Skip to content

Instantly share code, notes, and snippets.

What is the difference between a router and a modem? Answer: Routers and modems are two of the most common computer peripherals, yet many people don't know the function of each one. While the two devices may look similar, they each serve a difference purpose. Fortunately, the functions of the two devices are pretty easy to understand.

A router is a small box that allows multiple computers to join the same network (see below). not avail

Netgear Router

While early routers provided several Ethernet ports for wired connections, most modern routers offer wireless connectivity as well. These "wireless routers" often have one or two moveable antennas on the sides, though some models house the antennas inside the enclosure. Wireless routers allow multiple computers and other devices, such as smartphones and tablets, to join the same network.

DSL vs Cable vs Fiber Internet Video Transcription Your internet is one of these three – cable, DSL or fiber because no one uses dial-up anymore. They do the same thing, which is provide you internet access. But they have their own advantages and disadvantages. So without further ado, let’s get right into it.

Cable internet is a type of connection that transmits data through a cable television network through a coaxial cable. While cable is generally faster than DSL, its primary disadvantage is that you’re sharing bandwidth with neighbors who are using the same cable line.

So during peak times where a lot of people are online, your speeds are going to slow down considerably. But on the upside, cable internet speeds are not affected by how far you are from your ISP or Internet Service Provider.

DSL stands for digital subscriber line. It is a type of connection that transmits data over a telephone network through a telephone cable. DSL is the most popular connection in the world. Over 60 percent of broadband

1. Open the Task manager. Here’s a tip: Press CTRL+Shift+ESC.
2. Click File > Run New Task
3. Make sure you have a check mark beside “Create this task with administrative privileges”
4. Type CMD
5. Type the following 4 commands at the CMD prompt:
dism /online /cleanup-image /restorehealth
sfc /scannow
6. Close the CMD window

Systemd Example for a Simple Ruby Daemon Supervision | COMMENTS Since the new ubuntu versions migrated from upstart to systemd in order to unify basic Linux service behaviors across all distributions we now have to deal with systemd as a default service manager/supervisor. In this article I will describe basics of how to write your first service on this platform.

Services directory location:

1 /lib/systemd/system/*.service Logs location:

Locality of reference, also known as the principle of locality, is a term for the phenomenon in which the same values, or related storage locations, are frequently accessed, depending on the memory access pattern.

There are two basic types of reference locality – temporal and spatial locality.

Temporal locality refers to the reuse of specific data, and/or resources, within a relatively small time duration.

Spatial locality refers to the use of data elements within relatively close storage locations.

Sequential locality, a special case of spatial locality, occurs when data elements are arranged and accessed linearly, such as, traversing the elements in a one-dimensional array.

When a program reads or writes data from a file, the requests go to a kernel driver. If the file is a regular file, the data is handled by a filesystem driver and it is typically stored in zones on a disk or other storage media, and the data that is read from a file is what was previously written in that place. There are other file types for which different things happen.

When data is read or written to a device file, the request is handled by the driver for that device. Each device file has an associated number which identifies the driver to use. What the device does with the data is its own business.

Block devices (also called block special files) usually behave a lot like ordinary files: they are an array of bytes, and the value that is read at a given location is the value that was last written there. Data from block device can be cached in memory and read back from cache; writes can be buffered. Block devices are normally seekable (i.e. there is a notion of position inside the file which the applicatio

As others already stated, BIOS is the specific name for the (motherboard) firmware in older PCs. New computers these days have a technically somewhat different kind of firmware which is called either EFI or UEFI.

Please note that any computer will contain, besides the BIOS (or EFI or UEFI), also other firmware. Network cards, video cards, RAID controllers, hard drives, flash drives, SSDs, sound cards, just to name a few examples, can all have firmware embedded inside the device.

Weirdly enough, the firmware of a video card is often called the video BIOS. This is technically incorrect. BIOS is appropriate only for the startup firmware of the motherboard itself.

"net" is synchronous and "sc" is asynchronous.
SC sends the control to the service and then returns to the command prompt. This typically results in SC START returning the service in a state of START_PENDING. NET START will wait for the service it is starting to come to a fully started state before it returns control at the command prompt.
...
[L]ike SC START, SC STOP does not wait for the service to come to a stop and will there for often return STOP_PENDING for many service stop operations. NET STOP on the other hand will wait on the service to stop before it returns to the command prompt.
...

If your SSH service allows password based authentication, then your Internet connected SSH server will be hammered day and night by bot-nets trying to guess user-names and passwords. The bot net needs no information, it can just try popular names and popular passwords. There's an awful lot of people named john with a password of qwerty123. Apart from anything else this clogs your logs.

If your SSH service only allows public-key authentication, an attacker needs a copy of a private key corresponding to a public key stored on the server. They can't just make random attacks, they have to have prior knowledge of your users and have to be able to steal a private key from the PC of an authorized user of your SSH server.

The fact that private keys are often protected by a long pass-phrase is of secondary significance.

Update:

As comments point out, and as I have experienced, moving your SSH service from port 22 to a high numbered port makes a dramatic difference in the number of unauthorized login attempts appea

Lambda is a service that allows once again to reduce the amount of backend work for website, mobile apps or other businesses .

In the most cases, if you run a mobile app or an online web app, there are always some tasks to execute in backend.

For example if you ask the photo of your users, you want to be able to resize it before display it in order to reduce loading of the app or avoid image distortion problems if it is resized by the html / css . To do this you have two options either resize when saving or do it later with a job that runs every x time. The problem when you choose the first solution is that resize an image at the time of the request break the user experience (slow) and increases the load on the server which often leads resize errors on large images and then you need to create a backend task to check and resize once again if the resized image was not created. So most startups run tasks in backend after doing the first solution error.

Then the question that comes is where execute the tasks ?