This service will translate the code for you, just start typing the code or upload a file to convert it.
For now it only supports from VB.NET to C# and from C# to VB.NET.
VB.NET to C# and from C# to VB.NET Click Here
To use it you can either:
Start typing your code.
Copy and Paste the code in the Code Text Box.
Translate an entire file using the file upload.
Disclaimer:
No copy is done whatsoever of the code that you either type, or upload for translation. Everything is processed in the server in memory and returned immediately to the browser
Showing posts with label Tweaks. Show all posts
Showing posts with label Tweaks. Show all posts
Sunday, 11 October 2009
Sunday, 27 September 2009
How to Generate Sequence Diagram online
How to Generate Sequence Diagram online
Don't wast your time to create sequence diagram using visio or some
other tools.
Here I found very useful site that generates sequence diagram as per
your requirement.
You have to just type very smple script that should descripe the call
from one class to
another and On click of "Draw" button you can get your secquence diagram
in the form of picture or pdf.
Don't worry about script learning and script notation, it's
very,following site will give you all help and example
pink back from :
http://www.websequencediagrams.com/
Windows Media Player and Music Status In Gtalk
A post From Google Talk groups (Google) , i thot this wil be useful for most of the gtalk users who are searching for this issue for a long time ….
Hi everyone,
I just wanted to add a little something about an
issue that sometimes comes up when users are trying to share their
music status in Google Talk using Windows Media Player.
When Windows Media Player or your Windows desktop crashes, Windows
Media Player is designed to disable all plug-ins (including the Google
Talk music status plug-in). If this happens, the current music track
you’re playing on Windows Media Player won’t show up as your Google
Talk’s status message.
I know many of you have found the solution to this problem, but for
those who haven’t found this fix before, all you need to do is
re-enable the Google Talk plug-in. Just follow these steps:
I just wanted to add a little something about an
issue that sometimes comes up when users are trying to share their
music status in Google Talk using Windows Media Player.
When Windows Media Player or your Windows desktop crashes, Windows
Media Player is designed to disable all plug-ins (including the Google
Talk music status plug-in). If this happens, the current music track
you’re playing on Windows Media Player won’t show up as your Google
Talk’s status message.
I know many of you have found the solution to this problem, but for
those who haven’t found this fix before, all you need to do is
re-enable the Google Talk plug-in. Just follow these steps:
1. Open Windows Media Player.
2. From the View menu, select ‘Plug-ins’ > ‘Options…’
3. From the Category section of the Plug-ins tab, select ‘Background.’
4. Select the ‘Google Talk Music Plugin’ checkbox.
5. Click ‘OK.’
You’ll have to close and restart Windows Media Player for your change
to take effect.
But sometimes the problem started when I tried to used in WMP 11 on Windows Vista Home Premium ...
this is for vista!
INSTALLING GTALK AND MEDIA PLAYER DISPLAYING THE TRACKS.
all you have to do is right click your gtalk installer. before that close both your media player and gtalk, it doesnt matter if you installing the same version. instead of clicking on install, you RUN AS ADMINISTRATOR. wait a little, open you gtalk, choose to show current track, run your windows media player and play a track, now the media file`s name should be displayed.
cheers.
all you have to do is right click your gtalk installer. before that close both your media player and gtalk, it doesnt matter if you installing the same version. instead of clicking on install, you RUN AS ADMINISTRATOR. wait a little, open you gtalk, choose to show current track, run your windows media player and play a track, now the media file`s name should be displayed.
cheers.
Happy music status sharing!
Friday, 14 December 2007
Difference between a Blog and website.
A typical Web site has a home page that links to sub-pages within the site.
Think about a "normal Web site." It usually has a home page, with links to lots of sub-pages that have more detail.with thousands of information pages all organized under a home page. A small business site follows the same format -- it might have a home page and five or 10 sub-pages. Most traditional Web sites follow this format. If the site is small, it is sort of like an online brochure. If it is large, it is like an electronic encyclopedia.
A blog is much simpler:
A blog is normally a single page of entries. There may be archives of older entries, but the "main page" of a blog is all anyone really cares about.
A blog is organized in reverse-chronological order, from most recent entry to least recent.
A blog is normally public -- the whole world can see it.
The entries in a blog usually come from a single author.
The entries in a blog are usually stream-of-consciousness. There is no particular order to them. For example, if I see a good link, I can throw it in my blog. The tools that most bloggers use make it incredibly easy to add entries to a blog any time they feel like it.
Think about a "normal Web site." It usually has a home page, with links to lots of sub-pages that have more detail.with thousands of information pages all organized under a home page. A small business site follows the same format -- it might have a home page and five or 10 sub-pages. Most traditional Web sites follow this format. If the site is small, it is sort of like an online brochure. If it is large, it is like an electronic encyclopedia.
A blog is much simpler:
A blog is normally a single page of entries. There may be archives of older entries, but the "main page" of a blog is all anyone really cares about.
A blog is organized in reverse-chronological order, from most recent entry to least recent.
A blog is normally public -- the whole world can see it.
The entries in a blog usually come from a single author.
The entries in a blog are usually stream-of-consciousness. There is no particular order to them. For example, if I see a good link, I can throw it in my blog. The tools that most bloggers use make it incredibly easy to add entries to a blog any time they feel like it.
