Understanding IPv6 (Internet Protocol version 6) for home and enterprise networking

Internet Protocol version 6 (IPv6) is a network layer protocol for packet-switched internetworks. It is a next version of current IPv4. IPv6 supports 2128 addresses, approximately.

ArsTechnica has published an excellent guide:

The engineers who design the machinery deep inside the bowels of the Internet have been working on it for more than a decade, but recently, companies like Microsoft and Apple have been more aggressive about enabling it in their new products: IPv6, the protocol that will power the next generation Internet.

TCP/IP has served us well since it was born in 1981, but for some time now it has been clear that the IP part has a limitation that makes continued growth of the Internet for decades to come problematic. In order to accommodate a large number of hosts but not waste too much space in the IP packet on overhead, the TCP/IP designers settled on an address size of 32 bits. With 32 bits, it’s possible to express 4,294,967,296 different values. Over half a billion of those are unusable as addresses for various reasons, giving us a total of 3.7 billion possible addresses for hosts on the Internet. As of January 1, 2007, 2.4 billion of those were in (some kind of) use. 1.3 billion were still available and about 170 million new addresses are given out each year. So at this rate, 7.5 years from now, we’ll be clean out of IP addresses; faster if the number of addresses used per year goes up.

=> Everything you need to know about IPv6

Howto publish and convert documents online with Scribd

This is cool new service that allows anyone to upload and publish document online just like Youtube videos.

You can covert document between many different formats, including Word, PDF, plain text, HTML, JPEG, PowerPoint, Excel, Postscript, LIT, and even audio format. You don’t have to sign up to download or upload files.

Howto publish and convert documents online with Scribd
(click to enlarge)

Scribd lets you publish and discover documents online. It is like a big online library where anyone can upload. We make use of a custom Flash document viewer that lets you display documents right in your Web browser. There are all sorts of other features that make it easy and fun to publish, convert, embed, analyze, and read documents.

Part of the idea behind Scribd is that everyone has a lot of documents sitting around on their computers that only they can read. With Scribd we hope to unlock this information by putting it on the web.

Visit Scribd website

MP3 – MPEG-1 Audio Layer 3 history : How MP3 Was Born

Most of us use mp3 file almost everyday. MPEG-1 Audio Layer 3, more commonly referred to as MP3 file. It is nothing but audio files to play on computer and other devices. It is compression format so that large audio file such as .wav stored in small size w/o losing quality.

So how MP3 was born:

Karlheinz Brandenburg often is cited as the inventor of the music format. But he credits many for a discovery that has upended the music business. Karlheinz Brandenburg doesn’t like being labeled the “inventor” of MP3. He points out that the most popular format for digital music on the Internet is the work of at least a half-dozen core developers and many others who made important contributions. Even folk-rock singer Suzanne Vega inadvertently played a walk-on role in the creation of MP3. “I know on whose shoulders I stand and who else contributed a lot,” says Brandenburg, now director of the Fraunhofer Institute for Digital Media Technology in Ilmenau, Germany.

=> Read more : How MP3 Was Born

PS: Wikipedia has more information about MP3 history

Server Computer Configuration for an Internet Service Provider (ISP)

Here is a quick question from one of our reader:

What sort of computer should you buy for an ISP? We need a computer for mailing, hosting customer sites and running games like Quake. We are small startup ISP.

For mailing and webhosting need you need to purchase a dedicated server. You can build one for yourself (a whitebox) or order from Dell and other vendors. A minimum suggested configuration:

Web server
=> Dual Intel XEON or AMD Dual core processor

=> RAID 5 1/2 TB disk space

=> 4 GB Ecc RAM

=> Linux or FreeBSD UNIX operating system
This web server can handle shared hosting load. You can use same configuration computer for mailing with anti spam and anti virus software.

For gaming you can get a Dual core Intel / AMD CPU with lods of RAM and fast hard disks.

Remember an ISP server mean lots of services such as a Firewall, Web, FTP, RADIUS server etc. You should also consider operating system and your own level of handling the same. You can also purchase 3rd party game and management control panel. Basically you need to do good research before making a final decision.

What Comes After Web 2.0? Web 3.0?

Today’s primitive prototypes show that a more intelligent Internet is still a long way off.

Many researchers and entrepreneurs are working on Internet-based knowledge-organizing technologies that stretch traditional definitions of the Web. Lately, some have been calling the technologies “Web 3.0.” But really, they’re closer to “Web 2.1.”

Typically, the name Web 2.0 is used by computer programmers to refer to a combination of a) improved communication between people via social-networking technologies, b) improved communication between separate software applications–read “mashups”–via open Web standards for describing and accessing data, and c) improved Web interfaces that mimic the real-time responsiveness of desktop applications within a browser window.

