FreeHostia Beginner’s Giude

This is an incomplete version of our beginner’s guide. We will be editing this tutorial to make it as easy and understandable for everyone who uses our web hosting control panel for the first time. We will also add some screenshots later.

Getting started

Once you have signed up for a web hosting account and you have received the welcome email with the login details, you most likely want to get started and get your site online as soon as possible. This guide will guide you through the steps of setting up your account and getting your website online. You will also learn how to setup email accounts, MySQL databases etc. But first things first, let’s start with setting up your domain name and uploading the files.

* Domain name setup *
– If you have registered our domain with us when you signed up for the account, all the work is done by us, so you just need to wait for your domain to become fully operational (usually 12-24 hours).
– If you have registered the domain from the Domain Registration section of your web hosting control panel you also need to add it to the Hosted Domains section before it becomes fully operational.
– In the case when you have registered the domain elsewhere, you need to add it to the Hosted Domains and set our name servers to it. The name servers are listed in the Hosted Domains section. The company which you have registered the domain with should have provided you with a control panel where you can edit the name servers (DNS) of your domain. Set our name servers to the domain and allow 12-24 hours for the change to take effect.
– If you have requested a domain transfer, make sure that the domain has been added to the Hosted Domains and set our name servers to it. Setting our name servers to your domain will make the domain point to your account (within 12-24 hours). The transfer procedure however takes more time – usually 5-7 business days. Transferring a domain means that you are changing the registrar company – the one which manages your domain. While the domain is transferring you can still use it as long as you have set our name servers (DNS) to it.

Now that you have the domain setup, you can start with uploading your files (publishing your website).

* Uploading your files / publishing your site *
We have an online File Manager integrated in the web hosting control panel which can be used for file manipulation and upload. Open the File Manager – you will see 5 folders:
These are the system folders of your account. The one that you will be accessing is the www folder. In the www folder are located the main folders of each of your subdomains/domains. When you add a domain to your Hosted Domains or you add a subdomain from the Subdomain Manager, a folder is created in the www/ directory. The folder has the same name as your domain/subdomain. So if you have added the domain to your Hosted Domains, then you should see a folder named in the www/ directory. Of course you can edit the folder where a subdomain/domain points to, but by default it points to the folder which has the same name and is located in the www/ directory. We will explain later how you can edit the default path of a subdomain/domain.

Now that you know where your subdomain/domain points to you should have some idea where you should upload your files. In the example with, you should upload your files to the folder named But how do you do this? There are several ways to upload/publish your website:

– FrontPage – if you have created your website with FrontPage, this is how you publish your website:
* From your web hosting control panel you should first activate the FrontPage Extensions (FPEs) for the domain/subdomain which you will be publishing your website to. Go to the FrontPage Extensions section of your web hosting control panel and activate the extensions by selecting the domain/subdomain that you want to activate them for.
* Now that you have the FPEs activated, you can publish your website:
1. Launch FrontPage Explorer and open the web site you have created on your computer.
2. From the menu at the top select “File” > “Publish”
3. Enter the location, where you want to publish your FrontPage web site. ( – if you are using a free subdomain type it without www in front). Then hit the Enter key on your keyboard.
IMPORTANT: Use “” (if you are using a free subdomain type it without www in-front) as the Destination Web Server to publish to our server. Leave the ‘Destination Web Name’ blank.
4. Use the following username and password:
Username: your account username
Password: your FTP password
You should use the username/password of your default FTP account. You can see the username in the FTP Manager section of your web hosting control panel – there you can also set the FTP password.

