Showing posts with label Tech updates. Show all posts
Showing posts with label Tech updates. Show all posts

Wednesday, February 16, 2011

How to Buy Domain Names and Webhosting With Unverified Paypal Account? Read more: How to Buy Domain Names and Webhosting With Unverified Paypal Account?


300x250 How to Buy Domain Names and Webhosting With Unverified Paypal Account?What Is Not proven paypal Tab?
  • Not proven Means A Paypal tab That Is Not Verified yet By count Credit Card
  • Though That Tab is Eligible For Online Conveying And other use
Webhosting And Field Names By Paypal:
  • Most Of the Registrar Doesn’t Allows you to Register A Field and Host By Not proven Paypal
  • So You Need  Credit Card
But Now You Don’t Have Any Doubts
Here in Way2Tech   Reveals One Of  The Two Best Sites That Accept you to Buy Field And Hosting By Not proven paypal Tab
1.Hostgator:
  • One Of The Planet Best Hosting Provider They Accept Not proven Paypal tab
  • You Can Point out A Exact Plot For Your desires
  • Better Support team anytime Help for you
How To Register :
Step-1:
Step-2:
  • Register Yourself
Step-3:
  • Payout By paypal
2.Namecheap:
  • A Planet Best And Low-cost Field name Peddler That Accept Not proven Paypal
  • You Can Point out Field And Payout With Paypal
Step-1:
Step-2:
  • Quest A Field
Step-3:
  • Add Field To Cart ( Now Register/Sign Up)
Step-4:
Add Funds From Paypal

Step-5:
    • Payout ..
    Thats All Now Ypu Are Done ..

Increase your Ram and computer speed


As many users questioned  to boost your computer speed.before a long search i find a ploy to speed up your pc and post it on web
The procedure is as follows:
1}.Start any application, say Word. Open some large documents.
2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.
3). Now thrash to Word and austerely minimize it. (Don’t use the Minimize All Windows selection of the task bar).
4). Now go back to the Windows Task Manager and see everywhere WINWORD.EXE is listed. Most doubtless you will not find it at the top. You will typically have to scroll to the underneath of the list to find Word. Now check out the quantity of RAM it is using. Bowled over? The memory utilization has reduced by a huge quantity.
5). Minimize each application that you are currently not effective on by clicking on the Minimize pin & you can boost the quantity of void RAM by a substantial margin. Depending upon the digit and type of applications you use together, the difference can be as much as 50 percent of superfluous RAM.
In any multitasking system, minimizing an application means that it won’t be utilized by the user aptly now. Consequently, the OS involuntarily makes the application use virtual memory & keeps bare nominal amounts of the code in corporal RAM

Tuesday, February 15, 2011

5 upcoming tech products in 2011| Upcoming 6 best tech products in 2011 | Waiting for your new gadget | Gizmo alarm


If you’re by now looking for your next pet toy, the 2011 product list is ready and coming up! Take a look at these hot new gadgets and be the first one in line when they hit the market:

1. The Bloggie Camera by Sony


If you’re dreaming of the day you can take your own 3D movies with a hand-held show camera, you won’t have to wait long! For an practically priced price, you’ll be able to pile about four hours of footage in any a 2D or 3D plot using on-board storage space. The bloggie camera will even allow users to mind record with the 3D effect on its small LCD screen without the need for any high-tech specs! Of course, if you want to use the current 3DTV models, you’ll have to don persons clumsy glasses to see your new 3D creation.



2. The Best of Both Worlds

If you like the thought of a tablet, but despise the thought of giving up your upright, Samsung has the exact solution. The Samsung 7 Run Sliding PC allows patrons to point out between two configurations; use it as a upset-screen tablet or slide out the full upright for a robust laptop. This may very well transform the planet of portable computing as we know it.





3. The Essential 3D Glasses

Although no one is fond of persons clumsy 3D glasses, Sony 3D glasses takes them to a new level. As a substitution for of wearing glasses to see the cool 3D record things on a TV screen, the viewer wears a head-mounted sight without the need for any TV at all. Reminiscent of numerous sci-fi classics, it would grow that the future may have by now arrived with the Sony Future 3D Head Mounted Sight.



4. If Only a Netbook had More Potential

No one can disagree with the fact that a netbook’s small size makes it a well-located tool for quick Web door. Though, it isn’t excellent for much of no matter what business else. Just presume having the potential of a full-blown apparatus in a pocket-sized computer. With the Razor
Switchblade 7-Inch Gaming PC, you can have exactly that!

