Sabtu, 24 Januari 2009

IP Addressing

IP ADDress
The intent of this paper is to document the background
behind the current IP address assignments which I have offered to
coordinate. The proposed scheme has been reviewed by Phil Karn,
Bdale Garbee and (verbally with) Mike Chepponis, all of whom have
encouraged that it be used.

Phil's code does NOT currently support the subnetwork
aspects of the scheme but will do so in the future. There is no
real reason for any national coordination of these addresses
until actual networks or at least geographically coordinated
groups of experimenters are formed.

I have offered to issue and keep track of SUBNET addresses
and their "owners" who are presumably responsible *NETWORK*
implementors and managers.


The basic premise behind the proposed plan is that amateur
radio networks will be politically defined. The plan is based
upon the presumption that current voice networks serve as a
proper analog by which to predict general characteristics of the
as yet unconstructed digital networks. Political entities will
build networks; funded, controlled, maintained and used primarily
by their own members and guests.

Each of these separately managed networks should be viewed
as a subnetwork of AMPRNET (with the idea being to somehow
rationally partition the 044.xxx.xxx.xxx AMPRNET address space).
Each subnetwork within AMPRNET will maintain routing tables for
its own constituents. Each will provide its own hosts (TACs,
Gateways, i.e. the mechanism by which users with simple terminals
and AX25 level 2 boxes will access network resources), switches,
rules (network administration), security measures and quite
possibly its own link level protocols.

The natural limitations on span of control will probably
limit the service area of each of these networks. This is
another factor leading to the partitioning of the AMPRNET address
space with respect to separate subnetworks.

This partitioning of the address space will allow for
much simplified routing tables in each host. Internetworking
gateways will connect these independently controlled subnetworks.
Each gateway will maintain routing tables only for local hosts
and for gateways to other networks. Hosts and relay switches on
a given subnet will need to maintain routing information
regarding only members of that subnet and gateways to other
networks. The required routing tables should prove to be very
manageable and make any kind of geographically based hueristic
addressing schemes such as ZIP codes, area codes etc. moot.


1



I would also like to propose that we coordinate logical
network names and their corresponding addresses based on these
political network subdivisions. The concept of a naming
convention which maps directly into an IP address is purely for
the convenience of network developers and is not considered
necessary. There is, however, some good reasoning behind making
network and host names hierarchical and meaningful to end users.
It will considerably aid in bootstrapping the initial networks
and in being comprehensible to the non-network folks who will be
the primary users of these networks. The naming convention
proposed is of the form USERID@HOST.SUBNET[.AMPRNET.RES].
WESTNET, SBARCnet (Santa Barbara ARC) and GFRN-net represent
three hypothetical networks with which this writer could be
involved, perhaps as a provider of gateway and/or host services.

Each of these subnetwork entities could have a distinct
address and perhaps several internally administered host/user
addresses.

[NOTE: Throughout this paper, Host or Host/User represents
any host or any user running IP protocols that has direct
network access. Also, for the purposes of the following
example, WA6JPR is not a network address, rather it
represents a user-id on a local host. It is the writer's
opinion that the majority of packet users for the forseeable
future will be using simple TNCs connected to hosts via
AX.25 level 2 protocols.]

WA6JPR may be "a user" on hosts on more than one network
such that a station in Washington D.C.,logged onto an AMPRNET
host, may send internet traffic successfully to
WA6JPR@JPRHOST.WESTNET (this traffic would be routed to Westnet
via various AMPRNET gateways and subnetwork level relays and then
to a Santa Barbara host known internally by Westnet to be
reachable via the W6AMT-2 switch). Traffic could also be
directed to Wally@SBARC (presuming that the Santa Barbara
Amateur Radio Club maintains a message server host gatewayed to
the AMPRNET catenet).

Based upon the presumption of the AMPRNET/SUBNET/HOST
hierarchy, it would seem that we could easily decide how to
allocate the 044.xxx.xxx.xxx 24 bit IP address field such that
there are bits allocated for a sufficient number of individually
managed subnetworks while leaving a correspondingly adequate
number of assignable bits for the internal addressing needs of
each individual subnetwork.

Accordingly, the following is proposed as an initial
addressing scheme and methodology for address assignment. [Bit
numbering is per RFC-960 Pg.2]


2



Bit 8 to be 0 for USA stations and 1 for non-USA stations.
[Note. This is not meant to imply a geographic basis for
assignments. It is meant to provide a very quick means for
segregating FCC controlled participants from non-FCC stations.]

Bits 9 - 18 to represent politically separate subnetworks within
AMPRNET. These bits are to be assigned in an inverse binary
sequence (see example below) beginning with the *MOST
SIGNIFICANT* bit first.

