how to trace the information of an individual using ip adress and email id can any one help me... i tried for a example using my friends ip address , and i was able to get only this information alone....
Location of the IP address 59.162.171.249:
Visakhapatnam in India.
but how to trace his address perfectly
plz help me
...
Hi all,
I am doing a script in which I change MAC address of interface in linux machine. But when I change the MAC address of the interface it generates an RARP packet (to get an IP address for the new MAC which is assigned). But this is not desirable in my scheme of things. I do not want the RARP to be generated. Can you guys suggest m...
This should be simple, very simple, but I'm having a hard time with it.
Problem
I'm looking for an open source project, in java, that will communicate using the RFC2217 protocol. I find no shortage of Java RFC2217 Terminal Servers but I need a client. If all these people are writing servers, someone has to have written a client! Righ...
Hello:
I created a simple RPC server to perform certain tasks common to our teams, but which are called from different networks. The server looks like this (I don't include error handling for brevity):
from twisted.internet.protocol import Protocol, Factory
from twisted.internet import reactor
import json
class MyProtocol(Protocol):
...
I have a list of IP addresses, about 1300, that I need to look up to find out company information or whatever is available from an online tool. I don't mind if I have to pay for it. but I don't want to have to put each one in manually.
Is there something that I can use that would give me this detail that I could either copy or paste or ...
What does destination mac address field contains, when the source doesn't know address of remote machine ? (say opening page from google.com from my machine)
And while broadcasting the packet, what does mac-address field contains?
...
How can Malroy impersonate Alice in the Wide Mouth Frog protocol?
Notation:
A: Alice
B: Bob
S: Trusted server
Ta: Timestamp A
Ts: Timestamp S
Kab: Session key between A and B
Kas: Session key between A and S
Kbs: Session key between B and S
Protocol:
step 1:
A->S:A,{Ta,Kab,B}Kas
step 2:
S->B:{Ts,Kab,A}Kbs
...
Hello,
I'm developing a remote desktop application that enables users to connect remotely to a machine that does not have a static IP.
How can I locate such a machine?
there is a site logmein.com that installs a client to the machine to allow remote desktop.
I don't know what this client do exactly to allow this process!
...
Hi,
How to get Port Range for Passive Mode FTP in C# ?
Any code snippet...
...
Hi, I'm currently using twisted's perspective broker on python and I have considered in the past switching to something like RabbitMQ but I'm not sure it could just replace pb - I feel like I might be comparing apples to oranges here.
I've been reading a lot about REST lately and the inevitable debate with SOAP, which led me to read abou...
Ok guys, So I was watching inception yesterday and I had this idea. I dont know too much about network security or the internet really. So thats what you guys are for, tell me if this is secure or even possible.Its to send secure data over the web by the way.
My Ideas takes the data needed to be send and encrypts it. The data is then sp...
Hello. I am to build an automation solution based on WinPac-8000 controller (http://www.icpdas.com/products/PAC/winpac/introduction.htm).
I split this project into 2 programs: 1st is running on the controller (it does some business logic) and second operates on user machine (it displays current results). The problem is: I use build-in ...
Drop Box appears to be really fast at syncing with its server. Does anyone know what algorithm it uses?
...
I need to classify TCP traffic base on video and non-video. So i need to find characteristics of each flow.
My classification is Flow-based and one of my variables is incoming packet length. but it is not accurate as
P(video|1200Bytes)= 0.04
P(non-Video|1200Bytes) = 0.22
I need some help to find some variables, at least two more to d...
Wondering how I can send a DELETE instead of POST/GET etc with ASIHTTPRequest.
Thanks!
...
Hi,
I'm building a system for monitoring several large web sites (resources), using distributed web services controlled by a central controller.
I'm coming to a specific part of the design - the actual reporting of resources that are thought to have fallen over.
My problem is that there is always the chance that the actual monitor it...
How do protocols like TCP identify the beginning of a new frame?
...
I'm a 2nd year computer engineering student in Ethiopia, Africa. We have taken C and C++ and i've taught my self HTML, CSS, PHP(cakePHP framework too) and little javascript, JQUERY and mySQL to develop small systems just like blog. But I want to build large systems that are secure and robust. I am very humbled to see very smart and exper...
802.11 standards define SIFS/DIFS value. Why do they use the same values? and if they use different values in the same network, what would happen?
...
I am a noob in netoworks stuff, but I must to get to know something.
When I have list o networkInterface
rmnet0
eth0
lo
//etc.
How can I tell, which kind of connection (wifi/bluethoof/UMTS) use which networkInterface?
...