A blog about Technical information in a simplified sense.
The Blog includes various topics like networking, testing , some interesting websites on the internet and various IT software's that helps your daily needs.
When connecting to the Internet, your home computer (or network router) is assigned a public IP address. As you visit Web sites or other Internet servers, that public IP address is transmitted and recorded in log files
kept on those servers. Access logs leave behind a trail of your
Internet activity. If it were possible to somehow hide your public IP
address, its Internet activity would become much more difficult to
trace.
Unfortunately, it is not technically possible to always hide the public IP address
of a home network. An IP address enables devices to locate and
communicate with each other on the Internet. Completely hiding the IP
address of a device would render it invisible but also unusable online.
On the other hand, it is possible to hide public IP addressees from
most Internet servers in most situations. This method involves an
Internet service called an anonymous proxy server.
Using an Anonymous Proxy Server
An
anonymous proxy server ("proxy") is a special type of server that acts
as an intermediary between a home network and the rest of the Internet.
An anonymous proxy server makes requests for Internet information on
your behalf, using its own IP address instead of yours. Your computer only accesses Web sites indirectly, through the proxy server. This way, Web sites will see the proxy's IP address, not your home IP address.
Using
an anonymous proxy server requires a simple configuration of the Web
browser (or other Internet client software that supports proxies).
Proxies are identified by a combination of URL and TCP port number.
Numerous free anonymous proxy servers
exist on the Internet, open for anyone to use. These servers may have
bandwidth traffic limits, may suffer from reliability or speed problems,
or might permanently disappear from the Internet without notice.
Such servers are most useful for temporary or experimental purposes.
Anonymous
proxy services that charge fees in return for better quality of service
also exist. These services are designed for regular use by households.
Related Tools for Hiding IP Addresses
Several related software tools (both free and paid versions) support anonymous proxies. The Firefox extension called switchproxy, for
example, supports defining a pool of proxy servers in the Web browser
and automatically switching between them at regular time intervals. In
general, these tools help you both find proxies and also simplify the
process of configuring and using them.
The ability to hide an IP
address increases your privacy on the Internet. Other approaches to
improving Internet privacy also exist and complement each other.
Managing Web browser cookies, using encryption when sending personal information, running a firewall and other techniques all contribute toward a greater feeling of safety and security when going online.
A network firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two.Network firewalls guard an internal computer network (home, school, business intranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users.
Network Firewalls and Broadband Routers
Many home network router
products include built-in firewall support. The administrative
interface of these routers include configuration options for the
firewall. Router firewalls can be turned off (disabled), or they can be
set to filter certain types of network traffic through so-called firewall rules.
Network Firewalls and Proxy Servers
Another common form of network firewall is a proxy server.
Proxy servers act as an intermediary between internal computers and
external networks by receiving and selectively blocking data packets at
the network boundary. These network firewalls also provide an extra
measure of safety by hiding internal LAN addresses from the outside Internet. In a proxy server
firewall environment, network requests from multiple clients appear to
the outsider as all coming from the same proxy server address. Also Known As: proxy, gateway
Here are a few tips for ensure proper functioning and long Life for your laptop .
>>Battery Life : The life of your laptop battery is said to be 100 times u keep for your laptop for charging : so reduce the number of times you keep your laptop for charging i.e keep only for charge when your battery goes down to 10 % & when u keep for charging keep it to aleast it goes to 90 %
>> Heating : never keep your laptopn over the bed or on unvevn surfaces because the hot air from exhaust vent wont be put properly ,,,
>> Dust : Remove dust frequently from the laptop so it does not seep into the laptop
Big data is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, and information privacy.
n cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.[1] Encryption does not of itself prevent interception, but denies the message content to the interceptor.[2]:374 In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted