Guide for beginners and administrators

New articles

Introduction to the communication features of ICQ
About the service, installation, registration and the basics..

begin * 22. January, 2006

Service pack integration to installation files (Slipstream)
It is very inconvenient and time-consuming first to use an older installation CD and then install the Service Pack. It is recommended that you create and updated installation folder or updated CD (DVD) using both the ol

windowsxp * 25. September, 2004

Creating a boot CD / DVD Windows XP SP2

windowsxp * 25. September, 2004

MySQL, PHP, Apache for Windows - Examples of configuration files:

programming * 12. August, 2004

MySQL, PHP, Apache for Windows - 2. Apache and PHP
.. This article follows the article about installing MySQL and focuses on installation and configuration of Apache 2 and PHP (version 4 and 5) for Windows XP.

programming * 10. August, 2004

Error messages of http protocol v. 1.1
When surfing on Internet it can happen that there appears an error at page requirement in consequence of some unpredictable event. There can be more reasons, therefore to explain them for each error an error message announcing problem cause is

internet * 5. August, 2004

MySQL, PHP, Apache for Windows - 1. MySQL - General information and installation

programming * 5. June, 2004

Favicon is an icon displayed in front of a URL in the address bar of an Internet browser. This article tells you more about it (how to create, place and display favicons).

programming * 1. May, 2004

The European and International Computer Driving Licence: ECDL and ICDL
s an international program of examining the knowledge about Internet Technologies (IT) and internationally recognised certificate proving that its holder has successfully passed the theoretical and practical tests in basic knowledge of Internet Technologi

certification * 13. November, 2003

Denial of Service (DoS), Distributed DoS (DDoS)
Denial of Service - DoS - This term donotes a group of various ways to prevent legitimate users of a computer system from using that system; they are called attacks. The attacks are organized by attackers (also called hackers) and can partly or completely

security * 31. October, 2003

0 10 20 30 40 50 60 70 80 90 100 110 120 130 140 150 160 170 180 190 200 210 220 230 240 250

FAQ (Frequently Asked Questions)



Web links