5. Document-Thin Computing

Do you like the thin design of the MacBook Air even though you’re a inveterate PC user? If so, no more chunky laptops for you! The Samsung 9 Run Pad is so slim you could describe it as anorexic, but it’s beyond doubt not starved for processing potential! Once you lay eyes on Samsung’s shiny design and feel the lightness of this product, you’ll by no means want to lug nearly a additional gray cut of machinery.




6. Motorola Atrix Smartphone

If you austerely must have the newest and greatest smartphone, don’t forget to take a look at the new Motorola Atrix. This dual-core, 4G smartphone has more on-board computing potential than anyone ever dreamed was doable. With the exclusive Webtop app, users can surf the Net with a full-blown Firefox browser and deal with documents like they were using an actual computer.




Be the first one to take the benefit and njoy.........

Advance gmail with new features | Two new enhancements in gmail contacts group | Gmail brought something new


Here i giving you the news of the new features of gmail just introduce, which we are not familiar with but can be of great importance for us .....................
1.Gmail Groups in contacts is very useful when you want to send any email to multiple recepients. If you want to send an email to all your team members at work then you can basically send it by selecting the contact group.
And now it will be more simple to deal with contact groups in Gmail because Gmail is donation two new enhancements to its Group. Here are two new features:
Add to Group  menu which will help you to add new contacts to Group. That is now you can basically add more email ID list to existing Groups that too just by a click.
2. Now you can select the which email address you want to use for which group. It is useful for people who have multiple email addresses and even as sending emails to such people, you can select you want to send email in work group or on personal group.
Gmail Contact improvements are very useful and clever because most of the time we need to send same mail to multiple reciepents and with above features Gmail groups would be simple and quick too.
No matter how other email air force like Yahoo or Hotmail keep on appearance up with new feature but it’s tough to competite with Gmail because of it’s useful and user-forthcoming features.

Password reuse opens doors for cyber criminals | Save your password | Is your password secure?


End-users must have a different password for every website and security domain

Interesting real-world data pertaining to password security has emerged recently, once again shedding light on the importance of having strong password policies in place at your organization. That doesn't stop at, for example, requiring a minimum password length -- but also reminding end-users to be careful about both surrendering and reusing passwords too readily.
The first set of data came from Amit Klein, CTO of Trusteer. He wrote about a study that found about 50 percent of phishing victims give up their password credentials within the first 60 minutes of a phishing attack's launch, and 80 percent of stolen credentials are taken within the campaign's first five hours. Given the way most of us hover around our email clients and smartphones, this doesn't seem all that far off. I mean, if you're going to be fooled, why would you wait a few days before responding to that emergency message "trying to protect you"?
If Trusteer's study holds true for most phishing attacks, it has interesting implications. For one, it probably takes most security vendors from a few hours to a day to help protect their customers against the latest attacks. Even if they block the phishing attack within an hour, half the potential damage is done. This is not to say that defense vendors shouldn't implement the quickest defense they can muster, as protecting half the victims is a very laudable goal.
Another theory: The data simply reflects that vendors are proactively protecting their customers after the first hour. Although I'm not overly convinced of the latter theory, I'll placate myself with it.
The plague of password reuseAnother interesting data point comes from researchers in the Security Group at the University of Cambridge Computer Laboratory, in which two websites were recently hacked and their password hashes stolen. The two sites appeared to have a lot of overlapping customers (based on email addresses). Of the passwords that were cracked, 76 percent of customers used the same password at both sites. The finding isn't surprising, but this is the first time I've seen data supporting the conclusion that people, against all advice, like to reuse passwords between sites.
I learned this lesson early on in the pre-Internet days of dial-up when I was a co-sysop for a popular BBS. One day the BBS wouldn't take my password. I had to call the other co-sysop, and he changed my password to a temporary one so that I could log on. I remember him saying as he viewed my current password (the one that did not work), "Hey, why is your password 'urfucxed'?" (Note: It didn't contain an "x.") I realized then that someone was sending me a message: I had apparently pissed off some other BBS sysop, and he or she had logged on to my site using the password I had reused across hundreds of sites.
Many people choose the same password they use at work for personal websites. In these times, not a single day passes without some major password hacking incident becoming public. At the time of this writing, the outbreak of the day involves eHarmony.
Combine end-users' propensity to reuse passwords with the aforementioned success of phishing attacks, the security ramifications become clear. No one should reuse passwords across any security domain or website; when the weakest and most poorly protected location is compromised, they all are "fucxed." Malicious hackers routinely reuse passwords they capture on unimportant sites on Web vendors that are likely to store credit cards, such as Amazon, iTunes, and so on.
Store your passwords safely
Today, I make sure I never reuse the same password on any site or among any two security domains, although I include a common root word in all of them, to make life easier. Say my root word is "frog" (it isn't). For Amazon, my password may be "Amazonfrog220." For iTunes it may be "iT220Frog," and so on.
When I store my passwords, I write "Amazonf220" and "iT220F"; that way, I won't have any of my passwords written down in plaintext for easy stealing if a password storing method (or smartphone) gets compromised. Sure, the attacker could guess at my root word, except that my root word is really a complex passphrase that would be more difficult to break than most people's passwords alone.
One of my very smart work colleagues, Laura A. Robinson, makes my method seem Cro-Magnon. She uses Bruce Schneier's free Password Safe tool. Using very strong Twofish encryption, it not only very securely stores passwords, it also allows her to double-click on a stored password and paste it into a password-requesting form. It generates long, complex, and unique passwords, as well. Laura said it surprises most people that she doesn't even know what most of her passwords are.
Sure, there are a few places she still has to manually type in passwords, such as on the Xbox and the TiVo, but most of the password work is done very securely. Laura uses Microsoft's Live Sync to sync her Password Safe database (itself very securely protected using a long and complex password) across all her computers and in the cloud.
However you accomplish it, make sure you don't share passwords across security domains or among websites. Make sure your company's password policy says the same and that end-users are educated about the dangers. Otherwise they're just passwords blowing in the wind.