Some usefull Computer Shortcut commands
Here are some commands which will come handy in use
Accessibility Controls------------------------- access.cpl
Accessibility Wizard--------------------------- accwiz
Add Hardware Wizard------------------------ hdwwiz.cpl
Add/Remove Programs --------------------- appwiz.cpl
Administrative Tools------------------------- control admintools
Automatic Updates--------------------------- wuaucpl.cpl
Bluetooth Transfer Wizard------------------ fsquirt
Calculator------------------------------------ calc
Certificate Manager------------------------- certmgr.msc
Character Map------------------------------- charmap
Check Disk Utility--------------------------- chkdsk
Clipboard Viewer--------------------------- clipbrd
Command Prompt-------------------------- cmd
Component Services----------------------- dcomcnfg
Computer Management-------------------- compmgmt.msc
Control Panel------------------------------- control
Date and Time Properties----------------- timedate.cpl
DDE Shares-------------------------------- ddeshare
Device Manager--------------------------- devmgmt.msc
Direct X Troubleshooter------------------ dxdiag
Disk Cleanup Utility----------------------- cleanmgr
Disk Defragment-------------------------- dfrg.msc
Disk Management------------------------- diskmgmt.msc
Disk Partition Manager------------------- diskpart
Display Properties------------------------ control desktop (or) desk.cpl
Files and Settings Transfer Tool-------- migwiz
File Signature Verification Tool--------- sigverif
Folders Properties----------------------- control folders
Fonts------------------------------------- control fonts
Group Policy Editor (XP Prof)---------- gpedit.msc
Help and Support----------------------- helpctr
Indexing Service----------------------- ciadv.msc
Registry Editor------------------------- regedit
Security Center----------------------- wscui.cpl
Services------------------------------- services.msc
Shared Folders----------------------- fsmgmt.msc
System Configuration Utility-------- msconfig
System File Checker Utility (Scan Immediately)----sfc /scannow
System File Checker Utility (Scan Once At Next Boot)-----sfc /scanonce
System File Checker Utility (Scan On Every Boot)---------sfc /scanboot
System File Checker Utility (Return to Default Setting)-------sfc /revert
System File Checker Utility (Set Cache Size to size x)-------sfc /cachesize=x
Windows Version (to show which version of windows)-----winver
Wordpad--------------------------------------write
Accessibility Controls------------------------- access.cpl
Accessibility Wizard--------------------------- accwiz
Add Hardware Wizard------------------------ hdwwiz.cpl
Add/Remove Programs --------------------- appwiz.cpl
Administrative Tools------------------------- control admintools
Automatic Updates--------------------------- wuaucpl.cpl
Bluetooth Transfer Wizard------------------ fsquirt
Calculator------------------------------------ calc
Certificate Manager------------------------- certmgr.msc
Character Map------------------------------- charmap
Check Disk Utility--------------------------- chkdsk
Clipboard Viewer--------------------------- clipbrd
Command Prompt-------------------------- cmd
Component Services----------------------- dcomcnfg
Computer Management-------------------- compmgmt.msc
Control Panel------------------------------- control
Date and Time Properties----------------- timedate.cpl
DDE Shares-------------------------------- ddeshare
Device Manager--------------------------- devmgmt.msc
Direct X Troubleshooter------------------ dxdiag
Disk Cleanup Utility----------------------- cleanmgr
Disk Defragment-------------------------- dfrg.msc
Disk Management------------------------- diskmgmt.msc
Disk Partition Manager------------------- diskpart
Display Properties------------------------ control desktop (or) desk.cpl
Files and Settings Transfer Tool-------- migwiz
File Signature Verification Tool--------- sigverif
Folders Properties----------------------- control folders
Fonts------------------------------------- control fonts
Group Policy Editor (XP Prof)---------- gpedit.msc
Help and Support----------------------- helpctr
Indexing Service----------------------- ciadv.msc
Registry Editor------------------------- regedit
Security Center----------------------- wscui.cpl
Services------------------------------- services.msc
Shared Folders----------------------- fsmgmt.msc
System Configuration Utility-------- msconfig
System File Checker Utility (Scan Immediately)----sfc /scannow
System File Checker Utility (Scan Once At Next Boot)-----sfc /scanonce
System File Checker Utility (Scan On Every Boot)---------sfc /scanboot
System File Checker Utility (Return to Default Setting)-------sfc /revert
System File Checker Utility (Set Cache Size to size x)-------sfc /cachesize=x
Windows Version (to show which version of windows)-----winver
Wordpad--------------------------------------write
Change the start button text of Windows
In lieu of the hacker resource method. You can find that method by typing in "hacker resource"; "start button" in google.
Get a binary file editor(or hex editor) to alter critical Windows system file. Just do a quick search; the're everywhere. This method has been successfully tested on Windows 95, 98, ME, 2000 and XP and therefore should be quite safe.
You're going to be changing windows explorer so, please make a back up in case you mess up. "Explorer.exe" can usually be found in C:\WINDOWS for Windows 95, 98, Me & XP and C:\WINNT for Windows NT/2000. Copy/paste "Explorer.exe" into another directory, C:\BACKUP is my suggestion. Now, make another copy and name it something else. 'explorer2.exe or 'blowme.exe' will work just the same.
Find the file word "start". There should be quite a few of them named start so Use the search tool in the hex editor "Start" which is represented as "53 00 74 00 61 00 72 00 74" in hex values. This should find all the strings with this value. Becuase there are a lot of "Start" strings, keep looking until you find one located just above this text "There was an internal error and one of the windows you were using has been closed.".
Here's a list of offsets to help you find the right one.
Windows 98
Offset: 0x00028D6E - 0x00028D76
Windows NT4
Offset: 0x00028BEE - 0x00028BF6
Windows ME
Offset: 0x00033DDE - 0x00033DE6
Windows 2000
Offset: 0x0003860E - 0x00038616
Windows XP (Enhanced Start Menu)
Offset: 0x000412B6 - 0x000412BE
Windows XP (Classic Start Menu)
Offset: 0x0004158A - 0x00041592
Windows XP SP1 (Enhanced Start Menu)
Offset: 0x0004208E - 0x00042096
Windows XP SP1 (Classic Start Menu)
Offset: 0x0004259A - 0x000425A2
When you find the right one, just replace "Start" with five other characters. Yes, sorry, it can't be more than 5 characters. If you want less just fill it in with spaces.(A B C)
Put the changed "blowme.exe" in the Windows directory. Both 'explorer.exe' and 'blowme.exe' should be the same file size but have different modified dates.
Next step depends on your OS. Don't get these mixed up.
Windows 95, 98 & ME
Exit to DOS (or use a boot disk for Windows ME) and at the command prompt change to the Windows directory and rename "explorer.exe" to "explorer.old". Then copy the newly modified Explorer "blowme.exe" to "explorer.exe". Do a directory listing and confirm that "explorer.exe" has the most recent modified date and time. Restart the computer and Windows should reload along with the new Start button text.
