Jio Celebration Offer 2018
Islands That are Mysteriously Ruined By Creatures
Learn Free Ethical Hacking Tutorials
MS Dhoni-Full Biography
Tips to Gain Weight in Just 20 Days
5 Amazing Toothpaste Beauty Hacks - You Must Try
Unknown and Amazing facts about Technology
How to Get Rid of dandruff - 100% working Home Remedies
Join us on Pinterest

Saturday, September 8, 2018

// // Leave a Comment

Reliance Jio Cadbury Dairy Milk Offer | Get 1 GB Data Free!!!

MyJio Cadbury offer


Jio Cadbury offer-Newsworldfactors
Reliance Jio is once more providing free data to their users by simply uploading a cadbury wrapper picture, as a free gift. Don’t throw the cadbury wrapper in trash barrel next time once you get a dairy milk, simply click a photograph by going into  MyJio app and avail your free one GB data. Isn’t amazing? don't Got it? ne'er mind, I have further explained all steps below...Keep Reading

How to Get MyJio Cadbury offer

  1. Firstly, Update your MyJio App
  2. Login/Skip Login with Jio Sim
  3. On dashboard,A Banner image of Cadburry offer are shown.
  4. Click on the Cadbury Banner from the Dashboard
  5. Now Click on Participate now Button
  6. Take a snap of Cadbury dairy Milk wrapper from your camera and upload it.
  7. That’s it! you may get a successful Message. Congratulations you have got unlocked one GB data.
  8. Now click on "KEEP one GB" option and you will get 1GB 4G data within 7-8 Days in your Account

You can conjointly gift Your data of 1GB to PRATHAM FOUNDATION.

MyJio Cadbury offer Trick

If you do not have an empty cadbury chocolate wrapper, don't fret, I have used Cadbury dairy Milk photos available on Google photos and it worked for me, you can conjointly try and Comment below your experience.
Read More
// // Leave a Comment

Jio Announces Celebration offer | Get 8GB 4G Data Free!!!

Jio Celebration offer 2018


Jio  Celebration offer 2018- Newsworldfactors

Reliance Jio has completed its 2 year industrial run in  "India" on September fifth. To celebrate its 2nd-anniversary  the Company has introduced a proposal referred to as Jio Celebrations pack.

As a part of the new Celebration Pack offer, Jio is giving 2GB of data per day to its subscribers for fully free. they're going to  deliver 2GB of high-speed daily data to you to celebrate its anniversary. In alternative words, Jio is providing 8GB of data for a span of 4 days.You don't have need to redee, a code or recharge a pack to induce this provide. Company can automatically provide this data in your My Plans Section, in my jio app.

To check if you have got received the free data or not, visit the MyJio app on your smartphone. In the app, open the My Plans section, wherever you'll get the list of all the plans activated on your SIM. If you will are entitled to the free data, the Jio Celebrations Pack can seem below your main plan. Notably, this offer might vary from user to user and telecom circle to circle. 

Terms and Conditions:

There are 2 Vouchers of eight GB High Speed data (2GB/day for four days in september month and 2gb/day for four days in october), where the primary voucher would be credited this month (maximum by twentieth September, 2018) and therefore the second voucher are going to be attributable in october 2018 (Date isn't Fixed). The voucher are going to be automatically applied on your existing plan and you'll be able to check usage by visiting “My plans” section in MyJio.

One more thing, Jio is not sending Message alerts regarding this offer to their customers, So you have to check My jio app to get info about this offer.

Write in the commment Section whether you have got this amazing offer or not...Thank you
Read More

Thursday, September 6, 2018

// // Leave a Comment

Top 10 Expensive Watches of the world

Top 10 Expensive Watches of the World


In this article i am exposing Some Most Expensive Watches of the world. Have A Look...

