Random Post

Showing posts with label Tech News. Show all posts
Showing posts with label Tech News. Show all posts
Wednesday, December 2, 2015
no image


What if I told you that this protocol will make your site bears on the user's browser more quickly, and that the performance of the server that hosts your site will improve significantly, using this new protocol developers will not have one location to spend hours and hours to make your site faster in order to improve rankings in the search results, What is this protocol if the magic? It's the HTTP / 2, my dear.

What is the Http / 2 ?
The Http / 2 is the latest version of your Web Surfing sites protocol the Http, this protocol is being developed periodically by the IETF Foundation (Internet Engineering Task Force), the current version currently in use of this protocol is Http / 1.1, which was released in 1999 and since that time there has been no update on this protocol, but with the growing and evolving in the world of the Web and the Internet had to be developing this protocol to show Pencchth later, this update includes many of the features most important of speed and safety.

The roots of the Http / 2 :

Built the new development of this protocol a protocol called SPDY, a protocol of the Internet was invented by Google and go back patent for Google Inc., this development took a lot of advantages of Google's Protocol, it was found that there are many features and common improvements between Http / 2 and SPDY, We will not get into the technical details of this protocol, but we will discuss all the points that concern us as workers in the field of search engines.

Basic improvements that have been added in the Http / 2 protocol:

- Open one connection: open one connection and only one between the browser and the server to download location on the user's browser, and this contact is open remains as long as this open the site to the user's browser and this has its benefits and is better than open multiple channels of communication between the user and the server.

- Multiplexing: a feature that allows the user to send more than one application in the same moment to the server and within the same channel of communication, in the previous version of this protocol you had to wait until the completion of the previous application so you can send the following request, but in this update you can send several requests together .

- Server Push: This feature enables you to send different types of Aldata and developed for future use.

- Priority: In the last update to this protocol, it became every request sent to the server is given priority to show its importance, and based on these priorities are coming orders are processed so that the top priority is addressing the demand by the other.

- Binary: feature enables the server to process headers of the Http / 2 protocol largest and reduce the likelihood of errors occur easily, Protocol sets HTTP sends Aldata in the form of the text of the text and then the server converts this text to zeros and the units of Binary, the new update sends content in the form of Binary directly, which speeds up the treatment process on the one hand the server.

- Headers CD-ROM: using this technique Protocol in pressure information called HPACK, this technique reduces the communication between the server and client processes for the transfer of Aldata, which in comparison between the two cases (before and after updating the Protocol) and in order to send the same amount of Aldata between the server and the client You'll need to km less than headers Headers and applications in Headers Http / 2 protocol, compared to Http.

Maybe all the previous speak for you Hungary words theoretical and want to see something practical shows you the difference between the two protocols, well, I will give you proof that will make you take an immediate decision to move to Http / 2, please enter the following locations and notice the difference in speed between the protocol http and http / 2:

- Https://http2.akamai.com/demo
- Http://www.http2demo.io/

Browsers that support Http / 2 :

The proportion of browsers that support the technology the Http / 2 currently 67.89% of the browsers used by users, there are some things that must be taken into account and for this harmonic things, for example, Internet Explorer 11 browser that supports the Http / 2 only in Windows 10, and both Chrome --Firefox --Opera supports Http / 2, but under special conditions and is to be used with the Https.
You can examine how your site's compatibility with various browsers after moving to the Http / 2 by drawing on google analytics through access to the Audience Technology and then Browser & OS. On this page you can see how browsers and agree to the web as well as special software (NGINX - IIS - Apache) with this protocol, the last thing I want to mention that all the CDN networks began to support this protocol.

Comparison between HTTP / 2 and HTTPS :

Of important advantages in this protocol that supports secure communications and telecommunications is safe, that is, it combines the advantages of the Http and the Https in one protocol, unfortunately, that some browsers do not support this protocol unless the https any support you certificate makes it reliable, from He converted his from http to https fully aware of what I am talking, let it explained more: If you want to move to Http / 2 and want your site to be supported by most browsers, you buy certificate certificate.

In fact, this is not the case that are worth thinking about for several reasons: First, most of the site is currently moved to Https and thus have the certificate and will not worry about this topic, if you have not yet passed and you want to buy Vsaaraa Cheap certificate does not exceed $ 100 per year, and if you want to obtain a certificate for free you can resort to the Let's Encrypt, which grants certificates for free, this project is currently beta and a copy will be given free certificates.

The benefits of the Http / 2 user :

For the user, it will get the most important benefit is the speed, where will notice the difference in speed and admire the speed with which it opens your site, which relies Http / 2 protocol.

The benefits of the Http / 2 developer:
For the developer will no longer need to be a lot of techniques that were previously used in order to speed up the site, which relies on Http 1.1, some expensive and some of these technologies need time, but with the new update of the Http goodbye to these technologies.

