How to Subnet a Network : Learn-Networking.com A properly designed subnet can do wonders for the security and performance of a network. The main idea in subnetting is to divide a network into smaller pieces, which we call subnets. Actually implementing a subnet is typically more difficult than simply using the default subnet mask of 255.255.255.0. 14 Best DIY Gadget Projects of 2011 Becoming a "maker" is a very green thing to do, and we love seeing fun, interesting and do-able projects to test out our builder instincts. This year, we've come across some fantastic projects by creative makers, from building your own solar-powered emergency radio to whipping up a solar oven with sun-tracking capabilities. Check out the top 14 projects from this year, and start making your to-do list.
.htaccess Tutorial Introduction In this tutorial you will find out about the .htaccess file and the power it has to improve your website. Although .htaccess is only a file, it can change settings on the servers and allow you to do many different things, the most popular being able to have your own custom 404 error pages. .htaccess isn't difficult to use and is really just made up of a few simple instructions in a text file. Will My Host Support It? Linux DNS Server - How To Set Up Static or Dynamic DNS for Your Internet Servers How To Set Up Linux DNS Services As mentioned on the Networking page, every system on the Internet must have a unique IP address. (This does not include systems that are behind a NAT firewall because they are not directly on the Internet.) DNS acts as a directory service for all of these systems, allowing you to specify each one by its hostname. A telephone book allows you to look up an individual person by name and get their telephone number, their unique identifier on the telephone system's network.
How to Crack a Wi-Fi Network's WEP Password with BackTrack Kinja is in read-only mode. We are working to restore service. I did check the publication date on this piece, because - no sarcasm intended - I thought something bubbled up from 2005. WEP cracking can be done much more easily than this, even. Kismet and Kismac both crack WEP with less effort. ALL Star Wars Paper Snowflake Design Patterns Featured, Pop Culture — By BB Admin on December 15, 2011 5:33 pm Got some time on your hands and some scissors? Are you a Star Wars Fan-atic? Well, put that time and talent to good and practical use by creating your own Star Wars Snowflakes from paper cuts. Scroll to the bottom to see where you can download patterns for all of these Star Wars snowflake patterns. Don’t wait for a disappointing snow where none of the snowflakes resemble George Lucas creations – Make your own snowflakes in the shape of your beloved Star Wars characters such as…
Running A MySQL-Based DNS Server: MyDNS The easiest way to follow this tutorial is to use a command line client/SSH client (like PuTTY for Windows) and simply copy and paste the commands (except where you have to provide own information like IP addresses, hostnames, passwords,...). This helps to avoid typos. Version 1.0 Author: Falko Timme <ft [at] falkotimme [dot] com>
Setting up a reverse SSH tunnel Learn to forward a port on a remote machine to a local machine while initiating the SSH tunnel from the local machine. SSH is an extremely useful tool in that it allows you to do many things in a secure fashion that you might not otherwise be able to do. One of the things SSH allows you to do is to set up a reverse encrypted tunnel for data transfer.
The Best Science Fiction Books (According to Reddit) Recently, someone asked Reddit for a list of the best science fiction books of all time. Being a fan of sci-fi, and wanting to expand my own reading list, I thought it would be helpful to tally the results and preserve them here for future reference. I've also included selected quotes from the comments, as well as my own notes on the books I've already read. PS: All book images in this post are copyright Amazon, and were retrieved using my Big Book Search Engine. nsupdate: Quick and Painless Dynamic DNS Introduced in BIND version 8 and refined in BIND version 9, the nsupdate utility provides the system administrator or casual user with a quick and painless method of updating a DNS zone, adding or deleting any type of DNS record the name server supports. This article describes how to setup dynamic DNS, and provides some examples of use. For Fedora Core (and Red Hat) users, you will need to install both the bind (for dnssec-keygen) and bind-utils (for nsupdate) packages. If you plan to configure a DNS server, also read the companion article on configuring your server. My home network is the same as millions of other Internet users: dynamic IP obtained from my ISP via DHCP. Wanting to make sure that I can connect to my home network remotely, even if the underlying dynamic IP changes, I looked around for a reliable (and hopefully free!)
IP Subnet Mask Quick Cheat Sheet Besides the fact that I am studying for another Microsoft test and staring at subnets all day long – I also get asked on a regular basis how many addresses can i get from a /24 subnet or what does 255.255.255.0 mean. Let me break it down for you real quick like: When you use 255.255.255.0 as your subnet you are limiting yourself to a network containing all the same ip’s except for the last number. Khet Laser Game 2.0: Toy of the Year Finalist The intense game of strategy featuring real lasers! Overview: Khet is like Chess but with frickin' lasers.