-
Posts
7,007 -
Joined
-
Last visited
Everything posted by Head Guru
-
Yes - take a look in the security section of the forums. We have been hosting since 1999
-
I think this is what your asking. the location for this would be. http://www.******/page.html If this is it please advise, I now see your help desk ticket. Thanks
-
No! Dont be silly.
-
Yes, our plans allow adult content as long as it abides by local laws.
-
The information applies specifically to the versions listed below but some will also work on win2000 and winxp. Experiment Microsoft Windows Millennium Edition Microsoft Windows 98 Second Edition Microsoft Windows 98 Microsoft Windows 95 Windows System Key Combinations- -F1: Help -CTRL+ESC: Open Start menu -ALT+TAB: Switch between open programs -ALT+F4: Quit program -SHIFT+DELETE: Delete item permanently Windows Program Key Combinations -CTRL+C: Copy -CTRL+X: Cut -CTRL+V: Paste -CTRL+Z: Undo -CTRL+B: Bold -CTRL+U: Underline -CTRL+I: Italic Mouse Click/Keyboard Modifier Combinations for Shell Objects -SHIFT+right click: Displays a shortcut menu containing alternative commands -SHIFT+double click: Runs the alternate default command (the second item on the menu) -ALT+double click: Displays properties -SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin General Keyboard-Only Commands -F1: Starts Windows Help -F10: Activates menu bar options -SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object -CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item) -CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu) -ALT+DOWN ARROW: Opens a drop-down list box -ALT+TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window) -SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature -ALT+SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window) -ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window) -CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI) program -ALT+underlined letter in menu: Opens the menu -ALT+F4: Closes the current window -CTRL+F4: Closes the current Multiple Document Interface (MDI) window -ALT+F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window) Shell Objects and General Folder/Windows Explorer Shortcuts For a selected object: -F2: Rename object -F3: Find all files -CTRL+X: Cut -CTRL+C: Copy -CTRL+V: Paste -SHIFT+DELETE: Delete selection immediately, without moving the item to the Recycle Bin -ALT+ENTER: Open the properties for the selected object To Copy a File Press and hold down the CTRL key while you drag the file to another folder. To Create a Shortcut Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder. General Folder/Shortcut Control -F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer) -F5: Refreshes the current window. -F6: Moves among panes in Windows Explorer -CTRL+G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only) -CTRL+Z: Undo the last command -CTRL+A: Select all the items in the current window -BACKSPACE: Switch to the parent folder -SHIFT+click+Close button: For folders, close the current folder plus all parent folders Windows Explorer Tree Control -Numeric Keypad *: Expands everything under the current selection -Numeric Keypad +: Expands the current selection -Numeric Keypad -: Collapses the current selection. -RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes to the first child -LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to the parent Properties Control -CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs Accessibility Shortcuts -Press SHIFT five times: Toggles StickyKeys on and off -Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on and off -Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and off -Left ALT+left SHIFT+NUM LOCK: Toggles MouseKeys on and off -Left ALT+left SHIFT+PRINT SCREEN: Toggles high contrast on and off Microsoft Natural Keyboard Keys -Windows Logo: Start menu -Windows Logo+R: Run dialog box -Windows Logo+M: Minimize all -SHIFT+Windows Logo+M: Undo minimize all -Windows Logo+F1: Help -Windows Logo+E: Windows Explorer -Windows Logo+F: Find files or folders -Windows Logo+D: Minimizes all open windows and displays the desktop -CTRL+Windows Logo+F: Find computer -CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray) -Windows Logo+TAB: Cycle through taskbar buttons -Windows Logo+Break: System Properties dialog box -Application key: Displays a shortcut menu for the selected item -Microsoft Natural Keyboard with IntelliType Software Installed -Windows Logo+L: Log off Windows -Windows Logo+P: Starts Print Manager -Windows Logo+C: Opens Control Panel -Windows Logo+V: Starts Clipboard -Windows Logo+K: Opens Keyboard Properties dialog box -Windows Logo+I: Opens Mouse Properties dialog box -Windows Logo+A: Starts Accessibility Options (if installed) -Windows Logo+SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys -Windows Logo+S: Toggles CAPS LOCK on and off Dialog Box Keyboard Commands -TAB: Move to the next control in the dialog box -SHIFT+TAB: Move to the previous control in the dialog box -SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option. -ENTER: Equivalent to clicking the selected button (the button with the outline) -ESC: Equivalent to clicking the Cancel button -ALT+underlined letter in dialog box item: Move to the corresponding item
-
Wow this is a tough one. You need to print out the form that I gave to you to download. Then go to your bank and give them money in the amount of the plan you choose. Then tell them you need an international money order, bank draft or certified check in that amount. Then just mail it to us.
-
As in bank draft, money order, or personal check.
-
Start with this. http://www.cpanel.net
-
Hi - Thats pretty general... We love to help noooooobs. What in specific are you looking for? Tell us we can help :0 Bill
-
Here is a test link to test our speeds. http://www.*****/test.zip You will see it wont take long Also know that this file is on server4. Which is a fully populated server. Please post back and let us know what speeds you can pull. Bill
-
Nope just send a check along with the form and you will be set up upon receipt.
-
Print out the url i metioned and attach a money order or bank draft. We do not invoice for pre-paid services. Thanks
-
Thanks for the LIVE IM chat. This issue has been discussed. Thanks
-
Ouch... Did you delete any files? There appear to be missing files?
-
Well I would need your username to do that. Ok i on my way to lookseeeee
-
Hi there. Here is the form you need to include with your payment. http://www.*****/paybymail.html Any refund issued in the first 30 days of service is a 100% refund. No questions asked! I hope this answers your question. If not just re-post! Thanks
-
Setting Up Interchange Shopping Cart
Head Guru replied to jewel464g's topic in Running your online business
Well, You could go a couple different ways. I really like the services that paysystems.com has provided. They handle all of our CC here at ***** and they have been excellent. Also, they provide a fully managed shopping cart for no extra charge. I would give them a look. Http://www.paysystems.com -
Hey you missed one smiley.