Friday, February 11, 2011

Biggest mistake for IPv6: It's not backwards compatible, developers admit


SAN FRANCISCO - The Internet engineering community says its biggest mistake in developing IPv6 - a long-anticipated upgrade to the Internet's main communications protocol - is that it lacks backwards compatibility with the existing Internet Protocol, known as IPv4
At a panel discussion held here Tuesday, leaders of the Internet Engineering Task Force (IETF) admitted that they didn’t do a good enough job making sure native IPv6 devices and networks would be able to communicate with their IPv4-only counterparts when they designed the industry standard 13 years ago.
"The lack of real backwards compatibility for IPv4 was the single critical failure," says Leslie Daigle, Chief Internet Technology Officer for the Internet Society. "There were reasons at the time for doing that…But the reality is that nobody wants to go to IPv6 unless they think they’re friends are doing it, too."
Originally, IPv6 developers envisioned a scenario where end-user devices and network backbones would operate IPv4 and IPv6 side-by-side in what’s called dual-stack mode.

IPv6 proponents say the lack of mechanisms for bridging between IPv4 and IPv6 is the single, biggest reason that most ISPs and enterprises haven’t deployed IPv6.However, they didn’t take into account that some IPv4 devices would never be upgraded to IPv6, and that some all-IPv6 networks would need to communicate with IPv4-only devices or content.
"Our transition strategy was dual-stack, where we would start by adding IPv6 to the hosts and then gradually over time we would disable IPv4 and everything would go smoothly," says IETF Chair Russ Housley, who added that IPv6 transition didn’t happen according to plan.
In response, the IETF is developing new IPv6 transition tools that will be done by the end of 2009, Housley said.
"The reason more IPv6 deployment isn’t being done is because the people who are doing the job found that they needed these new transition tools," Housley said. "These tools are necessary to ease deployment."
IPv6 is needed because the Internet is running out of IPv4 addresses. IPv4 uses 32-bit addresses and can support approximately 4.3 billion individually addressed devices on the Internet. IPv6, on the other hand, uses 128-bit addresses and can support so many devices that only a mathematical expression - 2 to the 128th power - can quantify its size.
Experts predict IPv4 addresses will be gone by 2012. At that point, all ISPs, government agencies and corporations will need to support IPv6 on their backbone networks. Today, only a handful of U.S. organizations – including the federal government and a few leading-edge companies like Bechtel and Google - have deployed IPv6 across their networks.
Richard Jimmerson, chief information officer for the American Registry for Internet Numbers, says demand for IPv4 address space has not slowed down despite the global economic meltdown.
Jimmerson said he’s seen a shift among network operators during the last year as it has become clear that IPv4 addresses are truly running out. "They’re further along in moving towards acceptance of IPv6," he said.
When IPv4 addresses run out, ISPs and enterprises will require several new transition mechanisms to bridge between IPv4 and IPv6 devices, IETF leaders say.
The transition mechanisms under development by the IETF are:
* Dual-Stack Lite
, a technique developed by Comcast that allows for incremental deployment of IPv6. With Dual-Stack Lite, a carrier would give new customers special home gateways that take IPv4 packets from their legacy PCs and printers and ship them over an IPv6 tunnel to a carrier-grade network address translator (NAT).
* NAT64, a mechanism for translating IPv6 packets into IPv4 packets and vice versa. A related tool, dubbed DNS64, allows an IPv6-only device to call up an IPv4-only name server. These two tools would allow an IPv6 device to communicate with IPv4-only devices and content.
The IETF also is considering work that would allow ISPs to share a single public IPv4 address among multiple users. 
Durand says these transition mechanisms are required so that IPv6 "can be deployed incrementally.""We need to take a two-pronged approach," says Alain Durand, director of IPv6 architecture and Internet governance in the Office of the CTO for Comcast. "We need to embrace IPv6, but we also need to build an IPv6 transition bridge that will allow for sharing of IPv4 addresses and IPv4 and IPv6 tunneling."
Jari Arkko, an engineer with Ericsson Research, says the IETF community has shown "tremendous interest" in developing these IPv6 transition mechanisms.
These mechanisms aren’t about "extending IPv4 for eternity," Daigle says. "We still need to be doing this to make sure that we can do a global transition from a primarily IPv4 network to a primarily IPv6 network."
The overall message of the IETF panel was that network operators need to plan for IPv6 deployment whether they like it or not.
IETF leaders say the networking industry is starting to accept that they have to migrate to IPv6, even if it doesn’t offer any concrete business advantages
"People are deploying, albeit slowly," says Kurtis Lindqvist, CEO of Netnod Internet Exchange in Stockholm. "The core networks are already capable of IPv6…Our biggest challenge is to make the transition work."
Daigle says the business case for IPv6 is simple: If companies want to have Internet applications that continue to work and scale, they need to deploy IPv6.
"IPv6 is the path forward," Daigle says. "There are a lot of technologies being discussed and being promoted for extending the use of IPv4 but that really is a bridging mechanism because the path forward is IPv6."
Daigle says the time for CIOs to start planning for IPv6 is now, before IPv4 addresses are depleted.
Network operators need "`to be aware of [IPv6] and accept it as coming and look forward to it as coming," Daigle says. "If at this point, IPv6 is not in your refresh cycle planning, it should be. If you haven’t done a review of what applications would be impacted in a heavily NAT-ted world or in an IPv6 world, you should."

