Skip to main content

Posts

Showing posts from March, 2016

File systems (FAT, FAT8, FAT16, FAT32 and NTFS)

The precise manner in which data is organised on a hard disk drive is determined by the file system used. File systems are generally operating system dependent. However, since it is the most widely used PC operating system, most other operating systems’ file systems are at least read-compatible with Microsoft Windows. The FAT file system was first introduced in the days of MS-DOS way back in 1981. The purpose of the File Allocation Table is to provide the mapping between clusters – the basic unit of logical storage on a disk at the operating system level – and the physical location of data in terms of cylinders, tracks and sectors – the form of addressing used by the drive’s hardware controller.  The FAT contains an entry for every file stored on the volume that contains the address of the file’s starting cluster. Each cluster contains a pointer to the next cluster in the file, or an end-of-file indicator at (0xFFFF), which indicates that this cluster is the end of the file...

What is a Darknet?

Under development for years and in use for reported thousands (maybe more), the definition of this ‘secret Internet has been elusive as its evolution is user-defined and built. This shifting innovation landscape results in frequent new concepts on how to apply Darknet technology and further navigate the future of cloaked or otherwise ‘deep’ network relations. As defined by Wikipedia: “A Darknet is an overlay network that can only be accessed with specific software, configurations, or authorization, often using non-standard communications protocols and ports. The purpose of of darknets is motivated by the desire to hide content, or even the existence of data and communication, from competing business or government interests. The most widespread darknets are governmental and corporate intranets, the use of which is a standard security practice nowadays, friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and privacy networks such as Tor.” The no...