Jump to content

Search the Community

Showing results for tags 'internet'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 103 results

  1. Almost every night, I sit in bed and stare at my phone. Then I fall asleep and dream about the internet. I send friends imaginary iMessages and hear the woo-Oop sound and then the ding when they reply. I scroll through nonsensical tweets and read Slack messages from my boss. Since I bought my first smartphone in 2008, the internet has oozed its way into the subterranean parts of my consciousness. Maybe it feels like the same thing has happened to you too. Plenty of research has looked at how smartphones and social media sites affect our habits, our relationships, our brains, and attention spans. There are also plenty of studies documenting how excessive use of these new technologies may lead to poorer sleep. But there’s little research on how our constantly internet-connected lives may alter the content and quality of our dreams. That's partially due to the fact that studying the phenomenon of dreaming is incredibly difficult. Researchers are almost always forced to rely on what people remember about their dreams, rather than directly observable data. "The only way for researchers to be sure that someone is dreaming is by awakening the sleeper, thus terminating the dream," says Raphael Vallat, a postdoctoral fellow at the University of California Berkeley who studies sleep and dreaming. So dreams remain mysterious; we don't yet know what purpose they serve, or exactly how to interpret them. But that doesn't mean research about media consumption and dreaming is nonexistent. In one study published in the journal Consciousness and Cognition in 2008, older participants who grew up watching black and white television reported dreaming more in grayscale than those who had consumed color TV, suggesting that access to media might have some sort of effect. What the Research Says Many dream researchers support an idea called the "continuity hypothesis," which says we tend to dream about the people and issues that preoccupy our waking thoughts. This doesn't mean that dreams reflect our waking lives necessarily, just that they tend to be about the same people and issues that concern us when we're awake. "Dreams really rarely replay a memory exactly as it was experienced, but rather integrate some of its elements into a broader, distorted narrative," Vallat adds. If you're obsessing over your friend’s Instagram comments or your own conversations on Twitter, the continuity hypothesis would suggest that it's reasonable for those things to appear in your dreams in some form as well. And people are definitely dreaming about the internet, at least according to anecdotal reports. Plenty of individuals say they experience social media-themed dreams, or dreams about apps they use for work, like the messaging service Slack. "I have dreams about Google Docs constantly. It really bothers me when I can’t remember what I was working on," says Caroline Haskins, an intern at news site The Outline. But is constantly being on the internet or consuming other new forms of media changing how we dream? Researchers like Jayne Gackenbach are trying to find out. Gackenbach, a psychology professor at MacEwan University, has been studying dreams and digital media since the 1990s. She acknowledges that her work is often based on what people self-report. "How much do you trust what someone says? That's a longstanding issue in any kind of dream research," she says. With that caveat, though, her research has found that playing videogames for a significant amount of time can alter both the content and the quality of a person's dreams. She’s conducted a number of studies that observed an association between playing videogames and an increase in lucid dreaming—a phenomenon where a person becomes aware they’re dreaming and can potentially control their actions. A follow-up analysis in 2013 proposed that “gaming may be associated with dream lucidity because of the enhanced problem-solving quality of gamer’s dreams.” Gackenbach has also found that playing videogames may provide a "protection" against nightmares, at least for some male gamers. That might be because videogames often simulate "fighting back" against threats, a scenario which is mimicked in the gamers' dreams. What About Social Media? But playing videogames is not the same as scrolling on Facebook or sending messages on Snapchat. It's possible that these activities impact our dreams in a different way—and Gackenbach is keen to learn how. Recently, she polled 481 university students about their dreams and media habits. Specifically, she asked them to recall a dream that involved some sort of electronic media—such as television, videogames, or social media—and what electronic media they had consumed the previous day. Students who used interactive media, like playing videogames or chatting with friends online, reported higher-quality dreams than those who, say, passively consumed TV shows. "Those that used interactive media reported more control over their dream," Gackenbach says. She presented her findings at the International Dream Conference in Arizona earlier this month. Gackenbach's findings—that the type of media we consume may affect the kind and quality of dreams we have—feel intuitively correct. More than one person has blamed their nightmares on watching a scary movie late at night. Yet other researchers dispute the idea that what we do during our waking hours has much impact on what we dream about. In which case, you could terror-scroll through Twitter all you want before bed—the bad tweets won’t attack you in your sleep because of it. "Generally, outside influences have little or no influence on dreams," says G. William Domhoff, a professor emeritus in psychology and sociology at the University of California at Santa Cruz and the author of The Emergence of Dreaming. "But since the dominant view is stimulus and response in psychology, and more generally in terms of American can-do [there’s the notion that] we can shape anything, everyone denies that dreams are spontaneous thoughts that appear under certain conditions." Domhoff points to a number of studies that in his view support the idea that daily events don't have much of an effect on our dreams. In one, 50 participants learned how to navigate a virtual maze on a computer and then were asked to take a nap. Only four reported having dreams related to the task. So don't swear off the internet forever just because you keep dreaming about accidentally liking your ex's Facebook post. The truth is we don't really know what it means. Just take comfort in the fact that you're not alone. Source
  2. This week the EU's controversial "upload filter" plans moved ahead. Opponents of the plans warn that this could "ban memes" and "destroy the Internet" as we know it. If that rhetoric is true, the Internet is actually already being destroyed right under our noses, with surprisingly little pushback. Online censorship has always been a hot topic and with the EU’s proposed “upload filters” hitting the headlines, it’s at the top of the agenda once again. The fear of losing the ability to share ‘memes’ plays well on social media. Similarly, many journalists happily use ‘censorship’ in their headlines as, apparently, the fate of the Internet is at stake. A common theme is that, if the plans are implemented, powerful corporations may soon decide whether you can share something online – fair use or not. While to a degree this fear is warranted, it’s also nothing new. The ‘censorship machines’ are already up and running as we speak. YouTube, to give an example, regularly takes down videos for dubious reasons. Some are pulled manually after rightsholders file complaints, while many more are targeted by YouTube’s automated piracy filters. It’s not clear how many ‘memes’ are killed in the process, but what many people describe as the ‘censorship’ that will ‘destroy the Internet,’ is already fully operational on the largest video sharing platform of all. But the problem goes even further. Aside from copyright issues, YouTube also demonetizes certain accounts because their content isn’t advertiser-friendly. There is still free speech, to a certain degree, but not all speech can be monetized. Mind you, this policy is not forced by the EU. It’s regular business practice on the same platform where people are currently sharing their EU censorship warnings. Let that sink in for a minute… Meme killers These issues are not limited to YouTube of course. Many other sites have automated filters or approve questionable takedowns. This week, for example, Twitter removed a video of a cheering kid, because the World Cup was playing on a TV in the background. Also, accounts – including prominent ones – are frequently suspended for alleged copyright infringements which may be fair use. Similarly, Facebook is known to police its network for possibly infringing content. Like YouTube and others, they use automated filters to spot possibly infringing content, which it takes down before asking questions. Given the above, there is some irony to the fact that sites like YouTube, Facebook and Twitter are the main venues used by people protesting the EU’s looming censorship machines. Yes, the EU plans will force smaller companies to spend money on anti-piracy measures, above and beyond what they do now. They will potentially increase liability and uncertainty for startups too. That’s a legitimate concern. But censorship machines are nothing new. If we use the same rhetoric seen in various “upload filter” protests, the Internet is already being ‘destroyed’ by the Twitters, Facebooks, and YouTubes of this world. In the current climate, many large platforms will resort to filtering tools or other measures to stop copyright infringements. Their aim is to protect rightsholders, which is understandable, but unfortunately, that can also lead to collateral damage. The good news is that YouTube, or Facebook, or Twitter, are not the Internet. The Internet will be totally fine. If history has shown us anything, it’s that clever people will come up with new ways to defeat censorship attempts. While it may sound alien to many, there are alternatives for all these platforms – alternatives that people can host and control themselves. Not to pirate, but to ensure that people can share their legal work without having to worry about overzealous censorship machines. The real question is, perhaps, if the broader public will ever be ready for these kinds of tools. Twenty years ago the Internet was a place where a lot of people built stuff, but today it’s mostly a place to consume. There are still plenty of creators and contributors, but these mostly rely on large platforms over which they have no control themselves. These platforms are convenient, have a broad audience, and even allow some people to make a living. However, they also have power and control over what people are allowed to do and share, memes included. And many (ab)use that power, whether the EU tells them to or not. Instead of resorting to Twitter activism and YouTube outrage people can also take matters into their own hands, of course, but that would require some work… Perhaps someone can start a campaign for that? Source
