Techknow_Study

Archive for the category “Computer World”

What??? Search Engine Optimization Services

Search Engine Optimization Services
Ensuring that your website is properly optimized for search engines is critical to your overall internet marketing strategy and may be restricting your websites performance not only in search rankings, but also bounce rates and conversions. Vertical Measures offers a variety of services that specifically focus on effectively incorporating search engine optimization (SEO) tactics into the makeup of your website, leading to higher search engine rankings and therefore higher traffic, lower bounce rates, and increased leads and conversions.
Keyword Research
Search Engine Optimization isn’t all about tweaking page titles and image alt tags, however, its also about finding those search terms that your potential customers are using to try and find your business. As a result, I say  don’t treat SEO as a vacuum, but a service that requires detailed keyword research and sophisticated content development plans.

Android 4.1, Jelly Bean

As we all knows know a day’s people accept the new technology and android give new feature day by day. Android 4.0 Ice Cream Sandwich has been introduced as a perfect blend of android 2 and android 3.0. Then some new features introduce in Android 4.1 Jelly Bean.
It is the smoothest and fastest version of Android yet. Jelly Bean improves on the simplicity and beauty of Android 4.0, and introduces a new Google search experience on Android.

How Linux users DIFFERENT

How Linux users DIFFERENT


Linux is one of the three major operating systems but it has a very tiny market share in personal computer, comparing to that of Microsoft Windows and Apple MacOS. If you have always been using Windows or Mac, you may be curious about these users of Linux and want to know why they love using this unpopular operating system. Well, let me introduce the main different types of Linux users to you:


Hackers and Programmers
Linux is unarguably the heaven of programmers and hackers. In every Linux distribution, there are a lot of pre-installed tools and applications for programming like text editors and IDE software’s. Besides, to use Linux, the user will have to use the terminal and command line and popular programming languages like C, Python and Perl all the time. And if one chooses to use advanced distribution like Arch Linux or Gentoo, he will have to learn everything about how the computer works, how to configure all the hardware and software settings … and by doing so, he will accumulate a lot of experience and knowledge to help him in hacking and programming.


Practical people and business owners
Since almost everything in Linux is totally free and has nearly the same features as Windows or Mac, people who are financially practical love to use Linux. These people have recognized the economical value of Linux and like the fact that they do not have to pay any cent to upgrade the system or use the applications as they would do when using Windows or Mac. And because of this reason, there is no doubt that more and more business owners are using Linux. It’s also a good way to save money to invest into something else. Besides, there are a lot of accounting and finance applications in Linux as well.


Server administrators

Although Linux has the smallest market share in personal computer, it has always been the winner when it comes to servers. Linux is well known for being secure, fast and stable and financially efficient that is why it is always the first choice for many server administrators. In the most recent market report, despite the fact that the revenue of the sever market had dropped in the first quarter in 2012, the revenue of the Linux server market has always been increasing.

5 Best Android Game Apps

Cant See Secure Sites

Cant See Secure Sites

Fix the problem with seeing them secure sites (banks or online stores) u found this very usefull to me at ur work
Any way… what u need to do is make a new notepad file and write in it the followng DLL’s.. just copy-paste these




regsvr32 SOFTPUB.DLL
regsvr32 WINTRUST.DLL
regsvr32 INITPKI.DLL
regsvr32 dssenh.dll
regsvr32 Rsaenh.dll
regsvr32 gpkcsp.dll
regsvr32 sccbase.dll
regsvr32 slbcsp.dll
regsvr32 Cryptdlg.dll

and save it as > all file types, and make it something like securefix.bat.

then just run the file and ur problem shuld be gone.

Galaxy Nexus

Galaxy Nexus Pulled From Google Play Store – Now Listed As Coming Soon (Hopefully With A Vengeance)


And just like that, the coolest phone to ever happen to the world has been taken down from Google’s Play Store, snuffed out like a candle in the night. This, just after news that Samsung was denied a temporary ban lifting of the Galaxy Nexus, the device has been officially pulled from the Play Store. Would-be buyers will now be greeted with nothing more than a “coming soon” status where they can provide their email address to be notified of when the device becomes available.
Could this have something to do with Google infilling the device with their lovely “Apple patent workaround patch?” We can only hope. For now, let’s shake our fists at Apple… and pour a 40oz of High Life for our old friend, the Galaxy Nexus. I’m crossing my fingers that, just like Superman, he comes back bigger and badder than ever before… maybe with a sick new mullet.
[Google Play Store]

What is a SYN attack?