-
Firewalls Torn Apart A firewall is basically something that protects the network from the Internet. It is derived from the concept of firewalls used in vehicles which is a barrier made of fire resistant material protecting the vehicle in case of fire. Anyway a firewall is best described as a software or hardware or both Hardware and Software packet filter that allows only selected packets to pass through from the Internet to your private internal network. A firewall is a system or a group of systems which guard a trusted network( The Internal Private Network from the untrusted network (the Internet.) To understand how a firewall works, firstly we need to understand how exactly data is transferred on the Internet. NOTE: The following is a very weird, short and incomplete description of the TCP\IP protocol, I have just given a general idea of the whole data transmission process so that everyone can understand firewalls. The TCP\IP suite is responsible for successful transfer of data across a network both the Internet and the Intranet. The TCP\IP suite is a collection of protocols which are inter-related and interdependent and act as a set of rules according to which data is transferred across the network. A protocol can be defined as a language or a standard which is followed while transfer of data takes place. Lets go through a brief explanation of how data is transferred across a network following the various components of the TCP\IP suite. The whole process of data transmission begins when a user starts up an Internet application like the email client or a FTP client. The user types an email in his client and in this way provides data to be transferred. The email client is said to be a part of the application layer f the TCP\IP stack. Now this application layer (email client) provides data (the email itself) which has to be transferred to the Transmission control protocol or TCP which constitutes the Transfer Layer of TCP\IP. TCP breaks down the data i.e. the email into smaller chunks called packets and hands over the responsibility to the Internet Protocol or IP which forms the invisible network layer. This Internet Protocol adds some various info to each packet to ensure that the packet knows for which computer it is meant for and which port or application it is going to meet and from where it has come. An IP datagram contains: 1. A header which contains the Source and Destination IP, Time to live info and also the protocol used. There is also a header checksum present. 2. Remaining part contains the data to be transferred. You do not need to understand all this in detail but just remember that TCP breaks data into smaller packets and IP adds the source and destination IP's to the packets. When the data reaches the other server IP hands the packets to TCP again which re assembles the packets. Port numbers are also used to ensure that the packets know to which application it need to go to. So, basically we can conclude that a successful transmission of data across a network relies on the source and destination IP and also the ports. A firewall too relies on the source and destination IP and also the ports to control the packet transfer between the untrusted network and the trusted network. Firewalls can be classified into 3 types: 1. Packet Filter Firewalls 2. Application proxy Firewalls 3. Packet Inspection Firewalls Packet Filter Firewalls They are the earliest and the most criticized firewalls, which nowadays are not easily found. They are usually Hardware based i.e. Router Based (a router is a piece of device which connects two networks together.) Whenever a Packet Filter Firewall receives a packet for permission to pass through, it compares the header information i.e. the source and destination IP address, and port number with a table of predefined access control rules If the header information matches, then the packet is allowed to pass else the packet is dropped or terminated. They are not popular due to the fact that they allow direct contact between the untrusted system and the trusted private system. To understand such firewalls lets take the example of the secretary that sits in your office. This kind of secretary allows only those people who have an appointment to pass but if you convince her that her boss wants to meet her then she would allow you to pass. Such Firewalls can be fooled by using techniques like IP Spoofing in which we can change the source IP such that the firewall thinks that the packet has come from a trusted system which is among the list of systems which have access through the firewall. Application proxy Firewalls The shortcomings of the packet filter firewalls are addressed by the new type of firewalls developed by the DARPA. It was widely believed that the earlier type of firewalls were not secure enough as they allowed the untrusted systems to have a direct connection with the trusted systems. This problem was solved with the use of Proxy servers as firewalls. A proxy server which is used as a firewall are called application proxy servers. This kind of a proxy firewall examines what application or service (running on ports) a packet is meant for and if that particular service is available only then is the packet allowed to pass through and if the service is unavailable then the packet is discarded or dropped by the firewall. Once this is done, the firewall extracts the data and delivers it to the appropriate service. There is not direct connection between the untrusted systems with the trusted systems as the original data sent by the untrusted system is dropped by the firewall and it personally delivers the data. Let's again take the example of a secretary. Such a secretary would take a gift or something else for you only if you are available in the office and it would not allow the visitor to deliver the thing but would personally deliver it to you. Although they are somewhat slower, they are much more secure as they do not allow a direct contact between an untrusted network and a trusted network. Packet Inspection Firewalls It can be also known as an extension of the Packet Filter Firewall. It not only verifies the source and destination IP's and ports, it also takes into consideration or verifies that content of the data before passing it through. There are two ways in which this kind of a firewall verifies the data to be passed: State and Session. In case of state inspection, an incoming packet is allowed to pass through only if there is a matching outward bound request for this packet. This means that the incoming packet is allowed to pass through only if the trusted server had requested for it or had sent an invitation for it. In case of session filtering, the data of the incoming is not verified, but instead the network activity is traced and once a trusted system ends the session, no further packets from that system pertaining to that session are allowed to pass through. This protects against IP spoofing to a certain extend. Such firewalls can also be configured beforehand to act according to pre defined rules when it is attacked. It can also be configured to disconnect from the Internet in case of an attack. All along you will come across many Firewalls on various systems, basically a firewall can be established or setup in two ways: 1. Dual-homed gateway 2. Demilitarized zone (DMZ) In a dual homed gateway firewall, there is a single firewall with 2 connections, one for the trusted network and the other for the untrusted network. In the case of a Demilitarized Firewall or a DMZ there are two firewalls, each with two connections, but there is a slight difference in the case of a DMZ setup. In the case of a DMZ setup, there are two firewalls, the first having two connections, one leading to the untrusted network and the other leading to the host systems like the email server or the FTP server etc. These host systems can be accessed from the untrusted network. These host systems are connected with the internal private trusted systems through another firewall. Thus there is no direct contact between the untrusted network and the trusted internal network. The area or region between the two firewalls is termed as the demilitarized zone. In the case of a Dual Homed Gateway the untrusted network is connected to the host systems (email and FTP servers etc) through a firewall and these host systems are connected to the internal private network. There is no second firewall between the host systems and the internal private trusted network. The basic structure of the DMZ setup declares it to be a more secure system as even if an attacker gets through the first firewall, he just reaches the host systems, while the internal network is protected by another firewall. Do Firewalls provide enough Security for my Network? The answer is a simple no. There is no such thing that a firewall is enough to fulfill or satisfy all your security concerns. Yes it does protect the trusted systems from the untrusted ones, but they are definitely not enough for all your security needs. We need to protect our systems to secure the company data. The most common methods used to break into networks are brute force password cracking and social engineering. A firewall in no way can prevent such occurrences. There are other ways in which attackers can steal or destroy company data. Phone Tapping and the use of spy gadgets has become a common occurance.Although providing safety to the network to a large extend, a firewall is still not able to protect the company data from Viruses and Trojans, although some firewalls do provide for scanning everything being downloaded, the rate at which new HTML, Java and other viruses are propping up, it is becoming very difficult for firewalls to detect all viruses. Anyway firewalls provide no physical protection to the networks. It also provides no protection from fire, tornados etc.Yet another shortcoming is the fact that if the attacker is able to break into a trusted system which is provided access by the firewall, then he can easily gain access to the data at your network, as the firewall will think that he is actually the trusted party.