IPv6 Compatibility Addresses

IPv6 provides a set of compatibility addresses that help users migrate from IPv4 to IPv6 and these are IPv4-compatible, IPv4-mapped, 6to4 and Teredo addresses.

IPv4-Compatible Address

An IPv4-compatible address consists of an initial colon-hexadecimal notation and an ending dotted decimal notation as we find in IPv4. For example, 0:0:0:0:0:0:w.x.y.z or ::w.x.y.z, the last four octets represent an IPv4 address. IPv4-compatible addresses are used by hosts that are communicating with IPv6 over an IPv4 infrastructure. When an IPv4-compatible address is used as an IPv6 destination, the IPv6 traffic is automatically encapsulated with an IPv4 header.

IPv4-Mapped Address

The IPv4-mapped address has the last block of the colon-hexadecimal part set to ffff when compared to an IPv4-compatible type address. For example, 0:0:0:0:0:ffff:w.x.y.z or ::ffff:w.x.y.z, the last four octets represent an IPv4 address. The IPv4-mapped address is used to map IPv4 devices that are not compatible with IPv6 into the IPv6 address space.

6to4 Address

The 6to4 address is intended for temporary use as to facilitate the transition from the initial mixed environments to the full native IPv6 connectivity. Therefore, it has some limitations such as, cannot be used to connect IPv4-only hosts to IPv6-only hosts. A 6to4 address enables IPv6 packets to be transmitted over the IPv4 Internet or network without the need to configure explicit tunnels. Also 6to4 hosts can communicate over an IPv6 Internet and hence, users using their existing IPv4 connection can connect to the IPv6 Internet. It consists of 2002:<first two bytes of the IPv4 address>:<second two bytes of the IPv4 address>::/16

Teredo Address

Teredo is a tunneling protocol and it was designed for IPv6 connectivity to nodes that are located behind IPv6 unaware NAT devices. It defines a way of encapsulating IPv6 packets within IPv4 UDP datagrams that can be routed through NAT devices and on the IPv4 Internet.

Teredo is intended for temporary use, all IPv6 hosts should use native IPv6 connectivity. 6to4, the most common IPv6 over IPv4 tunneling protocol, requires the tunnel endpoint to have a public IPv4 address. However, many hosts are currently attached to the IPv4 Internet through one or several NAT devices, usually because of IPv4 address shortage. In such a situation, the only available public IPv4 address is assigned to the NAT device, and the 6to4 tunnel endpoint needs to be implemented on the NAT device itself. Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly.

