JS

Saturday, August 29, 2009

Softwares Pack 2009 - all latest softwares






Software Pack 2009 - Tiny Version
SOFTWARES Pack 2009 - Tiny Version | 667 MB


Thic pack includes :

All in One
12 Adobe Portables Collection
AIO Disk Image 2008
AIO Uniblue Products 2009
ImTOO Software All In One 2009
Best Hacking Tools - 85 in 1
Best Portable Soft 2009 40 in 1
ZC Software DVD Authoring Software 2009
AIO StarDock Applications September 2008
Bit Defender - All Product 2009
Auslogics AIO Pack 2009

Media Plugins & Players
DFX Audio Enhancer 9.102
Real Player v.11.0.9.372 Gold Premium
MediaMonkey Goid 3.1.0.1228
GOM Player 2.1.17.4710
FabFilter Pro-C VST RTAS 1.12
Winamp PRO 5.551 Build 2419
BSPlayer Pro v2.37.992B
CyberLink PowerCinema 6 v6.0.0.1309 Multilingual
CyberLink PowerDVD Ultra v9.0.1501 Multilingual
VLC Media Player v0.9.9

Portable
Adobe Photoshop CS4 v11.0 Portable
All Office Converter Platinum 6.1 Portable
CuteFTP Pro v.8.3.2 Build 09.02.2008.1 Portable
Instant Color Picker 2.5
IP Address Searcher 1.1.2
Flash Player Pro v3.9 Portable
Kaspersky Anti-Virus 2009 Portable
CorelDRAW Graphics Suite X4 Portable
IDM 5.15 Build 6 Portable
Nero 9.2.6.0 Retail Portable

Graphics & Designs
Nature Illusion Studio v3.00
Pictomio 1.2.28
DreamLight Photo Editor v3.0
Frame Photo Editor 3.2.0
ImageConverter Plus 7.1.20 build.80708
Blumentals Screensaver Factory Enterprise v5.0
CorelDRAW Graphics Suite X4 14.0.0.701 SP2
Photoshop CS4 Extended
ACDSee Pro 2.5.363
Picture Collage Maker 2.0.5 Build 2029

Editor & Authoring Tools
AoA DVD Creator 2.1.7
Aurora Web Editor 2008 Professional v5.2.1
AutoPlay Menu Builder v5.6.1406
MP3 Audio Editor 7.8.1
NGWave Audio Editor v4.4.20090404
Photodex ProShow Gold 4.0.2479
Photodex ProShow Producer 4.0.2479
Video Thumbnails Maker 2.0.1.0
Website Layout Maker Ultra Edition v2.5.7.0
Microsoft Visual Studio Team System 2008

Desktop Enhancements
360desktop v0.5.4.1479
Active Desktop Calendar 7.66 Build 081121 32-bit
CubeDesktop.Pro.1.3.1
Dream Render 2.20
EarthDesk Pro 4.5.2
Perfect Clock V3.1
RealWorld Cursor Editor 2007.1
RocketDock v1.3.5
Shock Aero3D
Snow for Windows 1.6
Stardock Desktop Pet 1.00
Stardock Fences v0.96.1533
Stardock IconPackager 4.2
Stardock SoundPackager 1.20.28.0
Talisman Desktop v3.0.3006
Total Stardock Application Suite 2009
ViennaDock 2.0
Webshots Desktop 3.1.1.7317
WindowBlinds 6.4 Build 73
XWindows Dock 5.2.1

Operating System
CyberXP Xtreme (BETA) New Update 2009
Extra Small Windows XP USB Flash Edition 2009
Extreme Seven 2009 Premium - SP3 - Final - April 2009
Fedora 10
Ghost Windows XP SP3 Pro With Seven Black Style YN 9.9.1 Drivers
iDeneb v1.4 10.5.6 for IntelAMD (Mac OSx86 Leopard)
MacOSX 10.5.6
Microsoft Windows 7 Ultimate Beta 1 Build 7022 32Bit
Microsoft Windows Vista SP2 32Bit Build 6002 16659
Microsoft Windows Vista ULTIMATE x86 SP1 Integrated February 2009
Microsoft Windows Vista Ultimate x86 SP1 OEM Pre-Activated February 2009 2CDs
Microsoft Windows Server 2008 12in1 MSDN DVD-CRBS
Ubuntu 8.10 Intrepid Ibex
Vortex XP Vista Style Third generation (3G-RED) 2009
Windows Royal Home Premium 2009 SP1
Windows Server 2003 Special Edition CD (10 in 1)
Windows Vista Black Dream Child Forever Full (January 2009)
Windows Vista InSpirat SP3 Ultimate Edition 2009
Windows Vista x64 SP1 Gamers Edition
Windows Vista® Eternity™ 2009 SP1 X86 (Genuine Version)
Windows XP Pro Asus EEE Edition 80MB
Windows XP PRO SP3 VistaVG Black and Blue Ultimate Style 2009
Windows XP Professional SP3 Corporate February 2009
Windows XP Professional SP3 Corporate March 2009
Windows XP Se7en Lite 2009 Build 2
Windows XP SP3 Dark Edition V.7 Rebirth Refix Version ( 1 CD )
Windows XP Unattended Edition 2009 by DarkSide XP
Windows XP Vista Lite 2009 v2.5
Windows XP-Se7en 2009 Build 7000 Basic Bootable DVD for MultiPC and Notebooks
Windows XP Pro SP3 Full Untouched (New Update)

System Tools
Acronis True Image Home 2009 12 build 9785
Active@ File Recovery 7.3 Build 121
CachemanXP 1.8.0.15
CopyFaster 1.0
Deep Freeze Standard 6.41.021.1973
Dr.Hardware 2009 v9.9.2e
Perfect Uninstaller 6.3.3.0
Power Memory Booster v6.1.0.3862
Recover My Files 3.98 Build 6356
Vopt 9.12
Shadow Defender 1.1.0.275
Startup Organizer 2.9.297 SR2
Super Utilities Pro 9.45
Repair Harddisk Bad Sector Pro 2009
SuperCopier 2
TuneUp Utilities 2009 v8.0.2000.35
TurboLaunch v5.1.1
Vista Manager 2.0.6
WinXP Manager 6.0.3
Your Uninstaller! PRO 2008 6.2.1347

Internet & Network Tools
µTorrent v1.9 Build 14908
cFosSpeed 4.51 Build 1489
Firefox Slim 3.0.7
Gbridge 1.0.0.1193
HiDownload Pro v7.28
Internet Download Manager 5.16
Opera 10.0 Build 1413 Alpha
Pidgin 2.5.5
TeamViewer 4.0 Build 5769
WebcamMax v5.1.1.12

Office Tools
Babylon 7.5.2.r13 Multilang
Classic Menu For Office 2007 4.00
Foxit PDF Editor v2.0.1011 2009
Foxit Reader Pro 3.0 Build 1301
Lingoes 2.5.3
Microsoft Office 2007 Blue Edition
Microsoft Office Enterprise 2007 (Highly Compressed)
Microsoft Office Professional Plus 2007 With SP2 Build 12.0.6416.1000
MTD9 EVA 2009
xNeat Cipboard Manager 1.0.0.6

Burning - Converter - Ripper
BurnAware Professional 2.3.2
Extra DVD Ripper Express v6.5
FairStars Audio Converter 1.80
Nero 9.2.6.0
Opell Video Converter v2.2.2
Power Video Converter 2.2.4
Total Video Converter 3.21
Xilisoft Audio Converter 2.1.74.0303
Xilisoft DVD Ripper Ultimate 5.0.49.0310
Xilisoft Video Converter Ultimate 5.1.23.0402

Virtual & CD DVD Tool
Alcohol 120% 1.9.8.7530
AnyDVD & AnyDVD HD v6.5.2.8
AoA DVD Creator 2.1.7
Daemon Tools Pro Advanced 4.30.304.47
Droppix Recorder v2.9.0.0
DVDFab Platinum 5.3.2.0
GameJackal Pro 3.2.0.6
UltraISO Premium Edition 9.3.3 Build 2685
VSO ConvertXToDVD v3.5.3.139
Xilisoft DVD Creator 3.0.40.0313

Security
AVG Internet Security 8.5.281 Build 1448
BitDefender Total Security 2009 Build 12.0.144
Kaspersky Internet Security 2009 8.0.0.506
Lavasoft Ad-Aware Anniversary 2009 Professional Edition 8.0.3
Malware Defender v2.1.1
Norton Internet Security 2009 16.2.0.7
Spyware Doctor v6.0.1.440
Trojan Remover 6.7.6 Build 2568
TrojanHunter 5.0 Build 968
USB Disk Security 5.1.0.15

Others
Active Lock 2.0
Advanced PDF Password Recovery 5.02
Genuine Windows 2.6
PowerArchiver 2009 11.50.23
Salfeld Child Control 10.115.0.0
ThinApp 4.0.2.3089
Universal Maps Downloader 4.0
Universal Viewer Pro v3.8.5
USB Safely Remove 4.1.2.777
WinRAR 3.80

Download:

2009 All Best Softwares and Antivirus


Antiviruses 2009

* Avast 2009
* AVG 2009
* Avira AntiVir Premium 9.0.0.420 2009
* BitDefender 2009
* Eset Nod32 2009
* F-Secure 2009
* Kaspersky 2009
* McAfee 2009
* Norton 2009
* Norton Gaming Edition 2009
* PANDA GLOBAL PROTECTION 2009
* ZONEALARM All Versions 2009
*Windows Doctor
* Spy Emergency 2009
* Spyware Doctor With Antivirus V6.0.1.440+Genuine Serial 2009
Ashampoo AntiVirus v1.61 MultiLanguage
SUPERAntiSpyware Pro v4.26.1000 Final - Multilingual - Full
Spyware Terminator 2.55
Spybot Search & Destroy 1.6.0.30 Final-PORTABLE [LATEST]
Spyware Cease 3.5 Portable | 7 Mb
PC Tools Internet Security Suite 2009
Norton 360
F-Prot Antivirus

