Home Blog Page 24

What is IPv6?

Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. Packet switching involves the sending and receiving of data in packets between two nodes in a network. The working standard for the IPv6 protocol was published by the Internet Engineering Task Force (IETF) in 1998. The IETF specification for IPv6 is RFC 2460. IPv6 was intended to replace the widely used Internet Protocol Version 4 (IPv4) that is considered the backbone of the modern Internet. IPv6 is often referred to as the “next generation Internet” because of it’s expanded capabilities and it’s growth through recent large scale deployments. In 2004, Japan and Korea were acknowledged as having the first public deployments of IPv6.

One of the main upgrades in IPv6 is in the number of addresses available for networked devices. For example, each mobile phone or other kind of electronic device can have its own IPv6 address. IPv6 allows 3.4×10^38 addresses. This is mainly due to the number of bits in each protocol. IPv4 addresses have 32 bits in them and so allow a maximum of four billion addresses. IPv6 addresses have 128 bits.

The explosive growth in mobile devices including mobile phones, notebook computers, and wireless handheld devices has created a need for additional blocks of IP addresses. IPv4 currently supports a maximum of approximately 4.3 billion unique IP addresses. IPv6 supports a theoretical maximum of 2128 addresses (340,282,366,920,938,463,463,374,607,431,768,211,456 to be exact!). Recent advancements in network technology including Network Address Translation (NAT) have temporarily lessened the urgency for new IP addresses, however, recent estimates indicate that IPv4 addresses could be exhausted as soon as 2012.

IPv6 and IPv4 share a similar architecture. The majority of transport layer protocols that function with IPv4 will also function with the IPv6 protocol. Most application layer protocols are expected to be interoperable with IPv6 as well, with the notable exception of File Transfer Protocol (FTP). FTP uses embedded network layer addresses to facilitate data transmission. An IPv6 address consists of eight groups of four hexadecimal digits. If a group consists of four zeros, the notation can be shortened using a colon to replace the zeros.

A main advantage of IPv6 is increased address space. The 128-bit length of IPv6 addresses is a significant gain over the 32-bit length of IPv4 addresses, allowing for an almost limitless number of unique IP addresses. The size of the IPv6 address space makes it less vulnerable to malicious activities such as IP scanning. IPv6 packets can support a larger payload than IPv4 packets resulting in increased throughput and transport efficiency.

A key enhancement over IPv4 is native support for mobile devices. IPv6 supports the Mobile IPv6 (MIPv6) protocol which enables mobile devices to switch between networks and receive a roaming notification regardless of physical location. MIPv6 is a hallmark of the protocol and was specified as a firm requirement during the design of IPv6. The IETF has separate specifications for MIPv6 that detail data structure, messaging, and security requirements.

Auto-configuration is another IPv6 enhancement that is considered a great benefit to network administrators. IPv6 devices can independently auto-configure themselves when connected with other IPv6 devices. Configuration tasks that can be carried out automatically include IP address assignment and device numbering. An IPv6 router has the ability to determine its own IPv6 address using data link layer addressing parameters. The IETF has issued RFC 2462 to set guidelines for IPv6 auto-configuration.

The IPv6 protocol improves upon IPv4 with increased authentication and privacy measures. IPSec security is embedded into the IPv6 specification to manage encryption and authentication between hosts. This built in security framework enables secure data traffic between hosts that is independent of any applications on either host. In this way, IPv6 provides an efficient end to end security framework for data transfer at the host or the network level.

The deployment of IPv6 networks is growing worldwide. Full replacement of IPv4 is expected to take some time, as it remains the most widely used Internet Protocol. The United States, China, and India are leading recent deployments of the IPv6 protocol and have large investments in IPv6 network infrastructure. The United States government has mandated that federal agencies must complete the transition to an IPv6 infrastructure no later than 2008. Software companies are also releasing operating systems that support the IPv6 standard. In 1997, IBM became the first commercial vendor to support IPv6 through its AIX 4.3 operating system. The latest version of Microsoft’s Windows operating system, Windows Vista, has full IPv6 support enabled by default.

