SEO

Google Instant & SEO

From the moment Google Instant was announced back on September 8 there have been forum chats, blog posts, articles and podcasts discussing the ramification of this new technology. Some have called it the “Death of SEO” which others (myself included) have proclaimed this a step forward and an opportunity for SEO’s, not a threat. And then of course there’s those who don’t even know there’s been a change at all, let’s call them “the vast majority”. In this article we’re going to discuss the pros and cons of Google Instant as it pertains to SEO’s and to website owners as well as cover some of the reasons that this new technology may not have as large an impact on search behavior as some may fear/predict.

But first, let’s cover the basic question …

What Is Google Instant?

Google instant is a technology that allows Google to predict what you are looking for as you type. They are referring to it as ‘search-before-you-type” technology (catchy). Essentially – as I type a phrase (let’s say “buy shoes online”) as soon as I get to “buy sh” I start seeing results for “buy shoes”. As soon as I’ve entered “buy shoes “ (with a space after shoes indicating I want more than just the 2 word phrase) I start seeing results for “buy shoes online”.

Technologically this is genius. Google is now serving likely billions of additional search results pages per day as each query has multiplied results that apply to it. Well … I suppose we all wondered what the Caffeine infrastructure update was all about didn’t we? But what does this do in the real world?

Why Google Instant Isn’t A Big Deal

Alright, obviously it is a significant technological enhancement in search but the way some react you’d think the whole universe was about to be turned on it’s head. There are two reasons why that’s not the case.

I find it unlikely that many will notice right away that the change has occurred and further I find it even less likely that the majority will use the feature. You see – the major hindrance of this enhancement isn’t in the technology – it’s in the users. Only those who touch type and can do so without looking at their keyboard will be affected. If the user looks at their keyboard while typing then they wouldn’t even notice the results coming in ahead of their actual search.

This will only affect users who are searching in instances where the shorter or predicted terms match the users end goals. For example, if I am searching for “buy shoes online” and get as far as “buy sh” the top results are sites which clearly suit the needs of a searcher for “buy shoes online” and thus – this may work to the detriment of sites who rank well for “buy shoes online” as they may well lose traffic. In the case of a site targeting, oh – I don’t know – “seo consulting” there will likely be little affect if any. The searcher, looking for an SEO consultant, will find once they’ve entered “seo” that they are presented with Wikipedia and Google – sites that, while informative, don’t offer the services (or results) desired and thus – the searcher would be less affected. Once they proceeded on to enter the “seo c” the searcher would be presented with the results for “seo company” but I’m prone to believe that if the searcher wanted those results – they would have searched for it. For this phrase I’m confident we’ll see little in the way of negative affect from Google Instant.
So we’ve discussed why Google Instant isn’t a big deal, now let’s discuss …

Why Google Instant Is A Big Deal

On the other side of the coin lies the reasons why Google Instant brings forth a revolution in search technology. Followers of the Beanstalk blog or my radio show on WebmasterRadio.fm (Webcology) will know I’m not one to love everything Google does but in this case the immediate affects and long terms affects may well be significant and at the very least – one has to appreciate the brilliance behind the effort. In this section of the article we’re going to cover the three important perspectives involved with the launch off this (or any) Google product. They are:

The Searcher – we’ll look at the pros and cons from a searcher perspective. It’s this aspect that will dictate whether the feature will matter at all.

Google – we’ll look at the positive affect on Google. Of course – this aspect is of paramount importance for this feature to be kept.

SEO’s – I’m of course incredibly interested and have spent much of my analysis time determining the pros and cons to SEO’s (admittedly – there’s more than a bit of self interest here).

So let’s begin …

Google Instant And The Searcher

This is sort of a win-win for Google from a searcher perspective. One of two things will happen for the searcher. Either they won’t notice the change or won’t be affected and thus – Google will be exactly where they are now OR they will notice the change and will select results quicker and find the feature helpful. As I noted – it’s a win-win. There isn’t much of scenario from a searcher perspective where the searcher will be negatively impacted and if they are – they’d simply revert back to past searching patterns. From the perspective of impact on the user – Google has it made with this feature. Their worst-case scenario is that they’re exactly where they are now.

Google Instant From Google’s Perspective

Any feature added to any corporate system must serve a single primary function – it must make it’s developer money. We’ve already seen that the feature itself can’t really negatively impact the searcher but can it make Google money? There are two ways that this can happen:

Improved loyalty and marketshare, and

Increased revenue directly from the initiative
Fortunately for Google – they’re going to win on both fronts here and when we see the Q3 earnings and moreso in the Q4 earning Google reports we’ll begin to see how significant an impact this change will have for them – mainly in the second of the two monetary reward methods noted above. And here’s why …

We’ve already covered the improved loyalty this can have on the searchers. Anything that makes my life easier and makes my quest for information faster will make me more loyal. At worst – Google will see my behavior stay the same but for many, the search experience will become faster and more effective – especially once the technology is improved by user behavior to a degree that people trust it more. Overall there will be a net gain in the experience – we’ve only to wait to see how large that net gain is and how it translates into marketshare. The big win is in the second point.

