by wolftech | Feb 12, 2014 | Uncategorized
When you open your Mozilla email, you are prompted for your password. There is a check box to “Use Password Manager to remember this password.” EIT recommends that you do not check this box, as it exposes you in the case of someone getting access to their...
by wolftech | Feb 12, 2014 | Uncategorized
Tables are designed to allow you to store information in rows and columns. Given the different levels of support for style sheets, they are still very useful for controlling the layout of a page. Tables are created row by row and made up of cells. The table is started...
by wolftech | Feb 12, 2014 | Uncategorized
On ocassion, you will be called upon to include an outline for a web page. An outline will consist of a series of ordered lists. To review ordered lists: Ordered Lists Ordered lists (sometimes called numbered lists) work the same as unordered lists with two...
by wolftech | Feb 12, 2014 | Uncategorized
The three commonly used lists in HTML: Unordered Lists Ordered Lists Definition Lists Unordered Lists Unordered lists are for producing a bulleted list. Each list item may be as long as you desire, even with multiple paragraphs. Everything within the unordered list...
by wolftech | Feb 12, 2014 | Uncategorized
Since NCSU changed its policy on over quota email from storing any messages that come after you’ve exceeded your quota to sending a ‘failed mail’ message to the sender, over quota mailboxes have been causing a lot of problems. Not only for the person...
by wolftech | Feb 12, 2014 | Uncategorized
IT support staffs do everything they can to assure that your computing environment is secure and trouble-free. But it’s an ugly world, and the spammers, virus writers, and hackers seem to be both clever and relentless. Assume that your computer is under constant...