What are Private and Public IP Addresses
 Internet Protocol (IP) addresses are usually of two types: Public and Private.
 If you have ever wondered to know what is the difference between a 
public and a private IP address, then you are at the right place. In 
this post I will try to explain the difference between a public and a 
private IP addres in layman’s terms so that it becomes simple and easy 
to understand.
Internet Protocol (IP) addresses are usually of two types: Public and Private.
 If you have ever wondered to know what is the difference between a 
public and a private IP address, then you are at the right place. In 
this post I will try to explain the difference between a public and a 
private IP addres in layman’s terms so that it becomes simple and easy 
to understand.What are Public IP Addresses?
A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting webpages or services on the Internet. On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.
You can check your public IP address by visiting www.whatismyip.com
What are Private IP Addresses?
An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):
10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)
Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other. Say for example, if a network X consists of 10 computers each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).
Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.
If the private network is connected to the Internet (through an Internet connection via ISP) then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.
You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be 192.168.1.1 or 192.168.1.2. Unlike the public IP, private IP addresses are always static in nature.
Unlike what most people assume, a private IP is neither the one which is impossible to trace (just like the private telephone number) nor the one reserved for stealth Internet usage. In reality there is no public IP address that is impossible to trace since the protocol itself is designed for transperancy.


 
 As  the fraudsters are now becoming more sophisticated in bypassing the  Geo-location controls by using proxies (Anonymous IPs) to spoof their IP  address, it has become very much necessary to come up with a means for  detecting the proxies so that the authenticity of the users can be  verified. Using a proxy (web proxy) is the simplest and easiest way to  conceal the IP address of an Internet user and maintain the online  privacy. However proxies are more widely used by online fraudsters to  engage in cyber crimes since it is the easiest way to hide their  actual Geo-location such as city/country through a spoofed IP address.  Following are some of the examples where fraudsters use the proxies to  hide their actual IP.
As  the fraudsters are now becoming more sophisticated in bypassing the  Geo-location controls by using proxies (Anonymous IPs) to spoof their IP  address, it has become very much necessary to come up with a means for  detecting the proxies so that the authenticity of the users can be  verified. Using a proxy (web proxy) is the simplest and easiest way to  conceal the IP address of an Internet user and maintain the online  privacy. However proxies are more widely used by online fraudsters to  engage in cyber crimes since it is the easiest way to hide their  actual Geo-location such as city/country through a spoofed IP address.  Following are some of the examples where fraudsters use the proxies to  hide their actual IP.
 Secure  Sockets Layer (SSL) is the most widely used technology for providing a  secure communication between the web client and the web server. Most of  us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https.  In simple words HTTP protocol is used for standard communication  between the Web server and the client. HTTPS is used for a SECURE  communication.
Secure  Sockets Layer (SSL) is the most widely used technology for providing a  secure communication between the web client and the web server. Most of  us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https.  In simple words HTTP protocol is used for standard communication  between the Web server and the client. HTTPS is used for a SECURE  communication.

 
  
 






 How  to write a C program without a main function?. Is it possible to do  that. Yes there can be a C program without a main function. Here’s the  code of the program without a main function…
How  to write a C program without a main function?. Is it possible to do  that. Yes there can be a C program without a main function. Here’s the  code of the program without a main function… This  program is an example of how to create a virus in C. This program  demonstrates a simple virus program which upon execution (Running)  creates a copy of itself in the other file. Thus it destroys other files  by infecting them. But the virus infected file is also capable of  spreading the infection to another file and so on. Here’s the source  code of the virus program.
This  program is an example of how to create a virus in C. This program  demonstrates a simple virus program which upon execution (Running)  creates a copy of itself in the other file. Thus it destroys other files  by infecting them. But the virus infected file is also capable of  spreading the infection to another file and so on. Here’s the source  code of the virus program.
 Most  of us are familiar with the virus that used to block Orkut and Youtube  site. If you are curious about creating such a virus on your own, here  is how it can be done. As usual I’ll use my favorite programming  language ‘C’ to create this website blocking virus. I  will give a brief introduction about this virus before I jump into the  technical jargon.
Most  of us are familiar with the virus that used to block Orkut and Youtube  site. If you are curious about creating such a virus on your own, here  is how it can be done. As usual I’ll use my favorite programming  language ‘C’ to create this website blocking virus. I  will give a brief introduction about this virus before I jump into the  technical jargon. In many of my previous posts especially in the
In many of my previous posts especially in the  In  this post I will show how to create a simple virus that disables/blocks  the USB ports on the computer (PC). As usual I use my favorite C  programming language to create this virus. Anyone with a basic knowledge  of C language should be able to understand the working of this virus  program.
In  this post I will show how to create a simple virus that disables/blocks  the USB ports on the computer (PC). As usual I use my favorite C  programming language to create this virus. Anyone with a basic knowledge  of C language should be able to understand the working of this virus  program.