  3. Workers lay fiber optic lines for high speed internet in Cary in December 2015. The city is the third-best internet-connected municipality in the U.S., according to a new survey. Travis Long Cary No, just because Netflix is buffering doesn't make your internet connection "literally the worst ever." In fact, if you live in the Raleigh area, your connection is probably pretty good, in the grand scheme of things. A report released June 6, lists Cary as the third most internet-connected municipality in the U.S. Raleigh follows closely, at No. 15. Yeah, really. The report, based on data collected as part of the U.S. Census Bureau’s 2016 American Community Survey, ranks all 186 municipalities in the U.S. with more than 50,000 residents. In Cary, only 11 percent of households lack a fixed high-speed internet connection, and in Raleigh, that figure is 18 percent. Across all surveyed households, 31 percent lack such a connection. The survey does not distinguish between households that do not have access to such a connection, and those who cannot afford or choose not to purchase such a connection. It includes all forms of cable, DSL and fiber-optic wired internet connections, as well as satellite and other fixed wireless connections, but not dial-up or cellular data connections. So while everyone loves to complain about their internet connection, it turns out it could be worse. Much worse. In North Carolina, Greensboro is the 35th worst-connected municipality, with 39 percent of households lacking a fixed high-speed connection. The worst on the list (which admittedly doesn't include rural areas) is Brownsville, Texas. There, only one in three households have a qualifying connection. The report comes from the National Digital Inclusion Alliance, or NDIA, a nonprofit that works toward digital equity, which they consider to be when everyone has the internet access necessary to participate in our increasingly digital society. Looking at the list, it's pretty easy to see why Cary and Raleigh rank so high: money and business. With large tech companies in the two cities and nearby Research Triangle Park drawing a large number of well-paid, tech savvy residents, it's no wonder major internet providers including Google Fiber, Spectrum and AT&T followed. The most connected major metropolis on the list is Seattle, Wash., home of tech giants Microsoft and Amazon. Not far behind are San Francisco, Calif., and the rest of the Silicon Valley area. On the other end of the spectrum, Detroit, Mich., and Cleveland, Ohio, each lack internet connections in about half of their households. Both former manufacturing hubs were hit hard by the Great Recession, and still have yet to fully recover. The report’s release came just in advance of the death of the Obama-era net neutrality regulations. The Federal Communications Commission voted to repeal the regulations in December, and the decision took effect Monday, June 11. "Under my proposal, the federal government will stop micromanaging the Internet," said FCC chairman Ajit Pai in a statement. "Instead, the FCC would simply require Internet service providers to be transparent about their practices so that consumers can buy the service plan that’s best for them." Pai’s reasoning shows why reliable access to high speed internet and net neutrality are intimately related issues, said Angela Seifer, executive director of NDIA. "Choosing the internet service plan that is best for one’s household assumes there is a choice of internet service providers with multiple speed and price offerings. This is not always the case, particularly in rural and inner city neighborhoods," Seifer said, referring to the lack of investment in internet infrastructure often faced by low-income communities, a problem frequently noted by NDIA. So, the next time you get frustrated that the Wi-Fi isn't strong enough to load Instagram in your bedroom, remember: In many cities, you still can't use a landline and the computer at the same time. Source
  4. North Korea has opened a new internet connection with the outside world, this time via Russia, a move which cybersecurity experts say would strengthen the country’s internet and its ability to conduct cyberattacks. North Korea has been blamed for several major cyberattacks in recent years, including against banks and Sony Pictures, as well as the WannaCry ransomware attack. Pyongyang has routinely denied any involvement. Dyn Research, a company which monitors internet connectivity, said it had seen Russian telecommunications company TransTeleCom routing North Korean traffic since about 0900 GMT on Sunday. Previous traffic was handled via China Unicom. TransTeleCom could not be immediately reached to comment on the report. North Korea’s internet is limited to a few hundred connections. But these connections are vital for coordinating the country’s cyber attacks, said Bryce Boland, FireEye’s chief technology office for the Asia-Pacific region. Boland also confirmed the new connection, which was first reported by 38 North, a project of the U.S.-Korea Institute at Johns Hopkins School of Advanced International Studies (SAIS). Boland said the Russian connection would enhance North Korea’s ability to command future cyberattacks. Many of the cyber attacks conducted on behalf of Pyongyang came from outside North Korea, using hijacked computers, he said, while those ordering and controlling the attacks remained inside, communicating to hackers and hijacked computers from computers within North Korea. “This will improve the resiliency of their network and increase their ability to conduct command and control over those activities,” Boland said. The Washington Post reported earlier that the U.S. Cyber Command has been carrying out denial of service attacks against hackers from North Korea. The operation was due to end at the weekend.(wapo.st/2yRbg8w) < Here >
  5. Google is speeding up its internet services in Asia once again. Fresh from expanding its data centers in the region — which are located in Singapore and Taiwan — last year, the company said today that it has switched on a new undersea cable that will quicken services like YouTube and its cloud computing platform. The cable connects Google’s facility in Taiwan with a location in Japan, which itself is connected to the U.S. via an undersea cable from the FASTER Consortium which has the honor of being the planet’s fastest fiber optic undersea cable. Google said the Japan-Taiwan cable supports speeds of up to 26 terabits per second. The search giant is particularly keen to increase data speeds in Asia because of the vast numbers of people from the region who are coming online for the first time. In a recent report co-authored with Singapore sovereign wealth fund Temasek, Google said that 3.8 million people go on the internet for the first time each month in Southeast Asia alone — that’s not even including India or other places. “You may not notice right away, but this new cable should help Google products and services load more quickly across the region. It should also improve the reliability and consistency of this speedier experience, since the cable was strategically built outside of tsunami zones to help prevent network outages related to natural disasters,” Google said in a blog post. Google said last year it has spent more than $1 billion constructing and staffing its two data centers in Asia, and no doubt there is a lot more investment to come. “With more people coming online every day in Asia than anywhere else in the world, we’ve been working hard to invest in the infrastructure needed to make the Internet work for all of us who live in the region,” it added. Article source
  6. mona


    KNOW YOUR MEME About Memes are broadly defined as culturally transmitted information, or ideas and beliefs that can be spread from one organism, or group of organisms, to another.[2] A key component to the meme concept is that the information is able to self-replicate, and in turn undergoes a type of natural selection, much like biological genes and viruses. Origin The word was coined by evolutionary biologist Richard Dawkins in his 1976 book The Selfish Gene (shown below). The book focused on the importance of self-replication in evolution, and pointed to the gene as the unit of biological information that is subject to selection pressures.[1]He postulated that perhaps not only biological information undergoes natural selection, and that anything that is capable of replicating itself would also be susceptible to selection pressures, like ideas and beliefs. The word “meme” was used to label this type of self-replicating cultural information, and it was derived from the Greek word mimema, which translates to “something imitated”. Spread With the commercialization of the internet in 1995,[6] modern memes gradually became more strongly associated with internet memes. Internet memes are associated with media, catchphrases, and more general trends that spread throughout various outlets on the World Wide Web like chat clients, blogs, social networking sites, email, forums and image boards. They’re often used to point out how trends online evolve and change over time, creating various new derivatives.