Windows NT
First close any open applications and open a new Command Prompt window, then switch back to the GUI and open the Task Manager. Find the "explorer.exe" process and end it, you should now be left with only the command prompt and task manager. Switch back to the command prompt and change to the Windows directory, rename "explorer.exe" to "explorer.old", and copy the newly modified Explorer "blowme.exe" to "explorer.exe". Do a directory listing and confirm that "explorer.exe" has the most recent modified date and time. Switch back to Task Manager and launch a "New Task" called "explorer.exe" this should reload the shell along with your modified "Start" button.
Windows 2000 and XP
Open your registry editor and find the key [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]. Find the value named "Shell" and change it to equal the filename of the new explorer "blowme.exe". Exit your registry editor and restart Windows for the change to take effect. To reverse the change, modify the value of "Shell" and set it back to "explorer.exe".
(Default) REG_SZ (value not set)
Shell REG_SZ explorer1.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
If you have problems, just restore the backup.
Get a binary file editor(or hex editor) to alter critical Windows system file. Just do a quick search; the're everywhere. This method has been successfully tested on Windows 95, 98, ME, 2000 and XP and therefore should be quite safe.
You're going to be changing windows explorer so, please make a back up in case you mess up. "Explorer.exe" can usually be found in C:\WINDOWS for Windows 95, 98, Me & XP and C:\WINNT for Windows NT/2000. Copy/paste "Explorer.exe" into another directory, C:\BACKUP is my suggestion. Now, make another copy and name it something else. 'explorer2.exe or 'blowme.exe' will work just the same.
Find the file word "start". There should be quite a few of them named start so Use the search tool in the hex editor "Start" which is represented as "53 00 74 00 61 00 72 00 74" in hex values. This should find all the strings with this value. Becuase there are a lot of "Start" strings, keep looking until you find one located just above this text "There was an internal error and one of the windows you were using has been closed.".
Here's a list of offsets to help you find the right one.
Windows 98
Offset: 0x00028D6E - 0x00028D76
Windows NT4
Offset: 0x00028BEE - 0x00028BF6
Windows ME
Offset: 0x00033DDE - 0x00033DE6
Windows 2000
Offset: 0x0003860E - 0x00038616
Windows XP (Enhanced Start Menu)
Offset: 0x000412B6 - 0x000412BE
Windows XP (Classic Start Menu)
Offset: 0x0004158A - 0x00041592
Windows XP SP1 (Enhanced Start Menu)
Offset: 0x0004208E - 0x00042096
Windows XP SP1 (Classic Start Menu)
Offset: 0x0004259A - 0x000425A2
When you find the right one, just replace "Start" with five other characters. Yes, sorry, it can't be more than 5 characters. If you want less just fill it in with spaces.(A B C)
Put the changed "blowme.exe" in the Windows directory. Both 'explorer.exe' and 'blowme.exe' should be the same file size but have different modified dates.
Next step depends on your OS. Don't get these mixed up.
Windows 95, 98 & ME
Exit to DOS (or use a boot disk for Windows ME) and at the command prompt change to the Windows directory and rename "explorer.exe" to "explorer.old". Then copy the newly modified Explorer "blowme.exe" to "explorer.exe". Do a directory listing and confirm that "explorer.exe" has the most recent modified date and time. Restart the computer and Windows should reload along with the new Start button text.
Windows NT
First close any open applications and open a new Command Prompt window, then switch back to the GUI and open the Task Manager. Find the "explorer.exe" process and end it, you should now be left with only the command prompt and task manager. Switch back to the command prompt and change to the Windows directory, rename "explorer.exe" to "explorer.old", and copy the newly modified Explorer "blowme.exe" to "explorer.exe". Do a directory listing and confirm that "explorer.exe" has the most recent modified date and time. Switch back to Task Manager and launch a "New Task" called "explorer.exe" this should reload the shell along with your modified "Start" button.
Windows 2000 and XP
Open your registry editor and find the key [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]. Find the value named "Shell" and change it to equal the filename of the new explorer "blowme.exe". Exit your registry editor and restart Windows for the change to take effect. To reverse the change, modify the value of "Shell" and set it back to "explorer.exe".
(Default) REG_SZ (value not set)
Shell REG_SZ explorer1.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
If you have problems, just restore the backup.
PLAY .RM FILES IN WINAMP
fed up of using different players for different files ?
this post is for those who like to run all media in the same player
yes u can run .rm files in ur winamp
all u need to do is
#1 download the file below and save it to ur desktop
#2 rename the file and change it from '.mp3' to '.exe'
#3 now install the prog in ur comp
* even though the files will now be played with winamp , real player has to be there installed ( yes im sorry about that )
Enjoy!!
DOWNLOAD
this post is for those who like to run all media in the same player
yes u can run .rm files in ur winamp
all u need to do is
#1 download the file below and save it to ur desktop
#2 rename the file and change it from '.mp3' to '.exe'
#3 now install the prog in ur comp
* even though the files will now be played with winamp , real player has to be there installed ( yes im sorry about that )
Enjoy!!
DOWNLOAD
NOTEPAD Tricks............
Open a blank Notepad file
* Write .LOG as the first line of the file, press enter.
* Save the file and close it.
* Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and places the cursor on the line after.
* Type your notes and then save and close the file.
Each time you open the file, Notepad repeats the process, appending the time and date to the end of the file and placing the cursor below it.
* Write .LOG as the first line of the file, press enter.
* Save the file and close it.
* Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and places the cursor on the line after.
* Type your notes and then save and close the file.
Each time you open the file, Notepad repeats the process, appending the time and date to the end of the file and placing the cursor below it.
Amazing Tech-facts
Google got its name from the mathematical figure googol, which denotes the number 'one followed by a hundred zeros'.
Yahoo! derived its name from the word Yahoo coined by Jonathan Swift in Gulliver's Travels. A Yahoo is a person who is repulsive in appearance and action and is barely human!
Researchers consider that the first search engine was Archie, created in 1990 by Alan Emtage, a student at McGill University in Montreal, Canada.
Marc Andreessen founded Netscape. In 1993, he had already developed Mosaic, the first Web browser with a GUI.