Firewalls 2009

* Kaspersky Antihacker
* Kerio WinRoute
* Sygate Personal Firewall
* Outpost Firewall Pro 2009 Build 6.5.3 (2518.381.0686)

Utilities 2009

* Close Hacker Doors alias Windows Worm Doors Cleaner
* HiJack this
PC System Utility:Advanced System Optimizer V2.20.4.746
* Lavasoft Ad-Aware
* Microsoft Windows Defender
* Test Drive, Hard Drive Tools ( Collection )
* WindowsXP USB Stick Edition 80mb
* Norton antibot
* Protector Plus for Windows
* Reistry Fix 7.1 Best reistry fixer in 2009! (must have)
* Rootkit Revealer
* Secunia PSI 3
* Windows Doctor Professional Edition 2009
* Spy Eraser
* Registry Fix 7.1
* SpyBot Search & Destroy
* Spy Doctor
*Anti-Trojan Elite 4.4.8 ( Latest )
* Webroot Spy Sweeper
*TuneUP Utilities 2009
* Speed Connect 2009
* 12 Tools for a virus infected PC
* Test Drive,Hard Drive Tools Collection
* 100.000 Universal Windows Drivers DVD Updated February 2009
*WinSysClean 2009
* SpyHunter 3.10
* UniBlue Power Suite 2009
* jv16 PowerTools 2009 v1.9.0.540 Final
* RegCure 1.5.1.3 2009
* Helium Music Manager 2009
* Windows Seven Transformation Pack
* EVEREST_Ultimate_Edition_4.60.1631
*F-SECURE CLIENT SECURITY 8.00.232 2009
Windows 7 Transformation Pack -
Driver Genius Professional Edition v8.0.0.316
Driver Detective 6.2.5.0
Mobile Unlocker
System Mechanic Professional v8.5.4.5
Trojan Remover 6.7.8 Build 2572 Full + New keygen TeamRes
WindowBlinds 6.4 Build 73
PC Fix in 1 Click
WinXP Manager v6.0.1
Dis Keeper Pro 2009
Recover My Files 3.98 Build 6173
* Hide IP Platinum 2009
Startup Faster! 3.0.4.0
Universal Shield v4.2
Error Repair Professional 3.8.5
PCmover
Fix-It Utilities™ 9 Professional
XP repair pro 3.5.5
MASTER COLLECTION ADOBE CS3
ALL PORTABLE VERSIONS
Malwarebytes Anti-Malware 1.32
IP Anonymous Surfing Tool 2009
Genie Backup Manager Professional v8.0.340.510
O&O defrag 10.0.1634 PROFESSIONAL EDITION
Need3space 1.4.3
Adobe Macromedia Flash Professional 8
Registry.Easy.v4.9+Serials¬
Windows Live OneCare Latest
Error Sweeper 2.7
YoutubePick 1.7.2
Remote Administrator Control v3.3.1
Symantec.Ghost.v11.5.0.2113.Corporate.Edition
Computer Repair Utility Kit AIO
Advanced Vista Optimizer 2009+ Full
Deep Freeze AIO 2009
Ashampoo Win Optimizer 2009
Sony Vegas pro with Plugins 2009
XP Tools Pro 9.8
Winstep Xtreme 8.11
MemTurbo 4.1.2759.459
eBoostr Pro 3.0
O&O Defrag Professional v11.5.4065
Smart PC Professional v5.5
Universal Maps Downloader v4.0
BurnAware Professional 2.3.1
Disk Drive Administrator 3.1
1 Click and Lock 3.3
Bulk Image Downloader 2.0.0.8
Clean Disk Security 7.81
Movie Collector Pro v6.1.1
Super Ad Blocker 4.6.1000

Usefull Applications 2009
Nero 9 - Lite Edition - Only 51MB!
Firefox Ultimate Optimizer 2009
BS.player PRO 2.35.985 **25/02/2009**
Convert Doc to PDF For Word V3.51
Internet Download Manager 5.16 Build 3
Limewire Pro 5.1.2 ( 2009 )
Windows 7 Transformation Pack -
Helium Music Manager v2009.0.0.6765
Windows 7 Build 7068 x86 DVD ISO
Download Managers 8 in 1 If
Internet Explorer 8:
Kingdia Video to AVI/WMV/MPEG/MOV/SWF/FLV/MKV Converter 3.5.11
DivX Pro v7.0.0
Super Internet TV v7.3
Sattelite TV 2009 Titanium Edition
Transfer Your PC Deluxe v2.0
IP changer 2.2
Windows Media Player Codecs Pack 2009 (Portable)
Personal PC Spy 1.9.7
TeamViewer 4
Mega Collection of Serials and Keys
Personal PC Spy 1.9.7
Corel Paint Shop Pro Photo X2 with Serial Keys
Master Voyager
Leechget 2009
Rapidshare Plus
Kaspersky Key Finder
Windows Keygen Pack 2008
Tweak-XP Pro 4.0.9
AdminToys Suite 2008 1.1.1100
Advanced SystemCare Professional v3.1.2
All in One Antivirus For USB Flash-Drive
Portable Windows VISTA - USB/CD Edition
Microsoft Virtual PC ver 2007 Portable - compressed to 14mb
Full Hack Pack 2009
Reset Any Windows Password [including Vista]
Microsoft Genuine Maker 2009 - XP / VISTA / OFFICE
Your Uninstaller! Pro 6.2.1347
Hide My IP Address v.1.0
Cisco Network Magic Pro 5.0.8282
Direct Backup Standard 2.80
CareWindows RAM Boost Master 6.1.0.8146
Cool Record Edit Deluxe 7.8.5
Hamrick VueScan Pro 8.5.10
Trojan Hunter 5.0.962
Zealot All DVD Ripper 1.7.5
Rapidshare Direct Download 3.2
RapidShare Database Search 2009
Proxy Switcher PRO 3.9.0.4059
Folder-Lock 6.1.7
Total Commander 7.04
Acronis True Image 11.0
Deamon Tools Lite 4.12.3
Dr.Web 5.00.1.04130
IDM UltraEdit 15.00.0.1039
Startup Organizer 2.9.297
Net Detective 5.19
BS Player 2.14
Real GIF Optimizer 3.05
McAfee Anti-Spyware Enterprise 8.0
Netconceal Anonymizer Shield v5.2.059.02
TubeHunter Ultra 4.0.1433
PC Tools Disk Suite 2009 1.0.0.66
Hide Files and Folders 3.3
FlashGet 3.0.0.1025
Dead Disk Doctor 1.26
Hide Folders 2009 v3.1.8.551
Safe Data Recovery 2.4
Easy Hide IP v1.3
Kaspersky Offline Updater 3.1.0.7
SevenXP 3.0
GameJackal 3.2.0.5
VueScan 8.5.08
Facebook Freezer By GZ
Magic ISO Maker 5.5 Build 0276 Final - Multilingual - Full

More Optimizers
* Memory Booster Gold
* Network Mechanic
* PC Tools Registry Mechanic
* Ram Booster Pro
* Registry Booster
* Registry Clean Expert
* Registry Mechanic
* Registry Victor
* uTorrent Turbo Booster
* Wise Registry Cleaner
* XP Tools Pro

More Partitioners:

* Active Partition Recovery
* EASEUS Partition Master Ultimate
* Norton Partition Magic
* Paragon Partition Manager
* Partition Table Doctor
* PowerQuest Partition Magic

Iso Burners:

* Acronis True Image
* Alcohol 120%
* Daemon Tools (Windows7 compatible) NEW!
* ImTOO ISO Burner
* ISO Buster
* ISO Master
* MagicISO
* Power ISO
* UltraISO
* VMware Workstation
* WinISO
* Xilisoft ISO Maker

DVD:

* Cheetah CD burner
* Cyberlink PowerDVD Ultra Deluxe
* DVD Rip Master Pro
* DVDFab
* Easy DVD Creator
* Nero 9 Lite Edition
* SlySoft CloneDVD
Converters:

* AVS Video Converter
* ConvertXtoDVD
* Easy Real Media Tools X To RMVB
* DBPoweramp Music Converter
* ImTOO WMA MP3 Converter
* Magic Video Converter
* Mkv To Avi Converter + Mkv codecs
* OJOsoft Total Video Converter
* One Click Ringtone Converter
* Replay Converter
* Total video converter
* Universal Document Converter
* Xilisoft AVI To DVD Converter
* Xilisoft Ultimate Converter

Misc :
Xilisoft Audio Maker 3.0.49.0402
Webroot Spy Sweeper 6.1.0
MalwareGuard 1.1.03
Recover My iPod 1.7.2.833
Online TV Live 6.3.38
USB Disk Security 5.1.0.15
RegDoctor 2.09
R-Drive Image 4.3
Google Earth Plus 5.0
Backup Key Recovery 1.0.2
TechSmith Camtasia Studio 6.0.2
Utilities XP 9.80
Wondershare YouTube Downloader 1.3
QUAD Registry Cleaner 1.5.69
Blaze HDTV Player 2.5
Smart PC Professional 5.5
DriverMax 4.92
DVD-Cloner 6.20.0.980
Fresh Download 7.98
Passmark Performance Test 7.0.1004.0
Registry Genius 3.0
SwishMax 2.0 Build 2009.01.20
ChrisTV Online! 3.30
Conceiva DownloadStudio 5.1.1.0
Sharp World Clock 4.21
Remote Observer 2.1


If you want any of the Software, listed above, just post ur email id with name of Software n I'l send you the Links...