-
Hello - What is your domain name? I will take a look for you.
-
There are four general types of software out there: Freeware - This type of software is available for free, no strings attached, usually online. You can download, install, and use it as often as you want. A good example is the software available from AnalogX at http://www.analogx.com/contents/download.htm Shareware - This type of software is usually distributed free of charge, but you're expected to pay a small fee to the author if you like it and use it on a regular basis. For-pay Software - This type of software is purchased online or in a retail store. You fork over money to buy a license for the right to use the software. Ad-ware - This type of software, usually available online, is offered to the user at no charge. However, the author of the software still wants to get paid, so he incorporates advertising technology into the software. As a result, you get the software for free, but you have to view banner ads while using the software. Sometimes ad-ware is offered also in a for-pay version that does not include the ads, giving you a choice from free and ads, or for-pay without ads. However, there is a major catch with most (not all) ad-ware programs. In order to deliver the advertising to you, the installation program for the software not only installs the program you want, but also installs additional tracking software without your knowledge. This tracking software monitors your surfing habits and sends this data back "home" any time you're online, again without your knowledge. The advertising company analyzes the data and uses it to deliver targeted ads to you when you use said software. For example, if you have visited several web sites checking out DVDs, this information will be sent back to the marketing company, resulting in them displaying DVD-related advertisements when you use the software. Therefore, any software that tracks users' surfing habits, abuses a user's Internet connection to secretly send data "home", or employs any other techniques to profile or gather data about a user without express permission is called "Spyware". Spyware also comes in other forms such as cookies that track your surfing habits. Some Examples Here are a few examples of common spyware programs and what they do: Gator's webform completion and password saving software includes offercompanion, which is advertising software, tracking your surfing habits, sending info home, and displaying ads. It is also said to replace website's advertising with its own. Download programs like NetZip's Download Demon, Netscape/AOL's SmartDownload, and Real Network's RealDownload keep track of every file you download and assign you a unique ID number, enabling them to keep a detailed record of any files you download off the Internet. Aureate/Radiate secretly installs itself, tracks information, has the capability of installing additional software without your knowledge, hides itself, and is responsible for browser crashes. Ezula's TOPText/ContextPro/HOTText inserts ads in web pages that you view without your or the web site's webmaster's consent. Peer-to-peer file sharing software such as Kazaa, Grokster, Limewire and the likes have been known to secretly install spyware on users' machines that collects and sends personal data to another web address. Other names you might recognize that also fall into this category are CometCursor, BonziBuddy, Alexa, RealJukebox, and many more. What's the problem? Spyware enables advertising and marketing companies to gather data about you without your knowledge, abuse your Internet connection to send the data back to them, analyze and profile the data, then use it for their own profit by selling advertisement. This is an inexcusable invasion of anybody's privacy. If somebody asked you whether it's ok for somebody to look over your shoulder while you surf, make notes of sites and products you view, put this info into a database, use this info to serve you annoying ads and on top of that make money off of it, would you say "Yes, sure, go ahead" and be comfortable with that? Didn't think so. Some of the companies defend themselves by pointing out that they clearly disclaim their practices in the fine print. However, any user you ask and inform about this type of software, didn't realize it at the time s/he was installing it. The majority of companies distributing spyware is very covert about it and takes extra steps to hide the presence and activity of these spyware components, making it even more despicable. In addition, Spyware only encourages and enhances annoying pop-up ads and flashing banners, wastes your bandwidth, screen real estate, time, and disk space. Some spyware is also known to cause crashes and stability problems on users' computers. Other spyware offers a serious security risk by opening a backdoor on your system, offering the capability to secretly install software. How does that affect me? Obviously you do not want a computer that spies on your surfing habits gathers personal data about you and sends it to marketing companies takes up your bandwidth crashes your browser bombards you with more advertising secretly installs unknown software opens up secret backdoors Therefore it is important to keep your machine free of such malicious software. How do I detect and remove Spyware? Some spyware can be removed via the Add/Remove Programs applet in the Windows Control Panel, provided you know it's there and what its name is. Some of it can be removed manually. Some of it is difficult to remove due to hidden files and registry keys. In order to effectively check and clean up your system you need to be more aggressive. Right now the most complete and thorough spyware detection and removal tool is a freeware program called Ad-Aware offered by the German company Lavasoft. You can download it at no charge from their web site at http://www.lavasoft.de/downloads.html. Download and install Ad-aware on your machine. Before you use it, you will need to download the latest signature file from the same page and extract it into the Ad-aware program directory, overwriting an earlier version of the signature file. Once installed, run Ad-ware by clicking the icon in the start menu. The program is pretty self-explanatory and walks you through the process of scanning your hard drives and registry, identifying spyware components, and removing them. If you have questions about the software or need help, Ad-aware comes with a good manual, which is accessible from the Start menu. Additional Resources http://www.cexx.org/adware.htm http://grc.com/optout.htm http://www.lavasoft.de/ http://www.wilders.org/spyware.htm http://www.spychecker.com/
-
If you have Internet access - and you probably do, otherwise you probably wouldn't be reading this - chances are that you use a modem and a phone line to go online. But what exactly is a modem? How does it work? How do you make sure you get the best performance out of your modem? Read on for the answers to these and more questions! What is a Modem? The word modem is derived from MOdulator-DEModulator and that pretty well describes their function. Standard telephone circuits, known as POTS lines for Plain Old Telephone Service, are designed to carry analog information like the sound waves of your voice. That is not compatible with information between computers which is a digital stream composed of ones and zeros. The computers digital signal must be modulated or converted to analog sound waves to travel through the phone lines, and demodulated or converted back into digital pulses that can be understood by the receiving computer. Modems need to have a set of instructions that tell them how to accomplish various communication tasks. An early pioneering modem manufacturer, Hayes, developed a set of instructions called the Hayes Command Set, which has been modified and expanded as the technology advanced. Other manufacturers adopted these commands so that modems made by different companies would be able to talk to each other. Thus the Hayes set became a de facto