Category: Technology

What Is Spam and How to Avoid It 1

What is Spam and How to Avoid It?

Introduction SPAM is the name given to unwanted messages that arrive by e-mail, messengers such as WhatsApp, social networks, areas of comments of blogs, and so on. The practice of SPAM is so common that it is virtually...

Creating and Managing Users in the GnuLinux 1

Creating and Managing Users in the Gnu/Linux

Introduction One of the things that makes it secure the operating system GNU/Linux (in fact, any Unix-based system), is its requirement that each thing has the owner and permissions of use. Thus, to be possible to restrict or...

Ddr Memory (Double Data Rate) 1

DDR Memory (Double Data Rate)

Introduction The memory is DDR (Double Data Rate) is the default, which replaced the traditional memories SDR SDRAM (further referred to as “memories SDRAM” or, still, as “memories DIMM”), being very well received by the market especially in the segment...

What Is Phishing And How to Avoid Scams 1

What is Phishing? How to Avoid Scams?

Introduction The messages considered to be phishing (or phishing scam) are among the biggest dangers of the Internet. These attempts of fraud arriving by e-mail, social networks, WhatsApp and the like, and may result in serious consequences to victims, especially...

What Is Erp and What Does It Do 1

What is ERP?

Introduction The evolution of technology, the heating — or the slowdown — the economy, the increase in the supply of credit and reach new markets are among the factors that increase significantly the competitiveness of...

Sound Card Key Features 1

Sound Card: Key Features

Introduction The name says it all: the sound cards are the devices responsible by providing the audio generated in your computer. At the beginning of the the era of PCs, this item is not existed – the...

The Hoax The Dangers of Rumors on the Internet 1

The Hoax: The Dangers of Rumors on the Internet

Introduction The Internet is a medium of communication fantastic: with it, we can do shopping, meet people, study, etc. But, being so comprehensive, the “world online also can offer the dangers of various kinds. One of them is...

DVD The Types, Capacities and Other Features 1

DVD: Types, Capacities and Features

Introduction DVD is the acronym for Digital Versatile Disc or The Digital Video Disc. It is a media for storage of data that is also widely used for distribution of films. In this text, you’ll learn the the main types of existing DVDs...

Understanding and Using Permissions in Linux 1

Understanding and Using Permissions in Linux

Introduction The permissions are one of the most important aspects of Linux (in fact, all Unix-based systems). They are used for various purposes, but serve primarily to protect the system and the files of the users. Manipulate permissions is an...

Video Projectors Key Features 1

Video Projectors: Key Features

Introduction The video projectors allow the display of the screen the computer (or other device) in a manner enlarged on a wall or on a screen appropriate. In this way, it is possible to all are present...

Raid Systems (Redundant Array of Independent Disks) 1

RAID Systems (Redundant Array of Independent Disks)

Introduction More than simply store data, solutions storage should provide access to information efficiently, in a timely manner and, depending on the case, offering some kind of protection against failures. Is at this point that the systems RAID (Redundant Array of Independent...

How to Avoid the Scam of Fake Job 1

How to Avoid the Scam of Fake Job

Introduction Bogus offers of employment are common in any season, but increase considerably in times of economic crisis, after all, the number of layoffs it makes a lot of people search for vacancies desperately. Many “rogues” take advantage in...

Understanding and Using Permissions in Linux (Part 2) 1

Understanding and Using Permissions in Linux (Part 2)

Introduction In this second part, about understanding and use of permissions on Linux, we will work with the command umask, chown , and chgrp. The first command allows you to manipulate the default permissions (default) the system, the second is used...

What Is Ransomware 1

What is Ransomware?

Introduction Ransomware is a type of malicious software (malware) created with the order to block access to files or systems only release them after the payment of a specified value. It is as if it were a kidnapping,...

How to Protect Your Credit Card From Fraud 1

How to Protect Your Credit Card From Fraud

Introduction Credit cards are synonymous with practicality. With them, you can pay for expenses without having to walk with cash or cheque and, in online shops, many sometimes it is possible to receive the product more quickly by...

Mission Critical Concepts Basic 1

Mission Critical: Basic Concepts

Have you ever wondered what would happen if the system of your bank to stay hours without work? What would the consequences be if your Internet service provider Internet access lost data of their customers? Already he thought about...

What Is Big Data 1

What is Big Data?

Introduction Have you ever stopped to think about the amount and variety of the data that we generate and store each day? Banks, insurance companies airlines, telecom operators, search services online networks and retailers are just a few...