A Teredo address consists of a 32 bit Teredo prefix (2001::/32). The prefix is followed by the IPv4 public address of the Teredo server that assisted in the configuration of the address. The next 16 bits are reserved for Teredo flags while the subsequent 16 bits store a version of the external UDP port. The final 32 bits store a version of the external public IPv4 address.

Thursday, February 10, 2011

Microsoft Readies New Browser Version With More Privacy Controls


   SAN FRANCISCO (Dow Jones)--Microsoft Corp. (MSFT) made an almost-finished version of its latest Internet Explorer browser available for download on Thursday, a move that comes as the software giant tries to bolster its sagging position in the software that helps users navigate the Web.
The release candidate of Internet Explorer 9, which has been in development for over a year, takes advantage of hardware acceleration technology to help Web pages play multimedia content faster and more smoothly. The browser also has built-in privacy features that allow users to more fully control which sites are tracking their movements on the Web.
IE9, as the browser is informally known, will work only with Microsoft's Vista and Windows 7 operating systems. A final version of the browser is expected to be released within weeks.
The new version of Internet Explorer comes as Redmond, Wash.-based Microsoft battles to preserve its slipping share of the market for browsers, a software category it has historically dominated, sometimes with a share of more than 90%. Now, Internet Explorer accounts for 56% of the market, while Mozilla Corp.'s Firefox has nearly 23% and Google Inc.'s (GOOG) Chrome browser about 11%, according to Net Applications.
As with other versions of Internet Explorer, Microsoft will not charge for IE9. But Dean Hachamovitch, who runs the IE business, says the new browser will help generate enthusiasm and excitement for the company's other products, most notable the well-received Windows 7 operating system.
"Your Web experience is only as good as the operating system it runs on," Hachamovitch said in an interview with Dow Jones Newswires. "We want them to have a great experience," he said, referring to prospective IE9 users.
IE9, which uses a new technology known as HTML5, loads and play Web pages quickly because it takes advantage of the graphics processing unit inside a computer, something previous browsers didn't do. IE9 can use both the graphics processor and the central processing unit, allowing it to render Web pages with more speed and power.
"The more operations you can move to the GPU, the more performance you can get from the CPU," said Rob Mauceri, a senior engineer on the IE9 team.
The browser also addresses growing concerns over the amount of private information that is collected each time a Web user visits a site. Because most websites are made up of material provided from other websites, users can end up providing their information to scores of different companies each time they visit a page.
Some of these companies then follow users across the Web.
IE9 has an opt-in tracking protection feature that allows users to employ lists of websites recommended for blocking. Once the lists are installed, they are updated automatically.
The lists are provided by four partner groups: Abine Inc., EasyList, PrivacyChoice and TRUSTe Inc.
Microsoft shares, which trade roughly where they did a decade ago, fell 1.7% to $27.50 in Thursday trading.

Update: Oracle to release finance data warehouse

The new Oracle data warehouse will be customized for the needs of banks and financial institutions

Oracle is offering a data warehouse tailored for the needs of the financial services industry, the company announced Thursday.
Financial services have found the process of setting up generic data warehouses difficult to complete, the company asserts. The new data warehouse package should eliminate a lot of the routine chores devoted to customizing data warehouses for the financial environment, according to Oracle
With financial data warehouses, "the focus ... shifts from the indiscriminate, tedious capture and stewardship of all data, to the speed and specific context in which comprehensive decisions must now be made," said S. Ramakrishnan, group vice president and general manager of Oracle Financial Services Analytical Applications, in a statement.
With this package, a firm should be able to easily store financial data, generate reports, manage the metadata and carry out other routine financial functions, Oracle said.
The Oracle Financial Services Data Warehouse will be based on a financial services data model that Oracle has developed over the past 15 years, geared toward prepping data so that it can be used for customer analysis, compliance testing, reporting and risk analysis. The company offers about 30 financial applications that can work with this data model, including those that cover enterprise risk management, governance, risk, and compliance, enterprise performance management and customer insight.
The data warehouse is packaged as hardware with preinstalled Oracle financial software applications, databases and extract, transform, load (ETL) tools. The package offers users self-service style reporting and business intelligence tools. Third party analytics applications can be used to also analyze data from the warehouse. It has been customized so that it can easily be coupled with Oracle Exadata database servers.
The Oracle Financial Services Data Warehouse is available now. Oracle declined to reveal pricing.