For anyone who’s every bid with AdWords you’ll know that for the most part – bids for generic terms are more expensive than bids for very specific terms. If I’m bidding on “shoes” I’m going to pay more than I would for “shoes online”. So let’s view the world where I start showing the results (and paid ads) for “shoes” while someone is searching for “shoes online”. And what if that person sees the ads that was written and bid on for “shoes” but relates to their query and they click on it. Google just made more from the paid ad click. Maybe only pennies but multiply that by billions of searches per day and you’ve got a significant increase in annual revenue.

The move is a huge win for Google but it does come with a theoretical downside and that is annoying the businesses that are paying for the ads. The argument I’ve heard is that if businesses find that the cost of their campaigns is increasing higher than the ROI that they might get annoyed. Fair enough BUT I would argue – what are they going to do about it? As long as Google maintains the first consideration (the searcher) then the advertisers have no choice. They can drop their bids but at worst – they’ll level off to what they were paying for the longtail phrases. Again – worst case scenario, Google will find themselves where they are today.

Google Instant From The SEO’s Perspective

So let’s assume for a moment that Google Instant is here to stay. Based on all the ways Google and the searchers can win and the limited situational permutations by which they could only come out even I’d say that’s a safe assumption. Given this, what’s happens to SEO’s and those optimizing their own websites?

For one thing – we can’t assume that research we did up to and before the 8th will be relevant down the road. I have already scheduled to redo keyword research in a couple months to see what industries and search types have been most (and least) affected by this change. The main reason for this is that I have a strong suspicion that specific industries will be more prone to being affected by the change based mainly on search types (such as the “buy shoes” vs “seo consulting” example above) and demographics. A Linux developer site is more likely to have a demographic off touch typers who can type without looking at the keyboard than say a life insurance site with a more scattered and thus less technically proficient overall demographic.

So in the short term – life is going to be very interesting for the SEO and website owner while we figure out which industries and phrase types are most affected. In a few months when we see the trends and which phrases are being affected and how we’ll likely have to make adjustments to many campaigns. The downside for may business owners will be that for those who’s campaigns focuses on searches for longtail phrases – they may find the search volumes for their phrases decrease and a shift to more generic (and generally more expensive to attain) phrases is necessary. Only time will tell what the best moves are there and we may not know what exactly will shift and how for a few months yet and even then – we’ll then know the trends, not where things will settle (if anything in online marketing can be referred to as “settling” anymore).

If there is a segment that should be concerned about the situation it is small business owners with limited organic or PPC budgets. Google Instant – because it puts preferences to more generic phrases – clearly favors businesses with larger budgets. How much so we’ll know after we’ve had a chance to see how the search volumes shift. For SEO’s this presents two opportunities and for business owners who do their own SEO – it offers one. And here’s the good news for those.

For SEO’s you’ll find two new opportunities, The first is that there will be a shift to more generic terms in search volumes. This means that there will be stiffer competition for more competitive phrases. If this sounds like a bad thing it’s not. If you’re a skilled SEO who knows how to get the job done it means you’ll have more access to larger volumes of traffic without the added efforts required to rank for a wide array or phrases. Rather than needing to rank for 10 or 20 phrases to get traffic you’ll be able to focus in more and reap the same rewards in the way of traffic. On top of that – SEO’s will be able to charge more for the rankings as fewer phrases have a higher value. A win-win for SEOs and a win for business owners who either do their own SEO or have talented SEO’s on staff.

The second opportunity will come in the form of improved clickthrough rates though I’ll admit – at this point that’s just a theory (noted with a hint sent to Gord Hotchkiss to run eyetracking tests on this theory). If I type while looking at my screen and I’m entering in “buy shoes online” and I rank organically or via PPC for both “buy shoes” and “buy shoes online” I would hypothesize that searchers who complete the phrase “buy shoes online” who had the site (or ad) for “buy shoes” appear and then the same site appear for the full query will have a tendency to click on the familiar. This same principle has been witnessed in sites appearing in both paid and organic results who have an increase in their organic clickthrough rates. This will present opportunities for both PPC and organic marketers to improve the traffic to sites by ranking for specific phrases meant to both attain traffic on their own but also to improve traffic for the other. I would suggest that down the road we’ll be hearing of this phenomenon when conducting and discussing keyword research.