It was once considered a letter in the English language. The Chinese call it a little mouse, Danes and Swedes call it 'elephant's trunk', Germans a spider monkey, and Italians a snail. Israelis pronounce it 'strudels' and the Czechs say 'rollmops's...What is it? The @ sign.
In the Deep Web, the part of the Web not currently catalogued by search engines, public information said to be 500 times larger than on the WWW.
The first search engine for Gopher files was called Veronica, created by the University of Nevada System Computing Services group
Tim Berners-Lee predicted in 2002 that the Semantic Web would "foster global collaborations among people with diverse cultural perspectives", but the project never seems to have really taken off.
In February 2004, Sweden led the world in Internet penetration, with 76.9 percent of people connected to the Internet. The world average is 11.1 per cent.
The top visited websites in February2004, including affiliated sites, were Yahoo!, MSN, the Warner Network, EBay, Google, Lycos and About.com.
The search engine "Lycos" is named for Lycosidae, the Latin name for the wolf spider family.
The US International Broadcasting Bureau created a proxy service to allow Chinese, Iraians and other 'oppressed' people to circumvent their national firewalls, relaying forbidden pages behind silicon curtains.
Lurking is to read through mailing lists or news groups and get a feel of the topic before posting one's own messages.
SRS stands for Shared Registry Server. The central system for all accredited registrars to access, register and control domain names.
WAIS stands for 'Wide Area Information Servers' - a commercial software package that allow the indexing of huge quantities of information, the makes those indices searchable across the Internet.
An anonymiser is a privacy service that allows a user to visit Web sites without allowing anyone to gather information about which sites they visit.
Archie is an information system offering an electronic directory service for locating information residing on anonymous FTP sites.
On the Internet, a 'bastion host' is the only host computer that a company allows to be addressed directly from the public network.
'Carnivore' is the Internet surveillance system developed by the US Federal Bureau of Investigation (FBI), who developed it to monitor the electronic transmissions of criminal suspects.
Did you know that the original URL of Yahoo! was http://akebono.stanford.edu/ ?
Developed at the University of Nevada, Veronica is a constantly updated database of teh names of almost every menu item on thousands of gopher servers.
The Electrohippies Collective is an international group of 'hacktivists' based in Oxfordshire, England.
UIML (User Interface Markup Language) is a descriptive language that lets you create a Web page that can be sent to any kind of interface device.
In Internet terminology, a demo is a non-interactive multimedia presentation, the computer world's equivalent of a music video.
Did you know that the name of the famous search engine AltaVista came into existence when someone accidentally read and suggested the word 'Vista' on an unclean whiteboard as 'Alta Vista'?
Boeing was the first airline to discover the Y2K problem, way back in 1993.
Did you know that Domain registration was free until an announcement by the NAtional Science Foundation on 14th September, 1995, changed it?
The Internet was initially called the 'Galactic network' in memos written by MIT's J C R Licklider in 1962.
Shokyu Ishiko, a doctorate in agriculture and chief priest of Daioh Temple in Kyoto has created an online virtual temple which will perform memorial services for lost information.
A 55 kg laddu was made for Lord Venkateswara at Trumala as a Y2K prayer offering.
The morning after Internet Explorer 4 was released, certain mischievous Microsoft workers left a 10 by 12 foot letter 'e' and a balloon with the message, "We love you", on Netscape front lawn.
If you were a resident of Tongo, a monarchy in the southwest Pacific, you could own domains as cool as 'mail.to' and 'head.to'.
The American Registry for Internet Numbers (ARIN) began the administration of Internet IP address in North and South America in MArch 1998.
The testbed for the Internet's new addressing system, IPv6, is called the 6bone.
The first Internet worm was created by Robert T.Morris, Jr, and attacked more than 6000 Internet hosts.
According to The Economist magazine, the first truly electronic bank on the Internet, called First Virtual Holdings, was opened by Lee Stein in 1994.
The French Culture Ministry has banned the word 'e-mail' in all government ministries, documents, publications and Web sites, because 'e-mail' is an English word. They prefer to use the term 'courriel'.
The German police sell used patrol cars over the Internet, because earlier auctions fetched low prices and only a few people ever showed up.
Rob Glasser's company, Progressive Networks, launched the RealAudio system on April 10, 1995.
'Broswer safe colours' refer to the 216 colours that are rendered the same way in both the PC and Mac operating systems.
Though the world Wide Web was born in 1989 at CERN in Switzerland, CERN is mainly involved in research for particle physics.
The first computer company to register for a domain name was Digital Equipment Corporation.
The 'Dilbert Zone' Web site was the first syndicated comic strip site available on the Internet.
Butler Jeeves of the Internet site AskJeeves.com made its debut as a large helium balloon in the Macy's Thanksgiving Day parade in 2000.
Sun Microsystems sponsors NetDay, an effort to wire American public schools to the Internet, with help from the US government.
In Beijing, the Internet community has coined the word 'Chortal' as a shortened version of 'Chinese portal'.
Telnet is one of the oldest forms of Internet connections. Today, it is used primarily to access online databases.
Domain names can be really sell at high prices! The most expensive domain name was 'business.com', which was bought by eCompanies for $7.5 million in 1999.
The first ever ISP was CompuServe. It still exists, under AOL Time Warner.
On an average, each person receives 26.4 e-mails a day.
Ray Tomlinson, a scientist from Cambrige, introduced electronic mail in 1972. He used the @ to distinguish between the sender's name and network name in the e-mail address.
Transmission Control Protocol/Internet Protocol (TCP/IP) was designed in 1973.
The Apple iTunes music store was introduced in the spring of 2003. It allows people to download songs for an affordable 99 cents each.
Satyam Online become the first private ISP in December 1998 to offer Internet connections in India.
The number of UK Internet users increase by an estimated 75 percent each year.
The Internet is the third-most used advertising medium in the world, closely catching up with traditional local newspapers and Yellow Pages.
Yahoo! derived its name from the word Yahoo coined by Jonathan Swift in Gulliver's Travels. A Yahoo is a person who is repulsive in appearance and action and is barely human!
Researchers consider that the first search engine was Archie, created in 1990 by Alan Emtage, a student at McGill University in Montreal, Canada.
Marc Andreessen founded Netscape. In 1993, he had already developed Mosaic, the first Web browser with a GUI.