Split Seconds Patek-Philippe Reference 1436 

Top 10 Expensive Watches of the world
This is a really long name, and we can only hope it lasts for just as long, cause this $214,000 watch, is a whole lot of fancy, and with cool features that would put inspector gadget to shame.

The Rolex Submarine 

Top 10 Expensive Watches of the world
Lots of people own Rolex's. Some real, some fake, and some worth $234,000. Yep, you heard right. This particular Rolex is self-winding and made of stainless steel. Misplacing this would give new pain to the term “lost time”.

Ulysse Nardin Triple Jack Minute Repeater

Top 10 Expensive Watches of the world
This watch’s unusual design costs more than a Ferrari, but definitely doesn’t possess as much…power. It’s pretty basic, but it’s so rare which makes it so exorbitantly expensive. If you like seeing three man hammering a bunch of bells every time you look at your wrist, why not pay $340,000 for it?

Jaeger – LeCoultre Gyro tourbillion

Top 10 Expensive Watches of the world
This $400,000 piece of time keeping machinery is, in essence, an anti-gravity device that you can wear. It features something called tourbillions which prevents gravity from affecting its accuracy.


Richard Mille Tourbillion

Top 10 Expensive Watches of the world
Some watches look like, well, watches, and others look like the lovechild of the terminator and something from alien. This $525,000 slice of the future is so advanced, we can’t tell which parts tell the time, and which ones are the door to a mystic abyss.


AP Royal Oak Grande Complication

Top 10 Expensive Watches of the world
With a retail price of $742,900, you could just buy a couple of houses. Or you can go with this dazzling watch that comes with these unique features, a minute repeater, split seconds chronograph and perpetual calendar. Ya thats totally worth it! Cause it not your average watch you can buy on a street corner. It’s for those shot callas that got no time to waste.


Patek-Philippe Ref 5016P

Patek-Philippe Ref 5016P
This platinum masterpiece costs a beastly $762,000, and requires regular adjustments, but if you have the money to buy it, that clearly shouldn’t be a problem. It’s a moon-phase, perpetual calendar piece of art that we don’t even think Bill Gates would buy. he can afford it, but he probably wouldn't buy it.

Vacheron Tour de I’iIe

Vacheron Tour de I’iIe
Vacheron happens to be the oldest manufacturer of watches in the world, and is the owner of the most complicated serial wrist watch ever created. It’s worth a whopping $1,250,000, almost as much as a Bugatti. Except…a lot smaller. And a lot easier to misplace.

The Patek Caliber 89 

Top 10 Expensive Watches of the world
When did you last buy a watch, and what did you pay? Was it close to $5,120,000? This one-of-a-kind piece is the most complicated watch in the world, with 33 complications. At the end of the day, you just want to know the time, but would you pay 5 million bucks for that? Well, Apparently, some fancy people Do!

The Breguet Marie Antoinette

Top 10 Expensive Watches of the world
This watch is estimated to be worth 30 million dollars, it was stolen by master-thief Naaman Diller in 1983, and found in 2007, 3 years after Naaman Diller passed away of old age. It took Breguet and Marie Antoinette 44 years to construct the original, but both of them passed away before its completion
Read More

Monday, September 3, 2018

// // Leave a Comment

Rekha- A Versatile Lady

Rekha Bollywood Actress
This is the story of an actress.. ..whose life was stuffed with success, sex and controversies. Bhanu Rekha Ganeshan. and that we call her Rekha. 70's sex-symbol Rekha's childhood.. ..was conjointly stuffed with controversies. Her father was the superstar of Tamil movie industry. Gemini Ganeshan. And her mother was an actress in Telegu films. Pushpavali. it was also heard that once Rekha was born.. ..her parents weren't married yet. And for years, Gemini Ganeshan.. ..didn't accept Rekha. once Rekha became a star.. ..she expressed her anger towards her father within the media.

