Tech Tips

How to Delete Run Command History In Windows 7

You can delete Run Command History In Windows 7 through Registry editor tool. Each successful Run command saved in database of Registry. For privacy purpose you can clear run command history so that other person can not access that command….
Read more

Best Data Recovery Software You Can Depend On

Best Data Recovery Software

Best Data Recovery Software There are many kinds of data recovery software out there but there are not many that have the ability to protect everything you do and let you get back to business. EaseUS is the best┬ádata recovery…
Read more

What is Trivial File Transfer Protocol (TFTP)

Trivial File Transfer Protocol

Trivial File Transfer Protocol   Trivial File Transfer Protocol (TFTP) is a simple file transfer protocol, with the functionality of the basic form of FTP. TFTP is used to transfer files from remote computer such as diskless workstations. Disk-less workstation…
Read more

Types of Wireless Network Security

Wireless Network Security

There are four types of wireless network security are data encryption, port based access control, Services system identifier (SSID) and Media Access Control (MAC) address filtering. Data encryption secures the data that transmit through the network and rest are for…
Read more

What Is File Transfer Protocol (FTP)

File Transfer Protocol

File Transfer Protocol FTP (File Transfer Protocol ) used over the Internet to transfer Files. FTP Uses the Internet’s TCP/IP protocol to enable transfer. The User can download a file from a server or upload a file from using FTP….
Read more

What is SSL-Secure Socket Layer Protocol

SSL-Secure Socket Layer Protocol

SSL-Secure Socket Layer Protocol is a developed by Netscape for transmission data over the internet. SSL ( Secure Socket Layer ) Protocol is designed to provide security, and encryption to the data generated from application layer. SSL Protocol mainly used…
Read more