• A Short History of SGML
  • About
  • Booklist
  • Cheap Private Proxies That Work
  • Contact
  • Index of Resources

ISGMLUG

Menu
  • Coding
  • network
  • Technology
  • Uncategorized

Route Tracking using HTTP Tracing

theadmin June 27, 2013 Technology No Comments
The HTTP 1.1 protocol has it’s own tracing method implemented called TRACE which provides route tracing on request.  Of course many people simply use traceroute commands which are available …
[Continue Reading...]

Proxies and Capturing Authentication Credentials

theadmin June 27, 2013 Technology No Comments
As the administrator of any internet facing network knows, there are certain essentials in allowing your clients access to the internet.  Most networks employ a proxy server to help …
[Continue Reading...]

How Does ICAP Work?

theadmin May 20, 2013 Technology No Comments
In brief, the protocol functions as follows. An HTTP message is passed by an ICAP client to the ICAP server. The server processes the message and sends a reply …
[Continue Reading...]

XML Sitemaps – A Brief Introduction

theadmin May 16, 2013 Technology No Comments
Google was the very first search engine to introduce sitemaps with the Google XML sitemap format in 2005. As the internet evolved, so the standard evolved with all the …
[Continue Reading...]

21st Century Coding

theadmin April 26, 2013 Coding No Comments
We all think of programmers as relatively the same thing.  Young white men, who sit behind their desk all day without a clue about what goes on in the …
[Continue Reading...]

TCP/IP Congestion Avoidance Algorithm

theadmin April 15, 2013 Technology No Comments
Lost packets is one of the biggest difficulties for any transport protocol.  Sending data across a variety of platforms, switches, hubs and routers is bound to end up with …
[Continue Reading...]

Border Gateway Protocol – BGP

theadmin April 13, 2013 Technology No Comments
The BGP protocol is one used by gateways and routers based in different systems.  It’s predecessor was called EGP, this protocol actually was used on the ARPANET – the …
[Continue Reading...]

Mathematical Fuzzy Logic Technology

theadmin March 27, 2013 Technology No Comments
Many high tech Japanese rice cookers now use fuzzy logic technology to cook superior rice. This is a computing approach that does not use traditional Boolean logic but instead …
[Continue Reading...]

Protocol Verification and Tunnelling

theadmin March 21, 2013 Technology No Comments
Circuit level tunneling for instance perhaps SOCKS or SSL tunneling allows a proxy server to pass any protocol it requires.  Of course at  this level the gateway may not …
[Continue Reading...]

A Little Bit About IP Checksums

theadmin January 29, 2013 Technology No Comments
The role of checksums in IP headers is actually very important.  THey are used to make sure that data is not corrupted during it’s journey from the source address …
[Continue Reading...]
  • Previous
  • Next
The Ultimate Residential Proxies

Recent Posts

  • Why Is It Recommended That You Avoid Doing Online Banking On Public Wifi
  • Do I Need AI SEO Tools in 2022 ?
  • Premium Proxies : Safe, Secure Data Access in 2022
  • Why Does Everyone Need Residential VPN Services and Where Can I Get One ?
  • What is an ISP Proxy? What are the Real Benefits of Using ISP Proxies?

Unblockable USA Proxies

50% Bonus Offer On Now !!

Static Geo Targeted Proxies

Recent Comments

  • Why Does Everyone Need Residential VPN Services and Where Can I Get One ? on What is an ISP Proxy? What are the Real Benefits of Using ISP Proxies?
  • Johnnie on SNMP – the Management Protocol
  • project james on A Brief History of Linux
  • Netflix Neddie on Using TCP Dump Filters
  • Kevin Sandford on Capacity Planning for Proxy Servers
  • Residential IP Addresses
  • Where Can I Buy Proxies
  • Proxies for Bots
  • Mobile Proxies
ISGMLUG Copyright © 2025.
Theme by MyThemeShop