Conclusion

There isn’t much to conclude that hasn’t been discussed above. Virtually every party wins or at worst, breaks even with the introduction of this technology. The only victim appears to be small businesses without the budgets to compete for the more generic phrases but even they may win with a shift away from these phrases by the larger companies. It may well occur that while the search volume shift heads in favor of large companies with larger budget – that the lower hanging fruit, while reduced in it’s search volume, may fall too in the competition levels making it more affordable. Larger business may focus like snipers on larger phrases and smaller business may well be presented with the opportunity to go after more, less search phrases that aren’t worth targeting for larger companies – at least organically.

But only time will tell and of course – we have much data to collect and many algorithmic updates to come between here and there.

Mac OS-X Malware

People for many, many years thought that if you had a Apple Mac computer then you was invulnerable against virus, malware, spyware, and more types of treats!

Well they have always been wrong, for many years Apple have wanted to compete against other giants like Linux, or Windows. so when they brought out the iPad and iPhone, it increased their vulnerability because of popularity. I hope they would understand this and induce extra security and immunise their systems, even thought we all know how BAD to put it politely iShit is. So if you want to find out………………………………………………………Protect yourself by using XProtect

Malware for Mac OS does exist and it’s becoming more and more widespread. In particular OSX/Pinheard-B, as categorized by Sophos, and better known as HellRTS is a malware that gives complete remote control of the infected OS-X machine: you can take snapshots, send emails, transfer files and log keystrokes from the victim. Apple, however, seems to be pleased by this misbelief and doesn’t do anything to wake up its users to the malware call: an update to Snow Leopard included a silent update to Xprotect.plist. XProtect is, in the words of Graham Cluley Senior Security Consultant at Sophos, a rudimentary file that contains elementary signatures of a handful of Mac threats. Starting from version 10.6, OS-X users are warned when suspicious files are downloaded and executed from Entourage, Safari, Mail, Thunderbird and other browsing tools. This kind of protection is rather sloppy as malware can get through by means of Skype, BitTorrent or other tools that are currently unsupported by Mac OS-X builtin signature-based malware protection.

More info exists Here

The update schedule for Snow Leopard has been:

  • 10.6           –       August 28, 2009 (release date)
  • 10.6.1        –       September 10, 2009
  • 10.6.2        –       November 9, 2009
  • 10.6.3        –       March 29, 2010 (revised April 13, 2010)
  • 10.6.4        –       June 15, 2010

This last update included an update to XProtect to protect against OSX.HellRTS (aka OSX/Pinhead-B). This has doubled the size of the file.

Most Mac malware solutions protected against OSX/Pinhead-B by the end of April. Waiting for an OS update to protect against malware could prove costly if this backdoor steals your personal information not least because XProtect only scans download (not installed) files. So there you have it the prouf is in the pudding! so it out of it will sort YOU!

Wii mod for 4.2E menus

bannerbomb alpha – v2

compatible with Wii Menu version 4.2 only, for older versions see index

  1. Get a SD card. If it has a private directory, rename it temporarily, e.g. to “privateold”. Having other saved channels on the same card will screw it up.
  2. Download abd6a_v200.zip and unzip it onto the SD card.
  3. Go download the HackMii installer. Copy installer.elf to the root of the SD card, and rename it to boot.elf.
  4. Press the SD card icon (for the SD menu). This is different from the last version. Then insert the card. It should either pop up Load boot.dol/elf? or freeze.
  5. If it pops up a dialog, then fill out the survey.
    • If you encounter any problems from then on, don’t try other versions (it won’t help), but see the information below the survey.
  6. If it freezes before popping up the dialog, you could try these versions:

FAQ

  • What are boot.dol and boot.elf? There are two executable formats in use on the Wii, DOL and ELF. Homebrew is distributed as a dol or elf file.
    bannerbomb does the following:
    • If boot.dol is found on the root of the SD card, load that.
    • Otherwise, if boot.elf is found, load that.
    • Otherwise, pop up an error.
  • What boot.dol do I use and how do I install the Homebrew Channel? You can install the Homebrew Channel using the HackMii installer. If you don’t want to install anything, you could unzip the dol from Loadmii onto the root of the SD, and get homebrew applications from here.
  • My Wii’s serial number starts with LU64, is this compatible? Yes.

Problems

:

  • /boot.dol could not be opened. You need to have a file called “boot.dol” or “boot.elf” on the root of the SD. Chances are you don’t.
  • Error -1030002011 installing ticket You’re using the wrong installer. You should use the installer at bootmii.org to install the Homebrew Channel. It should be called boot.elf. There should be no file called boot.dol.
  • When running the HackMii installer, the screen freezes with a blinking slot light. This is a known problem, but I’m not exactly sure what causes it.
  • When running the HackMii installer, I get the scam warning, but then it freezes/exits. Upgrade to the latest installer from bootmii.org.
  • I can install the Homebrew Channel, but I only see bubbles. You need to actually download homebrew. You could get some at WiiBrew.

