Solved

Unique IPs: How Did They Do It?

Posted on 1998-09-15
1
161 Views
Last Modified: 2010-03-18
There was a website which was conducting a test by generating unqiue IP addresses.  One thing I've always heard about the net is that IP addresses are unique for each person.  

How did they generate a unique IP address for each test they conducted?  Oh, the test was testing out those many CGI tracking programs for legitamacy.  Does the secret lie in programs such as LINKLINT or URLGET?

Are there any GREAT books which can teach me more about the underlying workings of the Internet, TCP/IP, etc.  I would love to understand LINKLINT and URLGET better.  A fetsih of mine.

Thanks.
0
Comment
Question by:ratboy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 51

Accepted Solution

by:
ahoffmann earned 50 total points
ID: 1586808
About unique IPs:

 they are maintained by the InterNIC http://rs.internic.net/
 InterNIC serves the mapping of IP address to domain name.

 If someone gives you a unique IP, (s)he got a pool of IPs
 from InterNIC (ussually a class A, B or C net).

Books:
  TCP/IP Network Administration, O,Reilly&Associates

0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question