Pages

Saturday, February 19, 2011

DUMMIES GUIDE TO IPV6 - ANALYSIS OF THE NEXT GENERATION WEB ADDRESSSING



Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. Packet switching involves the sending and receiving of data in packets between two nodes in a network. The working standard for the IPv6 protocol was published by the Internet Engineering Task Force (IETF) in 1998. The IETF specification for IPv6 is RFC 2460. IPv6 was intended to replace the widely used Internet Protocol Version 4 (IPv4) that is considered the backbone of the modern Internet. IPv6 is often referred to as the "next generation Internet" because of it's expanded capabilities and it's growth through recent large scale deployments. In 2004, Japan and Korea were acknowledged as having the first public deployments of IPv6.


Even if you’ve never studied IPv6, you may know about its most famous feature: big addresses. IPv4 uses 32-bit addresses, and with the growth of the Internet, these have become a scarce and valuable commodity. Organizations have gone to great lengths to deal with the shortage and high cost of IPv4 addresses. The most visible change in IPv6 is that addresses balloon from 32-bits to 128-bits


With such a huge address space, ISPs will have sufficient IP addresses to allocate enough addresses to every customer so that every IP device has a truly unique address---whether it’s behind a firewall or not. NAT (network address translation) has become a very common technique to deal with the shortage of IP addresses. Unfortunately, NAT doesn’t work very well for many Internet applications, ranging from old dependables, such as NFS and DNS, to newer applications such as group conferencing. NAT has also been an impediment for business-to-business direct network connections, requiring baroque and elaborate address translators to make everything work reliably, scaling poorly, and offering a highly vulnerable single point of failure. One of the goals of IPv6’s address space expansion is to make NAT unnecessary, improving total connectivity, reliability, and flexibility. IPv6 will re-establish transparency and end-to-end traffic across the Internet.


A look into the addressing format




The most important feature of IPv6 is a much larger address space than in IPv4. The length of an IPv6 address is 128 bits, compared to 32 bits in IPv4. The address space therefore supports 2128 or approximately 3.4×1038  addresses. By comparison, this amounts to approximately 5×1028


addresses for each of the 6.8 billion people alive in 2010. While these numbers are very large, it was not the intent of the designers of the IPv6 address space to assure geographical saturation with usable addresses. Rather, the longer addresses simplify allocation of addresses, enable efficient route aggregation, and implementation of special addressing features. In IPv4, complex Classless Inter-Domain Routing (CIDR) methods were developed to make the best use of the small address space. The standard size of a subnet in IPv6 is 264 addresses, the square of the size of the entire IPv4 address space. Thus, actual address space utilization rates will be small in IPv6, but network management and routing efficiency is improved by the large subnet space and hierarchical route aggregation


Renumbering an existing network for a new connectivity provider with different routing prefixes is a major effort with IPv4. With IPv6, however, changing the prefix announced by a few routers can in principle renumber an entire network since the host identifiers (the least-significant 64 bits of an address) can be independently self-configured by a host.




IPv6 addresses have two logical parts: a 64-bit network prefix, and a 64-bit host address part. (The host address is often automatically generated from the interface MAC address.) An IPv6 address is represented by 8 groups of 16-bit hexadecimal values separated by colons (:) shown as follows:

A typical example of an IPv6 address is

2001:0db8:85a3:0000:0000:8a2e:0370:7334.

The hexadecimal digits are case-insensitive.

The 128-bit IPv6 address can be abbreviated with the following rules:

Rule one: Leading zeroes within a 16-bit value may be omitted. For example, the address fe80:0000:0000:0000:0202:b3ff:fe1e:8329 may be written as fe80:0:0:0:202:b3ff:fe1e:8329

Rule two: A single occurrence of consecutive groups of zeroes within an address may be replaced by a double colon. For example, fe80:0:0:0:202:b3ff:fe1e:8329 becomes fe80::202:b3ff:fe1e:8329



Packet Format






The IPv6 packet is composed of two parts: the packet header and the payload. The header consists of a fixed portion with minimal functionality required for all packets and may contain optional extension to implement special features.