System Menu 4.2

Wii’s softmodding process has been updated to include an application called multi mod manager. This one app now does the whole job for you, apart from a few button presses the whole thing is pretty much automated. It’s now more difficult to get it wrong than it is to get it right!!
I’ve also included cios249 version 19 into the packs for all Wii softmods as well as a mod of Wadmanager, called yet another wad manager mod which enables you to batch install a number of wad files. Especially useful for those doing safe upgrades of the system menu.
uLoader has also been updated to version 4.9c. Another reason for doing a new post about this is because a bug in how 4.9A handled the uloader config file was causing a number of hard drives that worked before to fail. This most notably affected the buffalo drives. This problem should now be fixed and those users may now want to upgrade to 4.9″.

Grab the files you need from here,
http://www.mediafire.com/?zogjimgyyqm

Install THE HOMEBREW CHANNEL FIRST…………….Then….
Any black screens or DSI stack errors that may occur during any of the steps below are 99% harmless. Simply power off your Wii and turn it back on, then continue from the step you were on.

1. Copy the contents of the pack you downloaded above onto the root of your SD card keeping the folder structure. Overwrite any existing files.
2. Power on your Wii and go into the Homebrew Channel.
3. Load Multi Mod Manager.
4. Press down then press A to select ‘Install and patch IOS36.’
5. Press A to select Express mode.
6. Loads of text will splash across the screen, when the process has finished press any button on the wiimote.

**If you were only able to install Bootmii to IOS, you may want to install Priiloader now and make a NAND backup of your Wii and familarise yourself with how to access

Priiloader before the system menu should you ever need to recover your Wii. Press Home to exit GP DOP-IOS if you choose to do this in order to return to the homebrew channel. When finished installing Priiloader you can continue from step A5.***

7. Press down so Remove stubbed IOS is selected then press A. When asked to check for stub IOSs press A. A number of stub IOSs will be discovered. Press B for ‘NO’ for all IOS files except 222, 223, 249 and 250. Which you should press A to confirm deletion of. Press B for all other IOSs. When the discovery of stub IOS is complete you will be sent to the MMM menu. If you were not asked to remove 222,223,249 or 250 move to step 7.1. Otherwise to continue to step 8.
If you accidentally delete any other stub IOS, it is not the end of the world. However when inserting an original game disc it may ask you to update your system. Should this happen to you visit the ‘safe upgrade to 4.2 page‘, and follow the instructions in that guide to recover your IOS files to the latest versions.

7.1 Run Any Title Deleter MOD from the Homebrew Channel. Choose IOS36 and press A. Go to System Titles and press A. Select the following IOS files one by one and select A to delete them one after the other: IOS222 IOS223 IOS249 IOS250 If any of the above are not listed, check ‘other system files.’ If they are still not to be found, do not worry, just ignore and move onto the next step below, the guide may still work. Press home to exit when finished.

8. Still in MMM, press up to select Run WAD Manager, then press A.

9. Press 1 to select all the wad files in the folder, then press A to continue.
If you get any install errors with the above wads, try step 7.1 above and then try again.

10. When finished press home on your wiimote twice to exit back to the homebrew channel.
You are now set for playing backups on your Wii.
Tutorial above with pictures, thanks to the poster Rob Mulally !!!
http://www.robmulally.net/my-wii-gui…ames-from-hdd/

Texas Instruments’ Blaze tablet coming to developers this August

Blaze tablet coming to developers this August

Back in February when Texas Instruments announced its ARM-based OMAP 4 system-on-chip ‘Blaze’ dev platform, we sort of figured it might be tablet-bound. And, here it is — Blaze is going to be a tablet! Not a shocker, but we’re glad to hear it, of course, since the tablet wars are hotter than ever and we love a good fight. So, what do we know about TI’s entry in the game? Hardware wise it’s going to be a 10.4-inch XVGA touchscreen LCD with two USB ports. Internally, we hear it’ll boast a 1GHz OMAP4430 cpu, 1GB of DDR2 RAM, WLAN, Bluetooth, GPS, and FM, plus external camera and pico projector modules. The tablet is not set for retail release, but for developers, but we’re still pretty excited to see this one come out to play.

Over coming Internet connection Problems

Have you ever come across a problem using your home / friends network, where you would normally just connect and of you go???

For example: you take your laptop or mobile phone home or to your friends house and try and connect as usual to the network. usually there are other systems on the network, like a PS3, wii or another. Well an average user would check to see if there was a problem with the network security key and run a windows / linux diagnostics check if this problem arises, but what the average user should be aware of is the IP Routing (RIP) method used in all connections! This is stated below, in the last blog.

