Skip to main content

What is an IP Address

hi friends now we are seeing about IP Address
as we have name to identify a person distinctly ,
as we receive a call to us when another person dial our no
in the same way system finds an IP Address to send / receive data form one system to anther system
ip address means it is a 32 decimal code seperated by period(.)
ex :196.168.0.141
this is the ip seperated by (.)
and this is is related with subnet mask which seperates ip from classes
here classes means
A,B,C,D,E
these are classes which separates ip from there classes
for ex:
A - 1-126
B - 128-191
C - 192-223
D - 224-248
E - 249-255
all these IP are assigned by IANA standards only ( if u have doubt pls refer pervious post so that u can get the website addresses of IANA  etc)
A,B,C are used for general purpose
D,E are used for future purpose Experimental purpose
Here 127 is used for loop backadapter means self checking purpose

here ping is the general command which is used to check whether the link is active or not
ex: ping 192.168.0.141
if the reply comes we can say the link is active
if there is no reply we can say something problem in connection

frnds as our frnds asked me to tell how to shut down own system or remote system by using
command prompt
i wil give u reply in the comming post
thankyou for ur replies and suggestion my frnds
replies and queries contact kaliblog1@gmail.com
thankq and take care my friends

Comments

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...