Home » Posts tagged 'servers'
Tag Archives: servers
Amazon gets some competition, and customers should see some relief, unless Google withdraws commitment on these products after a few years of trying (like it often does now!)
|Machine Type Pricing|
|Configuration||Virtual Cores||Memory||GCEU *||Local disk||Price/Hour||$/GCEU/hour|
|n1-standard-1-d||1||3.75GB ***||2.75||420GB ***||$0.145||0.053|
|n1-standard-8-d||8||30GB||22||2 x 1770GB||$1.16||0.053|
|Egress to the same Zone.||Free|
|Egress to a different Cloud service within the same Region.||Free|
|Egress to a different Zone in the same Region (per GB)||$0.01|
|Egress to a different Region within the US||$0.01 ****|
|Inter-continental Egress||At Internet Egress Rate|
|Internet Egress (Americas/EMEA destination) per GB|
|0-1 TB in a month||$0.12|
|Internet Egress (APAC destination) per GB|
|0-1 TB in a month||$0.21|
|Persistent Disk Pricing|
|Provisioned space||$0.10 GB/month|
|Snapshot storage**||$0.125 GB/month|
|IO Operations||$0.10 per million|
|IP Address Pricing|
|Static IP address (assigned but unused)||$0.01 per hour|
|Ephemeral IP address (attached to instance)||Free|
** coming soon
*** 1GB is defined as 2^30 bytes
**** promotional pricing; eventually will be charged at internet download rates
Google Prediction API
Tap into Google’s machine learning algorithms to analyze data and predict future outcomes.
Leverage machine learning without the complexity
Use the familiar RESTful interface
Enter input in any format – numeric or text
Build smart apps
Learn how you can use Prediction API to build customer sentiment analysis, spam detection or document and email classification.
Google Translation API
Use Google Translate API to build multilingual apps and programmatically translate text in your webpage or application.
Translate text into other languages programmatically
Use the familiar RESTful interface
Take advantage of Google’s powerful translation algorithms
Build multilingual apps
Learn how you can use Translate API to build apps that can programmatically translate text in your applications or websites.
Analyze Big Data in the cloud using SQL and get real-time business insights in seconds using Google BigQuery. Use a fully-managed data analysis service with no servers to install or maintain.
Reliable & Secure
Complete peace of mind as your data is automatically replicated across multiple sites and secured using access control lists.
You can store up to hundreds of terabytes, paying only for what you use.
Run ad hoc SQL queries on
multi-terabyte datasets in seconds.
Google App Engine
Create apps on Google’s platform that are easy to manage and scale. Benefit from the same systems and infrastructure that power Google’s applications.
Focus on your apps
Let us worry about the underlying infrastructure and systems.
See your applications scale seamlessly from hundreds to millions of users.
Premium paid support and 99.95% SLA for business users
This is not about hacking the cloud. Instead this is about using the cloud to hack
Some articles last year wrote on how hackers used Amazon Ec2 for hacking/ddos attacks.
Roth claims that a typical wireless password can be guessed by EC2 and his software in about six minutes. He proved this by hacking networks in the area where he lives. The type of EC2 computers used in the attack costs 28 cents per minute, so $1.68 is all it could take to lay open a wireless network.
Cloud services are also attractive for hackers because the use of multiple servers can facilitate tasks such as cracking passwords, said Ray Valdes, an analyst at Gartner Inc. Amazon could improve measures to weed out bogus accounts, he said.
and this article by Anti-Sec pointed out how one can obtain a debit card anonymously
VPN Account without paper trail
- Purchase prepaid visa card with cash
- Purchase Bitcoins with Money Order
- Donate Bitcoins to different account
Masking your IP address to log on is done by TOR
and the actual flooding is done by tools like LOIC or HOIC
So what safeguards can be expected from the next wave of Teenage Mutant Ninjas..?
I really liked the software Qbittorent available from http://www.qbittorrent.org/ I think bit torrents should be the default way of sharing huge content especially software downloads. For protecting intellectual property there should be much better codes and software keys than presently available.
The qBittorrent project aims to provide a Free Software alternative to µtorrent. Additionally, qBittorrent runs and provides the same features on all major platforms (Linux, Mac OS X, Windows, OS/2, FreeBSD).
qBittorrent is based on Qt4 toolkit and libtorrent-rasterbar.
qBittorrent v2 Features
- Polished µTorrent-like User Interface
- Well-integrated and extensible Search Engine
- Simultaneous search in most famous BitTorrent search sites
- Per-category-specific search requests (e.g. Books, Music, Movies)
- All Bittorrent extensions
- DHT, Peer Exchange, Full encryption, Magnet/BitComet URIs, …
- Remote control through a Web user interface
- Nearly identical to the regular UI, all in Ajax
- Advanced control over trackers, peers and torrents
- Torrents queueing and prioritizing
- Torrent content selection and prioritizing
- UPnP / NAT-PMP port forwarding support
- Available in ~25 languages (Unicode support)
- Torrent creation tool
- Advanced RSS support with download filters (inc. regex)
- Bandwidth scheduler
- IP Filtering (eMule and PeerGuardian compatible)
- IPv6 compliant
- Sequential downloading (aka “Download in order”)
- Available on most platforms: Linux, Mac OS X, Windows, OS/2, FreeBSDSo if you are new to Bit Torrents- here is a brief tutorialSome terminology from
- A tracker is a server that keeps track of which seeds and peers are in the swarm.