Rekha got entry within the movie industry rather simply. Her film 'Sawan Bhadon' was successful at the box-office. however tons of individuals within the film industry did not like her. Rekha conjointly aforesaid in an interview, that.. ..people used to call her The anomaly of the movie industry. Because, that was the time when.. ..Rekha looked dark and plump. Like each sensation, Rekha was anticipating the proper turn. And, that turn came in her life when.. ..she worked with Amitabh Bachchan within the film 'Do Anjaane'.

Rekha and Amitabh Bachchan's pair was successful.. ..and they dominated the box-office. whether or not it was 'Mr. Natwarlal' or 'Muqaddar Ka Sikandar'.. ..and, who can ever forget the contentious film 'Silsila'.  Amitabh Bachchan came as a golden chapter in Rekha's life.. ..which Rekha still cherishes.

When Rekha was asked in an interview.. ..whether she beloved Amitabh Bachchan, she replied.. ...there's no one during this world that does not love Amitabh. Rekha and Amitabh Bachchan's so called affair.. ..made the headlines for years. And even these days, in each award scenario.. ..the media's focus is usually on Amitabh and Rekha. Although, Rekha received the status of a glamour lady in films. But, a movie changed her life forever. which film was 'Ghar', released in 1978. And, Rekha contend a rape victim during this film. And, the music of this film... ..portrayed Rekha's image differently. 'Ghar' was the film, after which.. ..the critics finally accepted Rekha as an actor. film reporters gossiped plenty regarding Rekha's personal life.. ..in their movie magazines. And, this conjointly troubled Rekha a lot. But, once doing a movie like 'Khoobsurat'.. ..it quietened those critics additionally.

Rekha was mounting new heights of success.. ..but, controversies weren't leaving her alone. after her so called affair with Amitabh Bachchan.. ..she married businessman Mukesh Agarwal. And, few years of her wedding.. ..Mukesh hanged himself with Rekha's veil. Passing through stages of happiness and sorrow.. ..Rekha was obtaining a fastness in the movie industry. And a novel chance came in her life, that completely modified her image. That film was Muzaffar Ali's 'Umrao Jaan'. Where, Rekha play the character of a dancer. And, throughout an interview Rekha aforesaid.. ..when she was given the script of 'Umrao Jaan'.. ..she might see her own image within the character. after 'Umrao Jaan', every alternative film-maker.. ..wanted to visualize Rekha in the role of a dancer. But, Rekha's one in all those actresses.. ..who forayed in parallel cinema similarly. In films like Shyam Benegal's 'Kalyug' and Girish Karnad's 'Utsav'.. ..her characters are persistent.

In the 80's Rekha was conjointly referred to as a action heroine. Some gave her the title of lady Amitabh. Her films like 'Phool Bany Angaray' or.. ..'Khoon Bhari Maang', Rekha showed her action skills additionally. there were rumours about Rekha's wedding.. ..with her close friend Vinod Mehra. But, years later Rekha cleared in an interview.. ..that Vinod Mehra was simply a friend, they ne'er got married. With ever-changing time, where famed heroines faded away.. ..Rekha treaded ahead. whether or not it absolutely was 'Koi Mil Gaya' or 'Krrish'.. ..or Shyam Benegal's 'Zubeidaa'. The Hindi movie industry liked see each single role of Rekha.

She fought controversies all her life.. ..and Rekha created a special image for herself. Even today, clad in a 'Kanjivaram sarii'.. ..Rekha appears like an angel. She is an honourable inspiration for all trendy actresses.
Read More

Sunday, September 2, 2018

// // Leave a Comment

Impact of Cambridge Analytics Data Scandal On Facebook

Impact of Cambridge Analytics Data Scandal On Facebook


Impact of Cambridge Analytics Data Scandal On Facebook

Facebook's market capitalisation lost over $100 billion in a day. Investors had looked like Facebook's only friends. Many younger users had deserted the social network years ago for alternatives like Snapchat. Regulators are investigating the company after the massive data leaked to Cambridge Analytica. Politicians are angry that Russian disinformation may have sowed division ahead of the US 2016 election. Juckerberg said- "We didn't take a broad enough view of our responsibility, and that was a big mistake and it was my mistake. And I'm sorry. But nothing had lost....is the friendship of investors who had bid this stock up to an all-time high".

