What is a Private IP Address?

What is a Private IP Address?

When you send a letter from your house to a friend, you have to know the address to send it to so that the postman knows which street and which house to take it to. Computer networks such as the Internet are no different, except instead of sending your Web traffic to an address like 1145 Main Street, your computer's "location" (the destination for your emails and Google inquiries) is known by its IP (Internet protocol) address.
In theory, your individual computer has to have its own unique IP address so that it will only receive the information that is meant for you. You don't want your emails and the responses to your Google searches going anywhere else. (If you go to the WhatIsMyIPAddress.com home page, you can see your public IP address.)
However, there is a major exception to this: That would be those network computers that are linked to a router and share the same IP address. Included in that number are home/office networks. All routers have an IP address built in.
In this instance, the router—once it has established its Internet connection through an Internet Service Provider—sends data to each individual device on that network based on something called a Network Address Translator (NAT).
The organization that doles out IP addresses to the world reserves a range of IP addresses for private networks. Private networks can use IP addresses anywhere in the following ranges:
  • 192.168.0.0 - 192.168.255.255 (65,536 IP addresses)
  • 172.16.0.0 - 172.31.255.255 (1,048,576 IP addresses)
  • 10.0.0.0 - 10.255.255.255 (16,777,216 IP addresses)
The assumption is that these private address ranges are not directly connected to the Internet, so the addresses don't have to be unique. In today's world, these private address ranges are often used for the protected network behind network translation devices.
Why is that? Because in a private network, the router connects to the Internet. From there, the router connects the other devices (usually desktops, laptops and tablets).
Because the private address ranges in a network don't have to be synchronized with the rest of the world, the complete address range is available from any network. A network administrator using these private addresses has more room for subnetting, and many more assignable addresses.
These blocks of addresses can be used by anyone, anywhere. Even if your neighbor is using the exact same addresses, it won't cause a problem. This is possible because these addresses are known as non-routable addresses. The network devices on the Internet are programmed to recognize these addresses. These devices (known as routers) will recognize that these are private addresses belonging to your network and will never forward your traffic onto the Internet.
You do need to obtain one real address from the general pool so that your home router can perform what is known as Network Address Translation (NAT). NAT is a process in which your router changes your private IP Address into a public one so that it can send your traffic over the Internet, keeping track of the changes in the process. When the information comes back to your router, it reverses the change—from a real IP address into a private one—and forwards the traffic back to your computer.
A typical home network router keeps two IP addresses: one for local devices to connect to across the local area network (LAN), and one for the external or wide area network (WAN) Internet connection.
The internal LAN-IP address is normally set to a default, private number. Linksys brand routers, for example, use 192.168.1.1 for their internal IP address. No matter the brand of router, its default internal IP address is listed in the manufacturer's documentation. Administrators have the option to change this IP address during router setup or at any time later. Unless someone manually changes it, however, this private LAN-IP address remains fixed.
The external WAN-IP address of the router is set when the router connects to the Internet service provider. This address can also be viewed on the router's administrative console. Alternatively, the WAN-IP address can be found by visiting a Web-based IP address lookup service—such as WhatIsMyIPAddress.com—from any computer on the home LAN.

I'm being attacked by one of these IP addresses!

If you are seeing unexplained Internet traffic to your computer from these numbers, it is important to remember the following things:
  • The traffic does not come from IANA. As the authority for IP addresses, they do not use or operate them, and they are not the source of the traffic.
  • As use of these numbers is untracked and unrestricted, we can not tell you who is using these numbers.
  • It is perfectly normal to see traffic from these numbers if you have a small home or office network. By default, most routers and access points use these numbers to assign to your local computers. It is most likely these numbers represent computers on your own internal network.
  • If you see these numbers in the headers of an unsolicited email, they usually indicate transit between servers within a corporate network or ISP. They are not useful in identifying the origin of an email. In such cases you can usually find the true origin by looking for the earliest "Received" mail header.

What is a Proxy Server?