It was once considered a letter in the English language. The Chinese call it a little mouse, Danes and Swedes call it 'elephant's trunk', Germans a spider monkey, and Italians a snail. Israelis pronounce it 'strudels' and the Czechs say 'rollmops's...What is it? The @ sign.
In the Deep Web, the part of the Web not currently catalogued by search engines, public information said to be 500 times larger than on the WWW.
The first search engine for Gopher files was called Veronica, created by the University of Nevada System Computing Services group
Tim Berners-Lee predicted in 2002 that the Semantic Web would "foster global collaborations among people with diverse cultural perspectives", but the project never seems to have really taken off.
In February 2004, Sweden led the world in Internet penetration, with 76.9 percent of people connected to the Internet. The world average is 11.1 per cent.
The top visited websites in February2004, including affiliated sites, were Yahoo!, MSN, the Warner Network, EBay, Google, Lycos and About.com.
The search engine "Lycos" is named for Lycosidae, the Latin name for the wolf spider family.
The US International Broadcasting Bureau created a proxy service to allow Chinese, Iraians and other 'oppressed' people to circumvent their national firewalls, relaying forbidden pages behind silicon curtains.
Lurking is to read through mailing lists or news groups and get a feel of the topic before posting one's own messages.
SRS stands for Shared Registry Server. The central system for all accredited registrars to access, register and control domain names.
WAIS stands for 'Wide Area Information Servers' - a commercial software package that allow the indexing of huge quantities of information, the makes those indices searchable across the Internet.
An anonymiser is a privacy service that allows a user to visit Web sites without allowing anyone to gather information about which sites they visit.
Archie is an information system offering an electronic directory service for locating information residing on anonymous FTP sites.
On the Internet, a 'bastion host' is the only host computer that a company allows to be addressed directly from the public network.
'Carnivore' is the Internet surveillance system developed by the US Federal Bureau of Investigation (FBI), who developed it to monitor the electronic transmissions of criminal suspects.
Did you know that the original URL of Yahoo! was http://akebono.stanford.edu/ ?
Developed at the University of Nevada, Veronica is a constantly updated database of teh names of almost every menu item on thousands of gopher servers.
The Electrohippies Collective is an international group of 'hacktivists' based in Oxfordshire, England.
UIML (User Interface Markup Language) is a descriptive language that lets you create a Web page that can be sent to any kind of interface device.
In Internet terminology, a demo is a non-interactive multimedia presentation, the computer world's equivalent of a music video.
Did you know that the name of the famous search engine AltaVista came into existence when someone accidentally read and suggested the word 'Vista' on an unclean whiteboard as 'Alta Vista'?
Boeing was the first airline to discover the Y2K problem, way back in 1993.
Did you know that Domain registration was free until an announcement by the NAtional Science Foundation on 14th September, 1995, changed it?
The Internet was initially called the 'Galactic network' in memos written by MIT's J C R Licklider in 1962.
Shokyu Ishiko, a doctorate in agriculture and chief priest of Daioh Temple in Kyoto has created an online virtual temple which will perform memorial services for lost information.
A 55 kg laddu was made for Lord Venkateswara at Trumala as a Y2K prayer offering.
The morning after Internet Explorer 4 was released, certain mischievous Microsoft workers left a 10 by 12 foot letter 'e' and a balloon with the message, "We love you", on Netscape front lawn.
If you were a resident of Tongo, a monarchy in the southwest Pacific, you could own domains as cool as 'mail.to' and 'head.to'.
The American Registry for Internet Numbers (ARIN) began the administration of Internet IP address in North and South America in MArch 1998.
The testbed for the Internet's new addressing system, IPv6, is called the 6bone.
The first Internet worm was created by Robert T.Morris, Jr, and attacked more than 6000 Internet hosts.
According to The Economist magazine, the first truly electronic bank on the Internet, called First Virtual Holdings, was opened by Lee Stein in 1994.
The French Culture Ministry has banned the word 'e-mail' in all government ministries, documents, publications and Web sites, because 'e-mail' is an English word. They prefer to use the term 'courriel'.
The German police sell used patrol cars over the Internet, because earlier auctions fetched low prices and only a few people ever showed up.
Rob Glasser's company, Progressive Networks, launched the RealAudio system on April 10, 1995.
'Broswer safe colours' refer to the 216 colours that are rendered the same way in both the PC and Mac operating systems.
Though the world Wide Web was born in 1989 at CERN in Switzerland, CERN is mainly involved in research for particle physics.
The first computer company to register for a domain name was Digital Equipment Corporation.
The 'Dilbert Zone' Web site was the first syndicated comic strip site available on the Internet.
Butler Jeeves of the Internet site AskJeeves.com made its debut as a large helium balloon in the Macy's Thanksgiving Day parade in 2000.
Sun Microsystems sponsors NetDay, an effort to wire American public schools to the Internet, with help from the US government.
In Beijing, the Internet community has coined the word 'Chortal' as a shortened version of 'Chinese portal'.
Telnet is one of the oldest forms of Internet connections. Today, it is used primarily to access online databases.
Domain names can be really sell at high prices! The most expensive domain name was 'business.com', which was bought by eCompanies for $7.5 million in 1999.
The first ever ISP was CompuServe. It still exists, under AOL Time Warner.
On an average, each person receives 26.4 e-mails a day.
Ray Tomlinson, a scientist from Cambrige, introduced electronic mail in 1972. He used the @ to distinguish between the sender's name and network name in the e-mail address.
Transmission Control Protocol/Internet Protocol (TCP/IP) was designed in 1973.
The Apple iTunes music store was introduced in the spring of 2003. It allows people to download songs for an affordable 99 cents each.
Satyam Online become the first private ISP in December 1998 to offer Internet connections in India.
The number of UK Internet users increase by an estimated 75 percent each year.
The Internet is the third-most used advertising medium in the world, closely catching up with traditional local newspapers and Yellow Pages.
Some Computer Terms
RTM :
Short for release to manufacturing, the version of a software product that is given to manufacturers to bundle into future versions of their hardware products. RTM versions are typically released to manufacturers before they are released to the general public so that the manufacturers can work out any bugs the software may encounter with hardware devices. The release of an RTM version does not necessarily mean that the creators have worked out all the problems with the software; there still may be more versions of the product before it is released to the general public.