Saturday, August 22, 2009

Money making & E-earning ebooks collection


Sharing a collection on money making in many ways (got from the net - 13 nos)
( in pdf format )


The first coll has

1) 7 Little known secrets of rich
2) Making money creating wealth
3) Art of getting money
4) Dozen ways to make money
5) Its easy to earn money
6) Rich Dad Poor Dad Summary
7) Make money
You and money - quiz ( student school quiz but intresting )


The second coll has

1) 999 money making ideas
2) Money secrets
3) Science of Getting Rich
4) Greatest Money making secret
5) Make money Online




http://rapidshare.com/files/51980303/make_money1.zip
http://rapidshare.com/files/51980556/make_money2.zip


No Password


==============================

Best Robotics Ebooks n PDF Documents collection


Best Robotics Ebooks n PDF Documents collection
robotics related books collection
Best books to learn abour robotics

http://rapidshare.com/files/119883738/141_20-_20Circuit_20Cellar_20-_20Robotics_20-_20April_202002.pdf
http://rapidshare.com/files/119883768/2__eBook_20-_20Engineering_20-_20Robotics_20-_20Artificial_20Intelligence__20Machine_20Learning.pdf
http://rapidshare.com/files/119884096/B8_20-_20Robots.pdf
http://rapidshare.com/files/119884644/centi.pdf
http://rapidshare.com/files/119884734/Coevolutionary_20Robotics_20Design__20Jordan_20Pollack__20EH99.pdf
http://rapidshare.com/files/119885022/Design_20of_20real-time_20large_20scale_20robot_20software_20platform_20and_20.pdf
http://rapidshare.com/files/119885262/Implementing_20Distributed_20Control_20System_20for_20Intelligent_20Mobile_20Robot.pdf
http://rapidshare.com/files/119885753/Integration_20And_20Automation_20Of_20Manufacturing_20Systems_20_Robots_Plc_Cnc__20-593P.pdf
http://rapidshare.com/files/119886093/Introductory_Robotics_-_Selig.pdf
http://rapidshare.com/files/119885278/Int_C3_A9gration_20robot-vision_20_Biblio_.pdf
http://rapidshare.com/files/119887551/Lego_20Mindstorms_20Mini_20HOWTO.pdf
http://rapidshare.com/files/119887510/Lego_20Mindstorm_20Articles.pdf
http://rapidshare.com/files/119887603/liu1.pdf
http://rapidshare.com/files/119888022/McGraw-Hill-_20PDA_20Robotics_20-_20Using_20Your_20PDA_20to_20Control_20Your_20R.pdf
http://rapidshare.com/files/119888007/MCGraw-Hill_20Osborne_20PDA_20Robotics.pdf
http://rapidshare.com/files/119888204/MIT_20Press_20-_20Natural_20Communication_20with_20Robots.pdf
http://rapidshare.com/files/119888456/Motion_20Control_20Theory_20Needed_20In_20The_20Implementation_20Of_20Practi.pdf
http://rapidshare.com/files/119888681/Non-Linear_20Dynamics_20Tools_20For_20The_20Motion_20Analysis_20And_20Condit.pdf
http://rapidshare.com/files/119905440/Radar-Based_20Intruder_20Detection_20for_20a_20Robotic_20Security_20System.pdf
http://rapidshare.com/files/119905594/robotarm.pdf
http://rapidshare.com/files/119905482/robotics_20for_20kids.PDF
http://rapidshare.com/files/120031547/Robotics_Experiments_v1_2_5B1_5D.pdf
http://rapidshare.com/files/119906204/robotics_servo.pdf
http://rapidshare.com/files/119905734/Robotics__V1.2.PDF
http://rapidshare.com/files/119905738/Robotics__v1_4_20.pdf
http://rapidshare.com/files/119905841/Robotics__v1_5.pdf
http://rapidshare.com/files/119906700/Robots.pdf
http://rapidshare.com/files/119907066/servo200804-dl.pdf
http://rapidshare.com/files/119907314/Stepper_20Motor.pdf
http://rapidshare.com/files/119907302/Stepper_20Motor_20Basics.pdf
http://rapidshare.com/files/119883710/_5BeBook_-_Techniques_-_PDF_5D_The_Art_of_LEGO_Design_-_Fred_G._.pdf
http://rapidshare.com/files/119883706/_5BEbook_20-_20Electronics_5D_20Introductory_20Robotics_20-_20J._20M._20Selig.pdf

Wednesday, June 10, 2009

Airports Adopt New Laptop RuLes

ThAVEIERS FORCED TO unpack their notebook computer at airport screening stations received some rclief in August as the Transportation Security Administration began letting people with “checkpoint friendly’1 bags leave the hardware inside.Such bags or cases must have a laptop-only section that completely unfolds to lie flat on the X-ray belt, the TSA says.The bag cannot contain metal snaps, zippers, or buckles inside, underneath, or on top of that laptop scction; nor can it sport pockets on the inside or outside of the laptop- only part of the case. Some 60 bag manufacturers expressed interest when the guidelines were unveiled several months ago, and 40 tested prototypes at one of three airports the government agency designated. Although the TSA says some current bags meet its criteria, particularly sleevelike carrying cases that lack pockets or zippers, most will be new products. Even if a bag meets the guidelines, however, nothing is guaranteed. ‘Given TSA’s use of random screening protocols, TSA reserves the right to re-screen any bag or laptop,’ the agency says.

IPhone 3G Issues

Many people waited in line for an iPhone 3G. but not all of our readers are fans. 3G unreliability, the short battery life, and other issues are
preventing some people from making the leap. Did you get an iPhone 30? Tell us why (or why not) by going to this site by -SAM- and clicking ‘Comment’.

Troubleshooting Sudden Reboots/crashes

Troubleshooting Sudden Reboots/crashes



Seems there are a lot of posts on sudden reboots, so I thought I’d write up a troubleshooting post.



If anyone has any feedback or changes to make, let me know.



This is basically a “shotgun” approach, @sudden reboots and crashing can be caused by so many different things. Here are some of the basic things to try before posting and asking for help. If you have gone through all the below and you are still crashing, then make a new thread and be sure to include a detailed list of your computer’s specs, including:



CPU:

Motherboard:

Ram Speed, size and #sticks:

GPU:

PSU (do not leave this out):

OS:



Also include details of the crash. When does it typically happen? What EXACTLY happens?



And a history as well. At one point, did your system work? Have you recently installed some new hardware/software?



The main cause of system crashes is drivers. If you are ONLY able to boot up in safe mode, this is usually a sign that you have a driver issue.



1. Before going any further, update the following:



Video card drivers: www.nvidia.com or www.ati.com

Motherboard chipset drivers: go to your motherboard maker’s website



Also take a look at how outdated your bios are, and consider an update. If there have been 3 or 4 revisions since the one you have currently installed, it is probably best to update.



2. Check your “Event Log”



@said above, the main cause of system crashes is outdated/corrupt drivers installed. It can be tricky to find which driver it is that is causing the crashes. If you are able to boot your computer up, right click on “my computer”, “manage”, “event viewer”. Here you will find 3 categories and a list of each. Your system reports any errors it encounters here. You want to search in all three categories and look for any details with a red symbol by them. Yellow are also significant, but red ones are the ones to research first.



To research them, the best way is to look inside the details provided. There is a link in there that tells you to “click for more details”. Do it. It’ll take you to the Microsoft site with some possible causes and solutions.



If the crashes seem related to a particular piece of hardware in your system, that is your hint. Update the drivers for that hardware and see if that fixes you up. For example, if you are getting constant error reports for your internet connection, try updating your NIC (network interface card) drivers.



Some other useful links in helping to figure out error codes: http://www.microsoft.com/technet/sup..._advanced.aspx http://www.eventid.net/



3. Auto reboot on error and reporting mini dumps



Windows XP is set by default to reboot your computer when it hits a critical error. For most users I suppose this is a good thing, as no one likes to see the BSOD (blue screen of death). But in this case, we actually WANT to see the BSOD because it contains some useful information in diagnosing the problem. In order to force your computer to show you the BSOD, need to tell it to stop auto restarting on critical errors.



Right-click "My Computer” and then click "Properties".

Click the "Advanced" tab.

Under Startup and Recovery, click "Settings" to open the Startup and Recovery dialog box.

Clear the "Automatically restart" check box, and click OK the necessary number of times.

Restart your computer for the settings to take effect.



If you are suffering from BSOD, please see this thread here by Howard: http://www.techspot.com/vb/topic51365.html



4. Power supply issues



My personal favorite rant. People spend thousands on great parts for their computer, and then by a $30 power supply to power it all up. Cheap power supplies will crash your system, and these types of glitches are extremely hard to diagnose. They make your other parts act unstable, and



For Ur issue u can try the ADVANCED WINDOW CARE it is a good utility and can help u it helps me with my client u can use this link http://www.download.com/Advanced-WindowsCare/3000-2086-10407614.html

----------------------------------------------

The world rocks

- SAM -

Saturday, April 25, 2009

Open Source Software (OSS)

OSS literally means software whose source is open. Stretching this
definition, to be termed OSS, the software should also not restrict
the user from freely using it, modifying it and distributing it. The
most significant differences between OSS and Proprietary Software
(PS) are immediately apparent. PS is usually distributed as a binary
without the source code. So it is almost impossible to dissect the
program to learn about its structure and logic, and make correc-
tions or modifications if necessary. PSS is normally sold with a lot
of conditions that restrict the usage and distribution of the program.