The benefits of the Http / 2 for servers:
For the servers that host the sites use http / 2 protocol, these servers will improve performance significantly because of the low number of incoming requests and the limited number of communications and lack of need for the conversion of text to zeros and the units and other benefits that make the transition to this update is very useful.

The benefits of the Http / 2 to improve rankings in the search results
For the field of SEO and the order in search results, dependence on http / 2 with the use of a certificate proving that a secure site means that your site is a secure site and fast in loading in the Filter Results browser, and safety and download speed of Google's algorithm factors, so expect improvement in your site's ranking If I moved to the Http / 2, Add to that the expectations that the use of the site by adding Google Protocol Http / 2 as a factor of Juzimaitha factors, so you will notice begin to move to this Protocol soon.

8:15 AM

What if I told you that this protocol will make your site bears on the user's browser more quickly, and that the performance of the...

Read more »
Monday, August 3, 2015
no image
The Assembly of the representatives of the people (ARP) currently continues thestudy by the Committee on the anti-terrorism Act. On the evening of Monday, July6, the Minister of the Interior, Mohamed Najem Gharssali was auditioned by thevarious committees in a meeting held behind closed doors.
 At this hearing and aboutthe ICT dimension, the Minister of the Interior has spoken with MEPs on how hisMinistry is now working with social networks (facebook, twitter, etc.) to hunt downpeople who hide behind the accounts that are apologists for terrorism.Mohamed Najem Gharssali also referred to the cyber-surveillance and the use of ICTfor terrorist purposes.
 The Minister of the Interior admitted that executives of theMinistry are not actually adequate combat cybercrime training, but this will beremedied soon. The Minister however held to remind MEPs and several times thathis Department is committed to respect for the privacy of Internet users.Prior to his stint in plenary, it is interesting for us to do a quick read of the anti-terrorist act, especially in its ICT component. While brings this new law?Counsel Sana Mason, Member of Ennahdha to ARP noted in a speech on Shems FmFriday July 3 that it is just the ICT dimension which is the great novelty of this Anti-terrosite Act.

Indeed, article 13 of the new law defines any act of damage to networks oftelecommunications or systems of information as a terrorist act. For this, sanctionscan range from 5 years to 20 years in prison with a fine whose value varies between50,000 and 100,000 dinars.
In article 15, Bill shows specific on the matter of transport and facilitation oftransport of electronic or computer hardware or software that could be used todesign, manufacture, or carry biological, chemical or nuclear weapons.
Then, it is in article 30 Bill considers the fact to glorify a terrorist or a terroristorganization as well as his ideas and opinions as part of a terrorist act. Thus, astraightforward interpretation of this article states that any publication on twitter orFacebook where its owner shows its support to terrorist groups is consideredbeautiful is good as a terrorist in the eyes of the law. He is liable to a term ofimprisonment with the maximum period of 5 years and a fine ranging from 5 to 10thousand dinars.
In article 33, the Andalucian draft Bill considered terrorist action to provideequipment, web sites, documents, or photos for the doing of a terrorist crime. In thisarticle, the first question that comes to mind is the following: an a hosting spaceprovider is, thus, considered him as a terrorist? Because in this case, of great hostslike GoDaddy, OVH or even our own phone as operators themselves provide Cloudhosting solutions.
In article 49, Bill gives legal pole of counter-terrorism powers to decide on thedeletion or censorship of audio / audiovisual or digital publications, or computerdata that are related to acts of terrorism.
About this axis, the question that should be asked is the framing content types thatmay or may not be relayed by the media in the context of their journalistic work.Thus, if an online media relays a screenshot of an account that publishes photospraising terrorism be obliged to censor the content?
PIs: How will this pole delete it? By contacting the administrator of support bysending him a requisition with a receipt of the requisition processing time? Or willthey be granted the right to hack says digital media and delete the contents? Andthen, how will they do with foreign media/media? Are they going to send themrequisitioning 'international '? Or apply this procedure only with the media/mediabased/hosted in Tunisia?
The people's representatives Assembly continues the discussion of the anti-terrorism Act in commissions. We concentrated on the pane ICT of this law whichprovides for fines and penalties of prisons for all those who broadcast messagesglorifying terrorists on the Net as well as those who use ICTs to sow terror (read thefirst part of the article by clicking here). In this second part continues to unravelother aspects ICT of the said Act.
In article 52 of this Bill, it is the issue of interception of communications which isprocessed. And this interception of communications includes traffic data, of listening, of the exploration of the content of communications, the fact to save, orcopy. The article quotes so the need for involvement of the technicaltelecommunications Agency (A2T), telecommunications operators, access networksoperators, access and internet service providers, etc.
The duration of an interception operation may not last more than four months,renewable one time and cannot be triggered only by a decision of the public prosecutor or a judge of investigation.

In the event that the interception operation does not result in a criminal trial, article54 provides that the data collected are subject to protection such as those dictatedby the laws of the area of protection of personal data. That said, it makes sense tomention that the Bill cites no reference to these laws in question!