standard that is usually referred to as the AT command set because commands are prefaced with AT to let the modem know that an instruction is to follow. A group of instructions is called a Command String. Modem Speed The original modems operated at the blazing speed 300 data bits per second (bps). Today the fastest analog modems are rated at 56,000 bps, unfortunately the Federal communications Commission (FCC) limits them to a maximum speed of 53 Kbps in order to protect the telephone network from interference that could affect normal voice communication. If you ever see a 56K modems speed reported over 53K, it is reporting the port speed of your computer (DTE), NOT the connection speed (DCE). This can occasionally happen when any modem is initialized, it is in error, your 56K modem will not connect at 115.2K. A modem can be forced to report port speed with an AT command so if you consistently see unrealistically high speeds reported you can correct your command string to fix it, Unfortunately, not all modems use the same command code so consult your modem manual or manufacturers web site. Modern modems are designed to adapt to phone line and noise conditions, and dynamically increase or decrease in speed as needed. When you sign on and the computer tells you that you connected at e.g. 48,000, don't worry about reconnecting to get a higher speed, that was just the speed at the moment you connected and it normally changes constantly as conditions dictate. There are other things to be aware of with the 56K modems that most of us use today. In order to deliver speeds above 28K there can only be one digital conversion between your computer and the telephone companies switch to which it connects. Since there is one in your home (your modem), that means that the phone company must have a digital rather than an analog switch. Unless you are really out in the sticks, nearly all TelCo switches are digital today. There is, unfortunately, another limitation, you must be located within about 3½ miles (5.6 Kilometers) of the TelCo switch, or line loss and noise will make high speeds impossible. Modem types Two different types of 56K modems originally were sold, the X2 modem developed by U.S. Robotics, and the Flex developed by Rockwell and Lucent. The two different types were unable to speak with each other, and it was important to use an Internet service provider (ISP) that used the same type of modem that you had. Eventually saner heads prevailed and the two camps came up with a system that combined the best features of each. This new system was adopted by the International Telecommunication Union (ITU) and is now universal under the ITU V.90 Standard. There are still different types of V.90 modems. External modems are self contained in their own box and have their own power supply that must be plugged into a power outlet. They are preferred by some users because they are easy to set up, just connect them to an available serial port, or USB port, and they have status lights that can give you information about their operation and performance. They can be moved easily between different computers, and can be turned off when not in use. Internal type modems are expansion cards that plug into either ISA or PCI slots inside the computer. They cost less than comparable external models since they need neither cabinets or power supplies. They, of course, require you to go inside the computer to be installed and can't have status lights. They are their own serial port and so do not use up one of the ports on your computer that may be needed for something else. Most internal modems today are Plug and Play (PnP) and are recognized and assigned by a PnP operating system. Make sure that your BIOS is NOT configured to set up PnP devices, Windows will handle the PnP setup. They require installation of drivers supplied by the manufacturer on a diskette or CD ROM. Some internal modems are Winmodems, they off load some functions to the computer CPU that are normally handled by onboard processors on a traditional modem. This obviously uses some of the computational power otherwise available to run applications. Manufacturers are not always up front in identifying winmodems, so look for the fine print on the box. A winmodem will always specify a minimum speed requirement for the computer's CPU. A winmodem also must be used only with the Windows operating system Modem Installation There are differing setup requirements for modems so the best advise is to carefully read the installation instructions that come with the modem. Internal modems cause the most confusion and aggravation so let's look at some considerations. Most computers come with two Com (Serial) ports. If you use a Serial mouse, it is normally installed on Com1, you could disable Com2 in your BIOS and use Com2 for your modem, but that is throwing away a port that you could use for other purposes, you would use Com2 for an external modem. If you use a USB type mouse Com1 would be open and available Remember we said earlier that an internal modem is it's own port, so it can become either Com3 or Com4. If you have a mouse on Com1, do not use Com3 for the modem. Com1 normally shares the same IRQ as Com3. Com2 shares an IRQ with Com4. We said normally because although Com1 & 2 are sometimes hardwired, com3 & 4 can also be placed on IRQ's 2, 5, 9, and 11. Of course, you only have 15 IRQ's in total and most will be needed for other devices. The following are the usual hex addresses and ports used for internal modems: Port Hex IRQ Com1 3F8 IRQ4 Com2 2F8 IRQ3 Com3 3E8 IRQ4 Com4 2E8 IRQ3 Most modems have jumpers or switches to set the Com port, Plug and Play modems will also have a PnP setting that will let Windows assign the port and hex address. Some modems are software configurable. If your modem and OS are Plug and Play it is usually OK to let Windows assign the IRQ and port, otherwise set the modem for the IRQ and port you want to use. If your mouse is not on Com1, use Com3 or Com4. If your mouse is on Com1, use Com4. Most modems come already set to Com4 as a default. Choosing either a PCI modem or an ISA modem has no effect on modem speed, either slot is more than fast enough for a modem. An advantage to a PCI modem is that PCI devices can sometimes share the same IRQ. As with any add in card, once you open the computer case you will need to select the slot you will use. Turn OFF the power and unplug the power cord before working inside the case. ISA slots are usually black and in the rear left hand corner of the motherboard, PCI slots are usually white and shorter than the ISA and slightly farther away from the rear panel. Metal slides in the rear panel line up with each slot. Remove the slide for the slot you intend to occupy, it will either be held in by a screw, or the breakout type which can be removed by prying them with a screwdriver blade and then flexing back and forth until it snaps off. Carefully line up the card edge with the slot and firmly press it straight down into the slot, you should not need excessive force. When the entire edge of the card is evenly seated, secure the card with a retaining screw at the top of the metal bracket. There will be two RJ11C modular telephone jacks exposed on the rear of the card where it shows through the rear panel, one is marked "LINE" and you will run a telephone cord from it to a nearby telephone wall jack. The other jack will be marked "SET" or "PHONE" and you may plug a standard analog telephone into that jack if you wish. Unlike some devices for which you can use the drivers in Windows, you will want to use the drivers that came with your modem. When you turn on the computer and Windows finds the modem select the Have Disk option and put the driver CD or diskette into the proper drive and follow the instructions that came with the modem to install the driver inf file. Most manufacturers frequently release updated drivers so it pays to check their web sites for new versions even with a brand new modem. Testing the Modem To test your modem, go to Start/Settings/Control Panel and double-click