Thursday 29 October 2015

Issue tracking system

An issue tracking system (also ITS, trouble ticket system, support ticket, request management or incident ticket system) is a computer software package that manages and maintains lists of issues, as needed by an organization. Issue tracking systems are commonly used in an organization's customer support call center to create, update, and resolve reported customer issues, or even issues reported by that organization's other employees. A support ticket should include vital information for the account involved and the issue encountered. An issue tracking system often also contains a knowledge base containing information on each customer, resolutions to common problems, and other such data.

                                                                                                        A ticket element, within an issue tracking system, is a running report on a particular problem, its status, and other relevant data. They are commonly created in a help desk or call center environment and almost always have a unique reference number, also known as a case, issue or call log number which is used to allow the user or help staff to quickly locate, add to or communicate the status of the user's issue or request.

Wednesday 28 October 2015

WebSite ReView :: Google Gravity

Google Gravity Trick

Google has lots of cool entertaining stuff for its users and Google gravity trick is one of them. However Google gravity trick has many names, some call it Google gravity, Google zero gravity, Google no gravity, Google 0 gravity and lots of them. The point is all of these names are for the same trick. So don’t be confused with the title variations.

What is Google Gravity Trick?

It’s simple. Just go by its name. All the elements on Google search page possess gravity and hence fall down to the bottom of the screen. You can see it in the image below. Well, its not a rocket science. Its just a Java script that executes the effect. Some guys even use this trick to do pranks with their friends. If you are planning to do a prank with some “non-technical” person it’s the good thing to try.
http://antigravitygoogle.com/

http://www.youtube.com/watch?v=bswdIKbQwzI
http://www.googlegravitytrick.com/

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.[1] A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed to not be secure or trusted

Web server

A web server is a computer system that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. The term can refer either to the entire system, or specifically to the software that accepts and supervises the HTTP request

Special, Public and Private IP Addresses

Private IP Addresses:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
These IP Addresses can only be used on private networks or LANs (Local Area Networks) without any special authorization. These IP are not routable on the Public internet.

Special IP Addresses:
127.0.0.1

Or any address that begins with 127 is considered a loop back address. The address is actually yourself or the computer that is making the request. It is also equivalent to being the 'local host'.
224.0.0.1 - 239.255.255.255

Is used for multicast and cannot be assigned to a computer.
240.0.0.0

And higher is used for experimental purposes only.
169.254.0.0-169.254.255.255

If the computer can't get an IP from the DHCP server, the Automatic Private IP Addressing (APIPA) provides this address that will not conflict with routable addresses. Read further for more of an explanation.
Why do I get 169.254.x.x IP?
Symptom: The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.0-169.254.255.255 for Automatic Private IP Addressing.
Resolutions:
  1. Make sure you have a good connection.
  2. Check the hardware and settings.
  3. Make sure the DHCP is working.
  4. For testing, you can assign static IP. If a static IP works, it is a possible DHCP issue. If a static IP doesn't work, check the hardware or connection.

Special IP Addresses:
All other IP addresses are public. These public IP's are also referred to as being legal, registered or legit IP addresses. These addresses are what is used on the public internet and are governed by a group called ARIN, the American Registry for Internet Numbers. To use a public IP address, you must either get them from your Internet provider, or you can buy them directly from ARIN, but you must justify their use in order to obtain them

WebSite ReVeiw :: PortCheckTool.com

http://www.portchecktool.com./

>>  Port Check and IP detection Tool

Port Check Tool.

 

--Your Current Public IP Address

-- Check your ports!
 Want to know if your server is running? Now you can ! Simply enter what port you want to verify into the empty box and click, "Check Your Port". A message will appear, notifying you if your port is blocked by a firewall or ISP.

Tuesday 27 October 2015

Website Review :: Chasms.com

chasms.com

 The  website provides the Latest Screens shots & at times the Simulators for  various buttons  Internet , Electronic Gadgets (computer, tablet or cell phone) based applications on multiple platforms (E.g : Operating Systems) ..
Technically speaking Chasms.com   provides the Graphical user interface (GUI) for various devices


  • Windows 〉
  • Mac 〉
  • Ubuntu 〉
  • Tablets 〉
  • Email 〉
  • Browsers 〉
  • Security 〉
  • Networking 〉
  • Smart Phones 〉
  • Game Consoles 〉

What's the difference between simulation and emulation ?

Simulation

A simulation is a system that behaves similar to something else, but is implemented in an entirely different way. It provides the basic behaviour of a system, but may not necessarily adhere to all of the rules of the system being simulated. It is there to give you an idea about how something works.


Emulation

An emulation is a system that behaves exactly like something else, and adheres to all of the rules of the system being emulated. It is effectively a complete replication of another system, right down to being binary compatible with the emulated system's inputs and outputs, but operating in a different environment to the environment of the original emulated system. The rules are fixed, and cannot be changed, or the system fails.

Friday 23 October 2015

Parallel Processing

What does it mean?
Parallel processing is a method of simultaneously breaking up and running program tasks on multiple microprocessors, thereby reducing processing time. Parallel processing may be accomplished via a computer with two or more processors or via a computer network.
Parallel processing is also called parallel computing.

