File list
From Computing and Software Wiki
This special page shows all uploaded files. By default the last uploaded files are shown at top of the list.
A click on a column header changes the sorting.Date | Name | User | Size | Description | Versions |
---|---|---|---|---|---|
03:31, 21 November 2009 | Formfillin2.gif (file) | Shensw | 2 KB | 1 | |
03:28, 21 November 2009 | Formfillin1.gif (file) | Shensw | 2 KB | 1 | |
23:55, 13 November 2009 | VLC_Preferences.png (file) | Scottj4 | 55 KB | (VLV Preferences panel resized.) | 1 |
22:08, 13 November 2009 | Confusing_Message.png (file) | Scottj4 | 24 KB | (Shows a Confusing message to the user) | 1 |
22:04, 13 November 2009 | Template_Selection.png (file) | Scottj4 | 73 KB | (Shows a bad GUI for selection a template. ) | 1 |
21:42, 13 November 2009 | Set_Time.png (file) | Scottj4 | 67 KB | (A user interface to set the time that was poorly designed.) | 1 |
21:33, 13 November 2009 | Interface_Example2.JPG (file) | Beyakle | 13 KB | 1 | |
21:30, 13 November 2009 | Interface_Example1.JPG (file) | Beyakle | 17 KB | 1 | |
23:53, 26 October 2009 | Modelquacky.jpg (file) | Jesurar | 243 KB | 1 | |
23:52, 26 October 2009 | Modelbuttons.jpg (file) | Jesurar | 265 KB | 1 | |
23:52, 26 October 2009 | Buttons.jpg (file) | Jesurar | 21 KB | 1 | |
06:44, 26 October 2009 | Movement.jpg (file) | Sandhj2 | 81 KB | 1 | |
05:11, 25 October 2009 | Placeholder1.jpg (file) | Jesurar | 6 KB | 1 | |
22:38, 24 October 2009 | Placeholder.jpg (file) | Jesurar | 7 KB | 1 | |
03:52, 13 April 2009 | DHCP_state_Diagram.jpg (file) | Sainis6 | 45 KB | (DHCP state diagram from Douglas E. Comer (2006). "Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture", 5ed, Prentice Hall ) | 1 |
03:52, 13 April 2009 | Video-conference.jpg (file) | Woodj5 | 190 KB | (This is an example of video conferencing, one of the applications that multicasting has helped to make more available. ) | 1 |
03:47, 13 April 2009 | IntroImg.jpg (file) | Chokshkk | 14 KB | 1 | |
03:00, 13 April 2009 | Sessionhijacking.jpg (file) | Luongp | 67 KB | (Session Hijacking IP Spoofing) | 1 |
02:42, 13 April 2009 | Network_Attached_Storage_Device2.jpg (file) | Holtomm | 30 KB | 1 | |
02:38, 13 April 2009 | Network_Attached_Storage_Device1.jpg (file) | Holtomm | 30 KB | 1 | |
02:32, 13 April 2009 | Active_MITM_Flow_3.jpg (file) | Heifetj | 17 KB | 1 | |
02:32, 13 April 2009 | Active_MITM_Flow_2.jpg (file) | Heifetj | 15 KB | 1 | |
02:32, 13 April 2009 | Active_MITM_Flow_1.jpg (file) | Heifetj | 14 KB | 1 | |
02:26, 13 April 2009 | Example.png (file) | Gosyned | 24 KB | (An example of a simple Peer to Peer model. http://ask-leo.com/will_bittorrent_harm_my_computer.html) | 1 |
02:24, 13 April 2009 | Peer_to_Peer_File_Sharing_Model.png (file) | Gosyned | 24 KB | (An example of a simple Peer to Peer File Sharing model. http://ask-leo.com/will_bittorrent_harm_my_computer.html) | 1 |
02:15, 13 April 2009 | BasicDHCP.jpg (file) | Sainis6 | 39 KB | (Basic DHCP initialization operations) | 1 |