[5] Russian Anti-Meme Law The Russian Anti-Meme Law refers to the Russian government’s ban on impersonating or sharing doctored image macros of public figures that are deemed out-of-context in relation to their personality or reputation in real life. The policy was introduced in early April 2015 as a direct result of a court decision in Moscow which ruled the unauthorized use of Russian singer Valeri Syutkin’s images as an internet meme to be an infringement of his privacy. However in other areas of the world, the ban showed a Streisand Effect as satire and memeification towards Russia’s President Vladimir Putin showed an increase. #MemeGate #MemeGate refers to an online feud between YouTubers LeafyIsHere and Ethan Klein of h3h3productions starting in late March 2016. The primary causes of the disagreement centered on accusations that LeafyIsHere cyberbullyied young and disabled vloggers and that Klein was hypocritical and preached sanctimonious views. Various Examples Related Sites KnowYourMeme Know Your Meme is a database style website run by the Cheezburger Network. Although the site has a small support team, the site is largely dependent on crowdsourcing for the documentation of memes as they develop and for the submission of viral media as it spreads. Encyclopedia Dramatica Encyclopedia Dramatica (or ED) is a satirical internet-culture based wiki created in late 2004 dedicated to documenting and categorizing internet memes and other cultural phenomenon. It is famous for having NSFW content that is largely uncensored. Originally hosted at encyclopediadramatica.com, it was turned into the “safe for work” Semantic Mediawiki OhInternet. Most of the articles were salvaged from the website and are available for download, and a new wiki EncyclopediaDramatica.se (previously EncyclopediaDramatica.es, .se, and .ch) has been set up containing most of the old articles, and is constantly being updated with new articles. TV Tropes TV Tropes is a wiki devoted to the documentation of “tropes”, which are tools of the trade for storytelling in movies, television shows, literature, memes, and other forms of media. These conventions and devices are used in all forms of fiction, and should not be confused with clichés. Related Subcultures The Internet The Internet is a system of interconnected computer networks linking billions of machines worldwide using the TCP/IP Internet protocol suite. Use of the Internet in the West expanded rapidly throughout the 1990s, growing over 100x within two decades. The Internet is the source of internet memes and is naturally the subject of numerous memes. Fandoms A fandom is a social group based around a particular interest and comprised of individuals who share that interest. On the internet, the term is typically used to refer to the fans of media franchises. It is often associated with fanfiction, as well as fan-made art and music. Fandoms are known for spawning large varieties of memes and in-jokes. Meme Elitism Meme Elitisim is an online ideology rooted in the opposition to the popularization of memes among non-underground communities and the mainstream media. While elitism has been a staple element of online communities since the days of Usenet newsgroups, such disdain for the promulgation of meme culture can be seen as a countermovement to the growing influence of social media in the Internet culture which began in the late 2000s. Those who pertain to this belief tend to have ties with online communities that thrived before the arrival of Web 2.0 and view themselves as arbitrators of what a meme can be and cannot be. Ironic Memes Ironics Memes is a subculture surrounding memes that are used satirically, usually by being deliberately humorless, crude, or overused, as a way to both criticize meme or meme elitism cultures, which has been considered by some to have become overused and unfunny with time, usually due to The Family Guy Effect, as well as to catch those with less Internet experience off guard. The use of ironic memes often includes intentional overuse of older Internet phenomena, such as 1337 speak or rage comics, as well as the use of the word “meme” as a replacement for some parts of speech, usually nouns or verbs. Related Memes Various meta memes exist that make use of the word meme or memes within their own memes. Meme Lord / Meme Master Meme Lord is an internet slang term used to refer to someone who shows a strong passion for memes.[9] The alternate term Meme Master is often used as a synonym.[10] Meme Master was first used on March 2nd, 2006, by user Duffergeek on his blog.[11] In his post titled C’est la même meme he posts various facts about himself and near the end says “1. Leslie – Go Go Meme Master!” Memeing Memeing is an internet slang verb that means to create or spread a meme. In 2013, the verb evolved to also mean communicating through memes.[7] On May 3rd, 1996, Matthew Aaron Taylor first used the term memeing in the title Fiction, AL, and the Memeing of Life for an online article about memes on the site Telepolis.[8] Meme Overload Meme Overload is internet slang which indicates that multiple internet meme references have been made. It often refers to images and videos, but can also be seen as a subgenre of online remix culture largely driven by the hyperinflation of online media and in-jokes in general. Meme Magic Meme Magic is a slang term used to describe the hypothetical power of sorcery and voodoo supposedly derived from certain internet memes that can transcend the realm of cyberspace and result in real life consequences. Since its coinage on the imageboard 8chan, the fictitious concept has gained popularity on 4chan’s /pol/ (politically incorrect) board and been heavily associated with several in-jokes and shitposting fads on the site, including Ebola-chan, Baneposting, and Donald Trump. Dank Memes Dank Memes is an ironic expression used to mock online viral media and in-jokes that have exhausted their comedic value to the point of being trite or cliché. In this context, the word “dank,” originally coined as a term for high quality marijuana, is satirically used as a synonym for “cool.” External References [1] Wikipedia – Richard Dawkins; Fathering the meme [2] Dictionary – Meme [3] KnowYourMeme – Internet Meme Database [4] Encyclopedia Dramatica – Main Page [5] Wikipedia – Internet meme [6] FAQs – Internet – The 1970s, The 1980s, Birth of the Internet [7] Urban Dictionary – Memeing [8] Telepolis – Fiction, AL, and the Memeing of Life [9] Urban Dictionary – memelord [10] Urban Dictionary – meme master [11] Duffergeek – Duffergeek March 2006 SOURCE and much more on the subject Special thanks goes to @SnakeMasteR who posted somewhere else the link to the site Hey @fl0ppyd1scours3, you might be interested, as you are the starter of nsane general meme thread.
  7. Hi I have a broadband connection and a 4G mobile data service as internet service to my laptop (Windows). The broadband data speed is high but the internet service goes off often and resumes. To manage that I got a 4G mobile data service - internet connection which has lower data speed while is having a daily limit. I always connect both my broadband and 4G mobile data service with my laptop. When both services are up, how to know which internet service (broadband or 4G mobile) is being utilized by system (alternatively, how to assign broadband as preferred internet connection for the system?) Looking for a (internet service / connection fail-over mechanism) software or any internet network configuration such that the internet for laptop works mainly on broadband and should switch AUTOMATICALLY to mobile data service, in case of broadband service failure and switch BACK automatically to broadband, once the broadband service resumes Thank you
  8. Firefox Portable Latest Build Online Installer by demon.devin (Softables.tk/) Built using the latest version of my PortableApps Compiler; Installer code included as well. Thanks to @Geez for pointing me in the right direction for adding the version selection custom install page. I had to heavily rewrite and debug anyway but I got it and it looks sweet.. To upgrade Firefox Portable, simply rerun the installer and enter your desired version of Firefox that you would like to download and install. New In Rev. 2: When installing this PAF, there's a page where it asks you to enter the version you want to install. To install the latest, stable build enter: latest To install the latest, Beta build enter: beta To install the latest, DevEdition build enter: devedition To install the latest, ESR build enter: esr To install any other version, enter the version number of that build and install as normal. HASHES: CRC32: 3288851D MD5: B5148B93B1ADAA4719B747B12EE1559C DOWNLOADS: Mirrors: http://softables.tk/depository/internet/firefox Site: https://www.upload.ee Sharecode[?]: /files/7601871/FirefoxPortable_x86_x64_Latest_Builds_Rev._2_online.paf.exe.html
  9. Last Friday, someone in Google fat-thumbed a border gateway protocol (BGP) advertisement and sent Japanese Internet traffic into a black hole. The trouble began when The Chocolate Factory “leaked” a big route table to Verizon, the result of which was traffic from Japanese giants like NTT and KDDI was sent to Google on the expectation it would be treated as transit. Since Google doesn't provide transit services, as BGP Mon explains, that traffic either filled a link beyond its capacity, or hit an access control list, and disappeared. The outage in Japan only lasted a couple of hours, but was so severe that Japan Times reports the country's Internal Affairs and Communications ministries want carriers to report on what went wrong. BGP Mon dissects what went wrong here, reporting that more than 135,000 prefixes on the Google-Verizon path were announced when they shouldn't have been. Since it leaked what the monitors call “a full table” to Verizon, the fat-thumb error also provided a “peek into what Google's peering relationships look like and how their peers traffic engineer towards Google”. For example, BGP Mon explains how the mistake hit ISP Jastel (Jasmine Telecom) in Thailand: “If we take a closer look at the AS paths involved starting at the right side, we see the prefix was announced by 45629 (Jastel) as expected. Since Jastel peers with Google (15169) that’s the next AS we see. The next AS in the path is 701 (Verizon) and this is where it is getting interesting as Verizon has now started to provide transit for Jastel via Google. “Verizon (701) then announced that to several of it’s customers, some of them very large such as KPN (286) and Orange (5511). So by just looking at four example paths we can see it hit large networks in Europe, Latin America, the US, and India (9498 Airtel).” BGP is the Internet's protocol for distributing routing information between networks. A BGP advertisement shouts out to the rest of the internet to announce things like “if you give me traffic for Verizon, it will reach its destination”. Designed for a more trusting (and much smaller) Internet, BGP's most serious shortcoming is that it's up to network admins to check and filter information in route advertisements. As BGP Mon notes, BGP leaks are “a great risk to the Internet's stability”, and both sides of an advertisement should be filtering them before accepting them. Previous BGP incidents have sent YouTube traffic to Pakistan, blackholed Chinese traffic, made Belarus the default route for more traffic than it could handle, and redirected Level 3's traffic to Malaysia. There are various proposals to tweak BGP to stop this sort of thing happening, but as is so often the case, implementation is lagging far behind requirement. Article BGPMON - explanation of cause of outages in Japan and beyond