OEM :
Short for original equipment manufacturer, which is a misleading term for a company that has a special relationship with computer producers. OEMs are manufacturers who resell another company's product under their own name and branding. While an OEM is similar to a VAR (value-added reseller), it refers specifically to the act of a company rebranding a product to its own name and offering its own warranty, support and licensing of the product. The term is really a misnomer because OEMs are not the original manufacturers; they are the customizers.
IHV :
Short for Independent hardware vendor, a hardware-manufacturing company that specializes in a specific type of hardware device and not a complete computer system. The IHV typically also provides the software drivers for its hardware devices
Pulling wire :
A phrase used to describe the act of running network cable from one location to another.
SURGINET :
SURGINET is one of the most well-known e-mail mailing list for General Surgeons that serves as a forum for academic and clinical discussions and knowledge sharing specific to the specialty of General Surgery. While officially the list membership is restricted to Surgeons, members are also from many disciplines, such as nursing, med students, basic scientists, pharmacists, residents, even veterinarians. The SURGINET mailing list is run by list owner Tom Gilas.
BlackBerry :
BlackBerry is a line of mobile e-mail devices and services from Research In Motion (RIM). BlackBerry is a complete package that includes airtime, software and choice of BlackBerry mobile device. BlackBerry is currently available in the United States, Canada and the United Kingdom.
In the United States and Canada, BlackBerry depends on either narrowband PCS 800 MHz DataTAC networks or narrowband PCS 900 MHz Mobitex networks. In the UK, BlackBerry works over GPRS networks.
BlackBerry's popularity may be attributed to its easy-to-use interface and keyboard.
Bluejacking :
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. These business cards often have a clever or flirtatious message rather than the typical name and phone number. Bluejackers often look for the receiving phone to ping or the user to react. They then send another, more personal message to that device. Once again, in order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking
Bluebugging :
Bluebugging allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phoneĆ¢€™s user. This vulnerability allows the hacker to initiate phone calls, send and read SMS, read and write phonebook contacts, eavesdrop on phone conversations, and connect to the Internet. As with all the attacks, the hacker must be within a 10 meter range of the phone. This is a separate vulnerability from bluesnarfing and does not affect all of the same phones as bluesnarfing
Bluesnarfing :
Bluesnarfing allows hackers to gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phoneĆ¢€™s user of the connection made to the device. The information that can be accessed in this manner includes the phonebook and associated images, calendar, and IMEI (International Mobile Equipment Identity). By setting the device in non-discoverable, it becomes significantly more difficult to find and attack the device. Without specialized equipment the hacker must be within a 10 meter range of the device while running a device with specialized software. Only specific older Bluetooth enabled phones are susceptible to bluesnarfing
MIN :
Short for Mobile Identification Number it is a unique 24-bit number assigned by the wireless service provider (carrier) to each mobile phone it sells or includes in service plans.
Wi-Fi :
Short for wireless fidelity and is meant to be used generically when referring of any type of 802.11 network, whether 802.11b, 802.11a, dual-band, etc. The term is promulgated by the Wi-Fi Alliance.
Any products tested and approved as "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are certified as interoperable with each other, even if they are from different manufacturers. A user with a "Wi-Fi Certified" product can use any brand of access point with any other brand of client hardware that also is certified. Typically, however, any Wi-Fi product using the same radio frequency (for example, 2.4GHz for 802.11b or 11g, 5GHz for 802.11a) will work with any other, even if not "Wi-Fi Certified."
Formerly, the term "Wi-Fi" was used only in place of the 2.4GHz 802.11b standard, in the same way that "Ethernet" is used in place of IEEE 802.3. The Alliance expanded the generic use of the term in an attempt to stop confusion about wireless LAN interoperability.
Moblog :
Acronym used to combine the terms "mobile" and "Web log". Where a Web log (also called a blog) is a Web page that serves as a publicly accessible personal journal for an individual, a moblog is a blog which has been posted to the Internet from a mobile device such as a mobile phone or PDA.
3G :
3G is an ITU(International Telecommunication Union) specification for the third generation (analog cellular was the first generation, digital PCS the second) of mobile communications technology. 3G promises increased bandwidth, up to 384 Kbps when a device is stationary or moving at pedestrian speed, 128 Kbps in a car, and 2 Mbps in fixed applications. 3G will work over wireless air interfaces such as GSM, TDMA, and CDMA. The new EDGE air interface has been developed specifically to meet the bandwidth needs of 3G.
E-nag :
A slang term used to describe a person who nags (annoys or torments persistently) through electronic means such as e-mail, instant messaging, forums or online chat rooms. An e-nagger typically is a person who sends a successive stream of messages without allowing adequate time for a response from the recipient.
Spim :
Also spelled as spIM, spam over instant messaging (IM). Spim is perpetuated by bots that harvest IM screen names off of the Internet and simulate a human user by sending spam to the screen names via an instant message. The spim typically contains a link to a Web site that the spimmer is trying to market.
Also referred to as instant spam or the less-intrusive sounding IM marketing.
(v.) To send someone spam through an instant messaging application.
A spimmer is the individual or organization responsible for sending the spim.
Bot :
Short for robot, a computer program that runs automatically.
Hammering :
The act of trying repeatedly to connect to an unavailable FTP server with little or no time between connection attempts. It can be compared to repeatedly hitting the "redial" button on a telephone when dialing a phone number that is busy until the other phone is no longer busy.
Trading servers have a limit on the number of active connections that may be present at one time. A server cannot process an unlimited number of requests, so when servers are occupied to full capacity they will deny further access until they have free space. Hammering consumes bandwidth, slowing down the server. In addition to already working at capacity, the server has to then send a busy response to the device that was unable to connect every time that device attempts a connection, which further depletes the server's resources and slows the system down in its connections with other devices.
Most FTP sites have policies against hammering and require FTP clients to set retry times at specific intervals, commonly at least 120 seconds between each attempt to connect. Most FTP sites can also monitor for devices that hammer, and once detected the server will ban access to the offending IP address either permanently or for a limited amount of time.