Facebook shares had bottomed out in March after the Cambridge Analytica scandal first erupted, but since then they've gone on a very nice rally. That meant the shares were extended, and perhaps overextended, leading into this earnings season. It's important to remember that Facebook shares are still higher than where they started the year. So investors were clearly spooked by these results, but they're hardly panicking yet. Facebook makes its money from advertising. Growth is partly faltering as it tries to find new places to put ads in front of eyeballs. But advertisers seem unlikely to desert the network just yet.

Advertisers have, surprisingly to some, not pulled away from the website. We've seen even in this quarter, when there were a lot of bad results, advertisers spent $13bn on the website. That was up 40% from a year ago. So for now, it seems that Facebook is deemed to still be too big and important to pull away from. Facebook and Google still have this duopoly in terms of digital advertising. So if you want to be seen online, there isn't much of a choice still other than to spend on Facebook.

Advertisers might be pushed to leave Facebook if the bulk of users were to go elsewhere. But user numbers keep rising. The hashtag "#DeleteFacebook" movement after the Cambridge Analytica scandal failed to make an impact. And even people who never use Facebook are often avid users of Instagram, which Facebook owns. That said, last quarter user growth did slow. 

Facebook is mainly adding users in developing countries which don't have large digital advertising markets. North American users held steady. And European users actually dropped by a million as new privacy rules meant they had to consider data protection policies before logging in. That might be a sign of a longer term decline. Or it could be a blip, as people just didn't want to tick through all those pesky boxes. So, have we reached peak Facebook? The answer is clearly no.

The dramatic drop in Facebook's market cap marked the end of an era where Facebook was the bright young thing of the tech industry. But now as it starts to grapple with some big grown up problems, we see that it still remains by far the largest social network in the world
Read More
// // Leave a Comment

Biography of Nana Patekar

Biography of Nana Patekar
Nana Patekar
Nana Patekar's full name is Vishwanath Nana Patekar. He was born on January 1, 1951 in Raigad Murud-Janjir, Maharashtra. His father, Dinkar Patekar, was a textile merchant trader. Mother's name was Sanjana Bai Patekar. He completed the studies of Sir JJ Institute of Applied Arts. Very few people know that they often used to help the police in making sketches of criminals. Before coming to the film industry, he worked for the advertising agency. She came in films because Smita Patil had compelled her. He knew her from Pune. He took them to the famous producer Ravi Chopra. The film's name was 'Today's Voice'. He was given the role of a rapist. Nana Patekar felt this role very bad. They refused and gave them a better role.

If you come back to Nana Patekar's life and see, then his father had a small business of textile painting. His father used to enjoy watching his son's plays, Nana Patekar used to play drama in his village. He felt that his father loved his elder brother more than him. When he worked in a play called 'Valmiki', and his father came from far away to watch the drama, Nana Patekar got happy. When he was only 13 years old, his father had a big loss in business. Their entire property was sold. At the age of 13, she went to school in the morning and used to do laboring in the evening. He used to go to the lamps which was 8 km away from his house and used to paint the film posters. He used to get 35 rupees per month for this work.

Whenever her father said that the children have grown up and I do not have the money to feed them, Nana Patekar would have been crying. Sometimes Nana Patekar used to visit his friend's house at noon or night because he used to think that it is lunch time. Maybe his friend should give him food. He told his friend, 'I am hungry.' But still Nana Patekar did not quit acting. He worked under the direction of a famous artist, Vijaya Mehta. The role was very much appreciated, everyone knew that he would become a famous actor in the future.