Understand ipv6 better

Hello friends my purpose is not to increase traffic but to provide good and proper information and guidance,
follow this link to know ipv6 better

HOWTO Configure Windows XP with Freenet6 TSP i.e ipv6 | configure ipv6

The Easiest way to get IPv6 Connectivity
As long as you have a publicly accessibly IP address (not a private IP address), you're all set. First thing's first, sign up for an account with Freenet6 by clicking on User account registration. You do not need to register, but it allows you to keep the same IPv6 address even if your IPv4 address changes and it also allows you to be able to register a large pool of addresses so that you can give IPv6 addresses to all of your networks via a your router. So register.
Once you register your username and email address, you'll get an email with your password and you'll need this to configure the TSP (Tunnel Setup Protocol) client.
Installing the Windows XP Freenet6 TSP Client
Visit the download site (http://www.freenet6.net/download.shtml) and select the latest binary code version of the tsp client. Download it and unzip it into an easily findable directory. I picked D:\ipv6\. Once you've got it downloaded and unzipped, now it's time to configure it with your information.
Configuring tspc.conf
Open the tspc.conf in your favorite text editor. Notepad will suffice. Change the userid=anonymous line to read userid=youruserid and the passwd= line to read passwd=yourassignedpassword. You may also at this time want to change the client_v4=auto line to read client_v4=yourexternalIP if you have more than one public IP on your machine and you want to be sure that it's set up on the correct one.
From the Start -> Run dialog, type in cmd and press okay. Proceed as follows:

C:\>cd \ipv6\
C:\ipv6>tspc -vf tspc.conf
tspc - Tunnel Server Protocol Client


Loading configuration file


Connecting to server


Send request


Process response from server


TSP_HOST_TYPE                    host
TSP_TUNNEL_INTERFACE             2
TSP_HOME_INTERFACE
TSP_CLIENT_ADDRESS_IPV4          externalIP
TSP_CLIENT_ADDRESS_IPV6          3ffe:0bc0:8000:0000:0000:0000:0000:13b3
TSP_SERVER_ADDRESS_IPV4          206.123.31.115
TSP_SERVER_ADDRESS_IPV6          3ffe:0bc0:8000:0000:0000:0000:0000:13b2
TSP_TUNNEL_PREFIXLEN             128
TSP_VERBOSE                      1
TSP_HOME_DIR                     .
Exiting with return code : 0 (0 = no error)

Now you've got your IPv6 address. I haven't tested past this point yet, so consider this documentation experimental until I get a chance to do so.

ipv4 vs ipv6

Ipv4 vs. Ipv6  Ipv4 is the fourth version of Internet protocol, but the first one to be widely deployed. It uses a 32 bit addressing and allows for 4,294,967,296 unique addresses. Ipv4 has four different class types, the class types are A, B, C, and D. An example of Ipv4 is 207. 142. 131. 235. The ipv4 uses a subnet mask because of the large numbers of computers used today.  The subnet mask helps reduce the number of unique IP given to companies, corporations and so on. An example of a subnet mask is a company. A architectural company is given one ip address to use in their company. The IP that they are given is the class C addresses, 192. 182. 162. 0. However, the employees want to send information about the plan to a fellow employee. The default subnet mask is 255. 255. 255. 0 this default is used so that people can send instant messages to each other without downloading programs such as MSN messenger.

IPv4
IPv6
Addresses are 32 bits (4 bytes) in length.Addresses are 128 bits (16 bytes) in length
Address (A) resource records in DNS to map host names to IPv4 addresses.Address (AAAA) resource records in DNS to map host names to IPv6 addresses.
Pointer (PTR) resource records in the IN-ADDR.ARPA DNS domain to map IPv4 addresses to host names.Pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6 addresses to host names.
IPSec is optional and should be supported externallyIPSec support is not optional
Header does not identify packet flow for QoS handling by routersHeader contains Flow Label field, which Identifies packet flow for QoS handling by router.
Both routers and the sending host fragment packets.Routers do not support packet fragmentation. Sending host fragments packets
Header includes a checksum.Header does not include a checksum.
Header includes options.Optional data is supported as extension headers.
ARP uses broadcast ARP request to resolve IP to MAC/Hardware address.Multicast Neighbor Solicitation messages resolve IP addresses to MAC addresses.
Internet Group Management Protocol (IGMP) manages membership in local subnet groups.Multicast Listener Discovery (MLD) messages manage membership in local subnet groups.
Broadcast addresses are used to send traffic to all nodes on a subnet.IPv6 uses a link-local scope all-nodes multicast address.
Configured either manually or through DHCP.Does not require manual configuration or DHCP.
Must support a 576-byte packet size (possibly fragmented).Must support a 1280-byte packet size (without fragmentation).

