File list

From Computing and Software Wiki

Jump to: navigation, search

This special page shows all uploaded files. By default the last uploaded files are shown at top of the list.

A click on a column header changes the sorting.
File list
 

descDate Name User Size Description Versions
03:31, 21 November 2009 Formfillin2.gif (file) Shensw 2 KB   1
03:28, 21 November 2009 Formfillin1.gif (file) Shensw 2 KB   1
23:55, 13 November 2009 VLC_Preferences.png (file) Scottj4 55 KB (VLV Preferences panel resized.) 1
22:08, 13 November 2009 Confusing_Message.png (file) Scottj4 24 KB (Shows a Confusing message to the user) 1
22:04, 13 November 2009 Template_Selection.png (file) Scottj4 73 KB (Shows a bad GUI for selection a template. ) 1
21:42, 13 November 2009 Set_Time.png (file) Scottj4 67 KB (A user interface to set the time that was poorly designed.) 1
21:33, 13 November 2009 Interface_Example2.JPG (file) Beyakle 13 KB   1
21:30, 13 November 2009 Interface_Example1.JPG (file) Beyakle 17 KB   1
23:53, 26 October 2009 Modelquacky.jpg (file) Jesurar 243 KB   1
23:52, 26 October 2009 Modelbuttons.jpg (file) Jesurar 265 KB   1
23:52, 26 October 2009 Buttons.jpg (file) Jesurar 21 KB   1
06:44, 26 October 2009 Movement.jpg (file) Sandhj2 81 KB   1
05:11, 25 October 2009 Placeholder1.jpg (file) Jesurar 6 KB   1
22:38, 24 October 2009 Placeholder.jpg (file) Jesurar 7 KB   1
03:52, 13 April 2009 DHCP_state_Diagram.jpg (file) Sainis6 45 KB (DHCP state diagram from Douglas E. Comer (2006). "Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture", 5ed, Prentice Hall ) 1
03:52, 13 April 2009 Video-conference.jpg (file) Woodj5 190 KB (This is an example of video conferencing, one of the applications that multicasting has helped to make more available. ) 1
03:47, 13 April 2009 IntroImg.jpg (file) Chokshkk 14 KB   1
03:00, 13 April 2009 Sessionhijacking.jpg (file) Luongp 67 KB (Session Hijacking IP Spoofing) 1
02:42, 13 April 2009 Network_Attached_Storage_Device2.jpg (file) Holtomm 30 KB   1
02:38, 13 April 2009 Network_Attached_Storage_Device1.jpg (file) Holtomm 30 KB   1
02:32, 13 April 2009 Active_MITM_Flow_3.jpg (file) Heifetj 17 KB   1
02:32, 13 April 2009 Active_MITM_Flow_2.jpg (file) Heifetj 15 KB   1
02:32, 13 April 2009 Active_MITM_Flow_1.jpg (file) Heifetj 14 KB   1
02:26, 13 April 2009 Example.png (file) Gosyned 24 KB (An example of a simple Peer to Peer model. http://ask-leo.com/will_bittorrent_harm_my_computer.html) 1
02:24, 13 April 2009 Peer_to_Peer_File_Sharing_Model.png (file) Gosyned 24 KB (An example of a simple Peer to Peer File Sharing model. http://ask-leo.com/will_bittorrent_harm_my_computer.html) 1
02:15, 13 April 2009 BasicDHCP.jpg (file) Sainis6 39 KB (Basic DHCP initialization operations) 1
02:06, 13 April 2009 NetworkTopologies-Mesh.png (file) Liberag 47 KB (The layout of a mesh network. Created by the user Foobaz from Wikipedia. ) 1
02:02, 13 April 2009 NetworkTopologies-Tree.png (file) Liberag 8 KB (The layout of a tree network.) 1
02:02, 13 April 2009 NetworkTopologies-Star.png (file) Liberag 69 KB (The layout of a star network.) 1
02:01, 13 April 2009 NetworkTopologies-Ring.png (file) Liberag 46 KB (The layout of a ring network.) 1
01:58, 13 April 2009 NetworkTopologies-Bus.png (file) Liberag 29 KB (Layout of a bus network.) 1
01:50, 13 April 2009 NetworkTopologies.png (file) Liberag 37 KB (Visualization of Network Topologies.) 1
01:41, 13 April 2009 Tdma.gif (file) Altahaa 12 KB   1
01:41, 13 April 2009 Cdma.gif (file) Altahaa 16 KB   1
01:36, 13 April 2009 3gevolution.gif (file) Altahaa 7 KB   1
01:35, 13 April 2009 Gsminfra.png (file) Altahaa 168 KB   1
01:07, 13 April 2009 MulticastVUnicast.png (file) Woodj5 668 B (This diagram shows how inefficient the unicasting routing scheme is compared to the multicasting routing scheme is.) 1
01:06, 13 April 2009 Network_Attached_Storage_Device.jpg (file) Holtomm 83 KB (This is an example application for Network Attached Storage. The data on the NAS device is accessible by a control portion of the internal network, but is protected from the outside world by a firewall.) 1
01:06, 13 April 2009 Monitor_mirror.jpg (file) Ivanoa 10 KB (Security departments prevent wandering eyes from seeing confidential data by installing mirror monitors on screens, enabling employees to see what's behind them.) 1
01:01, 13 April 2009 Privacy.jpg (file) Komolat 23 KB   1
00:32, 13 April 2009 Figure_3.jpg (file) Alhadds 34 KB (RFID) 1
00:30, 13 April 2009 Gsm.png (file) Mankarn 4 KB   1
00:17, 13 April 2009 Gsm_logo.gif (file) Mankarn 2 KB   1
00:14, 13 April 2009 Network.png (file) Mankarn 56 KB   1
00:08, 13 April 2009 Ping.JPG (file) Simpsoa 39 KB (Using Ping to calculate network latency in Microsoft Windows XP.) 1
23:42, 12 April 2009 Smartphone-security-risk-lg.jpg (file) Asokanp 20 KB (Smartphone security: An increasing concern among personal and corporate users Source: http://digital-lifestyles.info/2008/06/03/smartphones-bigger-security-risk-than-lappies/) 1
23:36, 12 April 2009 Amazonec2.jpg (file) Kimm23 20 KB   1
23:27, 12 April 2009 Cell-Architecture.jpg (file) Adamssw 22 KB (This file is an original creation based on information from IBM's Cell Broadband Engine Interconnect and Memory Interface, 2005 retrieved from http://www.hotchips.org/archives/hc17/2_Mon/HC17.S1/HC17.S1T2.pdf) 1
23:20, 12 April 2009 Googleapps.gif (file) Kimm23 5 KB   1
22:59, 12 April 2009 Bluetooth_logo.jpg (file) Morsall 4 KB   1

First page
First page
Last page
Last page
Views
Personal tools
Toolbox