Archives for Computers
Multiple Page Forms
So you have this long, involved form. Rather than present the user with a myriad of inputs on a single page, you want to break this up into separate form…
Simple PHP mail script
This script is not only educational, but also applicable for practical web development. It allows you to place a simple form for sending emails on any HTML page. The script…
PHP Include File
Server Side Includes (SSI) are used to create functions, headers, footers, or elements that will be reused on multiple pages. Server Side Includes You can insert the content of a…
Strength of Cryptographic Algorithms
Good cryptographic systems should always be designed so that they are as difficult to break as possible. It is possible to build systems that cannot be broken in practice (though…
Why Buy an HP Printer?
Many office equipment gurus believe that Hewlett Packard is the best name in computer technology. With a longstanding reputation of quality and dependability, HP has become a trademark for technological…
Cryptographic Random Number Generators
Cryptographic random number generators generate random numbers for use in cryptographic applications, such as for keys. Conventional random number generators available in most programming languages or programming environments are not…
Where to Find a Printer Ink Refill
If you are relatively new at managing a home computer or office equipment, you may be unfamiliar with where to purchase printer ink refills, especially if the company has handled…
Cryptographic Hash Functions
Cryptographic hash functions are used in various contexts, for example, to compute the message digest when making a digital signature. A hash function compresses the bits of a message to…
Could You Use a Canon Printer?
Canon office equipment has been around for a long time. Some shoppers will buy their products for this reason. Others do so because of the quality, pricing, and reputation they…
Digital Signatures
Some public-key algorithms can be used to generate digital signatures. A digital signature is a small amount of data that was created using some private key, and there is a…
Have You Considered an Epson Printer?
An Epson printer may be just what you are looking for in the line of quality computer printing equipment. Everyone needs a printer they can rely on to produce clear,…
Basic Cryptographic Algorithms
The method of encryption and decryption is called a cipher. Some cryptographic methods rely on the secrecy of the encryption algorithms; such algorithms are only of historical interest and are…
What to Look for in a Commercial Printer
If your home-based business is growing, it may be time to consider buying a commercial printer. This upgrade can be costly, so be sure to take into account a number…
Iomega External Hard Drive FireWire 800/FireWire 400/USB (250GB) Review
Iomega's External Hard Drive FireWire 800/FireWire 400/USB impressed us with its large capacity, speedy FireWire 400/800 performance, and nice array of backup software. The unit is great for gigabyte-hungry Mac…
How to print photography by laser printer!
The installation of color laser printer is growing every year. More and more people use laser printer to print photography and complain about poor printing quality or paper jam. What…
Keyboard: Buyer’s Guide
Layout There are a variety of keyboard designs and shapes from which to choose. Most computers come with a traditional "straight" keyboard, which is the rectangular design we're all familiar…
Alagus Print Admin 3.0 Pro
Alagus Print Admin is a client-server program for monitoring and management of network printers and print jobs. The program offers you an opportunity to reduce your printer related expenses. It…
Real-Time and Embedded Linux, Part II
In the previous article, I touched upon embedded systems, their uses, and the importance of developed them in an open manner. Now I'd like to take a closer look at…
Printer Ink or Toner Cartridge?
When shopping for a new printer, keep in mind the fact that you will need to buy replacement ink cartridges when the current supply runs out. For many models, the…
Real-Time and Embedded Linux
For years, there has been a sentiment throughout the industry that the desktop is where products should be targeted and that the home system is the center of personal computing.…