RIP is the easiest way to correct this problem, and all you have to do is use the Metric Value stated in the routing.PRINT, this is done as follows:

If you are using Windows, go to the start menu and type “CMD” (with out the “ ”) and right click on cmd and select “Run as Administrator” when the window pops up type “route PRINT”. this will show all the IP Addresses (destinations), Subnetmasks, Gateway’s, Interfaces, and Metric values, like the one shown below;

===========================================================================
Interface List
23…00 1f e2 d0 d6 ff ……Atheros AR5007 802.11b/g WiFi Adapter
12…00 1e 68 8d 5c c4 ……NVIDIA nForce Networking Controller
1………………………Software Loopback Interface 1
15…00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter #2
11…00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter
16…00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter #3
14…00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter
17…00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter #4
18…00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2
19…00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3
20…00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter #5
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:

Network Destination Netmask Gateway Interface Metric
127.0.0.0   255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
169.254.0.0  255.255.0.0 On-link 169.254.149.192 281
169.254.149.192 255.255.255.255 On-link 169.254.149.192 281
169.254.255.255  255.255.255.255 On-link 169.254.149.192 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 169.254.149.192 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 169.254.149.192 281

===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination      Gateway
1    306 ::1/128                  On-link
1    306 ff00::/8                 On-link
===========================================================================
Persistent Routes:
None

Now you will be able to see the persistent route through the network to your computer, mine is highlighted in yellow to show you an example of this, (mine has another route which you should ignore because i am host a web server through the local host 127.0.0.1). Look at the far right hand side column and you will see that Metric is consistent in all of them, which is …… yes 281.

Now take this value and place it in the network connection properties’ metric section, this is located;

Right click the network connections at right hand side of the task bar at the bottom of the screen,  then click the connection in question and then once the window opens select “properties” then select by double clicking “Internet Protocol Version 4 (TCP/IPV4) , next go to the “advanced” button at the bottom of the diaglog and click it. It will then show the Metric section at the bottom, un tick “auto Metric and input your metric code value from before to the input filed, like to one shown below.

And now you will have a fully working internet connection! 🙂 this will only take a few minutes to complete and once you get your head found it you will never have any problems, but if you do, just drop me a line.

Happy Hunting

IP Routing Explained

IP Routing

We now take up the question of finding the host that datagram’s go to based on the IP address. Different parts of the address are handled in different ways; it is your job to set up the files that indicate how to treat each part.

IP Networks

When you write a letter to someone, you usually put a complete address on the envelope specifying the country, state, and Zip Code. After you put it in the mailbox, the post office will deliver it to its destination: it will be sent to the country indicated, where the national service will dispatch it to the proper state and region. The advantage of this hierarchical scheme is obvious: wherever you post the letter, the local postmaster knows roughly which direction to forward the letter, but the postmaster doesn’t care which way the letter will travel once it reaches its country of destination.

IP networks are structured similarly. The whole Internet consists of a number of proper networks, called autonomous systems. Each system performs routing between its member hosts internally so that the task of delivering a datagram is reduced to finding a path to the destination host’s network. As soon as the datagram is handed to any host on that particular network, further processing is done exclusively by the network itself.

Subnetworks

This structure is reflected by splitting IP addresses into a host and network part, as explained previously. By default, the destination network is derived from the network part of the IP address. Thus, hosts with identical IP network numbers should be found within the same network.[1]

It makes sense to offer a similar scheme inside the network, too, since it may consist of a collection of hundreds of smaller networks, with the smallest units being physical networks like Ethernets. Therefore, IP allows you to subdivide an IP network into several subnets.

A subnet takes responsibility for delivering datagram’s to a certain range of IP addresses. It is an extension of the concept of splitting bit fields, as in the A, B, and C classes. However, the network part is now extended to include some bits from the host part. The number of bits that are interpreted as the subnet number is given by the so-called subnet mask, or netmask. This is a 32-bit number too, which specifies the bit mask for the network part of the IP address.

The campus network of Groucho Marx University is an example of such a network. It has a class B network number of 149.76.0.0, and its netmask is therefore 255.255.0.0.

Internally, GMU’s campus network consists of several smaller networks, such various departments’ LANs. So the range of IP addresses is broken up into 254 subnets, 149.76.1.0 through 149.76.254.0. For example, the department of Theoretical Physics has been assigned 149.76.12.0. The campus backbone is a network in its own right, and is given 149.76.1.0. These subnets share the same IP network number, while the third octet is used to distinguish between them. They will thus use a subnet mask of 255.255.255.0.

Figure 2-1 shows how 149.76.12.4, the address of quark, is interpreted differently when the address is taken as an ordinary class B network and when used with subnetting.

Figure 2-1. Subnetting a class B network

It is worth noting that subnetting (the technique of generating subnets) is only an internal division of the network. Subnets are generated by the network owner (or the administrators). Frequently, subnets are created to reflect existing boundaries, be they physical (between two Ethernets), administrative (between two departments), or geographical (between two locations), and authority over each subnet is delegated to some contact person. However, this structure affects only the network’s internal behaviour, and is completely invisible to the outside world.

