Skip to main content

Home/ KSU-Networking/ Group items tagged address

Rss Feed Group items tagged

anonymous

Study guide for test2 - 2 views

It was in color and much nicer...bummer :p

Gale Young

The MAC Address An Introduction to MAC Addressing - 0 views

  •  
    The MAC Address An Introduction to MAC Addressing
W. Brock Son

Operation Ghost Click DNS servers to shut down in March - 4 views

  •  
    I think that it is kind of creative how, as a temporary solution to the problem, they converted the rogue DNS servers to legitimate DNS servers. I wonder if they used the actual servers or just their address.
  • ...2 more comments...
  •  
    Good question Brock. Which scenario do you think would prove more difficult? Do you think you can dig into this story to find out the answer? Do you think you can find someone who knows the answer and can say?
  •  
    I do not know exactly how IP addresses are distributed, but I think that they are somewhat randomly assigned, so I think that it might be harder to reassign the IP address to a new server than to use the actual servers, but I may be wrong. I do want to dig into it more. I think that the answer could probably be found on the Internet as to who IP addresses are assigned, and I plan on looking there for such information. I think that maybe, if I do not find the answer to this myself, I could ask you, Troy Harding, Tim Bower, or a classmate.
  •  
    Hey Brock, you wrote this back in January. Do you know how IP addresses are distributed at this point in our class?
  •  
    I learned about DHCP as a method for dynamically assigning IP addresses to computers. However, I am not certain if the Internet uses them as well. I read some on the Internet about this, however.
anonymous

No Room at the Internet IPv4 Addresses - 0 views

  •  
    The supply of Internet addresses has run dry, but it's no cause for alarm. A new system for assigning Internet addresses will allow trillions of new possibilities. For most people, the change from IPv4 to IPv6 will go unnoticed, but a few users may experience some headaches before the transition is complete.
Kinneth Hurst

IP addresses running out to for IPv4 - 1 views

  •  
    Since so many people have their own home networks and such, IP addresses will one day in the not so distant future will be used up for users of IPv4.
W. Brock Son

The Basics of IP Subnetting | Linux Journal - 2 views

  •  
    An article about subnetting, IP addresses and subnet masks.
W. Brock Son

What Is DHCP? - 1 views

  •  
    "Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details." Quote from Article/Document
  •  
    Thanks Brock sometimes I get the DHCP and DNS mixed up. I say DNS when I mean DHCP this article should help me keep the difference frresh in my mind.
  •  
    You are welcome, Shane. You posted a lot of good articles as well.
justinnoggle

IP Addresses and the Internet - Computerphile - 1 views

  •  
    A quick video describing IP addressing and how it works.
Kelly Carpenter

Hawaii's proposed online tracking law comes under fire from ISPs, civil libertarians - 1 views

  •  
    There may be some trouble brewing in paradise, thanks to a seemingly draconian law currently under consideration in Hawaii's state legislature. If passed, H.B. 2288 would require all ISPs within the state to track and store information on their customers, including details on every website they visit, as well as their own names and addresses.
kuhlmanbraden

Online Social Networking Dangers and Benefits - 0 views

  •  
    Online Social Networking Dangers and Benefits Social Networking Site Dangers Because students often post detailed and specific information on Facebook (including phone numbers, addresses, class schedules, social plans, etc.) you can be more easily stalked by strangers (or even acquaintances). Identity theft can also be a significant risk of social networking.
seventhree

How To Get IP Of Your Choice To Bypass Country Specific Censorship | Megaleecher.Net - 1 views

  •  
    What TOR can be used for.
1 - 18 of 18
Showing 20 items per page