  10. All modern web browsers leak extension information to sites if the sites run scripts to pull the information. We talked about the findings of a research term that published its findings recently in a paper. Unless scripts are blocked, sites may run scripts that check the response time of the browser as it is different when checks are made for fake extensions and fake resources, and existing extensions and fake resources. Firefox's situation is special, as it supports the legacy add-on system and the new WebExtensions system. The researcher tested the browser's legacy add-on system only, but suggested that Firefox's new system would also be vulnerable. An anonymous reader pointed out that Firefox's WebExtensions system uses random IDs, and that this meant that the method to enumerate extensions would not work in that case (unlike in Chrome and other Chromium based browsers). While that is correct, Mozilla's implementation introduces a new issue that allows sites to identify users if WebExtensions expose content to sites as the random IDs are permanent. "... in particular, they [Mozilla] changed the initial scheme (moz-extension://[extID]/[path]) to moz-extension://[random-UUID]/[path]. Unfortunately, while this change makes indeed more difficult to enumerate user extensions, it introduces a far more dangerous problem. In fact, the random-UUID token can now be used to precisely fingerprint users if it is leaked by an extensions. A website can retrieve this UUID and use it to uniquely identify the user, as once it is generated the random ID never changes. We reported this design-related bug to Firefox developers as well." If a site manages to get hold of the ID, it may track the Firefox installation as that ID never changes. This is not just theoretical either; Earthling, one of the maintainers of the Ghacks Firefox user.js file, has created a proof of concept that highlights a leak in Firefox's native Screenshot tool. While this particular example requires that users click on the screenshot button in the Firefox interface to make the unique ID available to the site, other extensions may expose content without user interaction. Apple's Safari uses a random UUID system as well, and the researchers discovered that they could enumerate about 40% of all extensions as its implementation is flawed. If the WebExtension exposes content to sites because they have implementation flaws, sites may fingerprint users based on the unique ID that gets exposed in the process. Closing Words Mozilla needs to rework the implementation to protect users of the browser from this. Even if you don't use WebExtensions at all, you may be vulnerable to this as Firefox ships with several system add-ons that may expose the ID to sites. (Thanks Pants and Earthling) Article source
  11. If you want fast broadband, move to Singapore, Sweden or Taiwan. The USA, Canada and the UK have slower broadband speeds but at least they are in the world's top 31 countries out of 189. If you want slow, Burkina Faso, Gabon and Yemen make up the bottom three. Singapore is well ahead of the pack with the fastest average (mean) download speed of 55.13Mbps, according to a report from cable.co.uk that ranks 189 countries. Sweden is a comfortable second (40.16Mbps) followed by Taiwan (34.40Mbps). However, British and American users are not so lucky. The USA is in 21st place on 20.00Mbps, and Canada takes 26th with 18.03Mbps. The UK comes 31st with 16.51Mbps, behind 19 other European countries. (At least we made the top 20 in Europe.) The numbers are based on more than 63 million test results, though 45.4 million of those were in the USA, 4 million in Canada and 2.4 million in Australia. There were only 218 from Burkina Faso, where the average speed was 0.49Mbps. The only slower places were Gabon (0.41Mbps) and Yemen (0.34Mbps). The report says a user in Singapore could download a Full HD movie (7.5GB) in 18 minutes and 34 seconds. It would take an American 51'13" and a Brit just over an hour. For the average Yemeni, the download time stretches to 2 days, 2 hours, 2 minutes and 28 seconds. The results favour small countries with concentrated populations, like Singapore, and countries that have installed the most fiber optic broadband, such as Sweden and Latvia. They also show the benefits of having smart governments that are committed to advanced technologies. Again, Singapore is the world leader: it has been pushing its "intelligent island" theme for decades. Others include fourth-placed Denmark (33.54Mbps), sixth-placed Latvia (30.36Mbps) and, in 13th place, Estonia (24.11Mbps). The UK is not the only developed nation to score badly. Other examples include France (13.43Mbps), Italy (10.71Mbps) and Israel (7.2Mbps). The data was compiled by M-Lab, a consortium that includes New America's Open Technology Institute (OTI), Google Open Source Research and Princeton University's Planet Lab. M-Lab says it "provides the largest collection of open Internet performance data on the planet". Anyone can test their broadband speed at M-Lab's website. Article source
  12. This week a man in the US uploaded the remaining three episodes of Power to the Internet in advance of their commercial release. It was clear he didn't care about being identified. Or, presented with tools to pirate with ease, it's possible he didn't even consider it. With that in mind, are we all now just a click away from being a piracy supplier? For several decades the basic shape of the piracy market hasn’t changed much. At the top of the chain there has always been a relatively small number of suppliers. At the bottom, the sprawling masses keen to consume whatever content these suppliers make available, while sharing it with everyone else. This model held in the days of tapes and CDs and transferred nicely to the P2P file-sharing era. For nearly two decades people have been waiting for those with the latest content to dump it onto file-sharing networks. After grabbing it for themselves, people share that content with others. For many years, the majority of the latest music, movies, and TV shows appeared online having been obtained by, and then leaked from, ‘The Scene’. However, with the rise of BitTorrent and an increase in computer skills demonstrated by the public, so-called ‘P2P release groups’ began flexing their muscles, in some cases slicing the top of the piracy pyramid. With lower barriers to entry, P2P releasers can be almost anyone who happens to stumble across some new content. That being said, people still need the skill to package up that content and make it visible online, on torrent sites for example, without getting caught. For most people that’s prohibitively complex, so it’s no surprise that Average Joe, perhaps comforted by the air of legitimacy, has taken to uploading music and movies to sites like YouTube instead. These days that’s nothing out of the ordinary and perhaps a little boring by piracy standards, but people still have the capacity to surprise. This week a man from the United States, without a care in the world, obtained a login for a STARZ press portal, accessed the final three episodes of ‘Power’, and then streamed them on Facebook using nothing but a phone and an Internet connection. From the beginning, the whole thing was ridiculous, comical even. The man in question, whose name and personal details TF obtained in a matter of minutes, revealed how he got the logins and even recorded his own face during one of the uploaded videos. He really, really couldn’t have cared any less but he definitely should have. After news broke of the leaks, STARZ went public confirming the breach and promising to do something about it. “The final three episodes of Power’s fourth season were leaked online due to a breach of the press screening room,” Starz said in a statement. “Starz has begun forensic investigations and will take legal action against the responsible parties.” At this point, we should consider the magnitude of what this guy did. While we all laugh at his useless camera skills, the fact remains that he unlawfully distributed copyright works online, in advance of their commercial release. In the United States, that is a criminal offense, one that can result in a prison sentence of several years. It would be really sad if the guy in question was made an example of since his videos suggest he hadn’t considered the consequences. After all, this wasn’t some hi-tech piracy group, just a regular guy with a login and a phone, and intent always counts for something. Nevertheless, the situation this week nicely highlights how new technology affects piracy. In the past, the process of putting an unreleased movie or TV show online could only be tackled by people with expertise in several areas. These days a similar effect is possible with almost no skill and no effort. Joe Public, pre-release TV/movie/sports pirate, using nothing but a phone, a Facebook account, and an urge? That’s the reality today and we won’t have to wait too long for a large scale demonstration of what can happen when millions of people with access to these ubiquitous tools have an urge to share. In a little over two weeks’ time, boxing legend Floyd Mayweather Jr fights UFC lightweight champion, Conor McGregor. It’s set to be the richest combat sports event in history, not to mention one of the most expensive for PPV buyers. That means it’s going to be pirated to hell and back, in every way possible. It’s going to be massive. Of course, there will be high-quality paid IPTV productions available, more grainy ‘Kodi’ streams, hundreds of web portals, and even some streaming torrents, for those that way inclined. But there will also be Average Joes in their hundreds, who will point their phones at Showtime’s PPV with the intent of live streaming the biggest show on earth to their friends, family, and the Internet. For free. Quite how this will be combatted remains to be seen but it’s fair to say that this is a problem that’s only going to get bigger. In ten years time – in five years time – many millions of people will have the ability to become pirate releasers on a whim, despite knowing nothing about the occupation. Like ‘Power’ guy, the majority won’t be very good at it. Equally, some will turn it into an art form. But whatever happens, tackling millions of potential pirates definitely won’t be easy for copyright holders. Twenty years in, it seems the battle for control has only just begun. Source