- A Seed is used to refer to a peer who has 100% of the data. When a leech obtains 100% of the data, that peer automatically becomes a Seed.
- A peer is one instance of a BitTorrent client running on a computer on the Internet to which other clients connect and transfer data.
- A leech is a term with two meanings. Primarily leech (or leeches) refer to a peer (or peers) who has a negative effect on the swarm by having a very poor share ratio (downloading much more than they upload, creating a ratio less than 1.0)1) Download and install the software from http://www.qbittorrent.org/2) If you want to search for new files, you can use the nice search features in here3) If you want to CREATE new bit torrents- go to Tools -Torrent Creator4) For sharing content- just seed the torrent you just created. What is seeding – hey did you read the terminology in the beginning?5) Additionally -From
Trackers: Below are some popular public trackers. They are servers which help peers to communicate.
Here are some good trackers you can use:
- When a file is new, much time can be wasted because the seeding client might send the same file piece to many different peers, while other pieces have not yet been downloaded at all. Some clients, like ABC, Vuze, BitTornado, TorrentStorm, and µTorrent have a “super-seed” mode, where they try to only send out pieces that have never been sent out before, theoretically making the initial propagation of the file much faster. However the super-seeding becomes less effective and may even reduce performance compared to the normal “rarest first” model in cases where some peers have poor or limited connectivity. This mode is generally used only for a new torrent, or one which must be re-seeded because no other seeds are available.
- Note- you use this tutorial and any or all steps at your own risk. I am not legally responsible for any mishaps you get into. Please be responsible while being an efficient bit tor renter. That means respecting individual property rights.
It is best to use a DNS resolution service to avoid targeted attacks on your machine esp if you use the browser a lot. and it is quite fast!! Takes 2 minutes to set it up even for non geeks
I was getting slower browsing speeds on OpenDNS http://www.opendns.com/
so I switched to Google DNS (though I am not sure how people in Iran and China – who have a much greater need for DNS verification services will get secure resolution of DNS)
What is Google Public DNS?
Google Public DNS is a free, global Domain Name System (DNS) resolution service, that you can use as an alternative to your current DNS provider.
To try it out:
New! For IPv6 addresses, see our configuration instructions.
If you decide to try Google Public DNS, your client programs will perform all DNS lookups using Google Public DNS.
Why does DNS matter?
The DNS protocol is an important part of the web’s infrastructure, serving as the Internet’s phone book: every time you visit a website, your computer performs a DNS lookup. Complex pages often require multiple DNS lookups before they start loading, so your computer may be performing hundreds of lookups a day.
Why should you try Google Public DNS?
By using Google Public DNS you can:
Lets assume that the big bad world of American electoral politics forces some kind of modified SOPA to be passed, and the big American companies have to abide by that law (just as they do share data for National Security under Patriot Act but quitely).
I belive Opera Unite is the way forward to sharing content on the Internet.
Opera Unite features a Web server running inside the Opera browser, which allows you to do some amazing things. At the touch of a button, you can share images, documents, video, music, games, collaborative applications and all manner of other things with your friends and colleagues
I can share music, and files , and the web server is actually my own laptop. try beating 2 billion new web servers that sprout!! File system sharing is totally secure- you can create private, public, or password protected files, a messaging system that can be used for drop messages (called fridge), a secure messaging system and your own web server is ready to start at a click. the open web may just use opera instead of chromium, and US regulation would be solely to blame. even URL blocking is of limited appeal thanks to software like MafiaWire Extension
Throw in Ad block, embedded bit torrent sharing and some more Tor level encryption within the browser and sorry Senator, but the internet belongs to the planet not to your lobbyist.
- Any effort to combat online piracy must guard against the risk of online censorship of lawful activity and must not inhibit innovation by our dynamic businesses large and small (AJ-yup)
- We must avoid creating new cybersecurity risks or disrupting the underlying architecture of the Internet. (AJ-note this may include peer-to-peer browsers, browser extensions for re-routing and newer forms of encryption, or even relocation of internet routers in newer geographies )
We must avoid legislation that drives users to dangerous, unreliable DNS servers and puts next-generation security policies, such as the deployment of DNSSEC, at risk.
While we are strongly committed to the vigorous enforcement of intellectual property rights, existing tools are not strong enough to root out the worst online pirates beyond our borders.
We should never let criminals hide behind a hollow embrace of legitimate American values
We should all be committed to working with all interested constituencies to develop new legal tools to protect global intellectual property rights without jeopardizing the openness of the Internet. Our hope is that you will bring enthusiasm and know-how to this important challenge
Victoria Espinel is Intellectual Property Enforcement Coordinator at Office of Management and Budget
AJ-Why not sponser a hackathon, White House and create a monetary incentive for hackers to suggest secure ways? Atleast a secure dialogue between policy makers and policy breakers could be a way forward.
SOPA in its current form is dead. We live to fight another day.
Let us never negotiate out of fear. But let us never fear to negotiate. John F K