– File Manager – the File Manager integrated in your web hosting control panel can also be used for uploading files. Browse the directory where you want to upload the files to – in our example, go to www/ Then at the bottom you see 5 fields with the button “Choose” next to them. You can upload even more than 5 files at a time by clicking on the “More Files” button – it will add a new field every time you click it. Choose the files that you want to upload by clicking on the “Choose” button and selecting the files from your computer and then click “Upload File(s)” to initiate the upload (leave the “Upload permissions” set to 755). Once the files have been uploaded you will see them in the folder of your domain/subdomain.
Now when you open your website from the web ( your website will open. Please keep in mind that the file that loads by default is the one named index.html (or index.htm or index.php). If you don’t have an index file, a directory index page (Index of/) will open when you go to the address of your website (

– FTP – you can use FTP client software like FileZilla, CuteFTP, SmartFTP, WS_FTP etc. to upload your files. Such FTP clients are actually something like remote file managers. In order to connect to the server, they need the FTP connection settings. These are the same settings that you can see/edit in the FTP Manager. For FTP host use (or any of your working subdomains/domains) and for the username and the password use the ones in from the FTP Manager section of your web hosting control panel. For concrete instructions about using the FTP client that you have downloaded, please refer to the Help of the respective software.

Using one of the methods described above, you should have been able to publish your website. Now at you should see your home page.

If you are using a PHP/Perl system that requires MySQL database, then you have some additional work to do. First you need to create a database, then you need to connect your PHP/Perl driven website to the database.

* Creating a MySQL Database *
You can add a database to your account from the Manage SQL Databases section of the web hosting control panel. This is also where you can see the existing databases and edit the password of a database. The database names look something like:
Where username is the username of your web hosting account. When you create a database you can only choose the second part of the name (db1, db2, joomla, mambo). Keep in mind that the whole name (including username_) must not be longer than 16 characters.

Once you have created a database you can setup your scripts to connect to it using the following settings:
database name: username_db1 (the whole name of the database – the one that you see in the Manage SQL Databases section of your web hosting control panel)
database username: username_db1 (the same as above)
database password: password (the password that you have set to your database – you can edit it from the Manage SQL Databases section)
database host: ( is an example, you can see the correct server name / database hostname in the Manage SQL Databases section, just under the table with the list of your database(s))
database port: 3306
Usually the script that you are installing requires all of the above settings, in some cases, the MySQL port is not required though.
Using the correct MySQL settings, your script should be able to connect to the database. You may however need to do some manual changes to the tables of a database and the tool, which you can use for, that purpose is the phpMyAdmin – it is integrated in your web hosting control panel. You should login using the database name (the whole name) as username and the database password as password.

The phpMyAdmin can be used for importing and exporting a database (i.e. for loading a backup or creating a backup of your database).

* Importing a database (loading a backup from a database dump file) *
In the phpMyAdmin there are 5 icons on the left navigation menu, the middle one says SQL, click on it and a new window opens where you see “Import file” in the top navigation links. There you can import the file that you have exported.

[/b]* Exporting a database (creating a backup) *[/b]
You can backup your database from the phpMyAdmin section of your web hosting control panel. Login to phpMyAdmin. Click on your database (on the left you see the name of the database and all tables under the database, click on the name of your database), then click on “Export” from the top navigation menu. Check the “Save as file” check-box and click on the “Go” button in the bottom right corner.

Now that you have your domain working, your files have been uploaded and you have setup a database and your scripts are able to connect to it, we can say that your site has been setup. This is however only part of what you have to do. In the following sections of this tutorial you will learn how to add/edit subdomains; create email accounts; check the statistics of your web hosting account and websites; use the Password Protected Areas tools and more…


You can add, delete and edit the settings of a subdomain from the Subdomain Manager. You will note that in the Subdomain Manager there is a www subdomain for each of your domain ( for example). The www subdomain is the default subdomain of a top level domain – it cannot be deleted unless you delete the domain from the Hosted Domains. Using the form in the subdomain manager you can add new subdomains. This is what each of the subdomain fields mean:

– IP: the IP of the subdomain – by default this is the shared IP of the server – it is shared for all web hosting accounts on the server. You can also have a dedicated IP (we will explain how you can acquire one later) – if you have a dedicated IP you can select it from the drop-down menu and make your subdomain resolve at this dedicated IP. This way the site hosted in the folder of your subdomain will not only be accessible at but also at http://123.45.678.9 (where 123.45.678.9 is your dedicated IP).

– Path: the path of the subdomain defines to which folder the subdomain points to. As we explained earlier, by default the subdomain points to the folder, so the default path is /www/
You can however edit the path and make the subdomain point to /www/ – this way will open the content of the folder This way you can have the same content at more than one addresses (subdomains/domains) – this could be useful if you have the domains and and want them to open the same content.

– Error 404 page: you can set your won custom 404 error page, so when someone follows a wrong link on your site, he will be brought to your custom error page instead of the default error page of the server.

– Activate FPE: FrontPage extensions could be activated when creating/editing a subdomain, this is what this option does.

– Activate access & error logs: selecting this option would activate the access & error logs for the subdomain. The access logs and the error logs are text files with logs, which you can download from the Access & Error Logs section of your web hosting control panel. We will explain the use of the Access & Error Logs later in this tutorial.

– Secure Socket Layer (SSL): you can also activate SSL when adding/deleting a subdomain. SSL is used for securing a site where the visitor is asked for personal details or billing information for example. We will explain the use of SSL in details later.

When creating a subdomain you can choose the domain at which the subdomain will be created from a drop-down menu. If you choose for example and type “forum” in the subdomain field, a subdomain will be created. In the domain drop-down menu are listed all domains that you have added to your Hosted Domains plus the server domains – these are domains added to the server for public use. Usually people use them for testing, but you can also host a working website on such subdomain.

In the table where all subdomains are listed there are several columns:
# Subdomain IP FileManager FPE SSL Traffic Edit Delete
here is what each of them represents:
– # – the number of the subdomain in the list
– Subdomain – the name of the subdomain, clicking on it will open the website hosted on this subdomain
– IP – the IP of the subdomain
– FileManager – clicking on the folder icon opens the folder where the subdomain points via the File Manager
– FPE – shows whether FrontPage Extensions have been enabled for this subdomain or not
– SSL – shows whether SSL has been activated for this subdomain or not
– Traffic – opens the traffic statistics for this subdomain
– Edit – opens the page where you can edit the settings of the subdomain
– Delete – deletes the subdomain

Above the table where the subdomains are listed, there is a search form where you can search a subdomain by IP or the name of the subdomain. You can use this form if you have many subdomains and have problems finding any of them in the list.

*** Important: The way our system works, does not allow accessing a subdomain from the web with a www in front of the name of the subdomain – this means that would not work. You can only access a top level domain with a www in front (


* Creating and using an email account *
To create a working e-mail account you need to have a domain. Having a working domain in your hosting account, you will be able to create e-mail accounts by submitting the form in the E-Mail Manager menu of your Control Panel. Here is what each of the fields means/does:
– Catchall email: selecting this option will create a catchall account. A catchall accounts is an account which receives all emails sent to non-existing email address at a concrete domain. For example the catchall account will receive all emails sent to email addresses like if there is no actual created in your account. This could mean that the catchall account will receive a lot of spam, but also you won’t miss a message because a client spelled wrong your sales email and sent the message to the non-existing instead to which is the correct address. IMPORTANT: catchall accounts cannot send emails, the are strictly for incoming mail. Also, catchall accounts cannot have an auto-responder and cannot be forwarded.
– Password: sets the password for the email account
– Retype Password: sets the password for the email account
– Use Autoresponder: sets an autoresponder, so that someone sends an email to this email address, he will receive an automated reply
How do you use the email account that you have just created?
– You can use the email account with the Webmail – this is an online email client – similar to yahoo’s and hotmail’s webmails but more simple. You can login to the webmail using the name of your mailbox as username and the corresponding password as password. So if you have created an email account, the username which you should use in the webmail would be
– You can also use your email account with any standalone email client – like Outlook or Mozilla Thunderbird. In this case there are several settings that you need to know:
IMAP/POP3, SMTP username:
IMAP/POP3, SMTP password: corresponding password for the above account
IMAP/POP3, SMTP server: ( is just an example – you can see the mail server in the Email Manager, just under the table where your email accounts are listed)
Secure Authentication: ON – you should set your email client to use secure authentication. Here is how you can do this in some of the most popular mail clients:
* Outlook Express: enable the check-box “My server requires authentication”
* Eudora: enable the check-box “Authentication allowed”
* Mozilla Thunderbird: enable the option “Use name and password”
* Mail for Mac OS X: enable the check-box “Use authentication when sending mail”, also set Authentication to “MD5 Challenge-Response”

* Forwarding email accounts *
You can forward an email account to any valid email address. So if you only use the email account and want the emails sent to to be forwarded to you can do this from the Email Manager. In the email accounts table there is an icon in the Forward column, when you click on it, you can add a forward for the email account.

* Email aliases – what they are and how we use them *
An email alias is actually an alternative name for a mailbox. For example if we have the mailbox, it has the default alias and we can add more aliases. If we add the alias all emails sent to will be received by the email account How is this different from email forwarding? For instance, aliases cannot be used for sending emails. So you cannot send emails from which is an alias of Also you cannot login to the webmail or setup your outlook using, because it is not really a mailbox, the mailbox is So why using aliases instead of forwarding? Well, actually in most cases forwarding is better, there are some rare cases when you would like to use an alias, for example if you have an email account and people often get it wrong and send emails to – you can create an alias so that you don’t lose emails from people who can’t spell :)

* The email accounts table *
Let’s see what each of the columns means/represents:
# Mail Forward Delete Alias Mailbox Aliases Outlook Options Delete Mailbox
– # – the number of the email account in the table
– Mail – a list of the email Aliases for this email account
– Forward – indicates whether the alias has a forwarding set to it; you can click on the icon to add forwarding
– Delete – deletes the alias
– Aliases – clicking on the icon allows you to add an alias to this mailbox
– Outlook – clicking on the icon downloads a file which automatically configures Outlook for this mailbox
– Options – clicking on the left icon allows you to change the password, clicking on the right icon allows you to set an autoresponder
– Delete Mailbox – deletes the mailbox (incl. all aliases!)

* Sending mails using a script *
There is one very important requirement on our servers – when sending emails using a script, either the TO: or FROM: header must be set to an email account hosted in your web hosting account. This restriction is necessary to prevent spam. So if you have a contact form, the FROM: address will be most likely the email address of the person who is contacting you – this means that the TO: address must be set to your email, hosted in your web hosting account. IN the case when it is a “Tell a friend” form for example, the TO: address would be the email of the “friend”, so you must set the FROM: address to your email address.

As we mentioned before, there are several ways to send emails using a script:

– SMTP – some PHP/Perl systems allow you to use the SMTP for sending emails – the script connects to the SMTP server the same way a mail client does and sends the emails. In this case you need to use a concrete email account for sending emails. Let’s say you want to use the email account
The settings that you need to set in your scripts are actually the same that you use in your mail client (Outlook for example):
SMTP server: the mail server listed in the Email Manager (for example
password: the corresponding password for
Use secure authentication: YES
Keep in mind that is you use the email account the script must be hosted in the same web hosting account – you want be able to send emails using this email account with a script hosted elsewhere.

– phpmail() – the phpmail() or mail() function is a PHP function used for sending emails. In this case you don’t need to provide the password or the mail server, but only the email account, which you want to send the email FROM or TO. Again, the script must be hosted in the same web hosting account as the email account.

– sendmail – sendmail is a Perl module, in order to use it, you need to set the path to sendmail in your script and the email that you want the emails to be send FROM or TO. The sendmail path is: /usr/sbin/sendmail


We offer several kinds of statistics with every web hosting plan. There is an Account Usage table on the left of your web hosting control panel where you see the global stats for your account, like disk space, traffic, etc. The In Use column shows the number/amount used and the Available shows the available/not used number/amount. There are also detailed statistics about the traffic used by each subdomain in the Bandwidth Stats section. We also have even more detailed statistic – the Traffic Stats – there you can see the amount of visitors, hits, etc. for each of your websites.

Password Protected Areas (PPA)

If you want to protect a concrete folder with a password, so that when someone opens the folder it asks for username and password, you can do this using the Password Protected Areas tool.

You can add a password-protected area by using the form in the PPA section. You can select the folder, which you want to protect by clicking on the “…” button – a File Manager window will open and you will be able to browse to the folder and select it.

Remember that the password protection will not work if there is an .htaccess file in the folder, which you are trying to protect.

Use Disqus instead of Akismet ?

Moderating Comments on a Freehostia Chocolate Account (Free)

The problem: Freehostia Free Accounts block outside connections.  This means that Akismet can’t access it’s servers and you can’t have spam checking.  So, all of your comments are spam spam spam!

I tried to add a captcha, but they got around that.  I tried to add Disqus using the plugin, but that failed to install because of the account’s limitations.

But, I was able to add moderated comments to my freehostia site by manually installing Disqus.  This is very necessary because otherwise you get hit with a bunch of spammers.

Here is how you manually install Disqus on WordPress.

  1. Create New Disqus Account 
  2. Go to your dashboard
  3. Click on your site
  4. Go to Settings
  5. And then click Install
  6. Select Universal Code
  7. Copy that code
  8. In /wp-content/themes/THEMENAME/single.php Replace:
    <?php comments_template( '', true ); ?>
  9. Save, Upload, then go to one of your posts. You should see Disqus loading at the bottom.
  10. Remember to setup your Disqus the way you want it. It’s a little restrictive out of the box. You can even add Akismet to Disqus in their admin interface.

Sub-netting Made Easy

Understanding Sub-netting!

IP subnetting is a fundamental subject that’s critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it.

Over the years, I’ve watched students needlessly struggle through school and in practice when dealing with subnetting because it was never explained to them in an easy-to-understand way.

I’ve helped countless individuals learn what subnetting is all about using my own graphical approach and calculator shortcuts, and I’ve put all that experience into this article.

IP addresses and subnets

Although IP stands for Internet Protocol, it’s a communications protocol used from the smallest private network to the massive global Internet. An IP address is a unique identifier given to a single device on an IP network. The IP address consists of a 32-bit number that ranges from 0 to 4294967295. This means that theoretically, the Internet can contain approximately 4.3 billion unique objects. But to make such a large address block easier to handle, it was chopped up into four 8-bit numbers, or “octets,” separated by a period. Instead of 32 binary base-2 digits, which would be too long to read, it’s converted to four base-256 digits. Octets are made up of numbers ranging from 0 to 255. The numbers below show how IP addresses increment.
…increment 252 hosts…
…increment 252 hosts…
…increment 4+ billion hosts…

The word subnet is short for sub network–a smaller network within a larger one. The smallest subnet that has no more subdivisions within it is considered a single “broadcast domain,” which directly correlates to a single LAN (local area network) segment on an Ethernet switch. The broadcast domain serves an important function because this is where devices on a network communicate directly with each other’s MAC addresses, which don’t route across multiple subnets, let alone the entire Internet. MAC address communications are limited to a smaller network because they rely on ARP broadcasting to find their way around, and broadcasting can be scaled only so much before the amount of broadcast traffic brings down the entire network with sheer broadcast noise. For this reason, the most common smallest subnet is 8 bits, or precisely a single octet, although it can be smaller or slightly larger.

Subnets have a beginning and an ending, and the beginning number is always even and the ending number is always odd. The beginning number is the “Network ID” and the ending number is the “Broadcast ID.” You’re not allowed to use these numbers because they both have special meaning with special purposes. The Network ID is the official designation for a particular subnet, and the ending number is the broadcast address that every device on a subnet listens to. Anytime you want to refer to a subnet, you point to its Network ID and its subnet mask, which defines its size. Anytime you want to send data to everyone on the subnet (such as a multicast), you send it to the Broadcast ID. Later in this article, I’ll show you an easy mathematical and graphical way to determine the Network and Broadcast IDs.

The graphical subnet ruler


Over the years, as I watched people struggle with the subject of IP subnetting, I wanted a better way to teach the subject. I soon realized that many students in IT lacked the necessary background in mathematics and had a hard time with the concept of binary numbers. To help close this gap, I came up with the graphical method of illustrating subnets shown in Figure A. In this example, we’re looking at a range of IP addresses from up to Note that the ending IP of itself is actually the beginning of the next subnet. This network range ends at the number right before it, which is


Figure A


Note that for every bit increase, the size of the subnet doubles in length, along with the number of hosts. The smallest tick mark represents 8 bits, which contains a subnet with 256 hosts–but since you can’t use the first and last IP addresses, there are actually only 254 usable hosts on the network. The easiest way to compute how many usable hosts are in a subnet is to raise 2 to the power of the bit size minus 2. Go up to 9 bits ,and we’re up to 510 usable hosts, because 2 to the 9th is 512, and we don’t count the beginning and ending. Keep on going all the way up to 13 bits, and we’re up to 8,190 usable hosts for the entire ruler shown above.

Learning to properly chop subnets


Subnets can be subdivided into smaller subnets and even smaller ones still. The most important thing to know about chopping up a network is that you can’t arbitrarily pick the beginning and ending. The chopping must be along clean binary divisions. The best way to learn this is to look at my subnet ruler and see what’s a valid subnet. In Figure B, green subnets are valid and red subnets are not.


Figure B


The ruler was constructed like any other ruler, where we mark it down the middle and bisect it. Then, we bisect the remaining sections and with shrinking markers every time we start a new round of bisecting. In the sample above, there were five rounds of bisections. If you look carefully at the edge of any valid (green) subnet blocks, you’ll notice that none of the markers contained within the subnet is higher than the edge’s markers. There is a mathematical reason for this, which we’ll illustrate later, but seeing it graphically will make the math easier to understand.

The role of the subnet mask


The subnet mask plays a crucial role in defining the size of a subnet. Take a look at Figure C. Notice the pattern and pay special attention to the numbers in red. Whenever you’re dealing with subnets, it will come in handy to remember eight special numbers that reoccur when dealing with subnet masks. They are 255254252248240224192, and 128. You’ll see these numbers over and over again in IP networking, and memorizing them will make your life much easier.


Figure C


I’ve included three class sizes. You’ll see the first two classes, with host bit length from 0 to 16, most often. It’s common for DSL and T1 IP blocks to be in the 0- to 8-bit range. Private networks typically work in the 8- to 24-bit range.

Note how the binary mask has all those zeros growing from right to left. The subnet mask in binary form always has all ones to the left and all zeros to the right. The number of zeros is identical to the subnet length. I showed only the portion of the binary subnet in the octet that’s interesting, since all octets to the right consist of zeros and all octets to the left consist of ones. So if we look at the subnet mask where the subnet length is 11 bits long, the full binary subnet mask is 11111111.11111111.11111000.00000000. As you can see under mask octet, the subnet mask transitions from 1 to 0 in the third octet. The particular binary subnet mask translates directly to base-256 form as

The “mask” in subnet mask


The subnet mask not only determines the size of a subnet, but it can also help you pinpoint where the end points on the subnet are if you’re given any IP address within that subnet. The reason it’s called a subnet “mask” is that it literally masks out the host bits and leaves only the Network ID that begins the subnet. Once you know the beginning of the subnet and how big it is, you can determine the end of the subnet, which is the Broadcast ID.

To calculate the Network ID, you simply take any IP address within that subnet and run the AND operator on the subnet mask. Let’s take an IP address of and a subnet mask of Note that this can be and often is written in shorthand as the subnet mask length is 21. Figure D and Figure E show the Decimal and Binary versions of the AND operation.


Figure D

Decimal math


Figure E

Binary math


The binary version shows how the 0s act as a mask on the IP address on top. Inside the masking box, the 0s convert all numbers on top into zeros, no matter what the number is. When you take the resultant binary Network ID and convert it to decimal, you get as the Network ID.

One thing that’s always bothered me about the way subnetting is taught is that students are not shown a simple trick to bypass the need for binary conversions when doing AND operations. I even see IT people in the field using this slow and cumbersome technique to convert everything to binary, run the AND operation, and then convert back to decimal using the Windows Calculator. But there’s a really simple shortcut using the Windows Calculator, since the AND operator works directly on decimal numbers. Simply punch in 237, hit the AND operator, and then 248 and [Enter] to instantly get 232, as shown in Figure F. I’ll never understand why this isn’t explained to students, because it makes mask calculations a lot easier.


Figure F


Since there are 11 zeros in the subnet mask, the subnet is 11 bits long. This means there are 2^11, or 2,048, maximum hosts in the subnet and the last IP in this subnet is You could compute this quickly by seeing there are three zeros in the third octet, which means the third octet of the IP address can have a variance of 2^3, or 8. So the next subnet starts at 10.20.232+8.0, which is If we decrease that by 1, we have, which is where this subnet ends. To help you visualize this, Figure G shows it on my subnet ruler.


Figure G


IP classes made simple


For an arbitrary classification of IP subnets, the creators of the Internet chose to break the Internet into multiple classes. Note that these aren’t important as far as your subnet calculations are concerned; this is just how the Internet is “laid out.” The Internet is laid out as Class A, B, C, D, and E. Class A uses up the first half of the entire Internet, Class B uses half of the remaining half, Class C uses the remaining half again, Class D (Multicasting) uses up the remaining half again, and whatever is left over is reserved for Class E. I’ve had students tell me that they struggled with the memorization of IP classes for weeks until they saw this simple table shown in Figure H. This is because you don’t actually need to memorize anything, you just learn the technique for constructing the ruler using half of what’s available.


Figure H


Remember that all subnets start with EVEN numbers and all subnet endings are ODD. Note that ( to isn’t used and ( to is reserved for loopback addresses.

All Class A addresses have their first octet between 1 to 126 because 0 and 127 are reserved. Class A subnets are all 24 bits long, which means the subnet mask is only 8 bits long. For example, we have the entire subnet owned by GE, since GE was lucky enough to get in early to be assigned 16.8 million addresses. The U.S. Army owns Level 3 Communications owns IBM owns AT&T owns Xerox owns HP owns and Apple owns

All Class B addresses have their first octet between 128 and 191. Class B subnets are all 16 bits long, which means the subnet masks are 16 bits long. For example, BBN Communications owns, which is to Carnegie Mellon University owns

All Class C addresses have their first octet between 192 and 223. Class C subnets are all 8 bits long, so the subnet mask is only 24 bits long. Note that ARIN (the organization that assigns Internet addresses) will sell blocks of four Class C addresses only to individual companies and you have to really justify why you need 1,024 Public IP addresses. If you need to run BGP so you can use multiple ISPs for redundancy, you have to have your own block of IP addresses. Also note that this isn’t the old days, where blocks of 16.8 million Class A addresses were handed out for basically nothing. You have to pay an annual fee for your block of 1,024 addresses with a subnet mask of /22, or

The concept of subnet classes can cause harm in actual practice. I’ve actually seen people forget to turn classes off in their old Cisco router and watch large subnet routes get hijacked on a large WAN configured for dynamic routing whenever some routes were added. This is because a Cisco router will assume the subnet mask is the full /8 or /16 or /24 even if you define something in between. All newer Cisco IOS software versions turn off the concept of subnet classes and uses classless routing by default. This is done with the default command “IP Classless.”

Public versus private IP addresses


Besides the reserved IP addresses ( and mentioned above, there are other addresses not used on the public Internet. These private subnets consist of private IP addresses and are usually behind a firewall or router that performs NAT (network address translation). NAT is needed because private IP addresses are nonroutable on the public Internet, so they must be translated into public IP addresses before they touch the Internet. Private IPs are never routed because no one really owns them. And since anyone can use them, there’s no right place to point a private IP address to on the public Internet. Private IP addresses are used in most LAN and WAN environments, unless you’re lucky enough to own a Class A or at least a Class B block of addresses, in which case you might have enough IPs to assign internal and external IP addresses.

The following blocks of IP addresses are allocated for private networks:

  •  ( to
  •  ( to
  •  ( to
  •  ( to*

*Note that is a block of private IP addresses used for random self IP assignment where DHCP servers are not available. is normally used for larger networks, since there are approximately 16.8 million IP addresses available within that block. They chop it up into lots of smaller groups of subnets for each geographic location, which are then subdivided into even smaller subnets. Smaller companies typically use the range, chopped up into smaller subnets, although there’s no reason they can’t use if they want to. Home networks typically use a /24 subnet within the subnet.