There is a general opinion that all OSS is also free of cost. That isn’t
the case. Proponents of OSS do not restrict the sale of the OSS.
People are free to package and sell OSS at a price they consider fit.

But given the fact that the OSS is freely available to the next person
as well, it is easy to conclude that it would not be possible for an
arbitrarily high price to sustain. If the price is too high, other ven-
dors will enter the market and sell the same product cheaper. Thus,
market forces will ensure that only a fair price is charged.

How To Unblock Youtube At School

Proxy Sites
Why do people want to unblock Youtube? Youtube sucks. Rather unblock something useful, like Wikipedia. Seriously. But anyway, here's how you can get on any website at school (yes, including Youtube, you addict)

Why do people want to unblock Youtube? Youtube sucks. Rather unblock something useful, like Wikipedia. Seriously. But anyway, here's how you can get on any website at school (yes, including Youtube, you addict)... you need something called a...
Proxy
New proxies get blocked all the time, so you really need to keep finding new ones when that happens. Here is a proxy you can try:
www.haoproxy.com

The trick is to find a proxy that very few people know about. Most of the ones you'll find by searching on the internet will get blocked, because that's the first place a teacher will look when they want to know what sites they should block. So, the best way to unblock sites (yes, and Youtube... sigh) is to use other methods...

Other ways to unblock sites
Use Google's cached version of the site. This will let you read just about any site, but you can't log in to member sites (like Youtube or whatever). This may or may not also work with other search engines, like Yahoo and whatever else there is.
Translator sites can be used to access pages much like the search engine cache trick. Example: babel.altavista.com

You can use RSS readers to access news sites instead of going to the site itself. www.bloglines.com is just one, but there are millions of these.

You can use "web accelerators" to unblock sites too. Like webaccelerator.google.com

Unblocker Programs
UltraSurf is free software and is available in English and Chinese. Once started, it opens an Internet Explorer type program that is automatically configured to allow you to browse websites through UltraSurf. Other browsers must be configured manually. The UltraSurf site itself might be blocked, so you may have to download this at home and bring it to school on a flash drive or something.
Similar unblockers:
FreeGate
GPass
HTTP Tunnel
Jap Anon
TOR
I2P


Set up your own proxy
This is the most reliable way to unblock sites... but you have to do it yourself. Basically, you set up your own proxy on your home computer or on a web host somewhere, and use it yourself. Don't tell anyone about it, except maybe a close circle of friends. The more people who know about it, the more likely it will get blocked. But hey, if you can make one proxy, you can make more of them, so... :)
How to make a proxy
Install Apache and PHP on a computer that has permanent access to the internet. Download and install a PHP script called PHProxy (you'll have to Google for it, its owner stopped developing it). You can also use CGIProxy. Then, as long as you know your IP address, you can get to your proxy from anywhere. You can also set up DNS for it if you want, but that just makes it easier to block. So, if your IP is 123.456.78.9, you'll access your proxy by typing in http://123.456.78.9 at school.
psiphon turns a regular home computer into a personal, encrypted proxy server. psiphon is free and open source, and comes in Linux and Windows versions. It is easy to install, but if your computer is behind a home router it may require some configuration.

Peacefire Circumventor is similar to psiphon, but a bit harder to install.

They don't just block Youtube
Schools have been known to block a lot of educational and downright useful sites too. In fact, the software they use to block things with is extremely ineffective at blocking access to anything (as this article has just proven). For more information about internet censorship, go to Peacefire.org. Researchers have found that commercial filtering technologies mistakenly block access to content related to women’s health, gay and lesbian rights groups, and sexual education for teenagers. Everyone's Guide to By-Passing Internet Censorship for Citizens Worldwide

Don't forget to tell your friends about www.haoproxy.com!

Natural Learning

A natural approach to home schooling.
Natural learning is the basis of a relaxed, obligation free lifestyle in which children are free to reach their potential and parents are present to enjoy the process.

Natural Learning is not just a style of education, it's a lifestyle! It's about facilitating and supporting your children to make their own life choices, follow their dreams develop their potentialities and enjoy that journey. It's a process of being, discovering, creating, inspiring, sharing, enjoying and appreciating each other...

The control over what, when and how things are learned belongs to the individual child. Parents, siblings and others may provide a source of inspiration but ultimately the individual child makes their own assessments
about themselves and the world around them.

Natural Learning goes hand in hand with a natural parenting style that is based on principles rather than rules. It's almost like an extension of attachment parenting and compassionate parenting techniques...

The ultimate aim of educating and parenting in this way is to grow emotionally healthy adults with a high self esteem and a high regard for all living things.
Adults who;

* explore their passions
* make their own decisions based on a nonbiased evaluation of circumstances
* possess the skills to expand on their skillset, gain new knowledge and pursue goals
* maintain healthy relations with others
* are socially confident
* act from a peaceful place in their hearts.

Home-based education effectiveness research demonstrates that children are usually superior to their school-attending peers in social skills, social maturity, emotional stability, academic achievement, personal confidence, communication skills and other aspects.
"Curiosity is as much the parent of attention, as attention is of memory. Whately, Richard"


Natural learning is not compatible with ironhanded classrooms or rigid curriculum. Learning cannot be measured by multiple choice tests. Natural learning is basically an enjoyable thing to do. It is the learning that people do every day of their lives. Natural learning is, and will always remain, the most important form of learning.

People have powerful natural mechanisms for learning that allow them to master an enormous volume and variety of material during their lifetimes. Adults imposing their ideas of curriculum and lesson plans on children and young people is not an effective method of teaching. Learning, that is truly natural, will be the result of the child's own development and own motivations.


Learning implies growth, and growth implies the realization of an inner pattern of design and harmony. It is a natural process that every child experiences in his/her own unique way. Learning to learn is the most fundamental learning of all.

Learning processes can be both planned and opportunistic. Schools fail to educate because they don't leverage the natural learning process. What is the attitude of students towards classroom learning? How do schools fail to ignite the natural learning process? Can we make schools conform more closely to natural learning? How does a fixed curriculum inhibit learning?

Isn't it scary that many school-age children associate learning with fear of failure...
"My education was dismal. I went to a series of schools for mentally disturbed teachers. "Woody Allen.


Unlike their formal schooling couterparts, natural learners interact with people of all ages, cultures, religions, and race. Natural learning happens every day regardless of school days or terms. Developing a broader view of the world through a variety of social situations encourages creativity, empathy and lateral thinking in kids.

Education for adaptability through 'self-empowerment is 'holistic education'. The wonder is that it has taken so long for society to notice that education is stymied in those institutions. Education and training should be constructed so that learners are confronted with many new useful experiences that will be valuable to recall in the future.

How does formal education differ from childhood learning?

Cramming for an exam or trying to please a teacher ought not to be the goal of those seeking an education. The initial reasons for establishing universal schooling were more about social factors involved in producing a working class for the new industrial world of the 18th and early 19th Century. The kinds of social skills (obedience, deference, and unquestioning behaviour) and the education production function (didactic instruction) needed for factories aren't those needed for the post-industrial age of today. Self-motivation, self-direction and self-instruction are critical along with the broad generic skills of communication, information management, problem solving, team-working, and lateral-thinking that are highly sought after by employers.

"I have never let school interfere with my education."Mark Twain.


Education research demonstrates that the the learning environment of home is a better catalyst of educational success than the learning environment of school. Intrinsic motivation to learn is far more important in the long run than extrinsic motivation (such as through exams). School bears no relation to the real life situations of the workplace or home environment.

"Education is, not a preparation for life; education is life itself." Holistic education is education for development of human potential. Inthe paradigm of 'holistic education' the function of the effective teacher or 'soul educator' is defined in terms of the 'facilitation of learning'. Individual human development depends on education which provides the right conditions for the facilitation of learning. That which engages the person as a whole and their instinctive motivation for growth is exactly the kind of education neccessary to prepare the leaders of tomorrow for the catastrophic social and problems they face.

Children learn when they are ready, making it very easy to pick up the knowledge. Children will absorb much more because they are learning by their own desire to know. Naturally modelling positive examples set by their parents, is the most natural form of learning, easily observed in young children. It is clear that the interesting action, the stuff that comprises a child's mental life in school, is about interaction with other children in one form or another. Learning, that is truly natural, will be the result of the child's own development and own motivations. This is the way children learn to walk and talk. The environment of the home encourages kids to maintain a higher level of concentration for longer without the pressures of constant social stress.

Natural learning offers unparalleled opportunities to capture learning moments and turn them into meaningful and enduring knowledge. Trusting ourselves as parents and as mothers – our intuition and our personalities are important in our homeschooling adventure.

Each of us should be free to learn in our own way and our own time.


The term 'unschooling' was coined back in the sixties when John Holt, trying to promote school reform, learned about homeschooling. John Holt came up with the word unschooling to describe learning that was diametrically opposed to that usually used in the institutional setting. There has been a lot of debate about unschooling and many heated discussions with people taking sides for and against unschooling. I don’t believe there needs to be such adamant pro and con debate about unschooling. One of the basic premises of unschooling or natural learning is that of letting the child follow his interests. I think of unschooling as tapping into the inner structure of the child rather than imposing an external structure. This varies so much from each individual and family, that it's hard to say "unschooling looks like this", because it will look different in each house or person as they joyfully pursue their passions.

Natural learning is what happens anyway, despite what you do. However, natural learning is so vital to a person's growth and happiness that it should never be taken for granted by educators, by parents or by anyone concerned about the growth and development of young people. If educators are going to be concerned with the development of the whole person, one of their jobs should be to determine how and when natural learning is thwarted, blocked or undermined. Maybe natural learning is kind of a religion because more than anything, it seems to be about trust and acceptance. “Natural learning is invigorating,” says author Ron Dultz, “because the learner feels a strong personal connection to what is being learned, is ripe for it and has selected it. This natural learning is always self directed. I believe that natural learning is what happens before school and after school."