Gateways

Subnetting is not only a benefit to the organization; it is frequently a natural consequence of hardware boundaries. The viewpoint of a host on a given physical network, such as an Ethernet, is a very limited one: it can only talk to the host of the network it is on. All other hosts can be accessed only through special-purpose machines called gateways. A gateway is a host that is connected to two or more physical networks simultaneously and is configured to switch packets between them.

Figure 2-2 shows part of the network topology at Groucho Marx University (GMU). Hosts that are on two subnets at the same time are shown with both addresses.

Figure 2-2. A part of the net topology at Groucho Marx University

Different physical networks have to belong to different IP networks for IP to be able to recognize if a host is on a local network. For example, the network number 149.76.4.0 is reserved for hosts on the mathematics LAN. When sending a datagram to quark, the network software on erdos immediately sees from the IP address 149.76.12.4 that the destination host is on a different physical network, and therefore can be reached only through a gateway (sophus by default).

sophus itself is connected to two distinct subnets: the Mathematics department and the campus backbone. It accesses each through a different interface, eth0 and fddi0, respectively. Now, what IP address do we assign it? Should we give it one on subnet 149.76.1.0, or on 149.76.4.0?

The answer is: “both.” sophus has been assigned the address 149.76.1.1 for use on the 149.76.1.0 network and address 149.76.4.1 for use on the 149.76.4.0 network. A gateway must be assigned one IP address for each network it belongs to. These addresses—along with the corresponding netmask—are tied to the interface through which the subnet is accessed. Thus, the interface and address mapping for sophus would look like this:

Interface
Address
Netmask

eth0
149.76.4.1
255.255.255.0

fddi0
149.76.1.1
255.255.255.0

lo
127.0.0.1
255.0.0.0

The last entry describes the loopback interface lo, which we talked about earlier.

Generally, you can ignore the subtle difference between attaching an address to a host or its interface. For hosts that are on one network only, like erdos, you would generally refer to the host as having this-and-that IP address, although strictly speaking, it’s the Ethernet interface that has this IP address. The distinction is really important only when you refer to a gateway.

The Routing Table

We now focus our attention on how IP chooses a gateway to use to deliver a datagram to a remote network.

We have seen that erdos, when given a datagram for quark, checks the destination address and finds that it is not on the local network. erdos therefore sends the datagram to the default gateway sophus, which is now faced with the same task. sophus recognizes that quark is not on any of the networks it is connected to directly, so it has to find yet another gateway to forward it through. The correct choice would be niels, the gateway to the Physics department. sophus thus needs information to associate a destination network with a suitable gateway.

IP uses a table for this task that associates networks with the gateways by which they may be reached. A catch-all entry (the default route) must generally be supplied too; this is the gateway associated with network 0.0.0.0. All destination addresses match this route, since none of the 32 bits are required to match, and therefore packets to an unknown network are sent through the default route. On sophus, the table might look like this:

Network
Netmask
Gateway
Interface

149.76.1.0
255.255.255.0

fddi0

149.76.2.0
255.255.255.0
149.76.1.2
fddi0

149.76.3.0
255.255.255.0
149.76.1.3
fddi0

149.76.4.0
255.255.255.0

eth0

149.76.5.0
255.255.255.0
149.76.1.5
fddi0




0.0.0.0
0.0.0.0
149.76.1.2
fddi0

If you need to use a route to a network that sophus is directly connected to, you don’t need a gateway; the gateway column here contains a hyphen.

The process for identifying whether a particular destination address matches a route is a mathematical operation. The process is quite simple, but it requires an understanding of binary arithmetic and logic: A route matches a destination if the network address logically ANDed with the netmask precisely equals the destination address logically ANDed with the netmask.

Translation: a route matches if the number of bits of the network address specified by the netmask (starting from the left-most bit, the high order bit of byte one of the address) match that same number of bits in the destination address.

When the IP implementation is searching for the best route to a destination, it may find a number of routing entries that match the target address. For example, we know that the default route matches every destination, but datagram’s destined for locally attached networks will match their local route, too. How does IP know which route to use? It is here that the netmask plays an important role. While both routes match the destination, one of the routes has a larger netmask than the other. We previously mentioned that the netmask was used to break up our address space into smaller networks. The larger a netmask is, the more specifically a target address is matched; when routing datagram’s, we should always choose the route that has the largest netmask. The default route has a netmask of zero bits, and in the configuration presented above, the locally attached networks have a 24-bit netmask. If a datagram matches a locally attached network, it will be routed to the appropriate device in preference to following the default route because the local network route matches with a greater number of bits. The only datagram’s that will be routed via the default route are those that don’t match any other route.

You can build routing tables by a variety of means. For small LANs, it is usually most efficient to construct them by hand and feed them to IP using the route command at boot time. For larger networks, they are built and adjusted at runtime by routing daemons; these daemons run on central hosts of the network and exchange routing information to compute “optimal” routes between the member networks.