What is a Proxy Server?

proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

Web proxies

A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.
Web proxies can also filter the content of Web pages served. Some censorware applications - which attempt to block offensive Web content - are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.
You may see references to four different types of proxy servers:
  • Transparent Proxy

    This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)
  • Anonymous Proxy

    This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.
  • Distorting Proxy

    This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.
  • High Anonymity Proxy

    This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.

why mobile devices need an open-source browser.

why mobile devices need an open-source browser

There’s no doubt that it’s getting easier to access the Web on a mobile device. Thanks to the iPhone and Apple’s Web browser, Safari, millions of people feel as though they finally have the Internet in their pocket. But there’s still a lot of work that needs to be done in order to allow for the kind of innovation on the mobile Web that is possible on the traditional Web, says Mitchell Baker, chairman of Mozilla, maker of the Firefox browser.
Baker has been instrumental in building the open-source software community that gave the world Firefox, a popular alternative to desktop browsers such as Internet Explorer and Safari. But now Mozilla has turned its attention to the mobile Web. Last October, the foundation announced an initiative to build the first, fully open Web browser for mobile devices. As an open-source software project, the browser will be built using code from software programmers from all over the world. The hope is to spur innovation in an industry that’s famous for locking out software developers.

Why Saudi Arabia`s debt default looms

Oil price crash: Saudis told to embrace austerity as debt defaults loom


Kingdom faces a future of higher taxes and low fuel subsidies amid fears the world's weakest oil producers will soon begin to buckle.


Saudi Arabia faces years of tough austerity as the worst oil price crash in the modern history forces the kingdom to make radical cuts to government largess e, the International Monetary Fund has warned.
The world's largest producer of crude oil will need to "transform" its economy away from oil revenues, which make up more than 80pc of the government's wealth, according to Masood Ahmed, head of the Middle East department at the IMF.

What is IPv6? (Internet Protocol Version 6)

What is IPv6?

Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. Packet switching involves the sending and receiving of data in packets between two nodes in a network. The working standard for the IPv6 protocol was published by the Internet Engineering Task Force (IETF) in 1998. The IETF specification for IPv6 is RFC 2460. IPv6 was intended to replace the widely used Internet Protocol Version 4 (IPv4) that is considered the backbone of the modern Internet. IPv6 is often referred to as the "next generation Internet" because of it's expanded capabilities and it's growth through recent large scale deployments. In 2004, Japan and Korea were acknowledged as having the first public deployments of IPv6.
The explosive growth in mobile devices including mobile phones, notebook computers, and wireless handheld devices has created a need for additional blocks of IP addresses. IPv4 currently supports a maximum of approximately 4.3 billion unique IP addresses. IPv6 supports a theoretical maximum of 2128 addresses (340,282,366,920,938,463,463,374,607,431,768,211,456 to be exact!). Recent advancements in network technology including Network Address Translation (NAT) have temporarily lessened the urgency for new IP addresses, however, recent estimates indicate that IPv4 addresses could be exhausted as soon as 2012.
IPv6 and IPv4 share a similar architecture. The majority of transport layer protocols that function with IPv4 will also function with the IPv6 protocol. Most application layer protocols are expected to be interoperable with IPv6 as well, with the notable exception of File Transfer Protocol (FTP). FTP uses embedded network layer addresses to facilitate data transmission. An IPv6 address consists of eight groups of four hexadecimal digits. If a group consists of four zeros, the notation can be shortened using a colon to replace the zeros.
A main advantage of IPv6 is increased address space. The 128-bit length of IPv6 addresses is a significant gain over the 32-bit length of IPv4 addresses, allowing for an almost limitless number of unique IP addresses. The size of the IPv6 address space makes it less vulnerable to malicious activities such as IP scanning. IPv6 packets can support a larger payload than IPv4 packets resulting in increased throughput and transport efficiency.
A key enhancement over IPv4 is native support for mobile devices. IPv6 supports the Mobile IPv6 (MIPv6) protocol which enables mobile devices to switch between networks and receive a roaming notification regardless of physical location. MIPv6 is a hallmark of the protocol and was specified as a firm requirement during the design of IPv6. The IETF has separate specifications for MIPv6 that detail data structure, messaging, and security requirements.
Auto-configuration is another IPv6 enhancement that is considered a great benefit to network administrators. IPv6 devices can independently auto-configure themselves when connected with other IPv6 devices. Configuration tasks that can be carried out automatically include IP address assignment and device numbering. An IPv6 router has the ability to determine its own IPv6 address using data link layer addressing parameters. The IETF has issued RFC 2462 to set guidelines for IPv6 auto-configuration.
The IPv6 protocol improves upon IPv4 with increased authentication and privacy measures. IPSec security is embedded into the IPv6 specification to manage encryption and authentication between hosts. This built in security framework enables secure data traffic between hosts that is independent of any applications on either host. In this way, IPv6 provides an efficient end to end security framework for data transfer at the host or the network level.
The deployment of IPv6 networks is growing worldwide. Full replacement of IPv4 is expected to take some time, as it remains the most widely used Internet Protocol. The United States, China, and India are leading recent deployments of the IPv6 protocol and have large investments in IPv6 network infrastructure. The United States government has mandated that federal agencies must complete the transition to an IPv6 infrastructure no later than 2008. Software companies are also releasing operating systems that support the IPv6 standard. In 1997, IBM became the first commercial vendor to support IPv6 through its AIX 4.3 operating system. The latest version of Microsoft's Windows operating system, Windows Vista, has full IPv6 support enabled by default.