When he got married to Neelkanti, he was doing theater. He earns Rs 750 a month while his wife was earning 2500 rupees per month because he was a banker. He always said, 'You work hard in the theater, I will earn money' and 'I am sure that one day you will earn a lot of money.'

They both fell in love and they got married only at the age of 27. He had a child. Due to some complications during the birth, that child died very soon. He had another son, his name is Malhar. Seeing his acting skills in 'Salaam Bombay', the film industry was approaching him. He was signed for the film 'Angar'. He also received an award for this film ... and he started to be seen as a hero in the film industry as well as the villain.

Whether Marathi or Hindi cinema, Nana Patekar has performed miracles everywhere with his performance. The film 'Krantivir' proved that the manner in which Nana Patekar speaks is spellbound to everyone. He is Amol Palekar's 'Somany Romani Ho Jai' .. .. Vidhu Vinod Chopra's 'Parinda' has done work in movies that he can adapt to every character.

There was a time when he became director of the film. The name of the movie was 'Prahar - The Last Attack' .. He also personally took army training for it. The film became very famous. There was a cartoon series called 'The Jungle Book' on Doordarshan. In it Nana Patekar gave his voice for the character of "Sher Khan". There is no role, hero, villain, or comedy .. It is impossible to do any role played by him for any other actor. He was also given National Award for films such as 'Parinda', 'Krantivir' and 'Agni Sasakshi' Nana Patekar's name will be taken with honor in Indian cinema history for his non-acting skills.
Read More

Saturday, September 1, 2018

// // Leave a Comment

Working of TCP/IP Protocols-Newsworldfactors

How Does TCP/IP Works?

In Previous 6 Lesson of this Ethical Hacking Learning Series We are Familiar
With Its basic concepts, Definitions and
Fundamental approaches, Now it's a time to Dive deeper and Deeper in this Ocean of Hacking.
In Previous Lesson we have discussed about TCP/IP Protocols, Now Let's Understand Working Procedure of TCP/IP Protocols.

Working of TCP/IP Protocols By Newsworldfactors


The TCP / IP protocol is operated with the aid of using stack. it's far the sum of all of the protocols which might be required to meet the transmission of informations between 2 units. (it is a path because of which informations are transferred from one system to another ).

While data is passed then it goes to its destination. There, the procedure is carried out within the contrary (the data first completes the physical layer and later the stack travels its way). Throughout this procedure, a complicated system of errors research is employed on both the source and the destination system. every layer of the stack can send the data from its adjoining layer. every layer is also linked to numerous protocols.

At each stage of the heap, these protocols do their job with very complexity, of which As a end result, special services are furnished to the user

>> What are Sniffers?

Working of TCP/IP Protocols By Newsworldfactors

Snifers are those devices that can monitor such processes. A snuffer is a device - either hardware or software - which can read every packet sent to the network. Snifers are usually used to isolate network problems, while invisible to the user, network performance is decreasing. Thus, sneakers can read all the activities that occur between the network-level protocols. Apart from this, as you can guess, sniffers can create a tremendous security threat.

Personal protocol

You have tested how the data is transmitted through TCP / IP using protocol stack. Now I want to zoom in to identify the main protocol that works within that stack. I will start with the network-level protocol

Network-level protocol

Working of TCP/IP Protocols By Newsworldfactors
Network protocols are those protocols that transparently attach the transportation process (or feature). This is invisible to the user unless the user employs utilities to monitor system processes.

Important Network-level protocols include: -

• Address Solution Protocol (ARP)

• Internet Control Message Protocol (ICMP)

• Internet Protocol (IP)

Transmission Control Protocol (TCP)


The Address Resolution Protocol

Working of TCP/IP Protocols By Newsworldfactors
Address solution Protocol (ARP) serves the vital purpose of mapping internet addresses in physical address. this is often necessary in routing information on the internet. Before sending any message (or alternative data), it is packed in Internet protocol's packet, or blocks of formatted data formatted for internet transportation. they need numerical internet (IP) address of each native and destination machines. Before this package might leave the initial computer, however, the hardware address of the recipient (destination) ought to be searched. (The hardware addresses are completely different from the internet address.) this is often where arp does its beginnings.