However, IPv4 is still the protocol of choice for most of the Internet. The transition will be a steady one, and IPv6 is the future of Internet addressing, mainly because industry experts believe that they are close to running out of available addresses altogether.

Source : whatismyipaddress.com , wisegeek.com

The man-made ‘island’ that can be towed to any ocean in the world | worth $6.5M.

0

An Austrian firm has come up what it hopes is the next big thing for the mega-rich: a man-made, floating “island” with a list price of 5.2 million euros ($6.5 million), the company’s founder said Monday.

Measuring 20 by 37 metres (66 by 121 feet), the “Orsos Island” has no engine but can be anchored anywhere its owners choose and then towed to another location the other side of the world if they so wish, Hungarian-born Gabor Orsos said.

“The interest has been massive from all over the world, from Australia, China, the United States. We have already had the first pre-orders and we have some potential buyers coming from Australia next week,” the entrepreneur said.

The island is environmentally friendly and fully self-sufficient, with solar panels and wind generators providing power. It can sleep 12 people plus crew and offers 1,000 square metres of living space.

The only problem is that no “islands” have been produced yet and that once manufacturing starts it will initially be in land-locked Slovakia.

But Orsos expects the first finished products to be ready in 18 months’ to two years’ time, and for the “islands” to be transported down the Danube river into the Black Sea — and then to wherever the customer wants.

 

 

 

Source : www.nationalpost.com by Geeksagar.

What Is a Facebook API and it’s Authentication ?

One thing that sets Facebook apart from its competition in the social networking arena is its extensive use of building the site’s platform, features and applications with open-source software. Taking the open-source philosophy to heart, Facebook shares a set of Application Programming Interfaces (APIs) that developers can use to tap into the social network and that extend the developer’s Web applications and sites. The main Application Programming Interfaces offered by Facebook include the Ads API, Credits API, Chat API and Graph API.

Graph API

  • The most widely used Facebook API is the Graph API, which is a core feature that charts the social graph for all connections between people, pages, events, posts, photos, comments and “likes.” Tapping into the Facebook social graph lets your Web applications interact with the data in multiple ways. You can return a user’s most recent posts, access and download an entire photo album and discover the most popular “likes” across the entire social network. The Graph API includes a search feature that lets you easily retrieve and parse this data, as long as the user’s data is public and not private. If it is private, then your application will need a Facebook access token to get permission from the user.

Chat API

  • The Chat API lets a programmer integrate the Facebook Chat feature directly in a Web-based or desktop application. Instant messaging among Facebook friends is possible with the Jabber service and XMPP protocol. The Chat API lets users to send and receive plain-text messages, but not HTML-based ones. Additionally, the API lets developers retrieve a user’s photo via the vCard or XMPP protocols; once it’s retrieved, the photo can be displayed as the chatter’s profile picture.

Credits API

  • Facebook Credits are the platform’s internal payment system to purchase in-app items, services and more. Basically, a credit gives a user the ability to buy virtual goods within a Facebook app. An app developer can place a “Pay with Facebook” button in her game, encouraging users to purchase her digital goods. The Credits API encompasses two components — the front-end and back-end credits system. The front end handles everything Facebook users see, while the back-end API is used to manage credits received and post status updates on behalf of the user.

Ads API

  • The Ads API gives developers and high-end advertisers the ability to create their own applications to address their advertising needs and concerns. The API is available as an alternative to using the default Facebook Advertising Manager Tool, which is free to use when creating and managing your ads. To use the Ads API, a person or business must agree to the terms and conditions so the user is placed on the API whitelist. Otherwise, a developer or vendor won’t be able to access the application interface.

After API authentication, Facebook allows you to transfer users to your site and collect information that the user has stored on the Facebook site
.

Protocol

  • Facebook uses OAuth2 as their API protocol, which stands for Open Authorization. The developer Eran Hammer-Lahav likes to compare it to a valet key. This protocol allows the user to share some information with your application, such as contacts, photos and videos with a token, but doesn’t give username and password. OAuth began in November of 2006. The new version OAuth2 is not backwardly compatible with OAuth.