The fixed header occupies the first 40 octets (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic classification options, a hop counter, and a pointer for extension headers if any. The Next Header field, present in each extension as well, points to the next element in the chain of extensions. The last field points to the upper-layer protocol that is carried in the packet's payload.

Extension headers carry options that are used for special treatment of a packet in the network, e.g., for routing, fragmentation, and for security using the IPsec framework.

The payload can have a size of up to 64KiB without special options, or larger with a jumbo payload option in a Hop-By-Hop Options extension header



TECHNO TITANS

IOCTL Fuzzer v1.2 – Scan for venerabilities in Windows




IOCTL Fuzzer is a tool designed to automate the task of searching vulnerabilities in Windows kernel drivers by performing fuzz tests on them.

The fuzzer’s own driver hooks NtDeviceIoControlFile in order to take control of all IOCTL requests throughout the system.

While processing IOCTLs, the fuzzer will spoof those IOCTLs conforming to conditions specified in the configuration file. A spoofed IOCTL is identical to the original in all respects except the input data, which is changed to randomly generated fuzz.

IOCTL Fuzzer works on Windows XP, 2003 Server, Vista, Windows 7 and 2008 Server.



DOWNLOAD

Thursday, February 17, 2011

Apple is the most valuable Tech Firm. What about TCS and other Indian Tech companies.


yes, apple is the most valuable tech company in the world by $100 billion dollars. to put that in some perspective: the market cap of HP is $105 billion dollars. Apple is now worth an hp more than every other tech company.

In fact, not only is it clear now that Microsoft will not be re-taking the crown as the most-valuable tech company any time soon, but they’re flirting with being knocked down to the number three — or even number four spot. In the past year, while Microsoft’s stock is down slightly, Google’s is up nearly $100-a-share. This has allowed the search giant to surpass the $200 billion market cap themselves. And they’re now just $28 billion away from Microsoft.


To put it another way, Google is much closer to Microsoft in terms of market cap than Apple was when I wrote that post last year. Another killer quarter and Google may be able to take them down as well.






Meanwhile, IBM is a little bit closer at $202 billion. Their stock is up nearly 40 points in the past year. They have a shot of passing Microsoft too.


Indian tech Companies and their Market Cap
Indian market also saw some turn overs last year just like the Apple-Microsoft turnover. TCS overtook Infosys to become the biggest Tech company in India and now TCS is the second biggest market cap company in india after Reliance.



TCS, which was the top gainer among the country's 10 most valuable companies in the last week, saw its valuation surging by Rs 18,378.11 crore to Rs 2,37,330 crore in the week which is around 45 billion $ . Infosys saw some loss in shares and is currently valued around 40 billion $ . The third major Wipro is also amongst the oldest of Indian tech companies and is currently valued around 32 billion $ .


A comparison between the world's best and India's best

At the same time, Indian companies stand nowhere, even collectively, and there can be no comparison at all on individual levels. The top 10 IT companies comprising the BSE IT index currently command a combined market cap of little over 150 billion $. This is less than half of the marketcap of either Apple or Microsoft. Indian companies are still lagging behind with a huge margin . What i personally feel is that Indian companies focus more on providing services rather than development . We always say that we have progressed alot in the IT industry and today world knows India by the IT power house but we are still a way behind them in terms of market cap , global reach and technology.
The path is still tough and the Indian Tech companies still have to travel a long way. 


Tuesday, February 15, 2011

SEO software "web CEO" free download !!!!!!