   The Bill defines in its article 59 what is the audio-visual control. It is putting in placethe technical means for filming including suspects in a case of terrorist crime. Thetechnical means can be deployed according to the Bill in private or public areas, orprivate or public vehicles (metro/bus/train). The Bill also allows to implement thesetechnologies without that private owners of the vehicles or the places in questiondon't know it or accept it or not.
Still, the article in question States that the data collected subject to protection such as those dictated by the laws in the field of protection of personal data and thiswithout any specific reference to these laws.
Article 60 reads also that any person who intentionally distributes data collectedduring the interception or audio-visual control operations is sentenced to 10 yearsin prison.
Then section 63 defines the constitution of the national counter-terrorismCommittee. Thus, it is appropriate to mention that the 6 members of the Committee,a seat is reserved for the national Instance for the Protection of personal data.
This Committee has a role instead of proposal for a national strategy to combatterrorism. The Committee is responsible for coordinating international with foreignpartners in the fight against terrorism. Note that this Bill which should be adoptedurgently by the Parliament remains incomplete on that date. Indeed, if therapporteur of the commission on general legislation declares that the contributionof this new Bill is really the coverage of ICT aspects in terrorist crimes, we do notfind that the question has been processed with care. Nothing that the definitions ofwhat is meant by "damage an information system or a telecommunications network"which remain very ambiguous.
Indeed Bill has reserved two whole pages to define biological, chemical weapons,and nuclear. But no definition of the terms in relation to information andcommunication technologies has been listed. The very vague terms of the genus"technical means", or "digital publishing" opens the door to several interpretations.The issue of cybercrime is first and foremost a full question which should be treatedseparately by setting all the contentious issues. We recall as well as cybercrime Billhas not yet submitted to the Ministerial Council. Gold this law should be a legalrepository for crimes on the Internet and that will define, and this fact more clearly,these "technical means."
Note that the Instance Nationale de Protection of personal data - who this Billassigns a role important - has no technical expert in its composition.

                                                                                                   Marwen Dhemaied

4:59 PM

The Assembly of the representatives of the people (ARP) currently continues thestudy by the Committee on the anti-terrorism Act. On the e...

Read more »
Sunday, July 19, 2015
no image

At a time where, on the PC, readers are becoming more and more rare, and where download takes a most important place, it becomes important to find other modes of distribution for software. Thus, as could reasonably think and rumor had predicted,Windows 10 will be well distributed in the form of USB key. This mode of distributionwas confirmed in VentureBeats by a spokesman for the fim.

Alsocould see the object in preorder from Amazon at the rate of $119,99 for the"home" version and 199.99 for the 'Pro' versionMicrosoft also said that otherresellers wil be part, and not necessarily the etailersFirst scheduled for August 16,the date then was quickly extended to August 30.

Marketing could not occur at the same time as the "official" Windows 10 wiki, from July 29.Microsoft does not also specify if physical marketing will place in this formor if it willalso issue of good old disk, as in the 20th centuryWe'll see if it will be, support has inany case little benefit compared to the USB key.

5:40 PM

At  a  time   where ,   on   the   PC ,   readers   are   becoming   more  and  more   rare ,   and   where  download   takes   a   mo...

Read more »
Saturday, March 14, 2015
Sunday, January 11, 2015
no image
I just want to introduce 3 new growing web proxies:

RedTube Proxy -a Video Streaming Unlock Proxy:

Redtubeproxy.info is a video Streaming proxy enable to browse not only redtube but also youtube and any other streaming website. Many proxies do not enable video streaming but this one have a fast proxy speed which allow it to stream videos like a YouTube proxy or redtube proxy.Redtube proxy let you surf anonymously and unblock blocked websites due to goverments or to webmasters.
 To try it ,take a look at:http://redtubeproxy.info/

Free YouTube Proxy Server:

Free YouTube Proxy Server is a free and efficient restricted unblock proxy server. Proxy will be known to bring for you to a great end most your own frustration connected with being prevented accessing ones favorite YouTube video throughout school, college, university or division local networks on dedicated server. Also If you are living in a country which blocks YouTube such China, Iran, Malaysia,Turkey or Pakistan ,our YouTube Proxy Server will give access for free.
  To try it ,take a look at: http://www.freeyoutubeproxyserver.com/

Fast Web Proxies:

fastwebproxies.com is a fast and free web proxy with three principal roles:

  • Unblock proxy :Which will give any one full access to any blocked website ( by governments or by website owner) such YouTube unblocking for India,Malaysia,China and Turkey....
  • Video proxy :Many proxies do not enable video streaming but this one have a fast proxy speed which allow it to stream videos like a YouTube proxy or redtube proxy.
  • proxy List sharing services :ervice currently unavailable! 


 To try it ,take a look at: http://fastwebproxies.com/

10:06 PM

I just want to introduce 3 new growing web proxies: RedTube Proxy -a Video Streaming Unlock Proxy: Redtubeproxy.info is a video St...

Read more »
 
Google Analytics Alternative