. Click the Update button on the lower right part of your screen. D...

How To: You No Longer Have to Open Settings to Switch & Connect to Wi-Fi on Your iPhone (FINALLY!)

Figuring out the Wi-Fi at a new location is challenging enough. Connecting to said Wi-Fi should be as easy as possible. Unless someone you know is already connected on their iPhone, you're probably used to the usual routine of heading to the Wi-Fi page in the Settings app to get yourself online. Luckily, there's now a much better way to do so.

How To: Change network settings in Windows 7

InfoWorld has some expertise advice for the new Windows 7 operating system from Microsoft. Now that Microsoft has made the Windows 7 beta available for public download, many people are trying to figure out what's new and different. And many others not willing to risk their PCs by installing a beta OS are curious, too.

How To: Encrypt the Windows system partition with Truecrypt

Truecrypt 5.0 adds many new features, most importantly Windows system partition encryption. To put it in slightly inaccurate layman's terms, this means encrypting your entire C: drive. Even if you already write your sensitive data to an encrypted space, files are sometimes squirreled away in unencrypted temp space or in the page file where they may be recovered. Using Truecrypt to encrypt your Windows XP system partition will help eliminate this problem.

How To: Send SMS Messages with Python

In this article, I'll show you how to send SMS messages with Python. You'll need Python 2.7 or later, urllib and urllib2. The code basically uses an online text messaging service to "POST" html data, as if a person was entering the data themselves. The uses for something like this are unlimited. For example, I modified the basic code so I would receive a text message letting me know every time someone rang my doorbell. The program could interface with Arduino through a serial port, and send d...

How To: UV project in modo 301

In this 3D software tutorial we cover a basic planar projection for UV mapping in modo 301. The video gives a brief explanation of the concept of UV data and a real world application of manipulating the resulting map. Learn how to work with UV projection in modo 301. UV project in modo 301.

How To: Create a RSS reader app in Visual C# 2005 Express

Interested in creating your own dynamic, web-based applications using Microsoft Visual C#? How about an RSS reader application? This lesson shows the design and planning of the RSS reader application. For more information, as well as tips for being a more effective user of Microsoft Visual C#, take a look at all five videos.

How To: Improve wireless network performance

This video demonstrates how to improve wireless network performance. From the people who brought you the Dummies instructional book series, brings you the same non-intimidating guides in video form. Watch this video tutorial to learn how to improve wireless network performance, For Dummies.

How To: The Essential Newbie's Guide to SQL Injections and Manipulating Data in a MySQL Database

No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the Internet, the real target is turning into data theft. You should learn how this happens so you can protect yourself accordingly. Let's take a look at what makes this possible and dare I say, easy.

UDP Flooding: How to Kick a Local User Off the Network

Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more parallel and distributed so that all of your speed isn't taken up by one transfer. When all of your bandwidth is sapped and unable to be used, this is called a denial of service, or a DOS.