on the Modem icon. A window will open that should show your modem by name, click on the Properties button and a new window will show what port it is on, there is also a slider to set the volume level of the speaker mounted on the modem card. Below that is a box for maximum speed, set the speed to 115,200 for a 56K modem and click OK. Next click on the Diagnostics tab and in the window that opens click on the Driver button, a box will tell you the driver that is installed. Click OK and then click on the More Info button, a box will say it is communicating with the modem and a results box should report the test results. Troubleshooting If for any reason the diagnostics fail, exit back to Control panel and double click on the System icon, then on the Device Manager tab. There should be a listing for Modem, click on the + in front of it and you should see your modem listed. Look also at the listing for Ports, click on the + and it should show the port your modem is installed on. If either of these are missing, or if there is a question mark (?) or exclamation point (!) in front of the item there was a conflict in the installation. Remove all references to the modem, and shut down the computer via Start/Shutdown, turn off the power for at least 5 seconds and then reboot and go through the detection and driver installation again being sure to follow the manufacturers instructions exactly. PCI modems can be slot sensitive, if computer fails to see or properly set up a PCI modem try putting it in another slot. Testing your phone line If you fail to get good connect speeds (at least 40 kbps) and your location and TelCo switch meet the requirements we described earlier, you should determine the quality of your phone line so you can ask your phone company to fix the situation. You will need to use a terminal program like HyperTerminal that is included in Windows or any of the many programs that are distributed with modems or available for download. Since HyperTerminal comes with Windows, might as well use it for our test. Go to Start/Programs/Accessories/Communications/HyperTerminal In the window double click on hypertrm.exe When the program comes up, type in TEXT for the name, and 1234 for the phone number and hit Enter. You will now be in a blank terminal window. Type ATZ and hit Enter, it will respond with OK Type ATDT###-#### (Where ###-#### is the number to your ISP) and hit Enter. After the modem dials, it will reply with "Login", type +++, it will respond OK Type AT&V1 and press Enter You should see something like the following: DISC. REASON NONE LAST TX 26400 BPS MAX TX 26400 BPS LAST RX 50667 BPS MAX RX 50667 BPS PROTOCOL LAPM COMPRESSION V42Bis Line QUAL 023 Rx LVL 012 Max Rx State 67 Max TX State 67 EQM Sum 0089 Min Dist 0000 RBS Ptrn 04 Rate Drop 00 Dig Loss 3F07 Loc Rtrn Cnt FF Rem Rtrn Cnt FF If the Line QUAL is more than 25 it indicates the line is noisy. Repeat this test several times to get an average. Note also in the above test the modem was sending data at 26,400 BPS, and receiving data at 50,667 BPS. A 56K modem is asynchronous meaning it is faster in one direction than in the other direction. Under current regulations connection to the Public Service Telephone Network (PSTN) at speeds in excess of 53K is prohibited and modems are designed to not violate this rule. If you normally see faster speeds reported your modem is showing the port speed at which it communicates with your computer, rather than the connect speed at which it communicates with your ISP. This can often be corrected by adding a command to your modem string. Go to Start/Settings/Control Panel/System/Device Manager and right-click on your modem and click on Properties, click on the Connection tab and then click on Advanced. In the advanced window is a box labeled Extra Settings, type W2 in that box and click OK. The W2 command will take precedence and should force your modem to report connect speed. (Rockwell based PCI modems use the command MR=2). Some commands can override the W2 command so if that does not fix the problem, try adding S95=0, or S95=1 to the init string. Modem Strings There are hundreds of modems on the market from dozens of manufacturers. Each modem has an initialization string stored in it by the manufacturer that tells it how to function. Even though the AT command set is standardized, the combination of commands used in a particular modem may be very different than that in another model even from the same manufacturer. All command strings must begin with "AT" and end with "^M". They can be either upper or lower case, but not mixed, and they are limited to a maximum of 39 characters not including spaces. There is a "Basic Command Set" and an "Extended Command Set". Extended set commands are preceded by an ampersand (&). The command ATZ means to use the modem default command string. A more specific command is AT&F1 which means to use the modem manufacturers command string, or AT&F0 which means to use the chipset manufacturers command string. The latter are extended commands. The possible combinations of commands number in the thousands. An init string for one model of modem can thoroughly mess up some other model by causing command conflicts. Fortunately you don't have to know anything about init strings because your modem and its manufacturer know. There are many tweaks that can modify how a modem handles certain functions. You can make it dial faster, connect only at a certain speed, change the speaker volume, and much more. All of this is mainly of little benefit for most users, and can create unforeseen problems. Only modify your manufacturers settings if you really know what you are doing, or on the advice of someone knowledgeable
-
FTP Error Codes 110:--> Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "="). 120:--> Service ready in nnn minutes. 125:--> Data connection already open; transfer starting. 150:--> File status okay; about to open data connection. 200:--> Command okay. 202:--> Command not implemented, superfluous at this site. 211:--> System status, or system help reply. 212:--> Directory status. 213:--> File status. 214:--> Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user. 215:--> NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document. 220:--> Service ready for new user. 221:--> Service closing control connection. Logged out if appropriate. 225:--> Data connection open; no transfer in progress. 226:--> Closing data connection. Requested file action successful (for example, file transfer or file abort). 227:--> Entering Passive Mode (h1,h2,h3,h4,p1,p2). 230:--> User logged in, proceed. 250:--> Requested file action okay, completed. 257:--> "PATHNAME" created. 331:--> User name okay, need password. 332:--> Need account for login. 350:--> Requested file action pending further information. 421:--> Too many users (Service not available, closing control connection. This may be a reply to any command if the service knows it must shut down.) NOTE WELL - If you see a 421, followed by message that login/password is not good. then IGNORE the login/password message. ONLY the 421 is correct. Just busy, the 2nd message is not true. 425:--> Can't open data connection. 426:--> Connection closed; transfer aborted. 450 Requested file action not taken. File unavailable (e.g., file busy). 451:--> Requested action aborted: local error in processing. 452:--> Requested action not taken. Insufficient storage space in system. 500:--> Syntax error, command unrecognized. This may include errors such as command line too long. 501:--> Syntax error in parameters or arguments. 502:--> Command not implemented. 503:--> Bad sequence of commands. 504:--> Command not implemented for that parameter. 530:--> Not logged in. 532:--> Need account for storing files. 550:--> Requested action not taken. File unavailable (e.g., file not found, no access). 551:--> Requested action aborted: page type unknown. 552:--> Requested file action aborted. Exceeded storage allocation (for current directory or dataset). 553:--> Requested action not taken. File name not allowed.