How to Hide Your IP Address

How to Hide Your IP Address

Borrow a different IP address to go anywhere online and stay hidden.

There are a few ways to hide your IP address...that unique number assigned to the network connection on the computer.

Top 4 reasons why people want to hide their IP address:

safe
  1. Hide their geographical location
  2. Prevent Web tracking
  3. Avoid leaving a digital footprint
  4. Bypass any bans or blacklisting of their IP address

The safe and secure way

Use a Trusted Proxy or Virtual Private Network. Sign up with these services and when you go online, you'll be showing the world a different IP address...one that's on loan from the service you're using.
Here are some VPN providers that you might consider:
VPNs can be free or you can pay for the service. They help you get on the Internet and assign you a different IP address, but there's a wide range of reliability in providers.
There are many more advantages to using a personal VPN service over a proxy (usability, security, access to blocked sites).

What are The Best Search Engines of 2016!

The Best Search Engines of 2016!


Most people don't want three dozen search engines, especially people who are not trained internet users. Most people want a single search engine that delivers three key features:
  1. Relevant results  (results you are actually interested in)
  2. Uncluttered, easy to read interface
  3. Helpful options to broaden or tighten a search
  4. With this criteria, several Reader Favorite Search Engines come to mind. These 11 search sites should meet 99% of the searching needs of a regular everyday user.

  1. 1.     Dogpile Search
  2.       Years ago, Dogpile preceded Google as the fast and efficient choice for web searching. Things changed in the late 1990's, Dogpile faded into obscurity, and Google became king. But today, Dogpile is coming back, with a growing index and a clean and quick presentation that is testimony to its halcyon days.  If you want to try a search tool with pleasant presentation and helpful crosslink results, definitely try Dogpile!

  1. 2.     Yippy Search
  2.       Yippy is a Deep Web engine that searches other search engines for you. Unlike the regular Web, which is indexed by robot spider programs, Deep Web pages are usually harder to locate by conventional search. That's where Yippy becomes very useful. If you are searching for obscure hobby interest blogs, obscure government information, tough-to-find obscure news, academic research and otherwise-obscure content, then Yippy is your tool.

  1. 3.     Bing Search
  2.       Bing is Microsoft's attempt at unseating Google, and arguably the second-most-popular search engine today. Bing used to be MSN search until it was updated in summer of 2009. Touted as a 'decision engine', Bing tries to support your researching by offering suggestions in the leftmost column, while also giving you various search options across the top of the screen. Things like 'wiki' suggestions, 'visual search', and 'related searches' might be very useful to you.

  1. 4.     Duck Duck Go Search
  2.       At first, DuckDuckGo.com looks like Google. But there are many subtleties that make this spartan search engine different. DuckDuckGo has some slick features, like 'zero-click' information (all your answers are found on the first results page). DuckDuckgo offers disambiguation prompts (helps to clarify what question you are really asking). And the ad spam is much less than Google. Give DuckDuckGo.com a try.

  1. 5.     Google Scholar Search
  2.       Google Scholar is a special version of Google.  This search engine will help you win debates.
    You see, Google Scholar focuses on scientific and hard-research academic material that has been subjected to scrutiny by scientists and scholars. Example content includes:  graduate theses, legal and court opinions, academic publications, medical research reports, physics research papers, and economics and world politics explanations.
  3. 6.     Ask.com Search

  4.       The Ask search engine is a longtime name on the World Wide Web. The super-clean interface rivals the other major search engines, and the search options are as good as Google or Bing or DuckDuckGo. The results groupings are what really make Ask.com stand out. The presentation is arguably cleaner and easier to read than Google or Yahoo! or Bing, and the results groups seem to be more relevant. Decide for yourself if you agree.

  5. 7.     Mahalo 'Learn Anything' Search

  6.       Mahalo is the one 'human-powered' search site in this list, employing a committee of editors to manually sift and vet thousands of pieces of content.  This means that you'll get fewer Mahalo hit results than you will get at Bing or Google. But it also means that most Mahalo results have a higher quality of content and relevance (as best as human editors can judge).
    Mahalo also offers regular web searching in addition to asking questions.
  7. 8.     Webopedia Search

  8.       Webopedia is one of the most useful websites on the World Wide Web. Webopedia is an encyclopedic resource dedicated to searching techno terminology and computer definitions. Teach yourself what 'domain name system' is, or teach yourself what 'DDRAM' means on your computer. Webopedia is absolutely a perfect resource for non-technical people to make more sense of the computers around them. 

  9. 9.     Yahoo! Search (and More)

  10.        Yahoo! is several things: it is a search engine, a news aggregator, a shopping center, an emailbox, a travel directory, a horoscope and games center, and more. This 'web portal' breadth of choice makes this a very helpful site for Internet beginners. Searching the Web should also be about discovery and exploration, and Yahoo! delivers that in wholesale quantities. 

  11. 10.    The Internet Archive Search

  12.         The Internet Archive is a favorite destination for longtime Web lovers. The Archive has been taking snapshots of the entire World Wide Web for years now, allowing you and me to travel back in time to see what a web page looked like in 1999, or what the news was like around Hurricane Katrina in 2005. You won't visit the Archive daily, like you would Google or Yahoo or Bing, but when you do have need to travel back in time, use this search site.

  13. 11.    Google Search

  14.           Google is the reigning king of 'spartan searching', and is the single most used search engine in the world. While it doesn't offer all the shopping center features of Yahoo! or the human curation of Mahalo, Google is fast, relevant, and the largest single catalogue of web pages available today.
    Make sure you try the Google 'images', 'maps' and 'news' features... they are outstanding services for locating photos, geographic directions, and news headlines.

How to Make Foolproof Tarte Tatin

Foolproof Tarte Tatin


INGREDIENTS

  • 6 to 8 large, firm-fleshed apples, preferably Braeburn, or use a mix of Honeycrisp and Granny Smith
  • 6 tablespoons/80 grams salted butter, very soft
  •  cup/135 grams granulated or light brown sugar
  • 1 sheet all-butter puff pastry, about 8 ounces (store-bought is fine)