To see how these ideas may evolve, and what may emerge after Web 2.0, one need only look to groups such as MIT’s Computer Science and Artificial Intelligence Laboratory, the World Wide Web Consortium, Amazon.com, and Google. All of these organizations are working for a smarter Web, and some of their prototype implementations are available on the Web for anyone to try.

What Comes After Web 2.0?

Top virus threats in 2007

McAfee Inc, a leading dedicated security technology company, on Wednesday announced its top ten predictions for security threats in 2007 from McAfee Avert Labs. According to McAfee Avert Labs data, with more than 217,000 various types of known threats and thousands more not yet identified, it is clear that malware is increasingly being released by professional and organised criminals.

Malware or malicious software is a software designed to infiltrate and damage a computer system without the owner’s consent. The expression is a general term to mean various forms hostile, intrusive, or annoying software or programme code.

Computers are an essential part of everyday life. As a result there is a huge potential for monetary gains by virus writers. With sophisticated techniques on the rise, it is becoming increasingly hard for the general user to identify or avoid malware infections.

In no particular order, McAfee Avert Labs’ top ten security threats for 2007 are:

1. Number of password-stealing Web sites will increase using fake sign-in pages for popular online services

2. Volume of spam, particularly bandwidth-eating image spam, will rise

3. Popularity of video sharing on the Web makes it inevitable that hackers will target MPEG files

4. Mobile phone attacks will become more prevalent as mobile devices become smarter

5. Adware will go mainstream

6. Identity theft and data loss will continue to be a public issue

7. The use of bots will increase as a tool favoured by hackers

8. Parasitic malware, or viruses that modify existing files on a disk, will make a comeback

9. The number of rootkits on 32-bit platforms will increase

10. Vulnerabilities will continue to cause concern fueled by the underground market for vulnerabilities

Top 10 computer virus threats in 2007

Weebly – Website Creation Made Easy

Weebly is yet another AJAX driven web site. It is the easiest way to create a great looking website and share it with the world for free. From personal to professional sites, Weebly will enable you to spend your time on the most valuable part of your site, its content

Features

=> Drag and Drop Interface
=> Variety of Themes
=> Personalized Subdomains
=> Export to Zip File
=> Numerous Content Elements
=> Photos, Videos, Maps, Ads, etc

This service is like Google Page Creator where user can select template and add the web pages using on line editor. So what is the difference between two?
Weebly allows to export your site to a zip file. This can be useful if you want to host your site on a different server, or to back up your site for recovery purposes.

System requirement

  • Weebly is compatible with Internet Explorer 5.5+/7 and Firefox 1.5+/2.0 on Windows, Firefox 1.5+/2.0 on Linux and Firefox 1.5+/2.0 on Mac OS X.
  • And yes you need good broadband connection.

Visit Weebly site to create your account and website (via Yahoo! Myweb)

Firefox portable download new updated version

A portable app is a computer program that you can carry around with you on a portable device and use on any Windows computer. When your USB flash drive, portable hard drive, iPod or other portable device is plugged in, you have access to your software and personal data just as you would on your own PC. And when you unplug the device, none of your personal data is left behind.

Firefox portable logo

Firefox Portable is a repackaged version of Firefox designed to run from a USB flash drive, iPod, external hard drive or other portable media. It arose out of a mozillaZine thread in June of 2004. John T. Haller released the first packaged version and has led its further development. It includes a specialized launcher that adjusts extensions and themes to work as it is moved from different computers. There is also a portable version of Firefox available for Macintosh computers called Portable Firefox OS X.

Download updated portable app version here.

This is necessary download for USB device.

Howto: Keep wordpress blog private from search engines

Wordpress logo

Recently I did setup a blog site for corporate client. This blog is only for company employees, its dealers/retailers business partners and other people related to core business. This blog is immediately pickup by both Google and Yahoo search engines.

They send me new request to remove blog from Google and Yahoo!. LOL, which is beyond my control. Anyway, I found a Google webpage that remove indexed data.

Next, I put entire blog in password-protected directory and I am working on wordpress plugin that will allow only authenticated user to see blog entries.

To be frank, blogs are available on the Internet exactly like other webpages. The only way to keep any blog (including wordpress, blogger.com and other all blog software) hosted on your own server is to put in password protected directory from both Search engine and guest users.

So how do I put wordpress blog in a password protected directory?

I have already wrote about how to password protect directory using Apache and Lighttpd webserver. Please follow instructions as given on these two urls.