-
Jargon and their definitions: active desktop: Enhanced functionality that enables webpages to be turned into desktop items that are updated automatically. A webpage can also be turned into wallpaper, allowing a workgroup homepage to be readily visible on each user's computer with links to related information on the intranet. Active Desktop supports active channels, or subscriber-based content delivery systems. It is available on Windows 98 and Internet Explorer versions 4.0 and higher. active server page: A specification for a dynamically created webpage that utilizes ActiveX scripting -- usually vb script: javascript has nothing to do with Java. This confusion was created by Netscape, which parasitically named the scripting language for its browser "javascript" to capitalize on the success of the Java programming language. Java, the programming language, is what's called a compiled language. It's written using English-language words and then translated by the computer into something that the computer can understand. Script is written in English as well, but is only understood and translated by the browser, not the computer itself. javascript is basically an advance on HTML coding that is used to provide functionality in webpages -- rollovers, pull-down menus, and so on. JPEG (Joint Photographic Experts Group): Pronounced "jay-peg," JPEG is an ISO/ITU standard for compressing still images. Using discrete cosine transform, it provides lossy compression (you lose some data from the original image) with ratios up to 100:1 and higher. It depends on the image, but ratios of 10:1 to 20:1 may provide little noticeable loss. The more the loss can be tolerated, the more the image can be compressed. Compression is achieved by dividing the picture into tiny pixel blocks, which are halved over and over until the appropriate ratio is achieved. JPEG is implemented in software and hardware, with the latter providing sufficient speed for real-time, on-the-fly compression. kernel: The central part of the Linux operating system that oversees all other operations. It loads first and stays in the memory throughout the operation of the OS. kilobyte: In decimal systems, kilo stands for 1,000, but in binary systems, a kilo is 1,024 (2 to the 10th power). Technically, a kilobyte is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes. LAN (local area network): A communications network that serves users within a relatively small area. Most LANs serve just one building or a group of buildings. A LAN's servers run the programs and hold the data that all users on the LAN share. The users' individual PCs are workstations (clients) which access the serves as needed. limiter: A signal processor used to keep audio signals from exceeding a set level. line level: The standard volume level for routing audio signals. For pro audio gear, line level is set at +4dBv and for consumer gear it is -10dBv. Linux: A Unix-like operating system that runs on many different types of computers. Linus Torvalds wrote the Linux operating system while he was a college student at the University of Helsinki in Finland. Instead of making it proprietary and trying to sell it, Torvalds gave it away, so anyone who wanted to develop for it could do so. But don't run out and download Linux just because it's free. It's not a consumer operating system, and it requires a very high level of skill to install and run. It's a flavor of the Unix operating system -- on which most of the Internet runs -- and is mainly used by programmers as a development tool. Linux, which has attracted a passionate cult following among programmers, represents the latest entry in the worldwide race for domination of the PC desktop and computer server markets. LFO (low-frequency oscillator): Low-frequency signals used to modulate other signals for vibrato and other effects. LPT: The typical designation for a computer's connection to a printer or other device through a parallel port. The name originally stood for "line printer terminal," but the LPT port can be used for other devices as well, such as a video camera. macro: A mini-program that performs a series of keystrokes, commands or other functions that have been recorded into it. Calling the macro (usually through pressing a combination of keys) causes the actions recorded in the macro to be run in sequence. Macros are often used to enter words or phrases that you use frequently. megabit: One million bits. Abbreviated as Mb, Mbit, and M-bit. megabyte (MB): A measure of computer processor storage and real and virtual memory; a 2 to the 20th power byte, or 1,048,576 bytes in decimal notation. memory: The electronic holding place for instructions and data that your computer's microprocessor can reach quickly. When your computer is in normal operation, its memory usually contains the main parts of the operating system and some or all of the application programs and related data that are being used. META tag: A special HTML tag that identifies a webpage's contents. META tags do not have any influence on the appearance of the page, but instead hold information such as keywords for search engine, descriptions of the site, and update histories. The information in META tags is often used in the indexes of search engines. microprocessor: A silicon chip that contains a CPU, or central processing unit. This is the brain of any computing device. MIDI (pronounced "middy"): Short for musical instrument digital interface, MIDI is a standard protocol for communication between musical devices such as synthesizers and PC sound cards. At minimum, MIDI defines the codes for a musical event, such asa note's pitch, length, volume, and other attributes, like vibrato, attack, and delay time. The MIDI standard is supported by most synthesizers, allowing MIDI music to be played by an orchestra of separate MIDI instruments. The MIDI standard is also utilized by musical editing and composition software. modem: A device that allows a computer to transmit data over telephone lines. It is the most common way that people connect to the Internet. A modem modulates data by converting it to audible tones that can be transmitted over a telephone line, and then demodulates received signals to get the data. A high-speed cable or DSL modem is highly recommend for transferring audio data across the internet. monitor: The display screen for a computer. monitors: Special speakers that have a very flat frequency response and are used during recording and mixing. motherboard: The central nervous system of a microcomputer. Typically it contains the CPU, BIOS, RAM, and mass storage interfaces, serial and parallel ports, expansion slots, and all the controllers required to control standard peripheral devices, such as the display screen, keyboard, and disk drive. mouse: A handheld device that a computer user can use to move the on-screen pointer without having to resort to key commands. MP3 (MPEG-1, Layer 3): Developed in Germany by the Fraunhofer Institute in 1991, MP3 is an audio compression technology. As part of the MPEG-1 and MPEG-2 specifications, it compresses CD-quality sound by a factor of 12 using perceptual audio coding. It provides almost the same high fidelity as a CD. MP3 music files, played via software or a handheld device, make it possible to download high-quality audio from the Web quickly. multiplier: The function that determines the speed of the processor, which, in turn, is a multiple of the bus speed. multitrack recording: The process of recording multiple sound sources to individual isolated tracks that are synchronized to record and playback in time. Napster: A peer-to-peer file-sharing format developed to trade mass amounts of music files over the Internet. Lawsuits forced the original version to be shut down, but the Napster technology is set to re-emerge as a subscription-based service. near field monitor: Speakers that