Saturday, February 25, 2012

Title:


How To Find The Owner Of A Phone Number





Word Count:



451





Summary:



A Guide to trace phone numbers, find the owner of a number and or stop prank calling







Keywords:



owner of phone number, phone number search







Article Body:



Finding out who's calling or has just called is a very handy and helpful thing, either from a safety point of view or curiosity. As long as you have the area code and the seven digit number, you should be able to locate any number’s owner, if you know where to look.





There are many reasons people turn to finding who owns a cell or land line phone number, take for example, a hypothetical situation of prank callers harassing you. Or a stalker that just wont leave you alone.





Searching For That Number





Your first stop should be a free reverse phone number directory. Plenty of them are available on the Internet. You’ll enter the entire number including the area code and hit “Search.” If the number is a published land line, you should get the information you want, including the name of the owner and the entire address of the owner.





If you’re lucky enough to get results, then your search can stop there. In most cases, you’ll need to try a slightly different approach.





Usually, the reason you’ll run into problems is that the number belongs to a cell phone. Because there is no central database of cell phone numbers, free reverse phone directories cannot return information on those numbers. You also won’t be able to get information on land line numbers that are unlisted or non-published.





Don’t bother trying multiple reverse phone directories in order to find the owner of a phone number, either. Most use the same databases, so if you don’t score results at one then you won’t fare any better at another site.





Find a Phone Number Owner – With Reverse Phone Detective





Instead, you may have to use a paid site. For a reasonable fee, you can access all of the information you need about the owner of a phone number using Reverse Phone Detective. There database gives you accurate, up-to-date information using both land line and cell phone searches.





The exclusive database includes broad coverage of the entire United States – with better results than you’ll find at most other sites. They also give you free search assistance, access to expanded people search databases, and more.





In addition, they also give you a 100%, ironclad guarantee – if you don’t get results, you don’t pay.





To use Reverse Phone Detectives’ reverse lookup service, you will pay a fee which gives you an unlimited number of searches inside the members’ area, plus a premium full phone report. After you sign up, just enter the phone number you want to find, click “Search,” and you’ll have your information. It’s that easy!


Monday, February 13, 2012

Title:


What is a torrent file and how does it work?





Word Count:



919





Summary:



A torrent file is the file that is transferred among users using the torrent technology. The file extension used by torrent files is .torrent. Torrent files, when added into a torrent application, can be distributed among numerous amounts of people without the need of any major hardware costs and server fees on a particular individual.







Keywords:



torrent file, download, share







Article Body:



A torrent file is the file that is transferred among users using the torrent technology. The file extension used by torrent files is .torrent. Torrent files, when added into a torrent application, can be distributed among numerous amounts of people without the need of any major hardware costs and server fees on a particular individual. This is because each user supplies bits of the full torrent file to users without those particular bits, while receiving bits that they do not yet have. Therefore, torrent files can also be shared relatively quickly.







History



Torrent technology was first planned and developed by Bram Cohen in April 2001. After months of development, it first went public in 2 July, 2001. Today, Cohen’s technology is widely used. Although there are no specific measurements, it is considered as one of the most significantly used protocols in the Internet today.







Behind the Technology



The torrent technology is operated by a torrent client sending bits of the torrent file through a torrent protocol. A torrent client would be for example a personal computer while the torrent file can be of any file in the .torrent format.





For the sharing to begin, first a user must create a .torrent file (eg. File.torrent). A torrent file contains information, such as the tracker, the main computer distributing the file first, and the metadata, information about the files in the torrent file. People wishing to obtain the information must first download the torrent file (in this case, File.torrent), run it with their torrent application, and then connect with the tracker, which will give orders on where to download what bits of the torrent file.







Torrent Files vs. HTTP Files



Although torrent files and its sharing are technically a transfer of files over the network, it has its strengths compared to the old-school HTTP downloading style. Firstly, when downloading files, web browsers will make one HTTP GET request through one TCP socket. However, torrent files make numerous amounts of small data requests over many TCP sockets. Also, HTTP will download in an order—what is first will be downloaded first; however torrents download in a random way—whatever is of high availability will be downloaded first.





This is exactly why the torrent files have its strengths; it doesn’t need much financial back, it has a higher redundancy, and a better resistance to potential abuse from flash crowds than what would be a frequent thing with HTTPs. However, as with everything, there is a downside. It takes a bit of time for downloads to be running in full throttle, as connecting to other peers can tae time. Also, becoming an effective uploader also takes time. Not to forget, while torrent file downloading will reach immensely high speeds, the speed will eventually fall near the end of the download as availability of the bits of the torrent file decrease.