User Authorization

  • The user authorization is addressed by the OAuth Dialog. The first step is determining if the user is logged into Facebook by validating the login cookie that is stored on the user’s browser. If the user is not logged in, they will be required to enter their email and password.

App Authorization

  • The next step is authorizing the application. The system is set up to access basic information. This information includes: name, profile picture, gender, networks, user ID, list of friend and any other information that is shared with anyone. However, if you need more information than this, you must request specific permissions by adding a scope parameter. You can find all of the permissions that are available in the permission references. Facebook warns that there is a strong negative correlation between the number of permissions requested and the users that grant them. They recommend only requesting the needed permissions.

App Authentication

  • If the user selects “allow” on the permissions, the application is authorized and an authorization code is returned. You must also obtain an app secret from the Developer’s App. Then you pass both the authorization code and your app secret to the Graph API token endpoint. If the application is authenticated and the user is authorized, you get a HTTP302 and the location of the URL returned. If there is a problem, you get a HTTP 400 and an error message.

How do I clear my Viewing History in YouTube ?

1

To clear your Viewing History:

  • Login and click your username located in the top right corner of the page. Select Video Manager from the drop-down menu that appears.
  • Click the History tab in the left column. There you will see all the videos you have recently watched.

Once in the History tab:

  • To delete single videos from your viewing history, click the check-box on the left of the video(s) in question and then click Removeat the top of the page.
  • To delete ALL videos from your viewing history, click Clear all viewing history at the top of the page.
  • To pause your viewing history, click Pause viewing history at the top of the page.

Top 4 Methods To Remove Write Protection From Your Pen Drives / Memory Sticks

In most of the USB based flash/pen drives, write protection is provided via the small notch. First of all look for it in sides of your drive. It’s even marked with lock/unlock symbol. Move/slide the notch to unlock position (means releasing write protection) before you perform any file operations in your drive such as copy/paste/format etc. After that you can slide back the notch to lock position safely.

But many of the pen drives don’t provide hardware lock/notch for write protection. Instead they back it up by means of some software/tool. From there you can change the write protection lock/unlock option. Refer to your pen drive’s manual for more details in this regard as different pendrive have diferent ways to to unlock them or otherwise you can also take help of some tools to unlock them.

Best Methods To Remove Write Protection From Your Memory Sticks / Pen Drives Goes here (ENJOY AND POST FEEDBACKS TOO)

METHOD #1 

  1. Open Registry editor of your PC
  2.  For this you should type command “regedit” on run.
  3. Successively navigate to following linkHKEY_LOCAL_MACHINE\SYSTEM\Currentcontrolset\control\storatedevicepolicies( Note: if you can’t find ” storatedevicepolicies ” after “control” folder then you need to create it. For that follow instructions       mentioned below )
    • Open a new note pad file.
    • Copy this
      cd\reg add “HKLM\System\CurrentControlSet\Control\StorageDevicePolicies” /t Reg_dword /v
      WriteProtect /f /d 0
    • save it as DISABLEWP.BAT
    • Then copy it to start up folder.
  4.  In right side u will be getting writeprotect option, just right click that and modify the hexadecimal value from 1 to 0
  5. Restart your PC and enjoy!!!!
    ( Still having problem???   Don’t worry try other methods below )

============================================================================================

METHOD #2

If you have transcend pen drive infected by 9u.exe which is a write protect virus then the following works like a charm:
1) Download JetFlash online recovery from:
www.transcendusa.com/Support/DLCenter/Software/OnLineRecovery.exe
2) Run the program
3) Specify the capacity of your drive eg.512 MB, 1 GB …..etc
4) Choose “repair and erase all data” OR ” repair and keep existing data”
5) Progress bar starts…….completes
6) Notification appears —” format complete”
7) Unplug and plug your drive and …..presto

enjoy!!!!

( Still having problem ?   Don’t worry try other methods below )

============================================================================================

Method #3 

1. Start > Run  -> type “CMD” and press enter
2. type< diskpart
3. type< list volume
4. type< select volume # (# is the number of the USB HDD you’ve pluged in)
5. type< attributes disk clear readonly

(If you need help while typing commands then type “HELP FORMAT” on command prompt)
============================================================================================

METHOD #4 

There are a series of options in the Group Policy Object Editor that deal with read/write permissions on hard drives and removable media.  I basically changed their individual settings from “Not configured” to “Disabled”.