are designed to be placed in relatively close proximity to the listener and used to monitor recording and playback. noise floor: The level of noise that an audio device produces, measured in negative dB. The lower the dB level, the quieter the device is. normalization: Adjusting sound files so the volume is consistent. Nyquist's theorem: States that a sampling device must capture samples at twice the frequency of sound being sampled to avoid aliasing. OCR (optical character recognition): A branch of computer science that involves reading text on paper and translating the images into a form that computer users can manipulate.. When a text document is scanned into the computer, it is turned into a bitmap, or picture, of the text. OCR software identifies letters and numbers by analyzing the light and dark areas of the bitmap. When it recognizes a character, it converts it into ASCII text. Advanced OCR programs can recognize hand printing. OEM (original equipment manufacturer): A misleading term for a company that buys computers in bulk from a manufacturer , then customizes the machines and sells them under its own name. The term is a misnomer because OEMs aren't the original manufacturers. Another term for OEM is VAR (value-added reseller ). oscillator: An electrical device that uses varying voltages to oscillate at different frequencies, thereby producing musical notes. overclocking: Running your processor at a speed faster than it's rated. Most processors can run faster than their rated speed with some sacrifice of reliability. over-sampling: A technique in which each sample coming from the D/A converter is sampled multiple times. The samples are then interpolated creating an anti-aliasing effect. Q (bandwidth): The bandwidth of an equalizer band. quantize: Forcing the notes in a MIDI sequence to fall on the nearest beat. QuickTime: A sound, video, and animation system developed by Apple Computer. A QuickTime file can contain up to 32 tracks of audio, video, MIDI or other time-based control information. Apple also provides a version of QuickTime for Windows. rack: A special type of storage shelf used to house pro audio gear. The height of rack mount gear is often expressed as a whole rack unit (meaning it occupies one entire rack space) or a half rack unit (half the vertical size of a whole rack unit). RAM (random access memory): A common type of computer memory that functions as a machine's primary workspace. It can be accessed randomly. That is, any byte of memory can be accessed without touching the bytes before or after itThe more RAM your computer has, the more efficiently it will operate. RAS (remote access services): A Windows NT feature that allows remote users to log into an a LAN using a modem, X.25 connection, or WAN link. RAS is compatible with network protocols including TCP/IP, IPX, and NetBEUI. raster: A pattern of horizontal lines displayed on a computer or TV monitor. As the part of a monitor's screen that is actually being used to display images, it's a bit smaller than the physical dimensions of the display screen itself. It varies for different resolutions. Most monitors have controls that allow you to move or resize the raster. RealAudio (.RA): The standard for streaming audio data over the Web. Developed by RealNetworks, RealAudio supports FM-stereo-quality sound. To hear a webpage that includes a RealAudio sound file, you need a RealAudio player or plug-in, a program that is freely available from a number of places, including Netscape Navigator and Microsoft Internet Explorer. release: The final stage of a sound's envelope. removable media: Information storage that allow users to remove the stored information if necessary. Examples of removable media include disks and magnetic tapes. The most popular form or removable media for audio is the CD-R. resolution: The degree of clarity an image displays.The term is most often used to describe the sharpness of bit-mapped images on monitors, but of course it also applies to images on printed pages, as expressed by the number of dots-per-inch (dpi). x. For example, a 300-dpi printer can print 300 dots in an inch-long line., or 90,000 dots per square inch. For monitors, screen resolution signifies the number of dots (pixels) on the screen. For example, a 640x480 pixel screen can display 640 dots on each of 480 lines, or about 300,000 pixels. Screens of different sizes have different dpi measurements. Printers, monitors, scanners, and other I/O devices are often classified as high resolution, medium resolution, or low resolution, but the corresponding degrees of clarity improve along with the technology. resonance: The persistence of a tone, usually caused by sympathetic vibration. reverb: The persistence of an acoustic signal after the original signal has ceased. ripping: Using software to extract raw audio data from a music CD. ROM (read-only memory): A storage chip that typically contains hard-wired instructions for use when a computer starts up. RSA: A public-key encryption technology created by Ron Rivest, Adi Shamir, and Leonard Adleman of RSA Data Security, Inc. The key has two parts, one private and one public. Both parts are required for decryption. The RSA algorithm takes into account the inefficiency of factoring very large numbers. Therefore, decrypting an RSA key requires e enormous amounts of time and computer processing power. Used in Netscape Navigator, Microsoft Internet Explorer, and other applications that require industrial-strength encryption, the RSA algorithm has become a standard, especially for data sent over the Internet. RSI (repetitive strain injury): Ailments of the hands, neck, back, and eyes due to computer use. Samba: An SMB (server message block) daemon that emulates SMB services for a Linux box. sampling frequency: The rate at which measurements of an audio signal are taken during A/D and D/A conversion. A higher sampling rate makes for a higher-fidelity audio signal. ScanDisk: a DOS and Windows utility that detects various errors on hard disk. It can repair some of them. In DOS, run ScanDisk by entering scandisk at the prompt and pressing the Enter key. In Windows 95 or 98, run ScanDisk by selecting Start->Programs->Accessories->System Tools->ScanDisk. scanner: A device that converts paper documents or photos into a format that can be viewed on a computer and manipulated by the user. SCSI (small computer system interface): Pronounced "scuzzy," SCSI is the standard port for Macintosh computers and is common in PCs and Unix boxes as well. SCSI is really a family of interfaces, ranging from the relatively primitive SCSI-1 to the spiffy new Wide Ultra2 SCSI. It offers some advantages over IDE, a similar port, including a higher data access rate (up to 80 MBps, depending on the type) and the ability to connect a number of devices to one port. SCSI can control seven devices, while IDE can control only two. SCSI hard drives are commonly used for audio applications as they generally can read and write data faster than can an IDE drive. semiconductor: A substance, usually a solid chemical element or compound, that can conduct electricity under some conditions but not others, making it a good medium for the control of electrical current. Its conductance varies depending on the current or voltage applied to a control electrode, or on the intensity of irradiation by infrared, visible light, ultraviolet, or X rays. send: See auxiliary send. sequencer: A device that stores MIDI data. server: The business end of a client/server setup, a server is usually a computer that provides the information, files, webpages, and other services to the client that logs on to it. shareware: Shareware is not software. Rather, it's a marketing method. When you buy software at your local computer store, you have to pay for the product before you see it. With shareware, you can try before you buy. That way you know whether it will meet your needs before you pay anything. shelving EQ: An EQ that is designed to boost or cut a selected frequency and tapers off at a fixed slope. .SHS files: Windows95/98/NT "scraps" -- usually dragged onto the desktop to be used as shortcuts. Trojan Horses can be hidden within .SHS files. Your computer does not need .SHS files. If you come across .SHS files, delete them. SIMM (single in-line memory module): A narrow circuit board that holds memory chips. It plugs into a SIMM socket on a motherboard or memory board. Usually, a SIMM holds up to 8 chips on a Macintosh or 9 chips on a PC. Unlike memory chips, SIMMs are measured in bytes rather than bits. SIMMs, which are generally available in configuration from 1MB to 32MB, are easier to install than individual memory chips. signal to noise ratio (S/N): The difference between the nominal signal level and the residual noise floor, usually expressed in decibels. SMART (self-monitoring, analysis, and reporting technology): An open standard within hardware and software that automatically monitors a disk drive's health and reports of potential failure. All major hard-drive manufacturers use SMART to detect imminent disk problems and report the danger to the computer user. The user can then take appropriate action, which typically means backing up critical data stored on the disk -- before the drive becomes unusable. SMB: A file-sharing protocol that Windows uses to share files and resources, such as printers, across a network. software: Computer programs that instruct the computer. Some examples are word processors, spreadsheets, and games. sound card: The card that processes audio data on a PC. It's often a PCI card, but it can also be USB or FireWire based. Or it can be built into the computer's motherboard. system exclusive: A MIDI message that is used to transmit data to a specific MIDI device that is in a chain. See also bulk dump. semiconductor: A substance, usually a solid chemical element or compound, that can conduct electricity under some conditions but not others, making it a good medium for the control of electrical current. Its conductance varies depending on the current or voltage applied to a control electrode, or on the intensity of irradiation by infrared radiation, visible light, ultraviolet radiation, or X-rays. shareware: Shareware is not software. Rather, it's a marketing method. When you buy software at your local computer store, you have to pay for the product before you see it. With shareware, you can try before you buy. That way you know whether it will meet your needs before you pay. There are many high-quality shareware music applications available on the Internet. SIMM (single in-line memory module): A small circuit board that can hold a group of memory chips. Typically, SIMMs hold up to eight RAM chips (on Macintoshes) or nine RAM chips (on PCs). Unlike memory chips, SIMMs are measured in bytes rather than bits. SIMMs are easier to install than are individual memory chips. software: Computer programs that instruct the computer. Some examples are word processors, spreadsheets, and games. spam: Electronic junk mail. Some people define spam as any unsolicited email. A narrower definition is unsolicited advertising, most commonly for credit cards, weight loss methods, and pyramid schemes, sent to a mailing list or newsgroup. S/PDIF: The Sony/Phillips Digital Interface. Carries up to 24-bit data. spreadsheet: Software that simulates a paper spreadsheet, or worksheet, in which columns of numbers are summed for budgets and plans. A spreadsheet appears on-screen as a matrix of rows and columns, the intersections of which are identified as cells. Spreadsheets can have thousands of cells and can be scrolled horizontally and vertically in order to view them. SRAM (static RAM): RAM (random access memory) that retains data bits in its memory as long as power is being supplied. Unlike DRAM (dynamic random access memory), which stores bits in cells consisting of a capacitor and a transistor, SRAM does not have to be periodically refreshed. SRAM provides faster access to data and is more expensive than DRAM. It is used for a computer's cache memory and as part of the digital-to-analog converter on a video card. streaming:Refers to the continuous transmission of data, typically audio or video, so it can be processed as a steady stream. Streaming technologies are increasingly important as the Internet grows because many users don'tt have fast enough Internet connections to download large multimedia files quickly. With streaming, the client browser or plug-in can start displaying the data as sound and pictures before the entire file has been transmitted. If the streaming client receives the data more quickly than required, it must save the excess data in a buffer. If the data arrives too slowly, its display will appear choppy. suite (also known as an "office suite"): A set of applications designed to work together. A suite typically includes word processing, spreadsheet, presentation graphics, and database programs. Some of the programs may be available separately, while others come only in the bundle. Microsoft Office, WordPerfect Office and Lotus SmartSuite are the major business application suites for Windows. Sun's StarOffice is a new contender that is expected to become popular. Although Windows provides integration features such as cut-and-paste and compound document creation, the suites provide additional tools to move data from one application more easily into another. In addition, common functions such as spell checking can be installed once and shared among all programs. While no single application suite has the best program in each category, they have become very popular because they come on one CD-ROM, are upgradable as a single unit, and training is available for the entire package. sustain: The part of the ADSR envelope that determines where the sound will decay while the note or key is depressed. synching: The process of linking two devices together in order to exchange data or work from the same documents. For example, a DAT can be synched to a PC and be used to store audio data while still being controlled by the PC. TCP/IP (transmission control protocol): An Internet protocol for moving data from one computer to another. IP, or Internet protocol, is also an essential part of the Internet data transmission process. The Internet protocol coordinates the addressing and packaging of the data packets that make up the article. terminal: A device with a screen and keyboard that relies on a mainframe or another computer for intelligence. thumbnail: A miniature representation of a page or image. A thumbnail program may be stand-alone or part of a desktop-publishing or graphics program. Thumbnails take considerable time to generate, but provide a convenient way to browse through multiple images before retrieving the one you need. A number of programs let you click on the thumbnail to retrieve the item it represents. TIFF (tagged image file format): A common ile format for storing bit-mapped images on computers. The images may display any resolution, and they can be monochrome, gray-scaled, or in full color. TIFF file extensions often end with .tif. timecode: Timecode is a signal that contains a chronological record of the absolute time in a recording. It is used for synchronizing different recorders. It can be used for electron
-
If your site resides on server4.totalchoicehosting.com this update is for you! We will be peforming some routine maintenance on this server starting 10/20/2002 @ 12:55AM EST. This will lead to approxiomatley 15 minutes of downtime. Upgrades are for Operating System Software. Then in the near future we will be conducting a hardware upgrade to this server. This is in the planning stages but should take place sometime in December. We will keep you posted. Thanks