Sharing Torrents and Files



First a user browses through the Internet looking for torrent files. Once a torrent file is obtained, the user will connect it through a torrent application and connect with the tracker. Then, the user will begin to download off of seeders and a group of peers known as the “swarm.” If there is one seeder, the user will directly connect to that seeder and begin to download, but eventually start to exchange files with other peers too, which lessens the burden on the seeder.







Applications of Torrent Files



Surprisingly, torrent files are widely used today by many individuals and some corporations.



 Some bands like “Ween” uses torrent files to distribute their free albums



 .torrent files are increasingly used by Podcasters to meet the high demands of these radio MP3s



 The game America’s Army uses torrent files to release their updates and patches for the games



 An immense number of open source and free softwares utilize torrent files to increase availability and awareness of the projects







Torrent Files’ Limitations



Although torrent files seem to be another great way to download and share files, it has some limitations such as security issues.



 IP Address Exposed: The use of torrent files can lead to anonymity issues, as all IP addresses of current and potentially previous swarm users can be found and abused



 Internet Speeds: It is best to use broadband when sharing torrent files, so dial-up users cannot take full advantage of the torrent technology



 Leeching Problem: While sharing torrent files is good, it doesn’t have many incentives behind it. Thus, there is no real reason to continue to seed after the download has finished. To fix this issue, some torrent sites have begun to limit the download speeds of users who do not upload often.







Free Torrent Applications to Download Torrent Files



In today’s market there are both quality free open source and paid products to download torrent files.



 BitTorrent: BitTorrent is the first and official torrent client made by Bram Cohen himself. It is supported in major operating systems such as Microsoft Windows, Apple, and Linux.



 Azuerus (Vuze): This is also a widely used torrent client first released in SourceForge in June 2003. Released under the GNU General Public License, Azuerus is a constantly developed, free client.



 µTorrent (uTorrent): uTorrent, also known as microTorrent, is a torrent client written in C++. Because of its small size but a powerful interface, it is another widely used free torrent client. It was first released on December 7, 2006 between BitTorrent, Inc. and Ludvig Strigeus, but was later fully acquired by BitTorrent, Inc. because of the application’s popularity, size, and power.


Monday, February 6, 2012

Title:


ATSC





Word Count:



376





Summary:



ATSC (Advanced Television Systems Committee) is a group formed in 1982 that developed the ATSC Standards for digital televisions in the United States and in many other countries such as Canada, South Korea, Mexico, and Honduras. The abbreviations are also known to refer to the ATSC Standards itself.







Keywords:



atsc, ntsc, signal, channels, Americas, Asia/Pacific







Article Body:



ATSC (Advanced Television Systems Committee) is a group formed in 1982 that developed the ATSC Standards for digital televisions in the United States and in many other countries such as Canada, South Korea, Mexico, and Honduras. The abbreviations are also known to refer to the ATSC Standards itself.





ATSC Standards is a digital television format which will in the long term replace the current NTSC television system, as is the case in United States by February 17, 2009 and in Canada by August 31, 2011. These new high definition standards produce a display resolution better than approximately six times its predecessor — it shows off a lucrative 16:9 wide screen images up to 1920x1080 pixels in size. Not to forget, other different image sizes are still supported so that a maximum of six standard definition channels can still be broadcasted.





Sound wise, the ATSC is capable of a “theater quality” audio as it adopts the Dolby Digital AC-3 format, which also produces the 5.1 channel surround sound.





When broadcasting with the ATSC and an analog signal, two separate channels are required as the ATSC requires an entire channel for itself. As virtual channels can be remapped to any other number from 1 to 99, ATSC stations will often associate with one of the NTSC channels or all stations will use the same number.





Also, like many other systems, the ATSC is an interwoven standard, and is also heavily patented as it includes elements from MPEG, AC-3 audio coding, and the 8VSB modulation.







Comparison with Other Standards



Nowadays, the ATSC system, despite previously being criticized as being too complicated for the ordinary and over-priced to be a household system, is relatively simplified and is moderately priced compared to the current world’s most used system, the DVB.





Also, the ATSC signal, ironically, is more capable of adopting the changes in radio propagation conditions compared to the likes of DVB-T and ISDB-T. Were the ATSC capable of changing its parts such as its error correction modes, code rates, the randomizer, and the interleaver mode, it could become even more robust. Regardless of such fixed settings, it still is sturdy under various conditions.





Territories Using ATSC





Americas



Argentina



Bahamas



Bermuda



Canada



Colombia



Chile



Guatemala



Honduras



Mexico



Peru



United States





Asia/Pacific



American Samoa



Guam



Northern Mariana Islands