Start -> Run… -> gpedit.msc -> OK
Computer Configuration -> Administrative Templates -> System -> Removable Storage Access

In here I disabled all of the “Deny read access/write access” options; you may only want to disable the ones relating directly to the type of media that you want to access.

Here are the ones I changed:

Removable Disks:  Deny execute access
Removable Disks:  Deny read access
Removable Disks:  Deny write access

Double-click each one and select the ‘Disabled‘ radio button.

Do the same as above, except the first step is “User Configuration” instead of “Computer Configuration

(Best result if you try both method #1 and method #4 together)

Enjoy!!!

All the methods mentioned are tested and they works well in my PC.

Please don’t forget to leave your feedbacks below as comment and lets discuss if more tricks are needed…

Thanks and Regards
Geeksagar

Bing’s Image Search | New Look.

Bing has updated its image search a couple of days earlier with a new look and some tweaks to its search and discovery features.

The first thing you can notice, aside from the fact that it is really cute, and  is the tight tile-based layout that Pinterest often gets credited for making popular in the past year or so. Both Flickr and Yahoo have recently rolled out similar layouts — Yahoo, in fact, rolled out a very similar look and feel just yesterday.

Image search on Bing has also been updated to the minimalist user interface that Bing.com launched in early May2012 . There are also bigger thumbnails and a “magnifying glass” tool that pops up above each image with information.

On the feature side, Bing is touting the filter bar at the top of the image results that lets users drill-down to images based on size, color and other options. There are also related topics and trending image searches to the right and search suggestions up above.

Of interest, too, is that Bing says image search makes up about seven percent of all Bing queries.

Source: searchengineland

AMAZING FACTS ABOUT WARREN BUFFET: 3rd RICHEST MAN IN THE WORLD

0

 

Here it goes

1) Warren bought his first share at age 11 and he now regrets that he started too late!

2) He bought a small farm at age 14 with savings from delivering newspapers.

3) He still lives in the same small 3 bedroom house in mid-town Omaha, that he bought after he got married 50 years ago. He says that he has everything he needs in that house. His house does not have a wall or a fence.

4) He drives his own car everywhere and does not have a driver or security people around him.

5) He never travels by private jet, although he owns the world’s largest private jet company.

6) His company, Berkshire Hathaway, owns 63 companies. He writes only one letter each year to the CEOs of these companies, giving them goals for the year. He never holds meetings or calls them on a regular basis.

7) Warren Buffet has given his CEO’s only two rules.

Rule number 1: Do not lose any of your share holder’s money.

Rule number 2: Do not forget rule number 1.

8) He does not socialize with the high society crowd. His past time after he gets home is to make himself some pop corn and watch television.

9) Bill Gates, the world’s richest man met him for the first time only 5 years ago. Bill Gates did not think he had anything in common with Warren Buffet. So he had scheduled his meeting only for half hour. But when Gates met him, the meeting lasted for ten hours and Bill Gates became a devotee of Warren Buffet.

10) Warren Buffet does not carry a cell phone, nor has a computer on his desk.

11) His advice to young people: Stay away from credit cards and invest in yourself.

12) He has donated $31 billion (85% of his fortune) to charity.

How to remove a write protection from your USB memory Card

1

WARNING:This will erase all the data:

Hi, I gonna provide you with special trick to format your USB memory stick. If there is no Write protection ON or OFF button on stick then follow the following steps
1. Shutdown your computer or laptop
2. Insert USB Memory Stick into your laptop or Computer
3. Turn on laptop and then immediately start pressing (F8) key then Advanced Boot Options screen will come up
4. Select Safe Mode with Command Prompt
5. After loading files if your USB Memory Stick drive letter is (G) for example then write as
6. C:\windows\system32>G: and press enter
7. G:\>format G: and press enter
8. If ask you (Y/N) then press (Y) and press enter
9. Now a full format will start which remove write protection from USB Memory Stick.