In the modern world of web 2.0 and social networking via the internet, this "Natural Learning" has a new platform. Young people are doing this automatically, this has been described by author Don Tapscott in his book "Grown up Digital". (Danielle, I am new to this, please edit or delete as seems appropriate!-

Legal Issues for IT Professionals

An Introductory Overview of Legal Issues for IT Professionals in the UK
This knol provides an introductory overview of the main pieces of UK legislation that are relevant to IT professionals. It includes a brief discussion of some cross national issues, including the Gary McKinnon case, the US PATRIOT Act and the Council of Europe Convention on Cybercrime.

This knol provides an introductory overview of the main legal issues and pieces of legislation that are relevant to IT professionals in the UK. Three of the most significant ones - the Computer Misuse Act, the Data Protection Act and Intellectual Property Rights - are expanded more fully in their own independent knols.

Computer Misuse Act 1990
The Computer Misuse Act (CMA) [1] - the so-called "hacking law" - is designed to prevent unauthorised access to computer systems - these are the so called hacking laws. The Act creates three categories of offence.

1. Unauthorised access to computer material.

This deals with unauthorised access to computer systems without the intent to commit serious crime such as fraud. It is regarded as a relatively minor offence and can be dealt with in Magistrate's courts.

2. Unauthorised access with intent to commit or facilitate commission of further offences.

This deals with unauthorised access to computer systems with the specific intention of committing, or facilitating the commission, of a serious crime. This is a much more serious offence, and is dealt with at the Crown Court.

3. Unauthorised modification of Computer material.

This covers unauthorized modification of computerised information, and thus includes viruses, logic bombs, and trojans. This is also a very serious offense.

There is more detail about this Act in a separate knol - Computer Misuse Act 1990.

Data Protection Act 1998
The Data Protection Act 1998 (DPA) [2] replaces the earlier act of 1984, and is intended to implement the 1995 European Directive on Data Protection. It is designed to cover the collecting, storing, processing and distribution of personal data. The act places obligations on those who record and use personal data and it gives rights to individuals about whom information might be held. Most significantly, the Subject Access Right entitles any individual to ask for, and be given, details of any personal data about them that is being stored or processed.

The Information Commissioner [3] is an independent government authority, with responsibilities to provide information and advice in relation to the Act, and to enforce compliance with it.

There is more detail about this Act in a separate knol - Data Protection Act 1998.

Freedom of Information Act 2000
The Freedom of Information Act 2000 FOIA) [4] gives individuals the right to access information held by public authorities. It differs from the Data Protection Act in that, amongst other things, it is not restricted to personal data. It gives the individual to do two things.

* To ask any public organisation covered by the Act what information it has on any subject you specify.

* If the organisation has the information, to be given copies.


Providing the information is not legally exempt from disclosure the organisation must tell you what it has and give it you within twenty working days. In many cases, even if it withholds the information, it at least has to tell you what it has.

A private company may be affected by the Act if data on the private company is held by a public authority. This may happen when, for example, the company has had a contract to supply goods or services to the public authority. In such cases the data may be subject to the Act.

The Information Commissioner [3] is an independent government authority, with responsibilities to provide information and advice in relation to the Act, and to enforce compliance with it.
This list of BBC news stories made possible by the Freedom of Information Act is a vivid illustration of the impact that the Act has had.
Intellectual Property Rights
Intellectual property (IP) allows people to own their creativity and innovation in the same way that they can own physical property. The owner of IP can control how others use his ideas, in order to profit from them. This benefits wider society as, well as the owner, because it encourages further innovation and creativity.

There are a variety of legal rights that can be used to protect IP. These include: patents, copyright and database rights. The owner of an IP right may exploit, and benefit from, that right by a number of means.

* They may use it directly in the creation of products or services – either for their own use or for sale.
* They may license the IP right so that others may make use of it – and be paid for the license.
* They may sell the IP right to a third party.


The most common method of protecting computer software is copyright. The copyright holder sells the user a license to use the software. The user is allowed to use the software but never owns it.

The UK Intellectual Property Office [5] contains detailed information about a wide range of IP rights. The principal legislation on IP protection in the UK can be found in the Copyright, Designs and Patents Act 1988 [6].

There is more detail about intellectual property rights in a separate knol - Intellectual Property for IT Professionals.

Health and Safety at Work
The Health and Safety at Work Act 1974 [7], and related legislation, imposes rights and responsibilities in relation to safety in the workplace.

* It is an employer’s duty to protect the health, safety and welfare of their employees, and other people who might be affected by what they do.
* It is an employee’s responsibility to take reasonable care of their own health and safety, and that of others who may be affected by what they do or do not do.


The Act provides for protection against - e.g. - bullying and harrassment, as well as the more obvious physical aspects of health and safety.

The Health and Safety (Display Screen Equipment) Regulations 1992 [8] provide specific regulations relating to the use of display equipment and computer workstations. The Regulations require employers to minimise the risks in VDU work by ensuring that workplaces and jobs are well designed.

The Health and Safety Executive [9] is an independent body whose job is to protect people against risks to health or safety arising out of work activities.

Public Interest Disclosure Act 1998

The Public Interest Disclosure Act 1998 [10] - the so called whistle blowers law - protects workers who raise concerns over any of the following malpractices at work:

* a criminal offence
* the breach of a legal obligation
* a miscarriage of justice
* a danger to the health and safety of any individual
* damage to the environment
* deliberate covering up of information tending to show any of the above


The Act protects whistle blowers from being victimised or sacked as a result of their whistleblowing. Although the Act provides protection there are still risks for the wistleblower and this is not something that should be undertaken lightly. Martin (1999) [11] gives detailed information and advice to anyone who is considering becoming a whistleblower.

WorldWideWhistleBlowers [12] provides a "forum and informational source for those brave individuals who would like to go public with evidence of actions contrary to the public good".

Defamation Act 1996
The Defamation Act 1996 [13] makes it an offence in the U.K. to disseminate defamatory statements, including any via e-mail or on a bulletin board. The same act allows a defence of innocent dissemination, which recognises that there is no offence if you don't know that you're disseminating such statements. This means that, for example, an internet service provider may not be responsible for defamatory materials published on his server.

Consumer Protection (Distance Selling) Regulations 2000
A range of UK laws apply to the sale of goods, regardless of whether that sale is completed in person, by mail order, or via the internet. Most of them are only applicable to the UK. Internet-based sales are usually treated in the same way as ‘mail order’. If you are buying from companies based in the UK the Consumer Protection (Distance Selling) Regulations 2000 [14] apply. The key features of these regulations are:

* The consumer must be given clear information about the goods or services offered.
* After making a purchase the consumer must be sent confirmation.
* The consumer has a cooling-off period of 7 working days, during which time they may cancel their order.


A Cross National Perspective
Other nations have laws that parallel the UK legislation described above. They may not always have the same names and they may not be exactly equivalent in every detail, but there is frequently a lot of overlap. Due to the global nature of communication technologies, it is increasingly important to be aware of the situation beyond the UK.

Council of Europe Convention on Cybercrime

The Council of Europe Convention on Cybercrime [15] deals with crimes - involving infringements of copyright, computer-related fraud, child pornography and violations of network security - committed via computer networks. It aims to promote international co-operation towards a common criminal policy aimed at the protection of society against cybercrime.

The list of signatories [16] to the Convention includes France, Germany, UK, USA and Japan.
The United States PATRIOT Act 2001
The PATRIOT Act - Providing Appropriate Tools Required to Intercept and Obstruct Terrorism - was part of the United States' response to the 9/11 attacks. Amongst other things, this legislation strengthened the US computer misuse laws to include:

"a computer located outside the United States that is used in a manner that affects inter-state or foreign commerce or communication of the United States"

Worries have been expressed that this may be interpreted as applying to data that simply passes through the USA. Many of the Acts provisions had a sunset clause, which meant that they would have ceased to be law in 2005. In the months preceding the sunset date, supporters of the act pushed to make its sunsetting provisions permanent. They largely succeeded, and the Act was reauthorised in 2005.

The Gary McKinnon Case
In November 2002 Gary McKinnon, a UK citizen, was arrested on suspicion of hacking into US military computer networks the previous year. He had allegedly used computers loacted in the UK to hack into US computers, without physically visiting the US.

Mr McKinnon was originally arrested under the UK Computer Misuse Act, a crime for which he might reasonably have expected community service sentence. Unfortunately for him - as it turned out - the Crown Prosecution Service did not charge him.

In 2005 the United States government began extradition proceedings. If extradited to the US, Mr McKinnon faces up to seventy years in prison. He is contesting the extradition, arguing that the alleged crimes were committed in the UK and so he should face trial in the UK rather than the USA.

Web3.0

Web 1.0 Web 2.0 Web 3.0

-1-Computer shortly

The society -1-Computer in a few words..

* 1991 - foundation (Sion, Switzerland)
* 1994 - adoption of the Linux platform
o freeware based solution
* 1997 - realisation of the first Internet sites
* 1999 - hosting of Internet sites
* 2001 - development for mobile Internet
* 2002 - application of Web (XHTML 1.1) standards
* 2003 - 1Work CMS (mobile, PDA, UMPC, PC)
* 2005 - Artemis (Tracability for wine cellars)


Web shortly

Some historical dates ...