Bits 19 - 23 to be unassigned and reserved for future allocation
as network addresses, to network administrations for internally
assigned host and/or user addresses, to a combination of the
above or to a completely new intermediate class of addresses.

Bits 24 - 31 to be used within politically separate AMPRNET
subnetworks for individual hosts, switches, workstations etc. as
determined by local network administration. It would be
recommended that these bits be assigned in binary sequence with
the *LEAST SIGNIFICANT* bits being assigned first.

The resulting network addresses would be as follows:

AMPRNET
||
|| SUBNET----+
|| | |
|| | | HOST--+
|| | | | |
44:0...127:000:0...255------- 32,768 addresses assignable
44:0...127:001:0...255--+
| +- 1,015,808 addresses reserved
44:0...127:031:0...255--+
44:0...127:032:0...255------- 32,768 addresses assignable
44:0...127:033:0...255--+
| +- 1,015,808 addresses reserved
44:0...127:063:0...255--+
44:0...127:064:0...255------- 32,768 addresses assignable
44:0...127:065:0...255--+
| +- 1,015,808 addresses reserved
44:0...127:095:0...255--+
44:0...127:096:0...255------- 32,768 addresses assignable
44:0...127:097:0...255--+
| +- 1,015,808 addresses reserved
44:0...127:127:0...255--+
44:0...127:128:0...255------- 32,768 addresses assignable
44:0...127:129:0...255--+
| +- 1,015,808 addresses reserved
44:0...127:159:0...255--+
44:0...127:160:0...255------- 32,768 addresses assignable
44:0...127:161:0...255--+
| +- 1,015,808 addresses reserved
44:0...127:191:0...255--+
44:0...127:192:0...255------- 32,768 addresses assignable



3



44:0...127:193:0...255--+
| +- 1,015,808 addresses reserved
44:0...127:223:0...255--+
44:0...127:224:0...255------- 32,768 addresses assignable
44:0...127:225:0...255--+
| +- 1,015,808 addresses reserved
44:0...127:255:0...255--+

44:128:xxx:xxx----------+
| +- 8,388,608 addresses assignable (non USA)
44:255:xxx:xxx----------+


The above allocation and assignment scheme allows network
(subnet) and intranet (host/user) addresses to begin to be
immediately assigned to experimenters while retaining the largest
possible contiguous block of unassigned bits whose assignments
can be defined in the future with little or no impact on
previously allocated addresses. The USER @ HOSTNAME .
SUBNET/ADMINISTRATION naming scheme represents a human-friendly
network naming convention which maps easily into numerical
network addresses. I believe that the above approach is in
general conformance with the requirements of RFC-950, "Internet
Standard Subnetting Procedure."

The numbering scheme as initially proposed allows for up to
1024 AMPRNET subnetworks of up to 256 hosts in the USA while
retaining five bits for future expansion. That's 262,144
individual AMPRNET addressable entities. If the proposed method
of address assignment is followed and we run out of Host/User
addresses before we run out of network addresses, we can simply
pick up the least significant reserved bit and assign more
Host/User addresses. Conversely, if network addresses are more
popular we could easily expand by taking the most significant
reserved bit and allocating it for network addressing.

If it should become clear that every user on a network needs his
or her own IP address, each network could allocate user blocks in
256 user increments from the least significant reserved bits.
Possible combinations are 1024 networks each with up to 8192
individually addressable units or 2048 networks each with 4096
hosts/users (8,388,608 individually addressable entities).

The writer presumes that 8 million plus addresses ought to
last the US amateur population for some time to come. All we need
to do to avoid painting ourselves in a corner is to assign them
in a logical sequence rather than randomly.


4



The following table serves as an example of the "high bit
first" network address assignment table and some actual and
requested initial networking assignments.

"this" 44.000.000.xxx ;special case
KARNnet 44.064.000.xxx ;network admin: KA9Q
BDALEnet 44.032.000.xxx ;network admin: N3EUA
DCnet1 44.096.000.xxx ;network admin: WB6RQN
SOCALnet1 44.016.000.xxx ;network admin: WB5EKU
DCnet2 44.080.000.xxx ;network admin: WB6RQN
SOCALnet2 44.048.000.xxx ;network admin: WA6JPR
PITTNET 44.112.000.xxx ;network admin: N3CVL
next 44.008.000.xxx
next 44.072.000.xxx
.
.
.
last 44.063.000.xxx
"all" 44.127.000.xxx ;special case

Spy-ware?!

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.


Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.

Check Here: http://www.spywareguide.com/product_search.php

If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// - 15k


Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
http://www.2020search.com// - 43k


Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!
http://www.browservillage.com/ - 36k

Great Google Secrets

http://www.pcmag.com/article2/0,4149,1306756,00.asp


Google is clearly the best general-purpose search engine on the Web (see

www.pcmag.com/searchengines

But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.