  13. As malicious hackers mount ever more sophisticated attacks, China is about to launch a new, "unhackable" communications network - at least in the sense that any attack on it would be quickly detected. The technology it has turned to is quantum cryptography, a radical break from the traditional encryption methods around. The Chinese project in the city of Jinan has been touted as a milestone by state media. The pioneering project is also part of a bigger story: China is taking the lead in a technology in which the West has long been hesitant to invest. In the Jinan network, some 200 users from the military, government, finance and electricity sectors will be able to send messages safe in the knowledge that only they are reading them. China's push in quantum communication means the country is taking huge strides developing applications that might make the increasingly vulnerable internet more secure. Applications that other countries soon might find themselves buying from China. So, what is this technology into which the country is pouring massive resources? 'Unhackable' communication If you send a message you want to keep secure from eavesdroppers, traditional encryption works by hiding the key needed to read the message in a very difficult mathematical problem. But what is "difficult" in terms of maths? It means you have to think really fast to figure it out as you try endless combinations of long, numeric keys. In 2017, that means you need to use a very powerful computer. Steady improvements in computer power mean that the number-based keys have to be lengthened periodically. Encryption has a shelf life and is rapidly becoming more vulnerable. There are also fears that the development of quantum computers, which effectively represent a massive step change in number crunching ability, will render much of modern encryption software vulnerable. Quantum communication works differently: If you want to send your secure message, you first separately send a key embedded in particles of light Only then doyou send your encrypted message and the receiver will be able to read it with the help of the key sent beforehand The crucial advantage of this so-called quantum key distribution is that if anyone tries to intercept the light particles, they necessarily alter or destroy them. What this means is that any attempt at hacking will immediately be noticed by the original sender and the intended receiver - hence its description as "unhackable". Leaving the West behind If quantum communication can help to secure online communications, why is China so far ahead? "For a long time people simply didn't think it was needed," says Prof Myungshik Kim of Imperial College, London, adding that it was not clear whether there was a commercial market for this technology. "The mathematical difficulty of the current coding system was so high that it was not thought necessary to implement the new technology," he says. The research itself is not new and China does not have an edge over the competition. Where it does have an advantage is when it comes to applications. "Europe has simply missed the boat," says Prof Anton Zeilinger, a quantum physicist at Vienna University in Austria and a pioneer in the field. He says he tried to convince the EU as early as 2004 to fund more quantum-based projects but it had little effect. "Europe has been dragging its feet and this has hindered us from being able to compete," he says. There are quantum key-based networks operating in the US and Europe but most are being carried out as research projects, rather than with commercial partners. Creating a market One problem is that it is expensive to build applications like the Jinan network. And if there is not yet a commercial market, it is hard to get investors or governments as backers. "We have to admit that when China invests into something, they have the financial power and manpower that is beyond probably anything else in the world except the US military," says Valerio Scarani, a physicist with Centre for Quantum Technologies at the National University of Singapore. The Jinan network is not the only quantum communication application China has developed. Last year, it launched a satellite equipped to test quantum communication over large distances that cannot be bridged by cables. There has also been a link established between the country's two main hubs, Beijing and Shanghai, so both ends can communicate and know when others are listening in. So while it might not be clear yet whether quantum communication will indeed be the one technology to replace traditional encryption, it is widely considered as one of the leading candidates. And China, in turn, is the leading country when it comes to building and experimenting with real applications of it. "It's a situation where the technology can create its market," says Prof Zeilinger. Once the technology is sold by Chinese companies, international banks might well be the first lining up as customers. Article source
  14. The use of the internet is growing rapidly and most of the people use the internet now. In the earlier times a small proportion of the people were using the internet but today it has become an essential part of our lives. We can find answers to almost every question through the internet. You can visit any website according to our need. Simply type the website name and you get the website loaded on your browser. But the most important role in this internet game is played by IP address which stands for Internet Protocol. Only because of the IP addresses, all the computers can communicate with the other. Every internet connection has a unique IP address. Do you know your device’s IP address? Just Google, “What is my IP address” and you will get your IP address. The first major version of the Internet Protocol was IPv4. IP addresses provided by IPv4 are in binary numbers. But now, a new version of IP address has come up. Well, due to the growing number of Internet connections, the IP addresses of IPv4 were running out due to which IPv6 came into the existence to fulfill the requirement of the IP addresses. Not only for providing the IP addresses but IPv6 features are also somewhat different from those of the IPv4. There are many differences between these two different versions of IP. If you want to know the difference between IPv4 and IPv6 then this article will help you. Difference Between IPv4 and IPv6 This article contains top 10 differences between IPv4 and IPv6 which you should know. So, let’s explore them. 1. IPv4 vs IPv6: Address The major difference between IPv4 and IPv6 is their address structure. The main reason due to which IPv6 came into existence is to fulfill the need of the IP addresses for different devices across the world as IP addresses provided by IPv4 were not sufficient. So, the address structure of IPv6 is far different from that of IPv4 so that it can accommodate as many IP addresses as required. The address of IPv4 is 32-bits long and is composed of host portion and network. All the IPv4 addresses are categorized into different classes on the basis of few initial values. The form of IPv4 addresses is like aaa.aaa.aaa.aaa where 0<=aaa<=255 and each aaa is a decimal digit. There are 4, 294, 967, 296 IPv4 addresses in total. Now come to the address structure of IPv6. Well, the number of IPv6 addresses are way more than IPv4. It utilizes 128 bit IP addresses. So, the total number of IPv6 address are 2^128 which is equal to 340,282,366,920,938,000,000,000,000,000,000,000,000. This huge number ensures that there are enough IP addresses to keep the internet running smoothly for a really long time. 2. IPv4 vs IPv6: Address Scope and Address Types All of the addresses provided by IPv4 are global. But some of the address ranges are designated to the private. The address scope is not applicable to the unicast addresses in IPv4. But in the case of IPv6, address scope is a part of the architecture. There are two address scopes of unicast addresses, one is global and the other one is local. And the multicast addresses have 14 scopes. The address types in IPv4 are unicast, multicast and broadcast. Whereas there are multicast, unicast, and anycast address types in IPv6. 3. IPv4 vs IPv6: HostTable Host table is supported by IPv4. This table is quite important and is used by socket name resolver before a DNS lookup or after the DNS lookup fails. It is a configuration table which associates and internet address with the host name, for ex- On the other hand, host table is not supported in IPv6 and because of this, the user will have to configure AAAA records in DNS for the domain resolution in IPv6. The DNS can be locally run on the same system or you can even run it on a different system. What is Ethernet Cable? Purpose & Usage of Ethernet Cable 4. IPv4 vs IPv6: ICMP and IGMP To communicate the network information, IPv4 uses ICMP which stands for Internet Control Message Protocol. Well, in IPv6 too, the same is used to communicate network information. But the IPv6 version of ICMP i.e. ICMPv6 has some additional attributes. Also, new codes and types are also added for the support of neighbor discovery and other related functions. IGMP has two functions in IPv4 hosts viz. to inform IPv4 routers of existing multicast group listeners and to find the host that want traffic for the particular multicast Group. But in IPv6, IGMP has been replaced by the MLD(Multicast Listener Discovery) protocol for IPv6. It does all the things which IGMP does for IPv4 but it also uses ICMPv6 by adding some MLD-specific ICMPv6 type values. 5. IPv4 vs IPv6: Private And Public Addresses All the IP addresses provided by IPv4 are public but there are three ranges of the IP addresses which are not public and are private addresses. This private addresses can not be routed across the internet and are only used by the organizations. These private addresses are designated as private by IETF RFC 1918. These private ranges are 10.*.*.*(10/8), through, and 192.168.*.* (192.168/16). In IPv6, there is also the similar concept and there are some differences too. There are temporary addresses and the public addresses. The temporary addresses are different from the private ones provided by IPv4. The temporary addresses can be globally routed and for the privacy concerns, these addresses are meant to hide or shield the identity of the client when it starts a communication. Also, the lifetime of these temporary addresses is limited. 6. IPv4 vs IPv6: Security IPv4 is less secure. IPv6 has more security features. See, IPv4 was created a long time ago and it is already overloaded. The systems are provided IP addresses in IPv4 by IP sharing because IP addresses are few and the number of connections is very large. More than one systems have the same IP address. For instance, If at your home 2 or more PCs to the same WiFi network then you will find that all of them have the same IP address which means a hacker can access more systems with a single IP address. IPv6 has stronger security. It has implemented powerful techniques for authentication and encryption. 7. IPv4 vs IPv6: Packet structure An IPv4 packet has two parts: Header and data section. IPv6 packet also has two parts: Header and Payload. The IPv4 Header structure has 14 fields out of which 13 are compulsory. IPv6 Header has minimal fields. The Header takes 320 bits of IPv6 packet and the payload should be less than 64KB. However, with Jumbo payload option the size of the payload may go up to 4 GB. 8. IPv4 vs IPv6: Configuration When you buy a new system then it is required to configure it. You will need to configure the system so that it can communicate with the other system which is the main function of IP addresses. So, you will need to configure the IPv4 addresses and also assign the routes. On the other hand, the configuration is optional in IPv6. As the interfaces of IPv6 are self-configurable using IPv6 stateless auto configuration. But if you don’t want to auto-configure your system then you can also configure it manually so that the system could communicate with the other computers whether local or remote depending on the type of the network. 