An arp request message is broadcast over the subnet. This request has been received by the router who responds with the requested hardware address. This answer has been caught by the initial machine and also the transfer process might begin. ARP's design includes a cache. to know the arp cash concept, contemplate this: -

Most modern hypertext markup language browsers (such as Netscape Navigator or Microsoft's internet Explorer) use a cache. this is often a section of the cache disk (or memory) that contains components of frequently viewed websites (like buttons, headers, and general graphics). this can be logical due to when you come back to those pages, these tidbits mustn't be reloaded from a remote machine. It should be in your native cache then they should load quicker similarly, arp implementation includes a cache. during this approach, the hardware address of the remote machines or network is remembered, and this memory prevents the necessity for consequent arp operations to run on them. It saves time and network resources.

Are you able to guess what forms of security risks may be enclosed in maintaining such an arp cache? At this stage, it's not significantly important. However, address caching (not solely in the arp but altogether cases) truly creates a unique security risk.

 If such address location entries are stored, then it makes it simple for a cracker to create a connection to the remote machine, that claims to meet one of the cached addresses.

The Internet Control Message Protocol (ICMP)

Working of TCP/IP Protocols By Newsworldfactors
The Internet control Message Protocol handles error and keep an eye on the messages that are passed between 2 (or more) computers or hosts throughout the transfer process. It permits those hosts to share that information. during this respect, ICMP is essential for diagnosing of network issues. examples of diagnostic info gathered through ICMP include

• When a host is down

• When a gateway is full or inoperable

• Other failures on a network

>> What is Ping?

The Most Widely illustrious ICMP implementation involves a network utility called Ping. Ping is commonly used to confirm whether or not a remote machine is alive. Ping's technique of operation is simple: once the user pings a remote machine, packets are forwarded from the user's machine to the remote host. These packets are then echoed back to the user's machine. If no echoed packets are received at the user's end, the ping program sometimes generates an error message indicating that the remote host is down.

The Internet Protocol

IP belongs to the network layer. the internet Protocol provides packet delivery for all protocols among the TCP/IP suite. Thus, IP is the heart of the unimaginable process by which information traverses the internet.

>>What is IP Datagram

An ip datagram consists of many elements. the primary part, the header, is composed of miscellaneous data, as well as originating and destination ip address. Together, these components form a whole header. The remaining portion of a datagram contains whatever data is then being sent.

The wonderful issue concerning ip is this: If ip datagrams encounter networks that need smaller packages, the datagrams bust apart to accommodate the recipient network. Thus, these datagrams will fragment throughout a journey and later be reassembled properly (even if they do not arrive within the same sequence in which they were sent) at their destination. Even additional data is contained within an ip datagram. a number of that data could include identification of the protocol being used, a header checksum, and a time-tolive specification. This specification is a numeric value. whereas the datagram is traveling the void, this numeric value is consistently being decremented. once that value finally reaches a zero state, the datagram dies. many varieties of packets have time-to-live limitations. Some network utilities (such as Traceroute) utilize the time-to-live field as a marker in diagnostic routines. In closing, IP's function can be reduced to this: providing packet delivery over the net. As you can see, that packet delivery is complex in its implementation.

The Transmission Control Protocol


The Transmission Control Protocol is the chief protocol utilized on the net. It facilitates such mission-critical tasks as file transfers and remote sessions. TCP accomplishes these tasks through a Way Known as reliable data transfer. during this respect, TCP differs from different protocols among the suite. In unreliable delivery, you have no guarantee that the information will arrive in a good state. In distinction, TCP provides what's sometimes mentioned as reliable stream delivery. This reliable stream delivery ensures that the information arrives within the same sequence and state during which it had been sent. The TCP system depends on a virtual circuit that's established between the requesting machine and its target. This circuit is opened via a three-part method, typically stated as the Three-Part Handshake.