Syntax Search Tricks

Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at

www.google.com/help/operators.html

. Here are some advanced operators that can help narrow down your search results.

Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.

Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as

www.mysite.com/index.html

, you can enter intext:html.

Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in

link:http://www.pcmag.com


Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature

(www.google.com/help/features.html#calculator)

lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."

Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search

(www.buzztoolbox.com/google/yellowsearch.shtml).




Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups

(http://groups.google.com)

indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
CODE
(http://froogle.google.com),

which indexes products from online stores, and Google Catalogs
CODE
(http://catalogs.google.com),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at

www.google.com/options/index.html

You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

(www.googlealert.com)

monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts

(www.google.com/newsalerts).

This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

(http://labs.google.com),

a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search

(http://labs1.google.com/gvs.html),

you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from
CODE
www.google.com/apis

. See the figures for two more examples, and visit

www.pcmag.com/solutions

for more.

Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.


Online Extra: More Google Tips


Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe

Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as

CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif


), but an easier way is to do a Google daterange: search by filling in a form at

www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml

. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications

Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query

(www.staggernation.com/gawsh/).

When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL

(www.staggernation.com/garbo/).

Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it's not something you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy address to know.

Protect your flashdisk

When You disable the autorun, you only Prohibit the virus access to the Computer System. But it doesn’t protect your Flashdisk… There are some ways to protect your flashdisk from Virus Infection
But before that you must disable the autorun First (read my last post in March)…
So here it is :
1. Download the file from http://www.programmersheaven.com/download/4125/download.aspx
2. Open and Extract ‘SETFATR.EXE’ to your default file system directory ( C:\)
3. Click Start-Run-cmd
4. Type :
Cd h:\
(h is your flashdisk directory)
5. Md autorun.inf
6. Cd autorun.inf
7. Echo Tes > a.txt
8. Echo tes > b.txt
9. Don’t close your cmd
10. Then move on… Open Start-Accessories-System
11. Find CJK fonts (Chinese-Japanese-Korean), If you don’t have it, install it first, I’ll tell you later after finishing this article
12. Copy several fonts
13. Open Windows Explorer, Find your flashdisk directory
Click the folder Autorun.inf
Right Click on a.txt, rename. And paste the character. Then press enter
14. Do the same thing with b.txt and close the windows explorer
15. Back to cmd
16. Type : cd \
17. C:\setfatr autorun.inf RSH
( RSH MUST be BIG!! )
18. And Done… No virus can infect your flashdisk

Rabu, 10 Desember 2008

sepatu Charles n Keith


--> Tampak depan


--> Tampak samping

No:1 Sepatu Sandal warna putih...(hak ceper)


No:2 Sandal warna cokelat...(hak ceper)


No:3 Sepatu Sandal warna emas...(hak ceper)

Berminat ?

Hub HP : 0816-1332223 Atau

 ym/email : pthonk_gonz88@hotmail.com 

Rp 120.000,- + "Ongkos Kirim"

Pengiriman menggunakan TIKI JNE dari Jakarta.
(http://www.tikijne.co.id)

(Produk - produk diatas merupakan tembakan charles n keith)

Kamis, 25 September 2008

Produk Apple

Jual Produk Apple GARANSI & BARU
Limited edition
Dapet dari distributor apple langsung
IPOD, MAcbookAir, Macbook, iMAC, Macbook Pro
Klik ja gambarnya klo kurang gede


























































MACBOOK AIR cuma 17JUTA!!












































































































































Berminat ?
ato ym/email : pthonk_gonz88@hotmail.com
ato HP : 08161332223

New Design

New HandDesign

New HandDesign Model
New Material
New Print


Rp 65.000,- + "Ongkos Kirim"

























































































































































































































































































































New Couple

New Design!!
Rp 130.000,- Sepasang
+ "Ongkos Kirim"

1.doll

















2.kaset

















3.lucky
















4.thinking

















HOW to ORDER????

Ukuran KaosRohani:

S= W:45 cm L:61 cm
M= W:50 cm L:71 cm
L= W:54 cm L:73 cm
XL= W:58 cm L:75 cm

Ukuran KaosCouple
All Size
Ukuran Cowo :
panjang : 62 cm
lebar : 52 cm

Ukuran Cewe :
panjang : 62 cm
lebar : 44 cm

Jahit Rantai
100 % Cotton Combed


Cara Pemesanan
Pemesanan&berbincang-bincang bisa melalui:
YM: pthonk_gonz88@hotmail.com
Email: pthonk_gonz88@hotmail.com
SMS: 08161332223