9. IPv4 vs IPv6: Quality Of Service (QOS) The quality of service of IPv6 is better than that of the IPv6. There are many similarities between the QOS of these two protocols but the main difference lies in the header context and due to this, there is a difference between the packet processing during the transmission. The header context of IPv4 which is 8-bit DS is used to categorize the packet also, the service which is associated with it. The header of IPv6 is 20-bit DS which offers quicker processing of the packets. All the packets originating from the same source and terminating to a particular destination are identified and handled by the router allowed by the header of IPv6. The delivery of packet becomes faster and more efficient as the flow of packet processing is recognized by the combination of packet value of flow label and packet source. And this eventually improves the Quality of Service of IPv6. IPv6 provides flexible options, extensions, and easier administration. 10. IPv4 vs IPv6: Mobility IPv4 used triangular routing for transferring packets in mobiles. It was a problem for many communication networks. However, the mobile version of IPv6 does not use triangular routing and is more efficient. IPv6 also allows entire subnets to move to a new router without renumbering. These were the top 10 differences between IPv4 and IPv6. Hope you found the article helpful. Stay tuned for more interesting and informative content. IPv6 is newer to the internet and more than 95% of the websites, users, and ISPs are still using the overloaded IPv4. Websites are making the transition to IPv6 but the internet service providers have to provide its users compatibility for both IPv4 and IPv6. Hope you found the article helpful. Stay tuned for more interesting and informative content. Article source
  15. TCP BBR congestion control comes to GCP – your Internet just got faster We're excited to announce that Google Cloud Platform (GCP) now features a cutting-edge new congestion control algorithm, TCP BBR, which achieves higher bandwidths and lower latencies for internet traffic. This is the same BBR that powers TCP traffic from google.com and that improved YouTube network throughput by 4 percent on average globally — and by more than 14 percent in some countries. GCP customers, like WP Engine, automatically benefit from BBR in two ways: From GCP services to cloud users: First, when GCP customers talk to GCP services like Cloud Bigtable, Cloud Spanner or Cloud Storage, the traffic from the GCP service to the application is sent using BBR. This means speedier access to your data. From Google Cloud to internet users: When a GCP customer uses Google Cloud Load Balancing or Google Cloud CDN to serve and load balance traffic for their website, the content is sent to users' browsers using BBR. This means faster webpage downloads for users of your site. At Google, our long-term goal is to make the internet faster. Over the years, we’ve made changes to make TCP faster, and developed the Chrome web browser and the QUIC protocol. BBR is the next step. Here's the paper describing the BBR algorithm at a high level, the Internet Drafts describing BBR in detail and the BBR code for Linux TCP and QUIC. What is BBR? BBR ("Bottleneck Bandwidth and Round-trip propagation time") is a new congestion control algorithm developed at Google. Congestion control algorithms — running inside every computer, phone or tablet connected to a network — that decide how fast to send data. How does a congestion control algorithm make this decision? The internet has largely used loss-based congestion control since the late 1980s, relying only on indications of lost packets as the signal to slow down. This worked well for many years, because internet switches’ and routers’ small buffers were well-matched to the low bandwidth of internet links. As a result, buffers tended to fill up and drop excess packets right at the moment when senders had really begun sending data too fast. But loss-based congestion control is problematic in today's diverse networks: In shallow buffers, packet loss happens before congestion. With today's high-speed, long-haul links that use commodity switches with shallow buffers, loss-based congestion control can result in abysmal throughput because it overreacts, halving the sending rate upon packet loss, even if the packet loss comes from transient traffic bursts (this kind of packet loss can be quite frequent even when the link is mostly idle). In deep buffers, congestion happens before packet loss. At the edge of today's internet, loss-based congestion control causes the infamous “bufferbloat” problem, by repeatedly filling the deep buffers in many last-mile links and causing seconds of needless queuing delay. We need an algorithm that responds to actual congestion, rather than packet loss. BBR tackles this with a ground-up rewrite of congestion control. We started from scratch, using a completely new paradigm: to decide how fast to send data over the network, BBR considers how fast the network is delivering data. For a given network connection, it uses recent measurements of the network's delivery rate and round-trip time to build an explicit model that includes both the maximum recent bandwidth available to that connection, and its minimum recent round-trip delay. BBR then uses this model to control both how fast it sends data and the maximum amount of data it's willing to allow in the network at any time. Benefits for Google Cloud customers Deploying BBR has resulted in higher throughput, lower latency and better quality of experience across Google services, relative to the previous congestion control algorithm, CUBIC. Take, for example, YouTube’s experience with BBR. Here, BBR yielded 4 percent higher network throughput, because it more effectively discovers and utilizes the bandwidth offered by the network. BBR also keeps network queues shorter, reducing round-trip time by 33 percent; this means faster responses and lower delays for latency-sensitive applications like web browsing, chat and gaming. Moreover, by not overreacting to packet loss, BBR provides 11 percent higher mean-time-between-rebuffers. These represent substantial improvements for all large user populations around the world, across both desktop and mobile users. These results are particularly impressive because YouTube is already highly optimized; improving the experience for users watching video has long been an obsession here at Google. Ongoing experiments provide evidence that even better results are possible with continued iteration and tuning. The benefits of BBR translate beyond Google and YouTube, because they're fundamental. A few synthetic microbenchmarks illustrate the nature (though not necessarily the typical magnitude) of the advantages: Higher throughput: BBR enables big throughput improvements on high-speed, long-haul links. Consider a typical server-class computer with a 10 Gigabit Ethernet link, sending over a path with a 100 ms round-trip time (say, Chicago to Berlin) with a packet loss rate of 1%. In such a case, BBR's throughput is 2700x higher than today's best loss-based congestion control, CUBIC (CUBIC gets about 3.3 Mbps, while BBR gets over 9,100 Mbps). Because of this loss resiliency, a single BBR connection can fully utilize a path with packet loss. This makes it a great match for HTTP/2, which uses a single connection, and means users no longer need to resort to workarounds like opening several TCP connections to reach full utilization. The end result is faster traffic on today's high-speed backbones, and significantly increased bandwidth and reduced download times for webpages, videos or other data. Lower latency: BBR enables significant reductions in latency in last-mile networks that connect users to the internet. Consider a typical last-mile link with 10 Megabits of bandwidth, a 40 ms round-trip time, and a typical 1000-packet bottleneck buffer. In a scenario like this, BBR keeps queuing delay 25x lower than CUBIC (CUBIC has a median round-trip time of 1090 ms, versus just 43 ms for BBR). BBR reduces queues and thus queuing delays on last-mile links while watching videos or downloading software, for faster web surfing and more responsive video conferencing and gaming. Because of this ability to curb bufferbloat, one might say that BBR could also stand for BufferBloat Resilience, in addition to Bottleneck Bandwidth and Round-trip propagation time. GCP is continually evolving, leveraging Google technologies like Espresso, Jupiter, Andromeda, gRPC, Maglev, Cloud Bigtable and Spanner. Open source TCP BBR is just the latest example of how Google innovations provide industry-leading performance. Article source
  16. straycat19

    Internet Speed Up By Changing DNS

    What DNS is best for you? The big question is how to find a new DNS and how to know it will be any better than your current one. Google has a solution called namebench. This lightweight program will test your DNS against other popular DNS servers. Once it finishes the comparison, it will give you detailed statistics on performance and recommend the best DNS for you to use. Download Instructions To download the program, navigate to the namebench download page by using the links at the end of this article. On the left side of the namebench download page, there is a green header labeled "Featured." Here is where you will find the program you need. For PC users, click the second download link with the ending "Windows.exe". Mac users should select the download link ending in "Mac_OS_X.dmg". You will be redirected to another page that has another download link. This link should be highlighted in green and have the same name as the previous download link you clicked. Note: If the download link is not highlighted in green or the download link is different from the first, do not click on it. It is not the download link you're looking for. Click the highlighted download link and your download will begin immediately. After the download is complete, extract the installation files. namebench will launch automatically. Managing namebench On the first window, you'll see a field labeled Nameservers. This will automatically be filled with the IP address of your current DNS. Below the Nameservers field are two checkboxes. One says "Include global DNS providers," the other says "Include best available regional DNS services." Leave both of these checked. The next area is for secondary options. The first checkbox lets you check if the DNS is blocking certain sites. If you're looking for a DNS with filtering options, definitely select this one. It will tell you how effective a DNS is at blocking unwanted content. The second checkbox will publish your results anonymously. This will help provide more accurate results to you and others in the future. You can leave this blank or check it. Neither will affect the comparisons you're given. Next, set the location dropdown to your