* 1990 - Software WorldWideWeb (Nexus) for NeXT
* 1993 - NCSA Mosaic
o multiplateform solutions, more stable
* 1995 - Domination of the market by Netscape and 1st release of MS Internet Explorer
* 1998 - Mozilla ends in 2003
* 2000 - Release of Konqueror (KDE). Domination of the market by MS Internet Explorer
* 2002 - Apparition of FireFox based on mozilla. 9th Nov. 2004 Ver. 1.0
* 2007 - Internet Explorer 7, FireFox 2.0, Prism (Mozilla labs)
* 2008 - Release of FireFox 3.0, Fennec (mobile), ...


Themes

* How to situate on the Web ? Which future ?
* How to remain platform hardware independent (terminals, mobiles, plasma screens) ?
o Easily publish on several support : from the small mobile screen to the huge plasma screen

Methodology - Graphical

* Internet is a spiderweb, the Web is a rainbow....
o There is a huge number of colors, but we only see a small part of them, which change depending on the means used !

*


Web 1.0 Characteristics

How to define the Web1.0 ?

* statical pages, sometimes dynamical
* change possible for the WebMaster only
* unitary web pages : texts, images, links

STATICAL....

* The webmaster uses one or several software to modify the data.
* Internet user do not contribute directly to the data changes

Web1.0 Graphically

* Web1.0: Statical pages, text, WebMaster,....
o Publication on several supports either the small mobile's screen or on a standard screen (resolution).
+ Statical pages, statical mobility.


Web 2.0 Characteristics

How to situate Web2.0 ?

* dynamical sites, sometimes statical
* changes of the content by the Webmaster and users
* site solution web (software)

DYNAMICAL....

* The webmaster do not use softwares to modify the datas.
* The webpage reader can contribute to the datas.


Web 2.0 Models
Web resources ?

* Web2.0 or Web2.c for users
* Model with free market (Advertisements)

Other...

* Web2.b for business (intranet, extranet)


Web2.0 Graphically

* Arrival of the Web2.0. Web User(s), Web community
* The web becomes software, tool, sharing....
o Upgrade to the Web2.0 offers a much broader offer of services


Web3.0 Themes

* How do the web evolves ? Which future ?
* Burst of technologies:
o technical and software (Ajax, Flash, 3D, ???, ...)
o hardware : mobiles, PDA, UMPC, PC, large screens,.....
(nokiaN810 5' , eeepc 7',...)
o Network: WiMax (centrino2), Uwb,...
o Web Object: Datamatrix, RFID, ...


Web 3.0 characteristics 1 of 2

How to define the Web3.0 ?

* Mobility: each kind of hardware, screen, printer
* Universality: for every browser
* Accessibility: Web's standards -> databases
* Application Solution software Web SaaS


Web 3.0 Characteristics 2 of 2

Web based solutions. (ASP, SaaS, Software, Application....We say not Web pages)

* 3 actors:
o The webmaster
o Users
o Web3.0 database servers , microformats
* With evolution and diversity, hardware will take a major role with the Web3.0


Web3.0 Graphically

* Release of the Web3.0. User(s), communities, mobility (hardware-software)
* Web becomes information : databases (xml, rss,...), micro formats, semantics,...
o Respect of standards to communicate between sites, transit of informations, Open Source

Rupture of the Web1.0

* Client becomes an actor. (Knol, Blog, CMS Wiki,...)
* Users are actors
o Wikipedia, social networks, Second Life,...
o Google Writer, Mahalo, Wikia...

Rupture of the Web2.0

* The web becomes an engine and an actor. Hardware becomes "transparent"
* The web solution allows to modifiy the tool.
* We create the web by the web.....
o 1Work:
+ Individual creation of databases
+ Automatic creation and anihilation of documents
+ Creation of forms
o Artemis:
+ Integrated programming language
+ display...
+ filters, requests
+ entry (data input), output : display or printer....


Web3.0 Graphically

* Locate a webpage or solution on this representation.
o Vertical: mobility; hardware and software.
o Horizontal: user, communities, databases

Web2.0 Web3.0 Graphically

* On this representation what are the possible sites ?
* Determine other situations...
* What should be there for Web2.0? Web3.0?


Web 3.0 Applications
Definitions

* The Web by the web independence at software and hardware levels
The web in every place and on every device.

Case study

* www.1computer.info/1work/
* www.1computer.info/artemis/


Conclusion

* In 3 points :
o Web1.0 : OS layer independent
o Web2.0 becomes software
o Web3.0 is software (engine and development) + microformats
+ hardware layer independent
* Finance: Release of the Web3.0 will finally take out the web from the unique
advertisement solution B2C...
* The use of the Web in the administration, trading and industry
will take a much more important position, maybe even a dominant one.
* Technical solution: « liquid structure »
o In the Web3.0 hardware plays one more role : it becomes transparent. The code becomes open source.

How Google Works ?

Now this question can be easily answered in 5000 words. Books have been written on this subject. But the point is who wants to know in deep? All that matters is some interesting facts to impress your friends.

There's a beautiful flash that describes google working process.[To view click here]

The flash gives a summery of the whole book in 2 minutes audio-visual entity.Really interesting to see.

If you aren’t interested in learning how Google creates the index and the database of documents that it accesses when processing a query, skip this description.


Google runs on a distributed network of thousands of low-cost computers and can therefore carry out fast parallel processing. Parallel processing is a method of computation in which many calculations can be performed simultaneously, significantly speeding up data processing. Google has three distinct parts:

1. Googlebot, a web crawler that finds and fetches web pages.

2. The indexer that sorts every word on every page and stores the resulting index of words in a huge database.

3. The query processor, which compares your search query to the index and recommends the documents that it considers most relevant.
Let’s take a closer look at each part.



1. Googlebot, Google’s Web Crawler

Googlebot is Google’s web crawling robot, which finds and retrieves pages on the web and hands them off to the Google indexer. It’s easy to imagine Googlebot as a little spider scurrying across the strands of cyberspace, but in reality Googlebot doesn’t traverse the web at all. It functions much like your web browser, by sending a request to a web server for a web page, downloading the entire page, then handing it off to Google’s indexer.
Googlebot consists of many computers requesting and fetching pages much more quickly than you can with your web browser. In fact, Googlebot can request thousands of different pages simultaneously. To avoid overwhelming web servers, or crowding out requests from human users, Googlebot deliberately makes requests of each individual web server more slowly than it’s capable of doing.

Googlebot finds pages in two ways: through an add URL form, www.google.com/addurl.html, and through finding links by crawling the web.


Unfortunately, spammers figured out how to create automated bots that bombarded the add URL form with millions of URLs pointing to commercial propaganda. Google rejects those URLs submitted through its Add URL form that it suspects are trying to deceive users by employing tactics such as including hidden text or links on a page, stuffing a page with irrelevant words, cloaking (aka bait and switch), using sneaky redirects, creating doorways, domains, or sub-domains with substantially similar content, sending automated queries to Google, and linking to bad neighbors. So now the Add URL form also has a test: it displays some squiggly letters designed to fool automated “letter-guessers”; it asks you to enter the letters you see — something like an eye-chart test to stop spambots.

When Googlebot fetches a page, it culls all the links appearing on the page and adds them to a queue for subsequent crawling. Googlebot tends to encounter little spam because most web authors link only to what they believe are high-quality pages. By harvesting links from every page it encounters, Googlebot can quickly build a list of links that can cover broad reaches of the web. This technique, known as deep crawling, also allows Googlebot to probe deep within individual sites. Because of their massive scale, deep crawls can reach almost every page in the web. Because the web is vast, this can take some time, so some pages may be crawled only once a month.

Although its function is simple, Googlebot must be programmed to handle several challenges. First, since Googlebot sends out simultaneous requests for thousands of pages, the queue of “visit soon” URLs must be constantly examined and compared with URLs already in Google’s index. Duplicates in the queue must be eliminated to prevent Googlebot from fetching the same page again. Googlebot must determine how often to revisit a page. On the one hand, it’s a waste of resources to re-index an unchanged page. On the other hand, Google wants to re-index changed pages to deliver up-to-date results.

To keep the index current, Google continuously recrawls popular frequently changing web pages at a rate roughly proportional to how often the pages change. Such crawls keep an index current and are known as fresh crawls. Newspaper pages are downloaded daily, pages with stock quotes are downloaded much more frequently. Of course, fresh crawls return fewer pages than the deep crawl. The combination of the two types of crawls allows Google to both make efficient use of its resources and keep its index reasonably current.

2. Google’s Indexer

Googlebot gives the indexer the full text of the pages it finds. These pages are stored in Google’s index database. This index is sorted alphabetically by search term, with each index entry storing a list of documents in which the term appears and the location within the text where it occurs. This data structure allows rapid access to documents that contain user query terms.
To improve search performance, Google ignores (doesn’t index) common words called stop words (such as the, is, on, or, of, how, why, as well as certain single digits and single letters). Stop words are so common that they do little to narrow a search, and therefore they can safely be discarded. The indexer also ignores some punctuation and multiple spaces, as well as converting all letters to lowercase, to improve Google’s performance.

3. Google’s Query Processor

The query processor has several parts, including the user interface (search box), the “engine” that evaluates queries and matches them to relevant documents, and the results formatter.
PageRank is Google’s system for ranking web pages. A page with a higher PageRank is deemed more important and is more likely to be listed above a page with a lower PageRank.
Google considers over a hundred factors in computing a PageRank and determining which documents are most relevant to a query, including the popularity of the page, the position and size of the search terms within the page, and the proximity of the search terms to one another on the page.
Google also applies machine-learning techniques to improve its performance automatically by learning relationships and associations within the stored data. For example, the spelling-correcting system uses such techniques to figure out likely alternative spellings. Google closely guards the formulas it uses to calculate relevance; they’re tweaked to improve quality and performance, and to outwit the latest devious techniques used by spammers.
Indexing the full text of the web allows Google to go beyond simply matching single search terms. Google gives more priority to pages that have search terms near each other and in the same order as the query. Google can also match multi-word phrases and sentences. Since Google indexes HTML code in addition to the text on the page, users can restrict searches on the basis of where query words appear, e.g., in the title, in the URL, in the body, and in links to the page, options offered by Google’s Advanced Search Form and Using Search Operators (Advanced Operators).