Depending on the size of the network, you’ll need to use different routing protocols. For routing inside autonomous systems (such as the Groucho Marx campus), the internal routing protocols are used. The most prominent one of these is the Routing Information Protocol (RIP), which is implemented by the BSD routed daemon. For routing between autonomous systems, external routing protocols like External Gateway Protocol (EGP) or Border Gateway Protocol (BGP) have to be used; these protocols, including RIP, have been implemented in the University of Cornell’s gated daemon.

Metric Values

We depend on dynamic routing to choose the best route to a destination host or network based on the number of hops. Hops are the gateways a datagram has to pass before reaching a host or network. The shorter a route is, the better RIP rates it. Very long routes with 16 or more hops are regarded as unusable and are discarded.

RIP manages routing information internal to your local network, but you have to run gated on all hosts. At boot time, gated checks for all active network interfaces. If there is more than one active interface (not counting the loopback interface), it assumes the host is switching packets between several networks and will actively exchange and broadcast routing information. Otherwise, it will only passively receive RIP updates and update the local routing table.

When broadcasting information from the local routing table, gated computes the length of the route from the so-called metric value associated with the routing table entry. This metric value is set by the system administrator when configuring the route, and should reflect the actual route cost.[2] Therefore, the metric of a route to a subnet that the host is directly connected to should always be zero, while a route going through two gateways should have a metric of two. You don’t have to bother with metrics if you don’t use RIP or gated.

Notes

[1]

Autonomous systems are slightly more general. They may comprise more than one IP network.

[2]

The cost of a route can be thought of, in a simple case, as the number of hops required to reach the destination. Proper calculation of route costs can be a fine art in complex network designs.

Hacking Facebok

Facebook hack #1 : How to see people’s big display picture (avatar) ; You’re looking for somebody you know,you find somebody who looks like the one you are looking for but you’re not sure if he’s the one you’re looking for since you cannot see his face very well and his profile can only be seen by his friends.To see his bigger picture(The profile we’re testing on is my profile):

Now you wonder i made “S” bold in the URL,because “S” is initial of SMALL ,which means Facebook shows his small(avatar) picture.

“N” means normal picture ,When you change “S” to “N” you will see a bigger picture.

Facebook hack #2 :How to see people’s old display pictures ; This facebook hack may take a few minutes to see ,first you need to have Flashget on your pc,open flashget and click File tab and then click “Add batch Download” and ;

Facebook hack #3 How to see people’s limited profile without adding as a friend ; You cannot see people’s profile if its limited to public.But :

  • Send a message like “Hello” to the one you want to see his/her facebook profile and wait for his/her reply.
  • When he/she replies to you you can see his/her facebook profile.

Facebook hack #4 Facebook fools you hackers not to get flooded : Lol.Yeah.Check the example below ,both url shows same thing ;

As you see Facebook creates fake folders to fool hackers.

I’m sure theres lots of hacks which are waiting for to be explored,is’not it shocking that a website that worths billion dollars is wack at security and cryptology.

Google ChomeOS Tablet specs leaked, implications abound

 

UK-based ibtimes got their hands on the specs to one of Google’s new ChromeOS Netbooks that they’ll reportedly sell direct rather than through resellers (though it isn’t had to see mobile carriers subsidizing the product, especially Tmobile and Verizon in the US).  They say Google may subsidize it as well, and they’d have to if they want to put the reported $300 price tag on the device.

The specs reveal some interesting directions that Google is going with their product.  This particular model is based on an Nvidia Tegra-based ARM processor which has a lot of graphics horsepower.  This is the same line of chips that Microsoft’s Zune uses and it will at the very least be able to play 720P video, but very likely will be able to display 1080P, at least on an external display.  It will also be good for gaming – as much as can be expected for the ChromeOS which is mostly based on Web technologies.

Also interesting to note that Google is choosing an ARM platform over Intel (at least on this particular spec).  As I’ve noted before, ARM has a efficient power-usage footprint compared to Intel’s Atom while providing similar performance.

Ibtimes also states:

It is also rumoured that the netbook will sport a 10.1-inch TFT HD-ready multi-touch display, and would come with 64GB SSD (mind you, not HDD), 2GB RAM and other bells and whistles such as WiFi, 3G, Bluetooth, Ethernet port, USB ports, webcam, 3.5mm audio jack, multi-card reader, etc.

“10-inch multi-touch display?”  Maybe.  If Apple’s tablet hasn’t used all of those by then.  That spec is incredibly similar to what people have been saying about Apple’s tablet and if Google’s netbook has a Multi-Touch display, it isn’t a netbook at all.  It is a tablet.

“HD Ready” means 720P to me.  We’re looking at 1366×768 or thereabouts.  As I said before the hardware will have no problem of playing HD content.