Saturday 17 October 2015

What Is Sip ALG (Application Layer Gateway) Voip firewall


SIP ALG (Application Layer Gateway) is a security component, commonly found in a router or firewall device .
An ALG is created in the same way as a proxy policy and offers similar configuration options, SIP Application Layer Gateway (ALG) provides functionality to allow VoIP traffic to pass both from the private to public and public to private side of the firewall when using Network Address and Port Translation (NAPT), SIP ALG inspects and modifies SIP traffic to allow SIP traffic to pass through the firewall.
Many of today's commercial routers implement SIP ALG, coming with this feature enabled by default. 

Basics SIP ALG operations
1-Control SIP call activity,The call duration and inactivity media timeout features help you to conserve network resources and maximize throughput.
2-Protect the SIP proxy server from denial-of-service (DoS) flood attacks
3-Enable unknown messages to pass when the session is in Network Address Translation (NAT) mode and route mode.
 
An ALG may offer the following functions:
  • allowing client applications to use dynamic ephemeral TCP/ UDP ports to communicate with the known ports used by the server applications, even though a firewall configuration may allow only a limited number of known ports. In the absence of an ALG, either the ports would get blocked or the network administrator would need to explicitly open up a large number of ports in the firewall — rendering the network vulnerable to attacks on those ports.
  • converting the network layer address information found inside an application payload between the addresses acceptable by the hosts on either side of the firewall/NAT. This aspect introduces the term 'gateway' for an ALG.
  • recognizing application-specific commands and offering granular security controls over them
  • synchronizing between multiple streams/sessions of data between two hosts exchanging data. For example, an FTP application may use separate connections for passing control commands and for exchanging data between the client and a remote server. During large file transfers, the control connection may remain idle. An ALG can prevent the control connection getting timed out by network devices before the lengthy file transfer completes.[2]
Deep packet inspection of all the packets handled by ALGs over a given network makes this functionality possible. An ALG understands the protocol used by the specific applications that it supports.
For instance, for Session Initiation Protocol (SIP) Back-to-Back User agent (B2BUA), an ALG can allow firewall traversal with SIP. If the firewall has its SIP traffic terminated on an ALG then the responsibility for permitting SIP sessions passes to the ALG instead of the firewall. An ALG can solve another major SIP headache: NAT traversal. Basically a NAT with a built-in ALG can rewrite information within the SIP messages and can hold address bindings until the session terminates.
An ALG is very similar to a proxy server, as it sits between the client and real server, facilitating the exchange. There seems to be an industry convention that an ALG does its job without the application being configured to use it, by intercepting the messages. A proxy, on the other hand, usually needs to be configured in the client application. The client is then explicitly aware of the proxy and connects to it, rather than the real server.

ALG service in Microsoft Windows

The Application Layer Gateway service in Microsoft Windows provides support for third-party plugins that allow network protocols to pass through the Windows Firewall and work behind it and Internet Connection Sharing. ALG plugins can open ports and change data that is embedded in packets, such as ports and IP addresses. Windows Server 2003 also includes an ALG FTP plugin. The ALG FTP plugin is designed to support active FTP sessions through the NAT engine in Windows. To do this, the ALG FTP plugin redirects all traffic that passes through the NAT and that is destined for port 21 (FTP control port) to a private listening port in the 3000–5000 range on the Microsoft loopback adapter. The ALG FTP plugin then monitors/updates traffic on the FTP control channel so that the FTP plugin can plumb port mappings through the NAT for the FTP data channels.
 
 
 
 

Thursday 8 October 2015

VOIP

Introduction

VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.
If you have a reasonable quality Internet connection you can get phone service delivered through your Internet connection instead of from your local phone company.


Why use VOIP?

There are two major reasons to use VOIP
  • Lower Cost
  • Increased functionality

Lower Cost

In general phone service via VOIP costs less than equivalent service from traditional sources. This is largely a function of traditional phone services either being monopolies or government entities. There are also some cost savings due to using a single network to carry voice and data. This is especially true when users have existing under-utilized network capacity that they can use for VOIP without any additional costs.

In the most extreme case, users see VOIP phone calls (even international) as FREE. While there is a cost for their Internet service, using VOIP over this service may not involve any extra charges, so the users view the calls as free. There are a number of services that have sprung up to facilitate this type of "free" VOIP call.

Increased Functionality

VOIP makes easy some things that are difficult to impossible with traditional phone networks.
  • Incoming phone calls are automatically routed to your VOIP phone where ever you plug it into the network. Take your VOIP phone with you on a trip, and anywhere you connect it to the Internet, you can receive your incoming calls.
  • Call center agents using VOIP phones can easily work from anywhere with a good Internet connection.

Monday 5 October 2015

QoS (Quality of Service)

Definition: QoS (Quality of Service) refers to a broad collection of networking technologies and techniques. The goal of QoS is to provide guarantees on the ability of a network to deliver predictable results. Elements of network performance within the scope of QoS often include availability (uptime), bandwidth (throughput), latency (delay), and error rate.
QoS involves prioritization of network traffic. QoS can be targeted at a network interface, toward a given server or router's performance, or in terms of specific applications. A network monitoring system must typically be deployed as part of QoS, to insure that networks are performing at the desired level.


QoS is especially important for the new generation of Internet applications such as VoIP, video-on-demand and other consumer services.