Wednesday 11 November 2015

Ways You Can Hide Your Public IP Address

When connecting to the Internet, your home computer (or network router) is assigned a public IP address. As you visit Web sites or other Internet servers, that public IP address is transmitted and recorded in log files kept on those servers. Access logs leave behind a trail of your Internet activity. If it were possible to somehow hide your public IP address, its Internet activity would become much more difficult to trace.
Unfortunately, it is not technically possible to always hide the public IP address of a home network. An IP address enables devices to locate and communicate with each other on the Internet. Completely hiding the IP address of a device would render it invisible but also unusable online.


On the other hand, it is possible to hide public IP addressees from most Internet servers in most situations. This method involves an Internet service called an anonymous proxy server.

Using an Anonymous Proxy Server

An anonymous proxy server ("proxy") is a special type of server that acts as an intermediary between a home network and the rest of the Internet. An anonymous proxy server makes requests for Internet information on your behalf, using its own IP address instead of yours. Your computer only accesses Web sites indirectly, through the proxy server. This way, Web sites will see the proxy's IP address, not your home IP address.
Using an anonymous proxy server requires a simple configuration of the Web browser (or other Internet client software that supports proxies). Proxies are identified by a combination of URL and TCP port number.
Numerous free anonymous proxy servers exist on the Internet, open for anyone to use. These servers may have bandwidth traffic limits, may suffer from reliability or speed problems, or might permanently disappear from the Internet without notice.
Such servers are most useful for temporary or experimental purposes.
Anonymous proxy services that charge fees in return for better quality of service also exist. These services are designed for regular use by households.

Related Tools for Hiding IP Addresses

Several related software tools (both free and paid versions) support anonymous proxies. The Firefox extension called switchproxy, for example, supports defining a pool of proxy servers in the Web browser and automatically switching between them at regular time intervals. In general, these tools help you both find proxies and also simplify the process of configuring and using them.
The ability to hide an IP address increases your privacy on the Internet. Other approaches to improving Internet privacy also exist and complement each other. Managing Web browser cookies, using encryption when sending personal information, running a firewall and other techniques all contribute toward a greater feeling of safety and security when going online.

Network Firewalls

A network firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two.Network firewalls guard an internal computer network (home, school, business intranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users.

Network Firewalls and Broadband Routers

Many home network router products include built-in firewall support. The administrative interface of these routers include configuration options for the firewall. Router firewalls can be turned off (disabled), or they can be set to filter certain types of network traffic through so-called firewall rules.

Network Firewalls and Proxy Servers

Another common form of network firewall is a proxy server.

Proxy servers act as an intermediary between internal computers and external networks by receiving and selectively blocking data packets at the network boundary. These network firewalls also provide an extra measure of safety by hiding internal LAN addresses from the outside Internet. In a proxy server firewall environment, network requests from multiple clients appear to the outsider as all coming from the same proxy server address.
Also Known As: proxy, gateway

Sunday 8 November 2015

Laptop Maintenance Tips

Here are a few tips for ensure proper functioning and long Life for  your laptop .

>>Battery Life :  The life of your laptop battery is said to be 100 times u keep for your laptop for charging : so reduce the number of times you keep your laptop for charging i.e keep only for charge when your battery  goes down to 10 % & when u keep for charging  keep it to aleast it goes to 90 %
>> Heating : never keep your laptopn over the bed or on unvevn surfaces because the hot air from exhaust vent wont be put properly ,,,
>> Dust : Remove dust frequently from the laptop so it does not seep into the laptop



Big data

Big data is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, and information privacy.

Encryption

n cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.[1] Encryption does not of itself prevent interception, but denies the message content to the interceptor.[2]:374 In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted