Implementing UNIX [Part 2]

After understand on how to implementing unix part 1, currently we are look into detail on X terminals If you are running UNIX on a central high-spec computer and connecting to it from a group of less powerful terminals – as is the case with mainframe systems – you can...

Implementing UNIX [Part 1]

After get to know on how to choose Unix part 1 and part 2, now time to implement unix. Uses of UNIX You can use the UNIX operating system on a wide range of computers, from standalone home PCs to high-end network and Internet servers. Because networking has been...

Getting know about scissor lifts

Many year ago, at my housing area, the drain system is not well develop and cause flooding during heavy rain. A lot of car owner did not move their car on time, car will be damage during flood. Usually heavy rain and night, and a lot of people does now realize...

Visit to Gunung Jerai

Few week back, I need to fetch mum and dad back to mum’s home town, sungai petani, kedah. I have nothing much to do there, so I decide to pay a visit to Gunung Jerai with few of my friend. After putting my mum and dad at sungai petani, 5 of us, NC, David, Chan,...

Encrypting and authenticating XML data [Part 2]

After get some understanding on encrypting and authentication on xml on XML web services. Now we getting to know more about the XML signature and also some summarize of XML encrypting and authenticating. XML Signature Standard The W3C XML Signature standard provides a...

HTML standards and compliance [Part 2]

After knowing how the HTML Standard and compliance on HT (Hyper Text) and Markup, let us get more understand on tag wars, xhtml and etc. Tag wars In the early days of the Web, HTML proved to be an extremely popular authoring language. With HTML, publishing content to...

Do you use Voice Over IP?

I believe most of us are familiar with this technology, but a lot of us don’t really know what is the actual term. Some said “Internet phone”, some said “free call from Internet”… But the actual term is call VOIP (Voice over...

Introduction to Linux processes [Part 2]

Last month was mention about the Linux Processes on PIDs , parent and child processes and using the ps command. In this part 2, let see how the background and foreground background process work. Background and foreground processes An interactive process can run in the...

Business use GPS tracking device

Recently I am looking for GPS tracking device which install in my car for security purposes, while doing research on GPS, found that a lot of businesses started to use GPS to track their company asset such as vans, company cars, trucks, even boats and airplanes. Now a...

How to Choose Unix [Part 2]

Last month, I have come across how to choose Unix, with which UNIX to choose, commercial UNIX, and open source UNIX, lets see how the “Brands of commercial UNIX“and “Brands of open source UNIX”. Brands of commercial UNIX Some of the most famous and widely used brands...

Plan for Swimming Trip

Back to year 2000, me and my family, together with my relative when for bukit merah water park, unfortunately, wae does not actually went to the water park, we just went for jungle tracking. Few week back when we go for Gunung Jerai, my friend was suggest to visit...

Encrypting and authenticating XML data [Part 1]

To lean on advance xml, we might need to know some W3C standards to extending the XML understanding, Encrypting and authenticating on XML data is one of the XML, XHTML and Webservices that we might need to know in order to master the XML skills Using encryption and...
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO