Skip to main content

Every Vista computer can have its own domain name

Every Vista computer can have its own domain name
By Jeremy Reimer | Published: November 14, 2006 - 07:36AM CT

With Microsoft having released Windows Vista to manufacturing, the computing industry is now busy preparing for the first major Windows desktop operating system upgrade in more than five years. One of the new features of Vista that hasn't gotten much attention is Microsoft's new "Computer Name" feature, which extends Windows XP's Peer Name Resolution Protocol (PNRP) service. Simply put, Computer Name allows users to identify their machine by a unique name, rather than an IP address, from anywhere on the planet.

PNRP works by extending IPv6, the new standard for identifying computers and devices on the Internet. The old IPv4 standard, identifiable by the series of four integers between 0 and 255, was designed when the Internet was much smaller, and its maximum 4.3 billion addressable devices is starting to look somewhat cramped in the modern era. IPv6 allows up to 3.4 x 1038 unique addresses, which should be enough until the nanobots take over the world and turn everything into a smooth grey slurry.

Windows Vista comes with IPv6 support built in, although not all of the Internet's infrastructure can operate using the new protocol, including many home routers now in use. If IPv6 support is not present, Vista downshifts to IPv4 as a backup, a feature which DNS co-inventor Paul Mockapetris warned could cause a significant slowdown in Internet throughput.

Extra bandwidth issues aside, what are the advantages and disadvantages of Microsoft's improved PNRP scheme? The company touts the ability to access your computer remotely using a unique name of your choice, without having to go through the process and expense of registering a domain name on the Internet. Some security experts, however, warn that making your computer easily accessible in this manner could set you up for all sorts of nasty hacks, particularly if bugs and holes are found in the PNRP infrastructure.

PNRP must be started from the command line, with Administration privileges. The user has the option of choosing their own name for their computer, or letting Vista create a more secure 128-bit name out of random characters. Vista will start running a PNRP service in the background, and from this point on the computer is accessible directly from any other machine running IPv6. There is no central server keeping track of these names—the system uses a peer-to-peer system where every machine knows about a few other machines at random, so it takes only a few hops to track down the Computer Name in question.

Ultimately, the usefulness of the feature will depend on how widely IPv6 is adopted. As for the security concerns, because the feature has to be enabled manually it is unlikely to become the source of a widespread outbreak. However, just as with other enabling technologies like wireless, activating a Computer Name is not without its risks. As wireless networking setups are vulnerable to brute-force password hacking, PNRP will be as well. Like many computing choices these days, it will come down to balancing convenience with security.

Comments

Popular posts from this blog

How to Use Chisanbop (Korean Finger Math) for Basic Addition and Counting | eHow.com

How to Use Chisanbop (Korean Finger Math) for Basic Addition and Counting eHow.com Difficulty: Easy Instructions Step 1 In Chisanbop you'll be using your two hands and ten fingers to represent numbers from 0 to 99. Start out with your hands out in front of you with closed fists. This represents 0. Each finger (not thumb) on your right hand represents 1. To represent 3, just press down three right hand fingers. Your right thumb represents 5. To represent 7, press down your right thumb and 2 right hand fingers. Think of your right hand as the ones or units place (column). Step 2 Your left hand represents the tens place (column). Each finger on your left hand is worth 10. For example, to represent 30, press down three left hand fingers. To represent 38, do the same, but also use your right hand to represent 8 as described above. Your left thumb represents 50. To represent 86, press down your left thumb and three left hand fingers for the 80, and your right thumb and one righ...
Should we allow our staff to use social networking sites? Some people say they are dangerous but I can't see how. Can you explain the dangers? > EXPERT RESPONSE There's nothing wrong with using Facebook, other than the potential impact on working time, but that's not a security matter! The issue is in how your staff configures Facebook, and what information they place on it. A few tips to pass on to your staff: Don't allow anyone that isn't part of your network of 'friends' to see your profile. Don't allow non-friends to see your friends. Why? I could easily impersonate one of your friends, fake a new profile, and send you an invite. You accept, thinking a genuine friend has created a new profile, then I'm in your network of friends and can see your profile. Think about what information is in your profile. What would be useful in stealing your identity? Date of birth, address, email address, employer, interests. why does this type of information n...

Creative commons

Few Terms related to CC  - Commons :  The Commons refers to resources that are collectively owned. [1] This can include everything from land to software. [2] The process by which the commons are transformed into private property is often termed enclosure . [source : wikipedia ] The public domain (public ownership of creative works) is an intellectual property designation for the range of content that is not owned or controlled by anyone. These materials are "public property", and available for anyone to use freely (the "right to copy" [1] ) for any purpose. The public domain is most often discussed in contrast to works whose use is restricted by copyright . Under modern law, most original works of art, literature, music, etc. are covered by copyright from the time of their creation for a limited period of time (which varies by country). When the copyright expires, the work enters the public domain. The public domain can be defined in contrast to several f...