The 64GB SSD is a very interesting spec as well.  Google’s ChromeOS is supposed to house everything in the Cloud, so the product should only need a few GB for the OS.  Why the very expensive and expansive 64GB SSD?

Likely it will be used to store media offline – which means not everything will be streamed from the net.  Also, your huge offline GMail databases will need to live somewhere as well.  That being said, I’d think 32GB would be a good size for starters, especially when a 64GB SSD would likely be over half the cost of the product.

This is interesting not only because Google is effectively building a tablet and using ARM as opposed to Intel.  It also means that Apple’s rumored tablet will also be competing with a Google product.  These two once friendly companies are now looking to be the biggest competitors in the tech world.

Static FBML CSS: Internet Explorer (all versions) and other browser

With Internet Explorer you have only two options in applying CSS styles to your Static FBML application tab:

  • Calling an external stylesheet using, for example:
    <link href=”http://yoursite.com/styles/layout.css” rel=”stylesheet” type=”text/css” />
    Of course, you need to upload the CSS file to your server (or some Web-accessible server). NOTE: Add this string to the end of your external stylesheet call to force Facebook to refresh the version it has cached (example): <link href=”http://yoursite.com/styles/layout.css?v=10.0” rel=”stylesheet” type=”text/css” />
  • Putting the CSS styles inside the HTML mark-up, i.e. inlining the styles, for example:
    <div style=”font-size:14px; margin:0 auto;”>

Although inlining the styles has appeared to always work with Static FBML application-tab pages, using calls to an external stylesheet seems to be only recently supported. I tested our HyperArts Static FBML Page, calling an external stylesheet, and it’s working fine. (If anyone does notice an issue, please let me know!)

The option that <em>doesn’t</em> work with Internet Explorer is using the style tag to embed your CSS rules:

 

<style type=”text/css”>
.some-class { margin:0; font-size:14px; }
#some-id { margin:0; font-size:14px; }
</style>

 

Although the above works in most other browsers, Internet Explorer ignores the contents of that tag.

If at all possible, you should choose the option to call an external stylesheet. You have much greater flexibility in applying — and making changes to — your CSS using a stand-alone stylesheet.

Read more: http://www.hyperarts.com/blog/category/web-coding-html-css-javascript/#ixzz0dYqppB5E

Creating search engine friendly URLs in PHP pages

See how to use .htaccess and mod_rewrite to easily transform ugly PHP URLs into search engine friendly ones.

The coming together of PHP and MySQL to create dynamic pages is a wonderful thing. Instead of having hundreds of separate webpages, your entire site can be stored inside a MySQL database, and then retrieved and displayed using a handful of “template” PHP pages. This makes updating the site extremely easy, though the draw back is often that the resulting URLs for the pages aren’t very search engine friendly. For example:

http://www.mysite.com/articles.php?id=3&page=0

The “?” and “&” characters within the URL will stump many search engines, even Google, from crawling the page. What we want instead is something like:

http://www.mysite.com/articles/3/0

which makes the URL appear just like any normal directory structure, with which all search engines have no qualms about. So how do we go about transforming the parameters portion of a dynamic URL into such a setup instead? Here are the simple steps:

Step 1: Rename your template PHP page, such as “articles.php”, as “articles” instead, without any extension. We want to use this page instead to act as our new templates page.

Step 2: Herein lies the key to creating search engine friendly URLs- configuring Apache to interpret a particular file without extension as a normal PHP page instead. In this case, we want Apache to treat “articles” as if it were a PHP page. In your .htaccess file, add the below code inside it:

ForceType application/x-httpd-php

Notice how the word “articles” appear within the tag. By adding the above code to your site’s .htaccess file, it informs Apache to interpret “articles” as a PHP page. You can add additional files for Apache to treat as PHP pages by duplicating the above multiple times.

Step 3: With “articles” now being synomonous to “articles.php”, all that’s left is writing code within “articles” to identify the parameters portion of our new URL format, and store them as variables for further processing. As a reminder, our new working URL looks like:

http://www.mysite.com/articles/3/0

What we want is to create code that detects the “3” and “0” portion of the URL, as they are the parameters. Within “articles”, you could do the following:

//split the URL into parts using "/" as the delimiter:
$urlarray=explode("/", $REQUEST_URI);
//Contains "3", or the ID of the article to display:
$articleID=$urlarray[2];
//Contains "0", or the page number of the article in question:
$pageNum=$urlarray[3];

We now have two variables that contain the two parameters embedded inside our search engine friendly URL, which we can then pass into a MySQL query to display the corresponding article and page number. For example:

$getarticle=mysql_query("SELECT thearticle FROM articletable
WHERE id=$articleID AND page=$pageNum");
echo mysql_result($getarticle, 0); //displays article

And there you have it. As mentioned, the key to creating search engine friendly URLs in PHP and MySQL is in fact via Apache’s .htaccess file.