country. In the Query Data Source dropdown menu, select your default browser. If you aren't sure what browser you use, visit this site. In the Health Check Performance section, you normally want this set to Fast. This will test the speed of 40 nameservers. But if your Internet connection is slow or unreliable, change Fast to "Slow (unstable network)." For the number of queries, the standard 250 should be sufficient. But if you're on a slower network, you may want to decrease the amount. Once you've got your settings in place, hit Start Benchmark. While namebench is running, you should avoid using the Internet as that can affect its results. When namebench completes, it will open up a new browser window with your results. There's a lot of information in this window. We'll focus on the most important parts. The first box gives you a DNS recommendation and tells you the possible speed increase by switching. The box immediately to the right gives you the settings of the recommended DNS and two backups. Below these boxes are a series of charts and graphs. These visualize and breakdown the performance of each DNS. You can find exact details about each graph at Namebench's wiki. Change your router settings Now that you know which DNS is best for you, you need to change the settings on your router. That improves all the gadgets on your network. To edit your router settings, you'll need to open your browser and type in your router's IP address and enter your username and password. You can find out your router's default IP address and login information in the router manual. Once you access the router's settings, take a look under the basic settings. You should see fields for Primary DNS and Secondary DNS. Write down both of the IP addresses in case you need to go back to them later. Next, replace the existing IP addresses with the Primary and Secondary IP addresses from Namebench's "Recommended configuration" box. Then Save your router settings and log out. If you don't have a router, you can change the DNS settings right on your computer. For Windows, look under Start>>Control Panel>>Network and Internet>>Network and Share Center. Click the "Manage network connections" link on the left. Right-click on the Local Area Connection icon and select Properties. Under the Networking tab, click on Internet Protocol Version 4 and click the Properties button. Under the General tab, click "Use the following DNS server addresses" and enter the DNS addresses provided by namebench. Then click OK. On a Mac, go to System Preferences>>Network. Click the lock icon in the lower left corner and enter your password. Select Built-in Ethernet and click Advanced. Select the DNS tab and click the + icon. Add the DNS addresses from namebench and put them at the top of the list. Click Apply and OK. Flush the old DNS cache Once your DNS is changed on your router or computer, there is still one more task. To finish, you'll want to flush your computer's current DNS cache. This prevents it from trying to use the old DNS server to look up sites you visit often. To flush your DNS on Windows Vista or later, type CMD into the search field in the Start menu and hit Enter. A Command window should open up. Type "ipconfig /flushdns" (minus quotes). Now hit Enter and you should see "Successfully flushed the DNS Resolver Cache." To flush your DNS on Mac OS X, first click on Spotlight. It's the magnifying glass at the top right. Now type in Terminal and hit Enter. When the Terminal window opens, enter "dscacheutil -flushcache" (no quotes). Now hit Enter. You should see "bash-2.05a$ dscacheutil -flushcache" if all went well. Namebench Downloads Page Namebench Wiki
  17. straycat19

    Quick Internet Speed Measurement

    Netflix has provided a site that requires nothing more than going to it in the browser of your choice and it automatically begins measuring your connection speed. No ads, no forms to fill out, just results on your connection. Website Link
  18. Both paid and unpaid apps can track your data. The apps pictured may not - but it’s hard to know which do and which don’t. Anyone who spends much time online knows the saying: “If you’re not paying, you’re the product”. That’s not exactly correct. On the internet, you’re nearly always the product. And while most internet users know that some of their personal data is being collected and monetised, few are aware of the sheer scale of the issue, particularly when it comes to apps. In fact, our research suggests a majority of the top 100 paid and free Google Play apps in Australia, Brazil, Germany and the US contain at least one tracker. This means data could be collected for advertising networks as well as for payment providers. This is just the beginning. As voice-activated intelligent assistants like Siri or Google Now evolve and replace the need for apps on our smartphones, the question of what is being done with our data will only grow more complicated. Nothing is free The difference between what apps actually do with user data and what users expect them to do was apparent in the recent Unroll.Me scandal. Unroll.me is a free online service that cleans email inboxes by unsubscribing the user from unnecessary emails. But many were dismayed when the company was recently discovered to be monetising their mail content. For example, UnRoll.me was reportedly looking for receipts of the ridesharing company Lyft in user emails and selling that information to Uber. Unroll.me’s CEO apologised, saying the company needed to do a better job of disclosing its use of data. But who is in the wrong? Consumers for thinking they were getting a service for free? Or the service provider, who should inform customers of what they’re collecting? The question is even more intriguing when it comes to mobile apps. In fact, compared to online services that usually access a few facets of a user’s personal profile, mobile apps can conveniently tap into a range of personal data such as location, message content, browser history and app installation logs. They do this using third-party libraries embedded in their code, and these libraries can be very intrusive. How libraries work Libraries are third-party trackers used by app developers so they can integrate their products with external services. These may include advertising networks, social media platforms and payment gateways such as Paypal, as well as tools for tracking bugs and crashes. In our study, carried out in 2015, we analysed tracking libraries in the top-100 free and top-100 paid apps in in Australia, Brazil, Germany and the US, revealing some concerning results. Approximately 90% of the top free apps and 60% of the top paid apps in Google Play Store had at least one embedded tracker. For both free and paid apps in the study, Google Ads and Flurry were the two most popular trackers and were integrated with more than 25% of the apps. Other frequently observed libraries include Chartboost, Millennial Media, Google Analytics and Tapjoy. The top trackers were also likely to be present in more than one app, meaning these libraries receive a rich dataset about the user. A summary of the study of top-100 free and paid apps in Google Play Store. NICTA, Author provided Of course, these numbers could have changed in the two years since our research was published, although recent studies suggest the trend has largely continued. It’s also possible these libraries are present without collecting data, but it’s nonetheless disturbing to see the presence of so many trackers in paid apps that have an alternative business model. What lies ahead? So what can you do if you don’t want to be tracked? Use your judgement when giving apps permission to access your data by first asking questions such as, “does this game really need to know my phone number?” Consider using mobile anti-virus and privacy advisory apps such as Lookout Security & Antivirus, Mobile Security and Antivirus, and PrivMetrics (this app is a beta release by Data61). Ultimately, however, these solutions barely touch the surface of a much larger issue. In the near future, apps may be replaced by built-in services that come with a smartphone’s operating system. The intelligent personal assistant by Google, Google Now, for example, could eliminate the need for individual transport, messenger, news and weather apps, as well as some financial apps. These services, otherwise known as aggregator platform services, could build extensive profiles that cover several aspects of our online and offline behaviour. When used, they have access to an incredibly broad range of our activities, not to mention our location. Still, app users have so far been willing to exchange their data for convenience. There’s little reason to believe that trend will not continue. Article source
  19. Ever since XP.. i have never installed Adobe Flash.. i've always used a portable browser... with portable flash.. But Windows 8 natively comes bundled with Adobe Flash! There are tools out there for pre-mastering Windows' images... But this tutorial will focus on already installed /Online installs.. which i just uninstalled IE.. and wanted Flash gone as well.. 1. Navigate here to get your flash package: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages 2. Start PowerShell. 3. enable unsigned PowerShell scripts: Set-ExecutionPolicy -ExecutionPolicy RemoteSigned 4. Now scroll below and verify "Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384" matches your registry key in Step 1. - if your package version is different.. edit all occurrence with your package version. 5. Now manually execute each command below.. 1 line at a time. $acl = get-acl -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing"$inherit = [system.security.accesscontrol.InheritanceFlags]"ContainerInherit, ObjectInherit"$propagation = [system.security.accesscontrol.PropagationFlags]"None"$rule = new-object system.security.accesscontrol.registryaccessrule "Administrators","FullControl",$inherit,$propagation,"Allow"$acl.addaccessrule($rule)$acl | set-aclSet-ItemProperty -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384" -Name Visibility -Value 1New-ItemProperty -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384" -Name DefVis -PropertyType DWord -Value 2Remove-Item -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384\Owners"dism.exe /Online /Remove-Package /PackageName:Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384If you followed the tutorial to a T.. you should see something similar to my output: Note: for extreme minimalists.. this procedure could be used to remove other packages.. dism.exe /Online /Remove-Package /packagename:Microsoft-Windows-Camera-Package~31bf3856ad364e35~x86~~6.3.9600.16384dism.exe /Online /Remove-Package /packagename:Microsoft-Windows-FileManager-Package~31bf3856ad364e35~x86~~6.3.9600.16384
  20. selesn777

    CCProxy 8.0 Build 20140811

    CCProxy 8.0 Build 20140811 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 1,95 Mb.
