Skip to main content

One thing about public WLAN and dynamic IP


Kimmo Huosionmaa

I must say that this writing is the continue for the last one, and the thing is about the IP-address. The IP-address is the thing, what the Internet uses for finding or specify the computer, where the data should be sent. And this thing is the thing, what client computer sends to the server before the server can start the data transfer. The server needs the static IP-address because other computers must find it over the network. And the homepages would link the data by using the IP-address.

The reason, why we cannot install the static IP-address for our home computers is that Internet service providers deny that action, and the reason for that is the streaming films or something like that from own server to the fellows is using so much bandwidth, that the service providers have normally locked that option, and they change the IP-address at least once per 24 hours. And there is another reason for that, what is not so well known. The thing is that the service providers have a limited number of IP-addresses and that means, they must release those addresses simultaneous, that the new devices can connect to the Internet.

But the major reason is that the material, what is prohibited to share would easily be shared from own server. The static IP normally pays extra money, and that's why most users use dynamic IP-where the IP-address changes in the time period. The payment for static IP normally guarantees more high uploading speed, and in dynamic IP the download speed is very high, but uploading speed is slower. Many people believe, that dynamic IP makes possible to surf anonymously on the internet, but the problem is that the network changes the IP by using the MAC-address of the computer.

And this means that the monitoring computer can easily track those computers if they are in the list of that machine. And changing MAC-address don't help, because the computer must get the new one from the net, and that would cause, that the tracking computer would just get information, that the new MAC-address is in use, and actually the new MAC-address can be given by the tracking server. The dynamic IP-might seem safe, but actually in the network might be a list of those IP:s to send the computer, what is under surveillance.

So those IP:s might be actually the same IP, what is send in the original session. Public networks might also seem perfect place for hiding the identity of the user, but the anonymous use by using them is actually allowed only if the service provider would give permission for that, because public WLAN:s are not meant for the support the communication of the terrorists, and as I just wrote in the text below this, that service provider can collect the information by using surveillance cameras about the person, who is using a computer.

Comments

Popular posts from this blog

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

Electric power innovations. Fuel cells in aircraft and solar panels over Arizona canal.

  "ZEROe teams powered on the iron pod, the future hydrogen-propulsion system designed for Airbus’ electric concept aircraft." (Intersting Engineering, Airbus's ZEROe: First engine fuel cell powers up for hydrogen flight) Electric power innovations. Fuel cells in aircraft and solar panels over Arizona canal.  Airbus Zero is a testbed for fuel cells that are used in commercial aircraft. The problem with aircraft is always noise and pollution. If the aircraft uses electric engines. That decreases noise levels and cleans the air, especially around airfields. Lightweight solar panels that can be installed on the wings and body of aircraft can give electricity to electric engines. And they can extend an aircraft's operational range.   The thing that makes this kind of system interesting is that the "flying cars" or cheap VTOL aircraft can use them as a power source. The hydrogen power cells can give energy to electric aircraft at night time. And that makes them m