PREPARATION

  1. At least one day before you plan to cook the tart, prepare the apples: Slice off the bottom of each apple so it has a flat base. Peel and quarter the apples. Use a small sharp knife to trim the hard cores and seeds from the center of each quarter; don’t worry about being too neat. Transfer to a bowl and refrigerate, lightly covered, for at least one day or up to three days. (This key step reduces the amount of liquid in the tart. Don’t worry if the apples turn brown; they will be browned during the cooking anyway.)
  2. When ready to cook, heat oven to 375 degrees (or 350 if using convection). Thickly coat the bottom of a 10-inch heavy ovenproof skillet, preferably nonstick metal, with butter. Sprinkle sugar evenly on top.
  3. Cut one piece of apple into a thick round disk and place in the center of the skillet to serve as the “button.” Arrange the remaining apple pieces, each one standing on its flat end, in concentric circles around the button. Keep the pieces close together so that they support one another, standing upright. They will look like the petals of a flower.
  4. On a floured surface, roll out the puff pastry about 1/8-inch thick. Place an upside-down bowl or pan on the pastry and use the tip of a sharp knife to cut out a circle about the same size as the top of your skillet. Lift out the circle and drape gently over the apples. Use your hands to tuck the pastry around the apple pieces, hugging them together firmly.
  5. Place the skillet on the stovetop over medium heat until golden-brown juice begins to bubble around the edges, 3 minutes (if the juices keep rising, spoon out as needed to remain level with pastry). Keep cooking until the juices are turning darker brown and smell caramelized, no longer than 10 minutes more.
  6. Transfer skillet to the oven and bake 45 to 50 minutes, until puff pastry is browned and firm.
  7. Let cool 5 minutes, then carefully turn out onto a round serving plate. (Or, if not serving immediately, let cool completely in the pan; when ready to serve, rewarm for 15 minutes in a 350-degree oven before turning out.) If any apples remain stuck in the pan, gently use your fingers or a spatula to retrieve them, and rearrange on the pastry shell. Cut in wedges and serve warm with heavy cream, crème fraîche or vanilla ice cream.

How to make Spicy & Tasty Pasta With Fried Lemons and Chile Flakes

Spicy & Tasty Pasta With Fried Lemons and Chile Flakes


INGREDIENTS

  • 4 lemons
  • 1 pound linguine or spaghetti
  • 4 tablespoons extra-virgin olive oil, more for drizzling
  • 1 teaspoon kosher salt, more as needed
  •  Pinch of sugar
  • 3 tablespoons unsalted butter
  • ¾ teaspoon chile flakes, more to taste
  •  cup Parmigiano-Reggiano cheese, more to taste
  •  Black pepper, as needed
  • ½ cup celery leaves, coarsely chopped (optional)
  •  cup parsley, coarsely chopped (optional)
  •  Flaky sea salt, for garnish

PREPARATION

  1. Bring a large pot of salted water to a boil. Finely zest 2 of the lemons and set aside. Trim the tops and bottoms off the other 2 lemons and cut lengthwise into quarters; remove seeds. Thinly slice the quarters crosswise into triangles. Blanch the lemon pieces in the boiling water for 2 minutes, then transfer with a slotted spoon to a dish towel. Blot dry.
  2. In the boiling water, add pasta and cook until just barely al dente. Drain, reserving 1/2 cup of the pasta cooking water.
  3. Meanwhile, in a large skillet, heat 1 tablespoon of the oil over high heat. Add the dried lemon pieces and season with a pinch each of salt and sugar. Cook until the lemons are caramelized and browned at the edges, 3 to 5 minutes. Transfer to a plate.
  4. Melt the butter with the remaining oil in the pan over medium heat. Add the chile flakes and zest of both lemons; cook until fragrant. Whisk in the reserved pasta water.
  5. Toss in pasta, juice of 1 lemon, cheese, pepper and the remaining salt. Cook until pasta is well coated with sauce. Toss in the caramelized lemon and the celery leaves and parsley if using. Taste and add lemon juice if needed. Serve, topped with a drizzle of oil, more cheese if you like, and a sprinkle of sea salt.