After the circuit is open, information will simultaneously travel in each directions. This ends up in what's typically called a full-duplex transmission path. Full-duplex transmission permits information to passing through each machines at the same time. during this way, while a file transfer (or different remote session) is underway, any errors that arise may be forwarded to the requesting machine. TCP conjointly provides intensive error-checking capabilities. for every block of information sent, a numeric value is generated. the 2 machines establish every transferred block using this numeric value. for each block successfully transferred, the receiving host sends a message to the sender that the transfer was clean. Conversely, if the transfer is unsuccessful, 2 things could occur:

• The requesting machine receives error information

• The requesting machine receives nothing


When an error is received, the information is retransmitted unless the error is fatal, in which case the transmission is sometimes halted. A typical example of a fatal error would be if the connection is dropped. Thus, the transfer is halted for no packets.

Similarly, if no confirmation is received among a given period, the data is additionally retransmitted. This process is continual as persistently as necessary to finish the transfer or remote session. you've got examined how the information is transported once a connect request is made.

It is time to Discover what happens when that request reaches its destination. When one machine requests a affiliation to another, it specifies a selected destination. This destination is expressed as the internet (IP) address and the hardware address of the target machine. The requesting machine specifies the application it's making an attempt to achieve the destination. This involves 2 elements:

• A program referred to as inetd

• A system supported Ports

Inetd: The Mother of All Daemon's


What are Daemon?

Working of TCP/IP Protocols By Newsworldfactors
Daemons are programs that unceasingly listen for alternative processes (in this case, the process listened for is a connection request). Daemons loosely check, terminate and stay resident (TSR) programs within the Microsoft platform. These programs stay alive in the slightest degree of  times, perpetually listening for a selected event. when that event finally happens, the TSR undertakes some action. inetd is a very special daemon. it's been called many things, including the super-server or grandfather of all processes. this is often because inetd is that the main daemon running on a UNIX machine. it's additionally an inventive tool. common sense tells you that running a dozen or additional daemon processes could eat up machine resources. therefore instead of doing this, why not create one daemon that might listen for all the others? that's what inetd does. It listens for connection requests from the void.

When it receives such missive of invitation, it evaluates it. This analysis seeks to determine one thing only: What service does the requesting machine want? like, does it need FTP? If so, inetd starts the FTP server process. The FTP server will then process the request from the void. At that time, a file transfer will begin. This all happens within the space of a second or so.

Note:- inetd is not just for UNIX anymore. to Illustrate, hummingbird Communications has developed (as part of its Exceed five product line) a version of inetd to be used on any platform that runs Microsoft Windows or OS/2. There are non- business versions of inetd, written by students and alternative software system enthusiasts.

In general, inetd is started at boot time and remains resident (in a listening state) till the machine is turned off or till the root operator expressly terminates that process. The behavior of inetd is usually controlled from a file known as inetd.conf, placed within the /etc directory on most UNIX platforms. The inetd.conf file is employed to specify what services will be called by inetd. Such services may include FTP, Telnet, SMTP, TFTP, Finger, Systat, Netstat, or the other processes that you just specify.


The Ports

Many TCP/IP programs are often initiated over the net. Most of these are client/server bound Programs. As a connection request is received, inetd starts a server program, which communicates with the requesting client machine. To facilitate this technique, each application (FTP or Telnet, as example) is appointed a unique address. This address is called as Port. Once any association request is created thereto port, the corresponding application is launched (inetd is the program that launches it). There are thousands of ports on the common internet server. For purposes of convenience and efficiency, a daily framework has been developed for port assignment. (In different words, although a supervisor can bind services to the ports of his or her choice, services are typically bound to recognized ports. These are usually Known  as Wellknown ports.)
Read More

Recent Posts

Rate us