The 0 in the subnet mask allows you to have 16 different networks having 14 computers per network allowing you to have a total of 224 computers in the company. You can create these networks by modifying the 0 the only number you can modify in the network. In the binary version of the 0 of the subnet mask it looks like this 0000. You can modify the numbers from 0000 – 1111. Those numbers will represent your network, you will then need numbers for your computer. When adding the numbers for the computer your IP would look like this in tens. 255.255.255.0-0 the zero after the dash represents your computer number. The way you can modify the number is the same as the network number, the difference is that you can only the numbers 0001-1110 in other words you cannot have all ones or all zeros. For further reference there is a diagram in the next page.  Ipv6 is the next in the advancement of IP’s. Although it is version 6 it will probably be the next widely deployed Internet protocol. Compared to the Ipv4 which allows for only 4,294,967,296 unique addresses, the Ipv6 that uses a 128-bit system will hold 340-undecillion (34, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000) this number is so vast that there are more unique ip addresses than stars in the universe, as we know it. However, the Ipv6 will not come out till at least 2025 in because they need time to fix the bugs in the protocol. An example of Ipv6 is: 207. 142. 131. 235. 207. 142. 131. 235. 207. 142. 131. 235. 207. 142. 131. 235.  The reason we may need to switch from Ipv4 to Ipv6 is because of the population of the world. The rate at which the world’s population is growing is nothing to look down at. Also in the future all vehicles will probably be networked in order to use Onstar or other navigational devices and those need IP’s too. So eventually we would need more unique IP’s than the number we have now.Ipv4 vs. Ipv6  Ipv4 is the fourth version of Internet protocol, but the first one to be widely deployed. It uses a 32 bit addressing and allows for 4,294,967,296 unique addresses. Ipv4 has four different class types, the class types are A, B, C, and D. An example of Ipv4 is 207. 142. 131. 235. The ipv4 uses a subnet mask because of the large numbers of computers used today.  The subnet mask helps reduce the number of unique IP given to companies, corporations and so on. An example of a subnet mask is a company. A architectural company is given one ip address to use in their company. The IP that they are given is the class C addresses, 192. 182. 162. 0. However, the employees want to send information about the plan to a fellow employee. The default subnet mask is 255. 255. 255. 0 this default is used so that people can send instant messages to each other without downloading programs such as MSN messenger. The 0 in the subnet mask allows you to have 16 different networks having 14 computers per network allowing you to have a total of 224 computers in the company. You can create these networks by modifying the 0 the only number you can modify in the network. In the binary version of the 0 of the subnet mask it looks like this 0000. You can modify the numbers from 0000 – 1111. Those numbers will represent your network, you will then need numbers for your computer. When adding the numbers for the computer your IP would look like this in tens. 255.255.255.0-0 the zero after the dash represents your computer number. The way you can modify the number is the same as the network number, the difference is that you can only the numbers 0001-1110 in other words you cannot have all ones or all zeros. For further reference there is a diagram in the next page.  Ipv6 is the next in the advancement of IP’s. Although it is version 6 it will probably be the next widely deployed Internet protocol. Compared to the Ipv4 which allows for only 4,294,967,296 unique addresses, the Ipv6 that uses a 128-bit system will hold 340-undecillion (34, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000) this number is so vast that there are more unique ip addresses than stars in the universe, as we know it. However, the Ipv6 will not come out till at least 2025 in because they need time to fix the bugs in the protocol. An example of Ipv6 is: 207. 142. 131. 235. 207. 142. 131. 235. 207. 142. 131. 235. 207. 142. 131. 235.  The reason we may need to switch from Ipv4 to Ipv6 is because of the population of the world. The rate at which the world’s population is growing is nothing to look down at. Also in the future all vehicles will probably be networked in order to use Onstar or other navigational devices and those need IP’s too. So eventually we would need more unique IP’s than the number we have now.

Mozilla adds "Do not track" to newest Firefox 4 beta


Mozilla's approach differs from that taken by rival Microsoft, who will debut an opt-in tool for IE9 later today
Mozilla on Tuesday rolled out the 11th beta of Firefox 4, adding the "Do Not Track" feature it touted three weeks ago to the browser.


The open-source company plans one more beta, which it hopes to wrap up this weekend, before moving on to "release candidate" builds that in turn will lead to final code.
Mozilla has said it will ship a completed Firefox 4 this month.


The privacy feature, announced Jan. 23, lets users opt out of the online tracking conducted by Web sites and advertisers. When users enable the feature in Firefox 4 Beta 11, the browser transmits special information with every HTTP page request, telling the site that the user does not want to be tracked.


However, the information Firefox sends as part of each HTTP header won't change how advertisers track users until sites and advertisers modify code on their end to respond to the Do Not Track request. Mozilla made that clear in a blog post announcing the availability of Firefox 4 Beta 11.


