IT technologies and concepts explorer and analyser in the web.

  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin

New IT Concepts

Share Your Comments

  • Saas - Cloud Computing

    The cloud computing : is based on this three concepts. IaaS (Infrastructure as a service), PaaS (Platform as a Service) and SaaS (Software as a Service).

  • Virtualization - The new technology evelution

    Virtualization, in computing, is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system, a storage device or network resources.....

  • http://ittechnologies.blogspot.com/2011/04/common-security-vulnerabilities-in-e.html

    Security Vulnerabilities in E-Commerce Systemin

    Most of these attacks have utilized vulnerabilities that have been published in reusable third-party components utilized by websites, such as shopping cart software and poor design of such websites. Other factor is user awareness of security vulnerabilities.

  • VPN - Virtual Private Network

    VPN is a technology which is making secure private network through the public accessible network infrastructure. Virtual Private Network represent by the short name VPN. ...

  • Saas - Cloud Computing

    The cloud computing : is based on this three concepts. IaaS (Infrastructure as a service), PaaS (Platform as a Service) and SaaS (Software as a Service).

  • Virtualization - The new technology evelution

    Virtualization, in computing, is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system, a storage device or network resources.....

Posted by Priyan Fernando 30- Jun- 2011 0 comments

What is APN? APN stands for Access Point Name and it is a gateway or protocol that allows people to gain access to the web by using the services of mobile phone networks. These networks may be 2G, 3G, or GPRS among others. But before someone can get access to the internet, the proper settings must be...

[ Read More ]

Posted by Priyan Fernando 13- Jun- 2011 0 comments

Multi-Protocol Label Switching (MPLS) provides a mechanism for forwarding packets for any network protocol. It was originally developed in the late 1990s to provide faster packet forwarding for IP routers (see RFC 3031). Since then its capabilities have expanded massively, for example...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Enabling or Disabling the “Hibernate” option in Windows 7 or Vista is not as simple as it used to be in Windows XP. For Windows 7 a different approach has to be followed to accomplish the same job. In this post you will find how to enable or disable...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Most of you are familiar with the telnet command. It is one of the well known Windows IP Utilities. In fact the telnet command is most important for sending a fake email which i have discussed in my previous post. If you are using Windows XP the telnet...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Most of us are very curious to know a method to send anonymous emails to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc? The answer is YES,...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.Most of us have experienced a situation...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background....

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

If you have been usin Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through...

[ Read More ]

Posted by Priyan Fernando 13- Jun- undefined 0 comments

How to get face book Hack  Wondering to know how to hack Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So in this post, we’ll look...

[ Read More ]