Web CEO (often misspelt as WebCEO) is a suite of search engine marketing tools in one software program, including a keyword generator, web page optimization analyzer, auto and manual submitter, ranking monitor, top-ranked web page analyzer, HTML editor, FTP client, and traffic counter and analyzer. Web CEO is the most complete SEO software package, plus it’s offers more for free than any other software package or suite for SEO.
What you can do with WEB CEO??
Optimize Your Site
Find best keywords and Optimize your site for high rankings
Promote Your Site
- Submit your URLs to search engines.
- Know who links to your site, and to your competition.
- Find link partners and build link popularity.
- Manage paid search campaigns.
Analyze Your Site
- Check your rankings with search engines. Web CEO software allows for tracking your SEO success with an advanced ranking checker and keywords trends.
- Track and analyze your visitors, ad campaigns, transactions, revenues, etc.
Maintain Your Site
- Pinpoint broken links and other errors on your site
- Edit your Web pages in the WYSIWYG mode
- Upload HTML and other files to your server
- Monitor your website to know if it is up or down

WinRAR 4.00 Beta 4 (x86/x64) Incl Key


Using WinRAR puts you ahead of the crowd when it comes to compression by consistently making smaller archives than the competition, saving disk space and transmission costs.
- WinRAR provides complete support for RAR and ZIP archives and is able to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, 7Z, Z archives.
- WinRAR offers a graphic interactive interface utilizing mouse and menus as well as the command line interface.
- WinRAR is easier to use than many other archivers with the inclusion of a special “Wizard” mode which allows instant access to the basic archiving functions through a simple question and answer procedure. This avoids confusion in the early stages of use.
- WinRAR offers you the benefit of industry strength archive encryption using AES (Advanced Encryption Standard) with a key of 128 bits.
- WinRAR supports files and archives up to 8,589 billion gigabytes in size. The number of archived files is, for all practical purposes, unlimited.
- WinRAR offers the ability to create selfextracting and multivolume archives.
Recovery record and recovery volumes allow to reconstruct even physically damaged archives.
- WinRAR features are constantly being developed to keep WinRAR ahead of the pack




Make your own Thumbnail view size in windows




When we browse images in the explorer, the thumbnail size of the picture's is too small or too big and the quality of the thumbnail is not good, it is possible to make our own thumbnail size and make the thumbnails display in high quaility.
To do this it is required to edit the registry, so it is better to make the registry backup.

1. open the registry editor - start->run-> regedit

2. navigate to HKEY_CURRENT_USER\ Software\ Microsoft \ Windows\ CurrentVersion\Explorer



3. create two new DWord Value by right clicking and select "new->DWORD value" and name one as "ThumbnailSize" and other as "ThumbnailQuality"


4. select Decimal Value and set values for bothThumbnailSize can have values 32 - 256


and Thumbnail Quaility can have values 50 - 100.

5. open any folder and change the view to Thumbnail and see the difference

Have fun..........

Build your own Virus by VMaker download now!!!




Note - the software is for educational purpose and it can be detected by your anti virus so you need to stop or disable your antivirus before you work on this software.


Create your own prank files/viruses with ease. Open Vmaker10 select
desired features, choose to add to start up and USB Spread, name press ‘Build’ OR dont put a name and the
software will name it for you ‘Built.exe’

DOWNLOAD

Sunday, February 13, 2011

USB Block 1.3.0 Full Download


USB Block prevents leakage and copy of your data to USB Drives, External Drives, CDs/DVDs or other such portable devices. Once installed, USB Block lets you block all such drives and devices that do not belong to you. If USB Block is installed on your computer, you can relax and share your PC with anyone without fear of data theft. You can also install the program on several computers in your office or home and feel safe. USB Block also lets you create a list of devices and drives you authorize with a password so that only your USB drives or CDs can be accessed on your computer.


DOWNLOAD HERE 
Rar password=rapidlinksbyannu.blogspot.com 

Otaku Software DeskSpace 1.5.7.2 Retail




Work and play on multiple desktops.
* Display multiple desktops in stunning 3D.
* Quickly switch between desktops using the mouse and keyboard.
* Drag windows between desktops by moving them to the sides of the screen.
* Display desktops in 3D on multiple monitors.
* Configure the hot keys and mouse buttons used to switch between desktops, and how DeskSpace displays and manages desktop.
* Use DeskSpace in multiple languages



DOWNLOAD HERE 

share