: Counter Strike, The beginner of Broad Band Pc Gaming:

Written by Fahad Ahmed Bashir


: Counter Strike, The beginner of Broad Band Pc Gaming:

This isrepparttar world of 21st century,repparttar 107613 century of technologies. Every thing is fast now a days and as far asrepparttar 107614 Computers and games are concerned, they are atrepparttar 107615 top of all. Every one these days like playing games and some of them love it. Well few years ago PC gaming was not so advance and usually was single user based and if any one wanted to play with any other player then one must have an extra input or any compatible playing device . An era of new technology began afterrepparttar 107616 entrance of Network gaming or Multiplayer gaming which revolutionizedrepparttar 107617 PC gaming world. The term of multiplayer gaming was that from now on if a person wants to play a certain game with any other personrepparttar 107618 he can easily connect torepparttar 107619 other person’s computer using broad band internet connection . Usually beforerepparttar 107620 arrival of Broad Band, games were played thorough Modem. This was perfect in those days asrepparttar 107621 games were not too heavy and only few packets of data are sent and received. However overrepparttar 107622 years this scene has changed greatly.

SWITCHING TO BROADBAND: Now a days multiplayer games send and receive more data and therefore need faster protocol for sending and receiving data items. Amongst those of course is COUNTER STRIKE. Few years ago when there was no concept of Broad Band, one would really be able to get anything faster thanrepparttar 107623 ISDN connection. But today as compared torepparttar 107624 past we have much greater availability and much greater broad band technology like DSL and Cable Modem as compare to normal dialup modem. So PC gaming has become very much advance and high quality games can be played at a very high speeds. Counter Strike isrepparttar 107625 most popular multiplayer game using Broad Band Connection. THE GAME : Without any doubt it isrepparttar 107626 most popular game played overrepparttar 107627 years and isrepparttar 107628 modification of half life developed by Valve. It is FPS (First Person Shooter) type game and is totally action packed. The game is divided into two teams The Terrorist Forces and The Counter Terrorist Forces. The game is played on some Maps which have different locations and objectives. According to these Mapsrepparttar 107629 Counter Terrorists andrepparttar 107630 Terrorist Forces assassinate/ Escapes, Hostages/ Rescues and diffuse bomb etc..

Should You Use Page Cloaking! I Say YES!

Written by James OKeefe


Search Engine Cloaking - Do it? Search Engine Cloaking - To Cloak or Not to Cloak

By Sumantra Roy

Cloaking can broadly be defined as a technique used to deliver different web pages under different circumstances. There are two primary reasons that people use page cloaking:

i) It allows them to create a separate optimized page for each search engine and another page which is aesthetically pleasing and designed for their human visitors. When a search engine spider visits a site,repparttar page which has been optimized for that search engine is delivered to it. When a human visits a site,repparttar 107612 page which was designed forrepparttar 107613 human visitors is shown. The primary benefit of doing this is thatrepparttar 107614 human visitors don't need to be shownrepparttar 107615 pages which have been optimized forrepparttar 107616 search engines, becauserepparttar 107617 pages which are meant forrepparttar 107618 search engines may not be aesthetically pleasing, and may contain an over-repetition of keywords.

ii) It allows them to hiderepparttar 107619 source code ofrepparttar 107620 optimized pages that they have created, and hence prevents their competitors from being able to copyrepparttar 107621 source code.

Page cloaking is implemented by using some specialized cloaking scripts. A cloaking script is installed onrepparttar 107622 server, which detects whether it is a search engine or a human being that is requesting a page. If a search engine is requesting a page,repparttar 107623 cloaking script deliversrepparttar 107624 page which has been optimized for that search engine. If a human being is requestingrepparttar 107625 page,repparttar 107626 cloaking script deliversrepparttar 107627 page which has been designed for humans.

There are two primary ways by whichrepparttar 107628 script can detect whether a search engine or a human being is visiting a site:

i) The first and simplest way is by checkingrepparttar 107629 User-Agent variable. Each time anyone (be it a search engine spider or a browser being operated by a human) requests a page from a site, it reports an User-Agent name torepparttar 107630 site. Generally, if a search engine spider requests a page,repparttar 107631 User-Agent variable containsrepparttar 107632 name ofrepparttar 107633 search engine. Hence, ifrepparttar 107634 cloaking script detects thatrepparttar 107635 User-Agent variable contains a name of a search engine, it deliversrepparttar 107636 page which has been optimized for that search engine. Ifrepparttar 107637 cloaking script does not detectrepparttar 107638 name of a search engine inrepparttar 107639 User-Agent variable, it assumes thatrepparttar 107640 request has been made by a human being and deliversrepparttar 107641 page which was designed for human beings.

However, while this isrepparttar 107642 simplest way to implement a cloaking script, it is alsorepparttar 107643 least safe. It is pretty easy to fakerepparttar 107644 User-Agent variable, and hence, someone who wants to seerepparttar 107645 optimized pages that are being delivered to different search engines can easily do so.

ii) The second and more complicated way is to use I.P. (Internet Protocol) based cloaking. This involvesrepparttar 107646 use of an I.P. database which contains a list ofrepparttar 107647 I.P. addresses of all known search engine spiders. When a visitor (a search engine or a human) requests a page,repparttar 107648 cloaking script checksrepparttar 107649 I.P. address ofrepparttar 107650 visitor. Ifrepparttar 107651 I.P. address is present inrepparttar 107652 I.P. database,repparttar 107653 cloaking script knows thatrepparttar 107654 visitor is a search engine and deliversrepparttar 107655 page optimized for that search engine. Ifrepparttar 107656 I.P. address is not present inrepparttar 107657 I.P. database,repparttar 107658 cloaking script assumes that a human has requestedrepparttar 107659 page, and deliversrepparttar 107660 page which is meant for human visitors.

Although more complicated than User-Agent based cloaking, I.P. based cloaking is more reliable and safe because it is very difficult to fake I.P. addresses.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use