Dennis Faas

Thu
19
Jan
Dennis Faas's picture

Bittorrent

BitTorrent is the name of a client application for the torrent peer-to-peer (P2P) file distribution protocol created by programmer Bram Cohen. BitTorrent is designed to widely distribute large amounts of data without incurring the corresponding ... consumption in server and bandwidth resources (and typically, monetary fees attracted as a result of that). The original BitTorrent application is written in Python and its source code has been released under the BitTorrent Open Source License (a modified version of the Jabber Open Source License), as of version 4.0. The name "BitTorrent" refers to the ... (view more)

Thu
19
Jan
Dennis Faas's picture

How to use an RSS Reader

"Extra, Extra, Read all about it!" The corner Newsy has long since gone, replaced by the Newsstand with its wide variety of publications and sensational headlines hoping to attract the attention of a passerby. Times have changed, and with them, so ... have ways of communicating. To keep up with the events and happenings in the world of today, we often visit our favorite 'newsstands' via the web. If we visit one or two news sites on a regular basis, it's not difficult to keep track of events. A capable browser and set of bookmarks take care of that problem; but when there are a dozen or ... (view more)

Thu
19
Jan
Dennis Faas's picture

Intelli HyperSpeed 2005 Review

Synopsis: Need to optimize your computer in a jiffy? Try Intelli HyperSpeed 2005! With only 2 simple mouse clicks, Intelli HyperSpeed 2005 thoroughly scans your system for performance bottlenecks and then adjusts settings based on your optimization ... preference. With 4 custom levels of optimization, advanced CPU and memory handling, network and Internet fine-tuning, and hundreds upon hundreds of specialized tweaks -- Intelli HyperSpeed 2005 is everything you need to maximize your PC, all rolled up into one neat little package! Intelli HyperSpeed 2005: Why Tweaking is Necessary Windows comes pre ... (view more)

Thu
12
Jan
Dennis Faas's picture

Ftp

FTP or File Transfer Protocol is a commonly used protocol for exchanging files over any network that supports the TCP/IP protocol (such as the Internet or an intranet). There are two computers involved in an FTP transfer. The first computer is an ... FTP server. This computer listens on the network for connection requests from other computers. Another computer (called the client) can make a connection to the FTP server by using FTP client software. Once connected, the client can do a number of file manipulation operations such as uploading files to the server, download files from the server, ... (view more)

Thu
12
Jan
Dennis Faas's picture

PSP Movie Creator Review

Synopsis: Convert DVD movies to your PSP (Playstation Portable) and watch them on the go! In only a few simple steps, PSP Movie Creator can convert DVD movies and various video formats for optimized playback on Sony Playstation Portable. PSP Movie ... Creator incorporates the world's fastest DVD conversion technique (up to 300% faster!), all the while providing superior video quality. And best of all, PSP Movie Creator has advanced video editing features built into the program, so you don't need a secondary video editor to do your editing! PSP Movie Creator: Features Drilldown Easy to use ... (view more)

Thu
12
Jan
Dennis Faas's picture

Email IP address change?, Part 2

Recall -- Back in August of 2004, Infopackets Reader Marylin W. inquired about a program capable of reporting any changes to an IP address (see: Email IP address change? ). Such a utility would be especially useful if your IP address changes ... frequently and you need to connect to your home computer from a remote location (for example). Infopackets Reader Bill H. writes: " I realize it's been more than a year since the question was asked, but anyone interested in a solution might consider IPSynchro. I came across this very useful freeware program and it is capable of emailing you if your ... (view more)

Wed
11
Jan
Dennis Faas's picture

Keylogger

Keystroke logging (often called keylogging ) is a diagnostic used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems. Such systems are also highly useful for law ... enforcement and espionage -- for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. Keystroke logging can be achieved by both hardware and software means. Commercially available systems include devices which are attached to the keyboard cable (and thus are instantly installable, but visible if the ... (view more)

Wed
11
Jan
Dennis Faas's picture

Can a Keylogger intercept cut and paste?

Infopackets Reader Windy H. writes: " Dear Dennis, I keep important information (such as credit card numbers) stored on my PC. The sensitive information, however, is disguised in such a way that if someone were to 'break in' to my PC, they would ... never realize that it is my credit card number. Question: I always go back to my repository program to cut and paste my credit card number into order forms when I make a purchase online. If there was a stealth Keylogger installed on my system, would it be able to detect the numbers I am entering? " My response: The short answer is "yes ... (view more)

Wed
11
Jan
Dennis Faas's picture

Power AutoPlay Menu Creator Review

Synopsis: Create your very own AutoPlay CD in less than 10 simple steps! Power AutoPlay Menu Creator Professional is a powerful, easy to use tool for creating an interactive CD Menu whenever you insert a disc into a Windows PC. With Power AutoPlay ... Menu Creator, you can create menus, launch applications, open documents, play movies, open web site, send an email, run built-in slide shows, and much more! No programming experience is necessary because Power AutoPlay Menu Creator runs on 'drag and drop' technology! What is AutoPlay? From Windows 95 and later, Microsoft Windows offers a CD AutoPlay ... (view more)

Tue
10
Jan
Dennis Faas's picture

Rootkit

A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. These tools are intended to conceal running processes, files or system data, which helps an intruder maintain ... access to a system without the user's knowledge. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows. A computer with a rootkit on it is called a rooted computer. Functions of a rootkit A rootkit typically hides logins, processes, files, and logs and may include software to intercept ... (view more)

Pages

Subscribe to RSS - Dennis Faas