Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged hosting

Rss Feed Group items tagged

rack bank

Tier 3 Data Center Services - 0 views

  •  
    The Hybrid hosting solutions at the state-of-the-art tier 3 Data center in India, Rackbank let you select the right and ideal balance for your business. Our data center services established by exceptional 24/7/365 support by the team of experts. Rackbank offers nearly all type of server hosting and data center services including dedicated server hosting, colocation services and reseller hosting.
rack bank

Dedicated Server Hosting in India - 0 views

  •  
    Dedicated Server Hosting Solutions support a wide range of dedicated workloads which requires a high performance like remote desktop, dedicated email servers, virtualization, high volume real time database applications and telephony. Rackbank offer dedicated server with the configurations which perfectly suits your business requirement.
rack bank

Colocation Hosting Services - 0 views

  •  
    Colocation allows you to place your server machine in someone else's rack and share their bandwidth as your own.Choosing the colocation hosting services from Rackbank Datacenter is a beneficial and a cost effective option for businesses that need a stable and high performance network while maintaining total control over hardware and server administration.
Janos Haits

Gitea - 0 views

  •  
    "A painless self-hosted Git service. Gitea is a community managed fork of Gogs, lightweight code hosting solution written in Go and published under the MIT license."
magdy medhat

What is Domain Name Resolution - 0 views

  • What is Domain Name Resolution Introduction When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.bleepingcomputer.com. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as 192.168.1.1. Therefore when you type a domain name in your program that you wish to connect to, your application must first convert it to an IP address that it will use to connect to. The way these hostnames are resolved to their mapped IP address is called Domain Name Resolution. On almost all operating systems whether they be Apple, Linux, Unix, Netware, or Windows the majority of resolutions from domain names to IP addresses are done through a procedure called DNS.
    • Ahmed Mansour
       
      i think it's great artical !!
    • Islam TeCNo
       
      Yes .....we know that Web sites are on servers that has IP adresses like this 217.143.56.12 for example .....this article tell us how the site name [www.google.com] is converted to the IP thanks Mans
    • magdy medhat
       
      ya tecno ya gamedddddd mesh de elly kona bntklm feha fel microbus :D
  • Hosts File - There is a file called the HOSTS file that you can use to convert domain names to IP addresses. Entries in the HOSTS file override any mappings that would be resolved via a DNS server
    • Islam TeCNo
       
      I think this is what some spam and adware programs use .... you type a normal site Name but you go yo another site ... i think so !!
  • Netbios - This only applies to Windows machines and will only be used to map names to IP addresses if all previous methods failed. This method will attempt to map the netbios name you are trying to connect to with an IP address.
    • Islam TeCNo
       
      any body can explain this point for me ?
  • ...2 more annotations...
  • This can be changed though by changing certain registry keys
    • Islam TeCNo
       
      start -> run -> regedit this will allow you to edit the registry
  • DnsPriority = 30 LocalPriority = 200 HostsPriority = 75 NetbtPriority = 100
    • Islam TeCNo
       
      Or Simpler DnsPriority = 1 HostsPriority = 2 NetbtPriority = 3 LocalPriority = 4
Janos Haits

Wolfram Neural Net Repository of Neural Network Models - 1 views

  •  
    "The Wolfram Neural Net Repository is a public resource that hosts an expanding collection of trained and untrained neural network models, suitable for immediate evaluation, training, visualization, transfer learning and more."
Janos Haits

Freedom to Tinker - Research and expert commentary on digital technologies in public life - 0 views

  •  
    "Freedom to Tinker is hosted by Princeton's Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you'll find comment and analysis from the digital frontier, written by the Center's faculty, students, and friends."
computersciencej

TCP/IP model questions based Study Material for gate Computer Science - 0 views

  •  
    TCP/IP protocol based questions for gate computer science exam Q1.What is the difference between transport and session layer of OSI model. Answer: OSI Model Transport Layer The transport layer uses the services provided by the network layer, such as best path selection and logical addressing, to provide end-to-end communication between source and destination. • The transport -layer data stream is a logical connection between the endpoints of a network. • End-to-end control is provided by sliding windows and reliability in sequencing numbers and acknowledgments. The transport layer regulates information flow to ensure end-to-end connectivity between host applications reliably and accurately. • The TCP/ IP protocol of Layer 4 (t transport t layer ) has two protocols. They are TCP and UDP. The transport layer accepts data from the session layer and segments the data for transport across the network. Generally, the transport layer is responsible for making sure that the data is delivered error-free and in the proper sequence. Flow control generally occurs at the transport layer. OSI Model Session Layer The session layer establishes, manages, and terminates communication sessions. Communication sessions consist of service requests and service responses that occur between applications located on different network devices. These requests and responses are coordinated by protocols implemented at the session layer. The session layer establishes, manages, and terminates sessions between applications Functions of the session layer and the different processes that occur as data packets travel through this layer. More specifically, you learned that Communication sessions consist of mini-conversations that occur between applications located on different network devices. Requests and responses are coordinated by protocols implemented at the session layer. • The session layer decides whether to use two-way simultaneous communication or two-way alternate communicati
computersciencej

