Recent Topic About Tutorials

Mobile Network State Disconnected

Mobile
Mobile Network State Disconnected This issue has become one of the most common among Android mobile phone users. It can happen for several reasons but the symptoms are always the same: the cell phone does not allow access to the internet through mobile data, and in some cases it is not even possible to make calls. We have collected information …

ARP Poisoning: What is it?

Other Tutorials
ARP Poisoning Currently, apart from the viruses that surf the Internet freely, waiting for an unsuspecting user to fall into their traps, there are people who are dedicated to trying to force their entry into other people’s computers. Today we present what is the ARP Poisoning, a very effective technique, although a little old, used by hackers to achieve their …

Animated Gifs

Other Tutorials
Animated GIFs One of the most popular virtual resources currently are the gifs; we find them on Facebook, on Reddit, on Adds, and on hundreds of other websites and social networks; they can contain memes, fragments of films, motivating phrases, etc., and what makes them so popular is that they are moving images, like small fragments of video but with …

What is a DNS server?

Other Tutorials
DNS Server DNS servers play a fundamental role in Internet browsing, and have an important influence on the speed and performance of your access to the network. The use of some or other servers, their modification, or the dangers of using the wrong DNS servers are some of the aspects you should know about. In fact, DNS servers are one …

Brute Force Attack

Other Tutorials
There are different types of computer attacks that websites or servers suffer all the time. One very simple but that bears its fruits is the so-called brute force attack. Here we will show you how they steal a key by trying all possible combinations until they find the one that allows access. The intention is to show you how these …

Distributed systems

Other Tutorials
A distributed system is defined as a collection of computers connected by a network, and with the appropriate distributed software so that the system is seen by users as a single entity capable of providing computing facilities. Distributed systems are implemented on various hardware platforms, from a few workstations connected by a local area network, to the Internet, with a …

DNS Resolver

Other Tutorials
Whenever we connect to a service on the Internet, be it a website, a mail server, a remote terminal server, or any other service, we usually do so by invoking a domain name. In this article we will talk about the domain name system, or DNS (Domain Name System), and its operation. Now, every connection between us and any service …

Candidate Key

Other Tutorials
We call the candidate key of a relation (or simply key) to the attribute or set of attributes that have the property of uniquely identifying a tuple within the relation. The keys are the basic tuple level addressing mechanism in a relational system, that is, it is the only way, guaranteed by the system, to locate a specific tuple. Let’s …

Binary Code

Other Tutorials
Perhaps one of the most used numbering systems in the world is the binary code, because although it is true that the numbering system that we usually use is the decimal system, the binary code is used by computers and by all devices computers for everyday use. It is for this reason, that this binary language is very important for …

Functional dependence: what is it?

Other Tutorials
The concept of functional dependence appears in several contexts of mathematics and logic and refers to certain mathematical entities can be expressed as mathematical functions of other entities. The concept of functional dependence is a generalization of the concept of linear dependence. It is said that a set of functions is functionally dependent when there is a functional relationship between …