  21. Russia demands Internet users show ID to access public Wifi (Reuters) - Russia further tightened its control of the Internet on Friday, requiring people using public Wifi hotspots provide identification, a policy that prompted anger from bloggers and confusion among telecom operators on how it would work. The decree, signed by Prime Minister Dmitry Medvedev on July 31 but published online on Friday, also requires companies to declare who is using their web networks. The legislation caught many in the industry by surprise and companies said it was not clear how it would be enforced. A flurry of new laws regulating Russia's once freewheeling Internet has been condemned by President Vladimir Putin's critics as a crackdown on dissent, after the websites of two of his prominent foes were blocked this year. Putin, who alarmed industry leaders in April by saying the Internet is "a CIA project", says the laws are needed to fight "extremism" and "terrorism." More: Communications Minister Nikolai Nikiforov said that demanding ID from Internet users was normal. "Identification of users (via bank cards, cell phone numbers, etc.) with access to public Wifi is a worldwide practice," he tweeted. A pro-Kremlin lawmaker said the measure was needed to prevent Cold War-style propaganda attacks against Russia. "It's about security. An information war is under way. Anonymous access to the Internet in public areas allows illegal activities to be carried out with impunity," Vadim Dengin, deputy chair of parliament's information technology committee, was quoted by state newspaper Izvestia as saying. Alexei Venediktov, editor of the popular Ekho Moskvy radio, lampooned the decree, saying the government's next step would be to embed a chip in people's chests "to automatically detect potential sellers of information to the enemy." UNEXPECTED Industry experts said vague wording in the decree did not define exactly what state who would have to comply with the law or what methods would be needed to authenticate users' identity. The Communications Ministry said in a statement that a "direct obligation to present identity documents" would only be required at "collective access points" such as post offices where the government provides public access to Wifi. State newspapers Izvestia and Rossiskaya Gazeta said the law required users to provide their full names, confirmed by an ID, at public Wifi access points including cafes and public parks. The personal data would be stored for at least six months. An official with the Moscow city government, Artem Yermolaev, said user identification could be carried out by registering a telephone number and receiving Wifi logins by SMS. Internet companies said they knew little about the new law. "It was unexpected, signed in such a short time and without consulting us," said Sergei Plugotarenko, head of the Russian Electronic Communications Association. The requirement for businesses to declare who was using their Internet networks would be the "biggest headache," he said. "We will hope that this restrictive tendency stops at some point because soon won't there be anything left to ban." Another law, which took affect on Aug. 1, requires bloggers with more than 3,000 followers to register with the government and comply with the same rules as media outlets. Websites are also required to store their data on servers located in Russia from 2016 - a move some believe would cut Russian users off from many international online services. Source
  22. Among all the scams and thievery in the bitcoin economy, one recent hack sets a new bar for brazenness: Stealing an entire chunk of raw internet traffic from more than a dozen internet service providers, then shaking it down for as many bitcoins as possible. Researchers at Dell’s SecureWorks security division say they’ve uncovered a series of incidents in which a bitcoin thief redirected a portion of online traffic from no less than 19 Internet service providers, including data from the networks of Amazon and other hosting services like DigitalOcean and OVH, with the goal of stealing cryptocurrency from a group of bitcoin users. Though each redirection lasted just 30 second or so, the thief was able to perform the attack 22 times, each time hijacking and gaining control of the processing power of a group of bitcoin miners, the users who expend processing power to add new coins to the currency’s network. The attacker specifically targeted a collection of bitcoin mining “pools”–bitcoin-producing cooperatives in which users contribute their computers’ processing power and are rewarded with a cut of the resulting cryptocurrency the pool produces. The redirection technique tricked the pools’ participants into continuing to devote their processors to bitcoin mining while allowing the hacker to keep the proceeds. At its peak, according to the researchers’ measurements, the hacker’s scam was pocketing a flow of bitcoins and other digital currencies including dogecoin and worldcoin worth close to $9,000 a day. “With this kind of hijacking, you can quite easily grab a large collection of clients,” says Pat Litke, one of the Dell researchers. “It takes less than a minute, and you end up with a lot of mining traffic under your control.” The Dell researchers believe the bitcoin thief used a technique called BGP hijacking, which exploits the so-called border gateway protocol, the routing instructions that direct traffic at the connection points between the Internet’s largest networks. The hacker took advantage of a staff user account at a Canadian internet service provider to periodically broadcast a spoofed command that redirected traffic from other ISPs, starting in February and continuing through May of of this year. The Dell researchers won’t name that ISP, and they’re not sure how the hacker gained access to the account or whether he or she might have in fact been a rogue staffer. That BGP hijack allowed the hacker to redirect the miners’ computers to a malicious server controlled by the hijacker. From that server, the hacker sent the mining machines a “reconnect” command that changed the mining computers’ configuration to contribute their processing power to a pool that stockpiled the bitcoins they produced rather paying them out to the mining pool’s participants. “Some people are more attentive to their mining rigs than others,” says Joe Stewart, a Dell researcher whose own computers were caught up in one victimized mining pool. “Many users didn’t check their setups for weeks, and they were doing all this work on behalf of the hijacker.” In total, Stewart and Litke were able to measure $83,000 worth of cryptocurrency stolen in the BGP attack. But the total haul could be larger; The researchers stopped collecting data for several weeks of the attack because Stewart broke his ankle in the midst of the study. BGP hijacking has been discussed as a potential threat to internet security since as early as 1998, when a group of hackers known as the L0pht testified to congress that they could use the attack to take down the entire internet in 30 minutes. The scheme gained renewed attention at the DefCon security conference in 2008, and five years later was used to temporarily and mysteriously redirect a portion of US internet traffic to Iceland and Belarus. Compared to those large-scale digital hijackings, the latest bitcoin heist was a much smaller and targeted traffic-stealing operation. And given that it required inside access to an ISP, Dell’s researchers don’t expect Bitcoin thieves to repeat the attack any time soon. In fact, the BGP bitcoin-stealing exploits represent less of a new vulnerability in bitcoin than the persistent fragility of the internet itself, Dell’s researchers say. If one Canadian ISP can be used to redirect large flows of the Internet to steal a pile of cryptocurrency, other attackers could just as easily steal massive drifts of Internet data for espionage or pure disruption. The Dell researchers suggest that companies set up monitoring through a service like BGPmon, which can detect BGP hijacking attacks. But they shouldn’t expect to be able to actually prevent those attacks any time soon. “We’re going to see other events like this,” says Dell’s Stewart. “It’s ripe for exploitation.” Source
  23. Giveaway Extended for Bitdefender Internet Security 2015 The giveaway ends in 7 hrs.! UPDATE: The giveaway is over As you may or may not know, Softpedia and Bitdefender have put together a giveaway promo over this past weekend for the new av tool, Bitdefender Internet Security 2015. However, the developer's website had some server issues last night that prevented users from claiming their free key for the application. Therefore, Bitdefender has decided to provide extra time for those unlucky ones who haven't got a chance to obtain a license. In other words, there are a few more hours added to the timer, more specifically until today, Monday 21 at 16:00 UTC (9:00 a.m. PDT/PST). Giveaway page
  24. I don't know much about networking and telecommunication. My ISP released a press statement some months ago about the new changes in services. Introducing data capping, where you are limited with downloads but unlimited to surf or browse anonymously. So I took it to myself, looking no elsewhere than nsane? Knowing the knowledgeable guys across the Globe. I decided not to contact my ISP I need help and more education on this and how can i bypass it successfully. To enjoy my unlimited downloads as I used to. I trust nsaners to do justice to it. Thanks Guys Best Regards geeteam
  25. Proxy Switcher PRO v5.10.0.6810 There are times when you have to cloak your true IP address. It might be that you want to remain anonymous when you visit a particular website. Or your access to various social networking and entertainment sites has been blocked. The solution is to use Proxy Switcher for all the anonymous browsing needs. It can be used to avoid all sorts of limitations imposed by various sites. Be that a download site that limits amount of downloads. Or video site works only in a particular country - more often than not it gets defeated by the anonymous browsing features Proxy Switcher provides. Whats New Completely revamped test targeting system:Added "negative matching" - check for string in content that should not be there.User defined targets added - full functionality in PRO version.Updated built-in targets.New target configuration window (main menu View->Configure Test Targets...)HTTP request and response trace window.For countries/places where proxy switcher domains are blocked switched from DynDns service for to DTDns as a "last resort DNS lookup".Added new wizard task named "Custom..." - user can select common sub-tasks to be performed.Reworked settings storage, most settings now are stored inside psw.lz file.Website: http://www.proxyswitcher.com/ OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Crack Size: 7,76 Mb.
  • Create New...