"You will not notice any difference in your browsing experience until sites and advertisers start responding to the header," said Mozilla.


Mozilla's approach differs from that taken by rivals Microsoft and Google, which have also revealed no-tracking plans.


Microsoft's Internet Explorer 9 (IE9) will include what the company has called "Tracking Protection," an opt-in tool that relies on published lists to selectively block third-party sites and content embedded in websites.


IE9 Release Candidate, or RC -- the last preview of the browser -- will launch later today with Tracking Protection.


Google, meanwhile, has launched the "Keep My Opt-Outs" add-on for Chrome that leverages self-regulation efforts by the online advertising industry to let users permanently opt out of ad tracking from participating companies.


The San Francisco-based Electronic Freedom Foundation (EFF) has thrown its weight behind Firefox's strategy, saying that it has a "clear lead" over rivals in the Do Not Track race.


"We believe that the only sensible way forward for privacy opt-outs is a Do Not Track header, and we're very pleased to see Mozilla planning to offer this option in their future browser versions," Rainey Reitman, EFF's activism director, said in a January blog post.


Mozilla plans to roll out one more beta for Firefox 4, but has not set a schedule, saying only that it hoped to quash all remaining blocker bugs -- the problems that would prevent it releasing Beta 12 -- by tomorrow, then close the code over the weekend.


At one point Mozilla had slated only 10 betas, but the company added another pair to the schedule as it wrestled with bugs.


Firefox 4 Beta 11 can be downloaded for Windows, Mac OS X and Linux from Mozilla's Web site.


Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed. His email address is gkeizer@computerworld.com.

Microsoft's Internet Explorer 9 web browser goes live


Microsoft has said the latest version of its internet explorer web browser puts it ahead of competitors like Google and Firefox.

The software giant, which is losing market share, made the bold claim as it unveiled what is known as the release candidate of IE9.

This is the final test drive for the new browser - a chance to catch any last-minute bugs before its debut.

IE9 has been downloaded 25 million times during beta testing.

Privacy and speed are being highlighted as two of the features that set IE9 apart.

"This release is one that is playing catch up [on past releases], but it leapfrogs everything and now you see the other folks on the back foot trying to catch up with us," Dean Hachamovitch, corporate vice president of Internet Explorer, told BBC News.

"With this release you are seeing innovation after innovation that other folks are catching up to. Hardware acceleration was something no one was talking about until we did it. No one else was talking about privacy and tracking until we did it."

According to Web analytics company Net Applications, IE lost more than six percentage points of user share in the past 12 months. At the end of January, the browser hit an historic low with 56% of users using IE.


"This is a real race again in terms of browsers," said Lance Ulanoff, editor-in-chief of PCMag.com.

"To some extent, Microsoft had ceded that race, but when I first heard about IE9, my initial reaction was 'oh the game is on'. Now it is a question of how people will perceive it when they look at it against Google Chrome and Firefox, but Chrome is where you have the most interesting battle and this is a true battle in the browser space."

Privacy features
One feature being put front and centre of IE9 is tracking protection that gives users better control over how their information is shared across the web.

Some content on websites can be used to track activity as people hop from one site to another. IE9's tracking protection means users can limit the browser's communication with certain websites to help keep information private.


IE9 allows users to limit communication with other websites
This feature relies on tracking protection lists the user can create, or on lists created by the four main online privacy and tracking companies to allow or block a site or ad network from tracking users.

Microsoft has said it will not generate such lists.

The feature is seen as a response to a call by the Federal Trade Commission for a web equivalent to the Do Not Call list aimed at telemarketers calling and harassing people at home.

Firefox also offers a 'do not track' option.

"The most exciting thing is this is a technology that is ready to use today and can provide a meaningful level of protection as you browse around the web," said Andy Zeigler, privacy programme manager with Microsoft's IE team.

"For example, the lists can block companies that collect data about you without your consent, which could be information like your browsing history, the sites you visit, the things you buy online and the videos you watch."

Need for speed
With speed becoming an increasingly seductive selling point for users, Microsoft said that this latest version of IE9 is faster than the beta by 35%, making it faster than any browser currently available.

Also new is expanded support for HTML5 and what is known as other "future-web" technologies. These include support for a geolocation feature and HTML5 semantic tags. These features are largely present in other browsers.

The company said it received over 17,000 comments from early users. As a result of some of that feedback, the software will let people add a new row of tabs to the bar at the top of the browser window. It will also pop up fewer notifications.

The company is now focused on encouraging developers to build new websites and user experiences on IE9.

IE9 is a free download that works Windows Vista and Windows 7 computers. It's not compatible with Windows XP.