Let’s see how Google processes a query.


Isn't it Interesting ? BTW the name ‘Google’ was an accident. A spelling mistake made by the original founders who thought they were going for ‘Googol’ ...

IPv6 The Next Generation Internet Protocol

INTRODUCTION

Internet is the global network that consists of interconnection of millions of computers. The connections between these computers are supplied by a list of rules which is called ‘Internet Protocol’, shortly ‘IP’. IP, which is a member of TCP/IP protocol suit, is the protocol that describes how data is send across networks. This protocol was initially designed to response limited specific requests. However, due to exponential growth of Internet, the current version of IP has gradually become a bottleneck for the future of Internet. As a result, transition to a new flexible and powerful protocol is unavoidable. This new protocol is called IP version 6 (IPv6).

This report will be about the next generation Internet Protocol, IPv6. The purpose of this report is to inform reader about current situation of Internet Protocol, necessity of transition to IPv6, features of IPv6 and transition strategies for IPv6. Since IPv6 is a high approach of engineering study, therefore includes lots of technical details, only key issues of IPv6 will be presented. This report will be beneficial for researchers who are interested in computer networking.

The four parts of this report discusses (1) definition of Internet Protocol, (2) necessity of IPv6, (3) features of IPv6, and (4) transition to IPv6. The first section describes Internet Protocol and a brief history of IP. The necessity of IPv6 section discusses bottlenecks of current protocol and why IPv6 is needed. In the following section, some of features of IPv6 will be explained. The final section gives information about transition period, time of transition, current studies for transition and strategies that will be followed in order to not experience troubles.
INTERNET PROTOCOL OVERVIEW

Before explaining structure of IPv6, its features and necessity of transition to IPv6, it is beneficial to mention what IP is, and its history.
What is IP?

Internet Protocol (IP) is one of the most important cornerstones of Internet structure that provides connection between any peers that are connected to Internet. Technically, as Kozierok (2004) states, “The Internet Protocol is the primary OSI network layer (layer three) protocol that provides addressing, datagram routing and other functions in an internet work”.
History of IP

History of IP started more than 20 years ago with development of a research network in United States Defense Advanced Research Agency (DARPA, or ARPA). This network, named ARPAnet, may be considered as grandfather of Internet, and it was operating on a number of protocols called Network Control Protocol (NCP). Later, Transmission Control Protocol (TCP) was used for this network. According to writers of HistoryoftheInternet.com (1999) “Transfer Control Protocol (TCP), outlined in a 1974 paper by Kahn and Cerf, was introduced in 1977 for cross-network connections, and it slowly began to replace NCP within the original ARPAnet”.
Internet Protocol firstly defined in Request For Comment document (RFC) 791, in 1981. The name IP version 4 would imply that there were earlier versions of IP, but in fact weren’t. Until version 4 of TCP, functionalities of IP were performed by TCP but there was no distinct protocol named IP and with version 4, TCP was splitted into two parts TCP and IP. In order to provide consistency same version number was applied IP, too. This means, IPv4 is actually IPv1 which was defined in RFC 791.

NECESSITY OF IPv6
Limitations of Current Protocol

As mentioned before, IPv4 which is the current version in use is the only version that was deployed and has not changed since RFC 791, which was published in 1981. However, it was designed only focusing on small experimental network and today’s growth of Internet was not considered. After two decades Internet become a widely used popular communication tool. This popularity caused to reach structural limits of IP.

The most important property of IP is its number allocation system that assigns a number to everyone (Karadere, n.d.). In theory, with its 32-bit addressing structure, IPv4 provides 4,294,967,296 IP numbers. However, as Yeğin (2005) states, due to inefficient number allocation mechanisms, active address amount can never reach this level. In order to use this limited address space more efficiently, many technologies such as Classless Inter-Domain Routing (CIDR), Point-to-Point Protocol (PPP) and Dynamic Host Configuration Protocol (DHCP) have been developed. However, according to Kozierok (2004) they only helped to postpone exhaustion of address space. Eventually, Network Address Translator (NAT) technology was included into structure of Internet as a patch for address limit.

NAT is system that allows privately addressed hosts to connect Internet over same public IP address.

A Burn to IPv6

The current address space is not capable to satisfy the exponential growth of Internet. Although, NAT and other technologies have extended the life time of IPv4, these techniques can not be complete solution for the future of Internet. Furthermore, some problems such as limited address space are structural problems that can not be fixed. That means a new flexible version of IP is the only solution must be considered. Therefore, in the 1990s, Internet Engineering Task Force (IETF) has started working on a new powerful protocol called IP Next Generation Protocol (IPng), later named IP version 6 (IPv6).

Due to version number ‘6’ it might be asked ‘What happened to IP version 5?’. The version number 5 was given to Internet Stream Protocol (ST) which “was created for the experimental transmission of voice, video, and distributed simulation. Two decades later, this protocol was revised to become ST2 and started to get implemented into commercial projects by groups like IBM, NeXT, Apple, and Sun.” (Krikorian, R., 2003).
Evolution of IP
According to Kozierok (2004), the primary motivating factor in creating IPv6 is necessity of a larger address space. Furthermore, together with fixing problems of IPv4, decision of a new protocol “made sense to use opportunity to make as many as improvements as possible”. These important enhancements are listed in Table 1, which is a comparison of IPv6 with IPv4.

IPv4


IPv6

Source and destination addresses are 32 bits (4 bytes) in length.


Source and destination addresses are 128 bits (16 bytes) in length.

IPSec support is optional.


IPSec support is required.

IPv4 header does not identify packet flow for QoS handling by routers.


IPv6 header contains Flow Label field, which identifies packet flow for QoS handling by router.

Both routers and the sending host fragment packets.


Only the sending host fragments packets; routers do not.

Header includes a checksum.


Header does not include a checksum.

Header includes options.


All optional data is moved to IPv6 extension headers.

Address Resolution Protocol (ARP) uses broadcast ARP Request frames to resolve an IP address to a link-layer address.


Multicast Neighbor Solicitation messages resolve IP addresses to link-layer addresses.

Internet Group Management Protocol (IGMP) manages membership in local subnet groups.


Multicast Listener Discovery (MLD) messages manage membership in local subnet groups.

ICMP Router Discovery is used to determine the IPv4 address of the best default gateway, and it is optional.


ICMPv6 Router Solicitation and Router Advertisement messages are used to determine the IP address of the best default gateway, and they are required.

Broadcast addresses are used to send traffic to all nodes on a subnet.


IPv6 uses a link-local scope all-nodes multicast address.

Must be configured either manually or through DHCP.


Does not require manual configuration or DHCP.

Uses host address (A) resource records in Domain Name System (DNS) to map host names to IPv4 addresses.


Uses host address (AAAA) resource records in DNS to map host names to IPv6 addresses.

Uses pointer (PTR) resource records in the IN-ADDR.ARPA DNS domain to map IPv4 addresses to host names.


Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6 addresses to host names.

Must support a 576-byte packet size (possibly fragmented).


Must support a 1280-byte packet size (without fragmentation).

Table 1:Differences between IPv4 and IPv6.


FEATURES OF IPv6
Although this report mostly pays attention to IPv6 addressing, IPv6 Header and Address auto-configuration, beyond these features, IPv6 also provides some additional benefits. These benefits are summarized by Enterasys Networks, Inc. (2004) as follows:

* Simplified header format for efficient packet handling.
* The streamlined IPv6 header provides more efficient processing at intermediate routers.
* Hierarchical network architecture for routing efficiency.
* Auto-configuration and plug-and-play support.
* Elimination of the need for Network Address Translation (NAT) and Application Layer Gateways (ALG).
* Embedded security with mandatory IPSec implementation. End-to-end security can be accomplished by deploying IPSec.
* Enhanced support for Mobile IP and mobile computing devices.
* Better support for Quality of Service (QoS). QoS is natively supported in IPv6.

IPv6 Addressing

Larger Address Space
The major factor of designing a new protocol was limited address space; therefore, the main goal of IPv6 is its large address space. It might be expected that new protocol would increase size from 32 to 48 or 64 bits. However, design of IPv6 extends size to 128 bit, which theoretically makes 340,282,366,920,938,463,463,374,607,431,768,211,456 (≈3.4 x 1038) addresses. Although the main concept of 128 bit addressing is to make sure that it will not consume again, “the relatively large size of IPv6 address is deigned to be divided into hierarchical routing domains that reflect the topology of the modern-day Internet” (Davies, 2003, p46).

A New Representation
Due to its large size, instead of ‘dotted decimal notation’, for IPv6, ‘colon hexadecimal notation’ was preferred. In order to keep size down, it is allowed to omit leading zeros and compress contiguous zero valued blocks. The figure below shows representation of an Ipv6 address in different notation. Also it illustrates how zero compression is applied. It should be noted that “::” notation can be used only once and it expresses that all values between two colons (:) are zero.

