Click here to Skip to main content
post an article ask a question Search our articles

 Latest Articles  

Featured article
9-Apr-12 8:34am by Andrey Karpov (new) 
The article briefly describes AMD64 architecture by AMD Company and its implementation EM64T by Intel Company. The architecture's peculiarities, advantages and disadvantages are described.
4-Mar-14 9:54am by Marco Bertschi (new) 
Short and easy description on how you get your own, private Git server running on your Raspberry Pi
4-Oct-13 15:40pm by Michael Haephrati (new) 
An example of a small and easy to implement monitoring application
4-Oct-13 15:39pm by Michael Haephrati (new) 
Why the creation of a cover story a mandatory part of any covert monitoring product and how Target Eye handled it
13-Sep-13 14:26pm by Michael Haephrati (updated) 
Michael Haephrati explains how keyboard capturing should be done
13-Sep-13 14:02pm by Alex Marbus (updated) 
Ethernet connections
13-Sep-13 12:33pm by Michael Haephrati (new) 
Michael Haephrati describes the Shopping List and how it is used
13-Sep-13 9:24am by Michael Haephrati (new) 
Michael Haephrati describes how a hardware copy protection dongle was developed.
13-Sep-13 9:23am by Michael Haephrati (new) 
Michael Haephrati brings a new angle to some questions about today's Internet
10-Sep-13 15:04pm by Michael Haephrati (new) 
Michael Haephrati describes Target Eye screen capturing mechanism
10-Sep-13 15:00pm by Michael Haephrati (new) 
How Target Eye's Auto updating mechanism allows a silent update of an application from identifying newer versions, downloading them and running them instead of the old one

 Our Community

4Workspaces - The Lounge
8I've got five seconds - The Lounge
4All other forums are broken. - The Lounge
9Ads on this site - The Lounge
4Windows has found 65 updates... - The Lounge
10I did it this time. - The Lounge

Showcase Product Showcase

by Paramesh Gunasekaran
Implementing Reverse Proxy Server in C# .NET v2.0 through HTTP Handler...
by rob tillaart
A line printer daemon in C#
by Joerg Brunke
Writing custom commands for the stsadm.exe administration tool in...
by razi bin rais
A look at the Windows SharePoint Services & SharePoint Server 2003...
by Dmitry Khudorozhkov
This article presents a JScript/WMI/WSH script - the core of any...

News Latest News

Discussions Latest Discussions

by Roger Wright
At work we have a local network with 15 or so PCs and a couple of network printers connected to a 24 port switch, thence connected to the outside world via a SonicWall firewall. Since the SonicWall includes several VPN licenses, and I often travel, I thought it would be a snap to construct a...
by ledtech3
I'm thinking about a project for a set of remote temp sensors for where my dog sleeps in the garrage under my workbench.The outside temps here can range from near -10 to +115 give or take.My electronic project skills are kind of limited but would like to see how I may do this.It...
by Michael Haephrati
What are the advantages of binary search trees over hash tables?
by Michael Haephrati
I would like to add a function to a static library which will get the full path of this library. Is that possible. There are ways to do that when it comes to a DLL, but I couldn't find out a solution for finding the path of a static library at runtime.
by Michael Haephrati
Many of my customers often ask me which environment is better for web sites and web applications: PHP with MYSQL, or ASP.NET with MS SQL. Which environment is better?

Top articles Latest Best Picks

by Michael Haephrati  5.00/5 (2 votes)
An example of a small and easy to implement monitoring application
by Michael Haephrati  5.00/5 (2 votes)
Why the creation of a cover story a mandatory part of any covert monitoring product and how Target Eye handled it

Advertise | Privacy | Mobile
RA-Web2 | 2.8.141022.1 | Last Updated 22 Oct 2014
Copyright © RootAdmin, 1999-2014
All Rights Reserved. Terms of Service
Layout: fixed | fluid