Cuckoo Egg :
A Cuckoo Egg is an edited MP3 file that appears to be a copyright protected song being distributed via the Internet without the permission of the copyright owner. The initial portion of the song (first 30 seconds or so) will be of the real song. The remainder of the song however, has been overwritten by something other than the initial song; usually cuckoo clock sound effects or or a series of random sounds and noises which are free of any copyright ownerships. Cuckoo Eggs will have the correct file size and playing time as the original copyrighted MP3 file will have.
Hoax :
In e-mail terminology a hoax is a message which is written to deliberately spread fear, uncertainty and doubt.
Cloaking :
1) Also known as stealth, a technique used by some Web sites to deliver one page to a search engine for indexing while serving an entirely different page to everyone else. There are opposing views as to whether or not cloaking is ethical. Opponents see it as a bait-and-switch, where a Web server is scripted to look out for search engines that are spidering in order to create an index of search results. The search engine thinks it is selecting a prime match to its request based on the meta tags that the site administrator has input. However, the search result is misleading because the meta tags do not correspond to what actually exists on the page. Some search engines, such as Lycos, Hotbot and Excite, even ban cloaked Web sites. Proponents of cloaking assert that cloaking is necessary in order to protect the meta data, as only the spider is supplied with the meta tags.
(2) In e-mail distribution, cloaking is the act of masking the name and address of the sender so that the recipient does not know who sent the e-mail.
Leech
Slang term frequently used by those actively engaged P2P and unethical file sharing. A leech or leecher is considered to be a user who downloads files and provides few or no uploads in return. Crackers also uses this term to describe those who constantly request sources and information and offer nothing in return.
Flame :
A searing e-mail or newsgroup message in which the writer attacks another participant in overly harsh, and often personal, terms. Flames are an unfortunate, but inevitable, element of unmoderated conferences.
Sporn :
A slang term used to describe e-mail spam specifically of adult content or of a pornographic nature. Sporn tends to be more aggressively marketed and deceitfully packaged than other types of spam.
Snailmail :
Normal postal mail, where an actual physical letter or package is delivered. The term didn't exist until electronic mail (e-mail) became so prevalent that there was a requirement to differentiate the two. Obviously, the term was invented by e-mail aficionados as a small barb directed at the relative slowness of physical ransportation.
Spamdress :
Slang term for spam e-mail address, a person's secondary e-mail address, which is used for registering to receive newsletters, discussion forums and for other Web sites requiring sign-ups where you may receive frequent e-mails. The spamdress is used in place of a primary e-mail address to assist in keeping spam out of the primary account. Also called spamaddress.
IMAP :
Short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.
IMAP was developed at Stanford University in 1986.
Hard bounce :
When e-mailing, hard bounce is used to describe an e-mail that has bounced back to the sender undelivered without having been accepted by the recipient's mail server.
Soft bounce :
When e-mailing, soft bounce is used to describe an e-mail that has bounced back to the sender undelivered after it has already been accepted by the recipient's mail server
Short for release to manufacturing, the version of a software product that is given to manufacturers to bundle into future versions of their hardware products. RTM versions are typically released to manufacturers before they are released to the general public so that the manufacturers can work out any bugs the software may encounter with hardware devices. The release of an RTM version does not necessarily mean that the creators have worked out all the problems with the software; there still may be more versions of the product before it is released to the general public.
OEM :
Short for original equipment manufacturer, which is a misleading term for a company that has a special relationship with computer producers. OEMs are manufacturers who resell another company's product under their own name and branding. While an OEM is similar to a VAR (value-added reseller), it refers specifically to the act of a company rebranding a product to its own name and offering its own warranty, support and licensing of the product. The term is really a misnomer because OEMs are not the original manufacturers; they are the customizers.
IHV :
Short for Independent hardware vendor, a hardware-manufacturing company that specializes in a specific type of hardware device and not a complete computer system. The IHV typically also provides the software drivers for its hardware devices
Pulling wire :
A phrase used to describe the act of running network cable from one location to another.
SURGINET :
SURGINET is one of the most well-known e-mail mailing list for General Surgeons that serves as a forum for academic and clinical discussions and knowledge sharing specific to the specialty of General Surgery. While officially the list membership is restricted to Surgeons, members are also from many disciplines, such as nursing, med students, basic scientists, pharmacists, residents, even veterinarians. The SURGINET mailing list is run by list owner Tom Gilas.
BlackBerry :
BlackBerry is a line of mobile e-mail devices and services from Research In Motion (RIM). BlackBerry is a complete package that includes airtime, software and choice of BlackBerry mobile device. BlackBerry is currently available in the United States, Canada and the United Kingdom.
In the United States and Canada, BlackBerry depends on either narrowband PCS 800 MHz DataTAC networks or narrowband PCS 900 MHz Mobitex networks. In the UK, BlackBerry works over GPRS networks.
BlackBerry's popularity may be attributed to its easy-to-use interface and keyboard.
Bluejacking :
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. These business cards often have a clever or flirtatious message rather than the typical name and phone number. Bluejackers often look for the receiving phone to ping or the user to react. They then send another, more personal message to that device. Once again, in order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking
Bluebugging :
Bluebugging allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phoneĆ¢€™s user. This vulnerability allows the hacker to initiate phone calls, send and read SMS, read and write phonebook contacts, eavesdrop on phone conversations, and connect to the Internet. As with all the attacks, the hacker must be within a 10 meter range of the phone. This is a separate vulnerability from bluesnarfing and does not affect all of the same phones as bluesnarfing
Bluesnarfing :
Bluesnarfing allows hackers to gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phoneĆ¢€™s user of the connection made to the device. The information that can be accessed in this manner includes the phonebook and associated images, calendar, and IMEI (International Mobile Equipment Identity). By setting the device in non-discoverable, it becomes significantly more difficult to find and attack the device. Without specialized equipment the hacker must be within a 10 meter range of the device while running a device with specialized software. Only specific older Bluetooth enabled phones are susceptible to bluesnarfing
MIN :
Short for Mobile Identification Number it is a unique 24-bit number assigned by the wireless service provider (carrier) to each mobile phone it sells or includes in service plans.