SYN flood
Normally when a client attempts to start a TCP connection to a server, the clientand server exchange a series of messages which normally runs like this:
  1. The client requests a connection by sending a SYN (synchronize) message to the server.
  2. The server acknowledges this request by sending SYN-ACK back to the client.
  3. The client responds with an ACK, and the connection is established.
This is called the TCP threeway handshake, and is the foundation for every connection established using the TCP protocol.
A SYN flood attack works by not responding to the server with the expected ACK code. The malicious client can either simply not send the expected ACK, or by spoofing the source IP addressin the SYN, causing the server to send the SYN-ACK to a falsified IP address – which will not send an ACK because it “knows” that it never sent a SYN.
The server will wait for the acknowledgement for some time, as simple network congestion could also be the cause of the missing ACK, but in an attack increasingly large numbers of half-open connections will bind resources on the server until no new connections can be made, resulting in a denial of service to legitimate traffic. Some systems may also malfunction badly or even crash if other operating system functions are starved of resources in this way.
 SYN attack


A normal connection between a user (Alice) and a server. The three-way handshake is correctly performed.

SYN Flood. The attacker (Mallory) sends several packets but does not send the “ACK” back to the server. The connections are hence half-opened and consuming server resources. Alice, a legitimate user, tries to connect but the server refuses to open a connection resulting in a denial of service.
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target’s system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.

Penguin Update

IPv6………

Hey guys I think you all knows about IPv6 but I am trying to give you some other and important information about IPv6…….. 
1. What is IPv6?

IPv6 is a new version of the Internet Protocol (IP for short). In the future, it will replace the current IPv4 protocol that is currently used on the Internet.

2. Why is there a need for IPv6?


Mostly because IPv4 addresses are becoming a scarce resource.

Every device connected to the Internet needs its own IP address. In IPv4, there is a theoretical maximum of 4,294,967,296 IP addresses (that’s about 4.2Billion), which might seem like a high number, but when you count the fact that we are 6.5 Billion people on Earth and that every piece of telecommunications equipment related to Internet connectivity needs its own IP addresses, it is not enough, especially since some of this space is used for routing and sub-netting purposes.

Again, in theory, IPv6 allows 3.4x10exp38 addresses – that’s 340,282,366,920,938,463,463,374,607,431,770,000,000addresses, which is a very large number indeed!
It means that every human on Earth could in theory use 5x10exp28, that’s roughly 50,000,000,000,000,000,000,000,000,000 IP addresses – which is enough for your home computer, your laptop, your mobile phone, your PDA, your robot, and virtually anything electronic around you.

If we want to connect the next billion Internet users, we will need IPv6.

3. What is the format and syntax of an IPv6 address?

IPv4 relied on 32 bit addresses, expressed in 4 octets, for example 192.168.10.1

IPv6 uses 128 bit addresses expressed in hexadecimal numbers (with letters not case-sensitive), represented in 8 groups and separated by colons, for example:

2001:0db8:85a3:0000:0000:8a2e:0370:7334

It’s rather long, so this address can be shortened, by removing the leading zeros in each group:

2001:db8:85a3:0:0:8a2e:370:7334

One instance of one or any number of consecutive groups of 0 value may be replaced with a single set of two colons (::):

2001:db8:85a3::8a2e:370:7334

Note that this substitution with double-colon may be performed only once in an address, because multiple occurrences would lead to ambiguity.

At first glance, shortening addresses might be confusing, but once you get the hang of it, it’s quite simple.

The localhost address, 0000:0000:0000:0000:0000:0000:0000:0001 can be written simply as ::1

IPv4 addresses can be written in IPv6 notation by writing the address in hexadecimal format in the last four groups of an IPv6 address, preceded by a “ffff”.
For example, 192.168.10.1 can be written as ::ffff:c0a8:a01 which really is: 0000:0000:0000:0000:0000:ffff:c0a8:0a01

4. Can IPv4 and IPv6 co-exist?


Not only can they coexist, but they actually need to!
The transition from IPv4 to IPv6 will take several years, during which time both protocols need to be used. Whilst there are still a few issues in isolated cases of IPv4/IPv6 co-existence, software and hardware vendors are working hard to resolve them and there should be no serious reason for both protocols not to co-exist for years to come.

5. Is IPv6 faster or slower than IPv4?

Theoretically, IPv6 is neither faster nor slower than IPv4. However, the use of gateways like Teredo and 6to4 tunnels in various flavors tends to add an overhead.
Furthermore, peering agreements among ISPs and transit providers are not as optimal for IPv6 as they are now for IPv4. This may result in perceived slower response. However, this will fade away when IPv6 is widely deployed.

Windows on Linux

Post Navigation

Design a site like this with WordPress.com
Get started