Skip to main content

One thing about public WLAN and dynamic IP


Kimmo Huosionmaa

I must say that this writing is the continue for the last one, and the thing is about the IP-address. The IP-address is the thing, what the Internet uses for finding or specify the computer, where the data should be sent. And this thing is the thing, what client computer sends to the server before the server can start the data transfer. The server needs the static IP-address because other computers must find it over the network. And the homepages would link the data by using the IP-address.

The reason, why we cannot install the static IP-address for our home computers is that Internet service providers deny that action, and the reason for that is the streaming films or something like that from own server to the fellows is using so much bandwidth, that the service providers have normally locked that option, and they change the IP-address at least once per 24 hours. And there is another reason for that, what is not so well known. The thing is that the service providers have a limited number of IP-addresses and that means, they must release those addresses simultaneous, that the new devices can connect to the Internet.

But the major reason is that the material, what is prohibited to share would easily be shared from own server. The static IP normally pays extra money, and that's why most users use dynamic IP-where the IP-address changes in the time period. The payment for static IP normally guarantees more high uploading speed, and in dynamic IP the download speed is very high, but uploading speed is slower. Many people believe, that dynamic IP makes possible to surf anonymously on the internet, but the problem is that the network changes the IP by using the MAC-address of the computer.

And this means that the monitoring computer can easily track those computers if they are in the list of that machine. And changing MAC-address don't help, because the computer must get the new one from the net, and that would cause, that the tracking computer would just get information, that the new MAC-address is in use, and actually the new MAC-address can be given by the tracking server. The dynamic IP-might seem safe, but actually in the network might be a list of those IP:s to send the computer, what is under surveillance.

So those IP:s might be actually the same IP, what is send in the original session. Public networks might also seem perfect place for hiding the identity of the user, but the anonymous use by using them is actually allowed only if the service provider would give permission for that, because public WLAN:s are not meant for the support the communication of the terrorists, and as I just wrote in the text below this, that service provider can collect the information by using surveillance cameras about the person, who is using a computer.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that