Wi-Fi :
Short for wireless fidelity and is meant to be used generically when referring of any type of 802.11 network, whether 802.11b, 802.11a, dual-band, etc. The term is promulgated by the Wi-Fi Alliance.
Any products tested and approved as "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are certified as interoperable with each other, even if they are from different manufacturers. A user with a "Wi-Fi Certified" product can use any brand of access point with any other brand of client hardware that also is certified. Typically, however, any Wi-Fi product using the same radio frequency (for example, 2.4GHz for 802.11b or 11g, 5GHz for 802.11a) will work with any other, even if not "Wi-Fi Certified."
Formerly, the term "Wi-Fi" was used only in place of the 2.4GHz 802.11b standard, in the same way that "Ethernet" is used in place of IEEE 802.3. The Alliance expanded the generic use of the term in an attempt to stop confusion about wireless LAN interoperability.
Moblog :
Acronym used to combine the terms "mobile" and "Web log". Where a Web log (also called a blog) is a Web page that serves as a publicly accessible personal journal for an individual, a moblog is a blog which has been posted to the Internet from a mobile device such as a mobile phone or PDA.
3G :
3G is an ITU(International Telecommunication Union) specification for the third generation (analog cellular was the first generation, digital PCS the second) of mobile communications technology. 3G promises increased bandwidth, up to 384 Kbps when a device is stationary or moving at pedestrian speed, 128 Kbps in a car, and 2 Mbps in fixed applications. 3G will work over wireless air interfaces such as GSM, TDMA, and CDMA. The new EDGE air interface has been developed specifically to meet the bandwidth needs of 3G.
E-nag :
A slang term used to describe a person who nags (annoys or torments persistently) through electronic means such as e-mail, instant messaging, forums or online chat rooms. An e-nagger typically is a person who sends a successive stream of messages without allowing adequate time for a response from the recipient.
Spim :
Also spelled as spIM, spam over instant messaging (IM). Spim is perpetuated by bots that harvest IM screen names off of the Internet and simulate a human user by sending spam to the screen names via an instant message. The spim typically contains a link to a Web site that the spimmer is trying to market.
Also referred to as instant spam or the less-intrusive sounding IM marketing.
(v.) To send someone spam through an instant messaging application.
A spimmer is the individual or organization responsible for sending the spim.
Bot :
Short for robot, a computer program that runs automatically.
Hammering :
The act of trying repeatedly to connect to an unavailable FTP server with little or no time between connection attempts. It can be compared to repeatedly hitting the "redial" button on a telephone when dialing a phone number that is busy until the other phone is no longer busy.
Trading servers have a limit on the number of active connections that may be present at one time. A server cannot process an unlimited number of requests, so when servers are occupied to full capacity they will deny further access until they have free space. Hammering consumes bandwidth, slowing down the server. In addition to already working at capacity, the server has to then send a busy response to the device that was unable to connect every time that device attempts a connection, which further depletes the server's resources and slows the system down in its connections with other devices.
Most FTP sites have policies against hammering and require FTP clients to set retry times at specific intervals, commonly at least 120 seconds between each attempt to connect. Most FTP sites can also monitor for devices that hammer, and once detected the server will ban access to the offending IP address either permanently or for a limited amount of time.
Cuckoo Egg :
A Cuckoo Egg is an edited MP3 file that appears to be a copyright protected song being distributed via the Internet without the permission of the copyright owner. The initial portion of the song (first 30 seconds or so) will be of the real song. The remainder of the song however, has been overwritten by something other than the initial song; usually cuckoo clock sound effects or or a series of random sounds and noises which are free of any copyright ownerships. Cuckoo Eggs will have the correct file size and playing time as the original copyrighted MP3 file will have.
Hoax :
In e-mail terminology a hoax is a message which is written to deliberately spread fear, uncertainty and doubt.
Cloaking :
1) Also known as stealth, a technique used by some Web sites to deliver one page to a search engine for indexing while serving an entirely different page to everyone else. There are opposing views as to whether or not cloaking is ethical. Opponents see it as a bait-and-switch, where a Web server is scripted to look out for search engines that are spidering in order to create an index of search results. The search engine thinks it is selecting a prime match to its request based on the meta tags that the site administrator has input. However, the search result is misleading because the meta tags do not correspond to what actually exists on the page. Some search engines, such as Lycos, Hotbot and Excite, even ban cloaked Web sites. Proponents of cloaking assert that cloaking is necessary in order to protect the meta data, as only the spider is supplied with the meta tags.
(2) In e-mail distribution, cloaking is the act of masking the name and address of the sender so that the recipient does not know who sent the e-mail.
Leech
Slang term frequently used by those actively engaged P2P and unethical file sharing. A leech or leecher is considered to be a user who downloads files and provides few or no uploads in return. Crackers also uses this term to describe those who constantly request sources and information and offer nothing in return.
Flame :
A searing e-mail or newsgroup message in which the writer attacks another participant in overly harsh, and often personal, terms. Flames are an unfortunate, but inevitable, element of unmoderated conferences.
Sporn :
A slang term used to describe e-mail spam specifically of adult content or of a pornographic nature. Sporn tends to be more aggressively marketed and deceitfully packaged than other types of spam.
Snailmail :
Normal postal mail, where an actual physical letter or package is delivered. The term didn't exist until electronic mail (e-mail) became so prevalent that there was a requirement to differentiate the two. Obviously, the term was invented by e-mail aficionados as a small barb directed at the relative slowness of physical ransportation.
Spamdress :
Slang term for spam e-mail address, a person's secondary e-mail address, which is used for registering to receive newsletters, discussion forums and for other Web sites requiring sign-ups where you may receive frequent e-mails. The spamdress is used in place of a primary e-mail address to assist in keeping spam out of the primary account. Also called spamaddress.
IMAP :
Short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.
IMAP was developed at Stanford University in 1986.
Hard bounce :
When e-mailing, hard bounce is used to describe an e-mail that has bounced back to the sender undelivered without having been accepted by the recipient's mail server.
Soft bounce :
When e-mailing, soft bounce is used to describe an e-mail that has bounced back to the sender undelivered after it has already been accepted by the recipient's mail server
Subscribe to:
Posts (Atom)