Routing Table Based Study Material for gate Computer Science - 0 views

  •  
    In our previous post Routing Concepts in Computer Networks we have explained the basic introduction of the routing concept. In the continuation of that post now in this article of Computer Science Study Material for Gate, we are going to tell about routing table. In this article provides the information about the different fields of a routing table with a suitable example, what is the use of these fields and how a particular route is selected for the destination host. So let's start with the introduction of routing table. http://www.computersciencejunction.in/2017/12/Study-Material-for-Gate-Computer-Science-routing-table-in-computer-network.html
computersciencej

Virtualization in Cloud Computing - 0 views

  •  
    Virtualization means creating the virtual version of a useful resource such as server, storage device, a desktop, operating system and network resources.Virtualization basically provide the services of pooling and sharing of the resources Behind the virtualization there is concept of virtual machine which is also known as guest machine and the machine on which this virtual machine is created is known as host machine.
Janos Haits

The Internet Computer | DFINITY - 0 views

  •  
    "We believe that "smart contracts" that run on a public blockchain are a vastly superior new form of software. However, traditional blockchains provide hosting frameworks for smart contracts that are highly limiting. We believe that once these limitations are removed by a next generation blockchain, a "blockchain singularity" will occur, in which the majority of the world's systems and services will be rebuilt entirely from smart contracts. In the process, these sys"
Janos Haits

Wikiversity - 1 views

  •  
    "Wikiversity is a project of the Wikimedia Foundation. It is a centre for the creation and use of free learning materials and activities. We host free education resources and scholarly projects. We also aim at interacting with other Wikimedia projects and support their content de"
Islam TeCNo

What's in an HTTP request? - 0 views

shared by Islam TeCNo on 15 Jun 09 - Cached
Ahmed Mansour liked it
  • These headers tell us which web server you were trying to contact.  If that seems odd, bear in mind that many web sites can be "hosted" on a single server, so when the request is received it needs to know which web site you were attempting to access
    • Islam TeCNo
       
      el server momken yekon 3aleh aktar men site ....3ashan keda lama bab3t request ba2olo bardo ana 3ayez site eh !!
  • The request method is usually either "GET" or "POST".  Basically if you fill in and submit a form on a web page it might generate a POST request (or it might be "GET"), whereas if you just click on a link, or activate one of your browser's "bookmarks" or "favourites", then the request method will always be "GET". Therefore, if it's "POST", we can tell that a form was definitely submitted.  The contents of the form would appear here, and there would also be some "Content-" headers describing the data. Web browsers generate two kinds of "POST" data: either "multipart/form-data", which is used when uploading files to a web server, or the more common "application/x-www-form-urlencoded".
    • Islam TeCNo
       
      el 7eta deh mohema ....we fe anwa3 tania bardo 3'er el GET we el POST
  • The "referer" header tells us which document referred you to us - in essence, if you followed a link to get to this page, it is the URL of the page you came from to get here.
    • Islam TeCNo
       
      el Referer by2ol lel server el page eli enta gaii menha ....we a3taked deh el tare2a eli fe sites betsta5dmha 3ashan temna3 maslan en sora aw keda tetshaf ela men el site zat nafso
  • ...2 more annotations...
  • Connection control Connection:keep-alive Keep-Alive:300 These headers are used to fine-tune the network traffic between you and the web server.  They don't tell us much, except a little about the capabilities of your web browser.
    • Islam TeCNo
       
      kan nefsi yekon fe shar7 lel 7eta deh aktar !!
  • Authorisation Username:not present If you have "logged in" to a web site, your username appears here. Note that this only applies to web sites which use proper HTTP authentication - typically, a "login" window pops up and you get three chances to enter your username and password, otherwise you see a page which says "Authentication Required" or similar.  It doesn't apply to web sites where the "login" is a separate page. It's also possible to supply the username and password in the URL you tell your browser to visit - for example, http://user:password@www.example.com/.  In that case, the username would appear here too.
    • Ahmed Mansour
       
      msh fahem el goz2 dah 2wey !! .. 7d yewad7ely please ...
    • Islam TeCNo
       
      ya3ni ya mans a7yanan fe sites bykon feha UserName we password 3an tare2 el HTTP protocol .....ya3ni el mail maslan aw cisclub dol fehom username we password mesh 3an tare2 el HTTP protocol ....el HTTP protocl el username we el pass beto3o bytlbo menak 2abl ma td5ol 3ala el page asasn we bytl3lk keda pop up tekteb feha
  •  
    really very important and useful article ... thanks tecno very match :P
  •  
    Nice Article Tecno..Go On
Janos Haits

The Freenet Project - /index - 0 views

  •  
    Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in "darknet" mode, where users only connect to their friends, is very difficult to detect. Share files, chat on forums, browse and publish, anonymously and without fear of blocking or censorship! Then connect to your friends for even better security! "
Janos Haits

Steem.io - 0 views

  •  
    "Steem powers Smart Media Tokens Steem is a blockchain-based rewards platform for publishers to monetize content and grow community."
Janos Haits

PureOS - 0 views

  •  
    "A user friendly, secure and freedom respecting OS for your daily usage. With PureOS, you are the only one in control of your digital life. CHECK OUT THE APPLICATIONS"
Janos Haits

Google Open Source - opensource.google.com - 0 views

  •  
    "Bringing better technology to the world by promoting open source"
Janos Haits

I2P Anonymous Network - 0 views

  •  
    I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
1 - 20 of 21 Next ›
Showing 20 items per page