02:06, 13 April 2009 | NetworkTopologies-Mesh.png (file) | Liberag | 47 KB | (The layout of a mesh network. Created by the user Foobaz from Wikipedia. ) | 1 |
02:02, 13 April 2009 | NetworkTopologies-Tree.png (file) | Liberag | 8 KB | (The layout of a tree network.) | 1 |
02:02, 13 April 2009 | NetworkTopologies-Star.png (file) | Liberag | 69 KB | (The layout of a star network.) | 1 |
02:01, 13 April 2009 | NetworkTopologies-Ring.png (file) | Liberag | 46 KB | (The layout of a ring network.) | 1 |
01:58, 13 April 2009 | NetworkTopologies-Bus.png (file) | Liberag | 29 KB | (Layout of a bus network.) | 1 |
01:50, 13 April 2009 | NetworkTopologies.png (file) | Liberag | 37 KB | (Visualization of Network Topologies.) | 1 |
01:41, 13 April 2009 | Tdma.gif (file) | Altahaa | 12 KB | 1 | |
01:41, 13 April 2009 | Cdma.gif (file) | Altahaa | 16 KB | 1 | |
01:36, 13 April 2009 | 3gevolution.gif (file) | Altahaa | 7 KB | 1 | |
01:35, 13 April 2009 | Gsminfra.png (file) | Altahaa | 168 KB | 1 | |
01:07, 13 April 2009 | MulticastVUnicast.png (file) | Woodj5 | 668 B | (This diagram shows how inefficient the unicasting routing scheme is compared to the multicasting routing scheme is.) | 1 |
01:06, 13 April 2009 | Network_Attached_Storage_Device.jpg (file) | Holtomm | 83 KB | (This is an example application for Network Attached Storage. The data on the NAS device is accessible by a control portion of the internal network, but is protected from the outside world by a firewall.) | 1 |
01:06, 13 April 2009 | Monitor_mirror.jpg (file) | Ivanoa | 10 KB | (Security departments prevent wandering eyes from seeing confidential data by installing mirror monitors on screens, enabling employees to see what's behind them.) | 1 |
01:01, 13 April 2009 | Privacy.jpg (file) | Komolat | 23 KB | 1 | |
00:32, 13 April 2009 | Figure_3.jpg (file) | Alhadds | 34 KB | (RFID) | 1 |
00:30, 13 April 2009 | Gsm.png (file) | Mankarn | 4 KB | 1 | |
00:17, 13 April 2009 | Gsm_logo.gif (file) | Mankarn | 2 KB | 1 | |
00:14, 13 April 2009 | Network.png (file) | Mankarn | 56 KB | 1 | |
00:08, 13 April 2009 | Ping.JPG (file) | Simpsoa | 39 KB | (Using Ping to calculate network latency in Microsoft Windows XP.) | 1 |
23:42, 12 April 2009 | Smartphone-security-risk-lg.jpg (file) | Asokanp | 20 KB | (Smartphone security: An increasing concern among personal and corporate users Source: http://digital-lifestyles.info/2008/06/03/smartphones-bigger-security-risk-than-lappies/) | 1 |
23:36, 12 April 2009 | Amazonec2.jpg (file) | Kimm23 | 20 KB | 1 | |
23:27, 12 April 2009 | Cell-Architecture.jpg (file) | Adamssw | 22 KB | (This file is an original creation based on information from IBM's Cell Broadband Engine Interconnect and Memory Interface, 2005 retrieved from http://www.hotchips.org/archives/hc17/2_Mon/HC17.S1/HC17.S1T2.pdf) | 1 |
23:20, 12 April 2009 | Googleapps.gif (file) | Kimm23 | 5 KB | 1 | |
22:59, 12 April 2009 | Bluetooth_logo.jpg (file) | Morsall | 4 KB | 1 |
First page |
Previous page |
Next page |
Last page |