IPv6 Address Types
As in IPv4, version 6 also supports three address types, however, with some remarkable changes. These three types are 1) Unicast, 2) Multicast and 3) Anycast addresses. Unlike IPv4, as Kozierok (2003) states, “there is no distinct concept of a broadcast address in IPv6”. Functionality of broadcast addressing is performed in IPv6 by multicast addresses. On the other hand, concept of Anycast addresses is special to IPv6 and it will be discussed in the next sections.
1- Unicast Addresses
Global Unicast Address:
Global Unicast addresses are identified with having their first three digits as “001” and correspond to a full 1/8 fraction of the complete size of IPv6 address space. As Davies (2003) describes IPv6 global unicast addresses are equivalent to public IPv4 addresses which are globally routable and reachable on the whole Internet.
The large size of IPv6 address supplies remarkable flexibility to create various hierarchic addressing schemes. However, in unicast addresses, always last portion is fixed to be 64bits to be used as interface identifier. In IPv6, modified Extended Unique Identifier (EUI)-64 addresses are used to represent IPv6 interface ID of all global unicast addresses. Benefit of this representation stated by Kozierok (2003) is that, it makes networks easier to administer, because just one number for each host needed to be recorded.
The Figure 3 illustrates process of deriving a 64-Bit IPv6 Modified EUI-64 Interface Identifier from a standard MAC address

Site-Local Address:

Site-local addresses are implementations of IPv4 private addresses in IPv6. These addresses are supposed to be used within a site or an Intranet and are not forwarded to public Internet. In hexadecimal notation they start with “FEC”, “FED”, “FEE” or “FEF”. Format of site-local addresses is

Link-Local Address:

Link-local addresses start with “FE8”, “FE9”, “FEA” or “FEB” notations. An IETF worker Hinden (1995) explains that link-local addresses “are designed to be used for addressing on a single link for purposes such as auto-address configuration” or neighbor discovery.

Special IPv6 Address Types

■ Loopback Address

The loopback address (0:0:0:0:0:0:0:1 or ::1) is equivalent to IPv4 loopback address of 127.0.0.1. This special address is used for testing device by sending packets to itself.

■ Unspecified Address

According to Juniper Networks’ Routing Protocols Configuration Guide the unspecified address (0:0:0:0:0:0:0:0 or :: ) “indicates the absence of an IPv6 address. For example, newly initialized IPv6 nodes may use the unspecified address as the source address in their packets until they receive an IPv6 address.”

Compatibility Addresses

Compatibility addresses are designed to provide a soft transition to new protocol. Some of these addresses are defined as follows:

■ IPv4-compatible IPv6 addresses: These addresses are assigned to ‘dual stack’ devices which can work with both IPv4 and IPv6. Designed to be have 96 zeros followed by an IPv4 address. (0:0:0:0:0:0.212.156.4.4 or simply ::212.156.4.4 ).

■ IPv4-mapped IPv6 addresses: are formed as 0:0:0:0:0:FFFF.a.b.c.d or by zero-compression ::FFFF.a.b.c.d and they are used to map nodes that are only capable of IPv4.

■ 6over4 IPv4 addresses: Format of this type addresses is [64-bit prefix]:0:0:AABB:CCDD where AABB:CCDD is hexadecimal notation of IPv4 address of a.b.c.d. 6over4 addresses are used for tunneling mechanism.
2- Multicast Addresses

Like in IPv4, in IPv6 multicasting is used to provide send packets to multiple recipients. However, “IPv6 nodes can listen to multiple multicast addresses at same time. Nodes can join or leave a multicast group at any time” (Davies, 2003, p58).

The general structure of an IPv6 multicast address is shown by Figure 6. Scope of a multicast packet is determined with 4 bits length scope field illustrated in Figure 6. In addition, flag value (000T) is with T=0 indicates that multicast address is permanently assigned, but if T=1, it is non-permanently assigned.
3- Anycast Addresses

As Weber and Cheng (2004) describe, anycast addressing is “a new one-to-one-of-many communication method” (p.127). A packet send to an anycast address is routed the interface that is easiest to reach – in routing terms. In application of this property, it provides flexibility of load sharing between routers and finding best server to use.

Weber and Cheng (2004) draw attention to the fact that possibilities of anycast addressing have just been touched on and researches on anycast addressing will continue in the future.
IPv6 Header
Another important feature of IPv6 is its new header structure. Unlike the variable size of IPv4 header, the main header of IPv6 is fixed to be 40 bytes. This is achieved by removing unnecessary fields and placing additional (optional) information into extension headers. Due to this structure as Davies (2003) states, in contrast to 20 bytes minimum-sized IPv4 header, the new IPv6 header is only 40 bytes length. However, the new IPv6 header contains source and destination addresses that are four times longer than IPv4 source and destination addresses (p.93).

The Figure 7 shows IPv4 header and IPv6 main header format. It demonstrates that IPv6 main header has simpler format than IPv4 header. According to one expert from Enterasys Network Inc., this simplified header format provides more efficient packet handling.

Another significant point is that processing issues are done by routers have been reduced from 6 to 4. For example, IPv6 routers will not do fragmentation. As a result, streamlined IPv6 header is more efficiently processed at intermediate routers (Davies, 2003, p7).
Address Auto-Configuration

Address auto-configuration protocols such as Dynamic Host Configuration Protocol (DHCP) ease network management because network administrators do not have to manually assign address to each host. For instance, DHCP server in a network maintains addressing table. Considering this table every host in a network is assigned an IP address by DHCP server. Due to existence of this ‘stated’ table, this type of configuration is called ‘stateful address configuration’. Like IPv4, IPv6 also supports stateful address assignment with a new version of DHCP. Furthermore, IPv6 supports ‘stateless’ auto-configuration, which enables ‘plug-and-play’ Internet connection. According to Kozierok (2004) the idea behind this feature “is to have a device generate a temporary address until it can determine the characteristics of the network it is on, and then create a permanent address it can use based on that information”.
TRANSITION
Transition Period

Transition to IPv6 is expected to take a long time because implementation of new protocol requires remarkable preparation efforts in various sectors. Furthermore, due to growth and importance of Internet connectivity, it is impossible to make migration happen as a ‘plug-and-play’ process for entire Internet. However, transition issues need be done under special care and attention.

According to one expert from Cisco Systems (2003), IPv6 networks have existed since 1996 and by the end of year 2001 Internet Service Providers (ISP) started deploying new protocol in order to provide IPv6 services to their customers. However, consumer adaptation of IPv6 services is expected to continue up to year 2010. On the other hand, it may take many decades in order IPv4 networks to be completely disappeared.
Deployment Strategies

In order to achieve a smooth and healthy integration of IPv6 into existing networks, IETF proposed variety of transition mechanisms. These mechanism are come under three general forms 1) dual-stacking, 2) tunneling and 3) translators. Key issue of these mechanisms to assure the coexistence of both protocols and interoperability of IPv6 networks with existing IPv4-based infrastructures (Enterasys Networks, 2004).
Dual-Stack Mechanism

Dual-Stack devices are ones that maintain both IPv4 and IPv6 protocols. According to Carmés (2002) dual-stacking “enables networks to support both IPv4 and IPv6 services and applications during the transition period in which IPv6 services emerge and IPv6 applications become available.” He also states that an IPv4 address must be assigned for every dual-stack machine. Since IPv6 was developed precisely due to the scarcity of IPv4 addresses, this extra need of IPv4 address may be annoying.
Tunneling Mechanism

In general tunneling mechanisms allows interconnection of separate IPv6 networks over IPv4 based services. However, later as amount of IPv6 networks increase, tunneling IPv4 over IPv6 will be needed. One expert from Cisco Systems indicates following tunnel mechanism will be used during transition period:

o IPv6 Manually Configured Tunnel
o IPv6 over IPv4 GRE Tunnel
o Automatic IPv4-Compatible Tunnel
o Automatic 6to4 Tunnel
o ISATAP Tunnel
o Teredo Tunnel

Figure 8 illustrates an IPv6 tunneling demo topology prepared by IP Infusion Inc. and Foundry Networks with their own products. The figure illustrates how IPv6 hosts communicated with each other over IPv4 clouds.


Protocol Translation Mechanism

Different from the cases dual-stacking and tunneling if there is no common protocol between peers, i.e. one device is IPv4-only and other is IPv6-only device, protocol translators are used to provide connection between these peers. However, it is advised to not use protocol translators when it is not obligatory because some technologies such as IPSec can not work with Network Address Translation-Protocol Translators (NAT-PT).

According to Waddington and Chang (2002) following protocol translation mechanisms are under consideration:

o Network Address Translation-Protocol Translation (NAT-PT)
o Bump-in-the-Stack (BIS)
o Multicast Translator Proxying
o Transport Relay Translator (TRT)
o Bump-in-the-API (BIA)
o SOCKS-Based Gateway

Current Situation in the World

Although address exhaustion is a global problem, implementation of IPv6 networks evolves at different geographies at different rates. One expert form Enterasys Networks (2004) states that this is because “the lack of address space in Asia is a key driver, and such countries, like China, Korea and Japan will migrate to IPv6 more quickly than countries in Europe and North America. While the lack of address space is not so great issue in the United States”. For instance, China has started it transition to IPv6 with development of CERNET2 (China Education and Research Network). CERNET2 is now being called the biggest network running IPv6. On the other hand, in USA, Department of Defense (DoD) claims to complete their transition to IPv6 by year 2008.

CONCLUSION
In this report I have tried to explain main concepts of IPv6, its features and deployment strategies. I have shown that, beyond being a solution to limited address space of IPv4, IPv6 provides additional benefits. Most of these benefits are related to 128-bit hierarchic addressing and its astronomically large address space. Furthermore, I have mentioned how migration to IPv6 will be done. I have emphasized that since IPv6 is an evolution of IP but not revolution, transition to IPv6 will continue over a period of time. Any company planning to implement IPv6 in their network should consider that even though IPv6 mostly took shape, some features still continue changing. In addition, such companies should benefit from experiments of other organizations or companies that are completed their transition to IPv6.