Page 45

iPhone Web Server

Posted on June 29th, 2010 by Victoria Pal in Tech

The iPhone - one of the most, if not the most, popular mobile phone on the market. Innovative, when first launched, craved by people from all around the world, and widely accepted by the software development society. There are many great applications for it, most of them designed for plain fun and rich multimedia experience on the go. After a period of euphoria people start tinkering with the device even more, thinking - "What else can I squeeze from this device?".

Most of the times the answer is - a lot! We've all seen various wacky applications and some of practical use. One that you might not find practical at all is the web server for iPhone, called ServersMan. I honestly don't think this app will have a solid commercial value and extensive future implementations, but it is one of those things people will put on their phones only to tell friends they did so. Geeky, really geeky, and good for home use too. You can get all your data off your phone without syncing.

Read more...

Time to Live (TTL)

Posted on June 24th, 2010 by Victoria Pal in Tech

Time To Live!We might have mentioned TTL in some of the previous posts related to Ping and Traceroute. TTL, or Time To Live is the transmission limit of a given data unit in a TCP/IP or UDP based computer network.

A data packet with a TTL value of 64 will cease to exist if it hasn't reach its end target in 64 iterations. The purpose of the TTL field is to avoid a situation in which an undeliverable datagram keeps circulating on an Internet system, a system that will eventually become swamped by such immortal datagrams.

Read more...

DHCP (Dynamic Host Configuration Protocol)

Posted on June 24th, 2010 by Victoria Pal in Tech

DHCPDHCP stands for Dynamic Host Configuration Protocol. This protocol is used by DHCP clients to automatically obtain IP addresses. Most ISPs use it to make your life easy and be ready to browse the Internet right after you properly connect your network device.

Four steps, invisible to the user, take place before a host can obtain its IP address.

Read more...

Google Showing Your Website’s Performance

Posted on June 22nd, 2010 by Victoria Pal in Tech

Google Webmaster ToolsGoogle Search Console (Webmaster Tools) is one account you can't go without on Google. It gives you so much information and enables you to tweak your sites in so many aspects that I can hardly fit all of them into a single post. Along with many of its present features - showing other sites linking to you, popular searches, sitemap submission, geographical targeting, etc., Google have recently introduced a new feature.

Site Performance is the last menu item which will appear under the "Labs" section in your Webmaster Tools account. There you can find valuable information, also available if you use a tool such as YSlow (from Yahoo) and/or Page Speed (by Google). You can learn how your pages are performing in terms of loading times. You will get a very rough comparison with the rest of the web and most valuable of all - a historical graph of your site's performance based on the loading times of each page. A graph like the one below. Under "Performance overview" you might want to see something a little bit more different to the excerpt below, but you will at least have a good start to fixing the problem.

Read more...

Email Blacklists

Posted on June 17th, 2010 by Victoria Pal in Tech

email blacklistSooner or later email blacklists become the nightmare of most system administrators. Long story short - when your email provider is reported as a source of email spam, a lot of your email messages won't reach your family, friends, business partners, loyal and prospective customers alike.

Becoming part of a blacklist isn't what gets other email providers to filter you, it is the way they decide to do so. Blacklisting causes problems when the administrator decides to simply filter out all emails coming from a network device on a blacklist. Medieval doctors did a similar job when taking off an arm to save the patient from an infected finger. Clean email has no chance of reaching its intended location. Decent e-mail service providers usually filter spam, employing methods that utilize multiple filters before deciding whether an email message is spam or not.

Read more...