The use of private IP addresses and NAT has prolonged the life of IPv4 for the foreseeable future because it effectively allows a single public IP address to represent thousands of private IP addresses. At the current rate that IPv4 addresses are handed out, we have enough IPv4 addresses for approximately 17 years. ARIN is much more stingy now about handing them out, and small blocks of IP addresses are relatively expensive compared to the old days, when companies like Apple were simply handed a block of 16.8 million addresses. The next version of IP addresses, called IPv6, is 128 bits long–and there are more than 79 thousand trillion trillion times more IP addresses than IPv4. Even if you assigned 4.3 billion people on the planet with 4.3 billion IP addresses each, you would still have more than 18 million trillion IPv6 addresses left!

Source –

How To Flash a Sprint LG Optimus S to Cricket ROM

(1) Install the drivers for your device.
(2) Connect to CDMA workshop and read SPC (LG method), then write to 000000.
(3) Write the PRL of your choice.
(4) Write your MDN and MIN

If everything was done properly you will now have Talk and Text, these settings should stick
without any problem. But if something weird happens just do it again.

For the PRL I suggest trying chrisngrod’s new Cricket/Sprint Hybrid PRL, since reportedly you
may be able to use talk and text in areas where flashed phones normally do not pick up. This
PRL must be written with QPST, as of yet it doesn’t work with CDMA workshop.
2. Obtaining Root and Flashing Custom Recovery
If you know what are you doing, or don’t want to bother with custom ROM’s you can skip this part.
If you decide not to use the Cricket ROM by Error420 you will need to install the Indulge’s MMS.apk,
push telephony.db, and possibly adjust the APNs.

(1) Use wifi to connect to market and download your favourite file explorer
(2) [Only registered and activated users can see links. ]
(3) Install and run gingerbreak, You should now have rooot.

Now we can flash a custom recovery in order to install the [Only registered and activated users can see links. ]

I[Only registered and activated users can see links. ]
You will need to use flash_image in order to flash the custom recovery image, instructions and download are here
Flash image – CyanogenMod Wiki

3. Installing LG Optimus S Cricket Rom
(1) Download the ROM from here Optimus S Cricket Rom
(2) Copy it to your SD Card
(3) Boot into recovery
(4) Wipe data and dalvik cache
(5) Flash rom from SD Card

(1)Connect to QPST v2.7 build 323. Ignore the fact that it will say “The phone has stopped responding to read/write commands.”
(2) input
* Change Active User – 0
* Change Registration Retries – 1
* Mobile IP Behaviour – Mob + Simp f/back
* Initial Registration Retry Interval – 1750ms

* User > [Only registered and activated users can see links. ]
* HA and AAA shared secret > Text String > cricket
* MN-HA-SPI > 12c
* MN-AAA SPI > 2
* DMU Public and DMU Mobile > 0
* Rev Tunnel Preferred > Leave Checked
* Home Address >
* Primary HA >
* Secondary HA >
* Do the same for both profiles, just in case, but uncheck profile enabled on the 2nd

> Um
* Input [Only registered and activated users can see links. ] in Tethered NAI and User ID
* Password > cricket
* Input [Only registered and activated users can see links. ] in User ID
* Password > cricket

(3) Write to phone and wait for reboot. You should now have 3G if your phone is
already on a $55 Android Plan. If you don’t you may have missed something.

NOTE: If you go back into QPST it will revert some settings back to Sprint.

5. MMS
If your settings are correct MMS Should work when you flash the Cricket ROM
6. Optional Steps to Improve Your Experience

The following is totally optional but will improve your experience on this phone
if you decide not to mess around too much with custom roms.

(1) Install ROOT UNINSTALLER from market, and use it to remove bloatware.
(2) Download GO Launcher EX to get rid of the annoying Sprint ID icon, and have more control.

To many to list, but some are, Ryan mogul, whitey10tc, rich hathaway.


I take no credit for the information provided, I simply compiled modified an easy-to-follow set of instructions.
It should get you going on the cricket Android plan.

Flash Cell to Cricket Instructions

Rom Install Instructions::
“Very Important Make A Nandroid ALWAYS”
– Make sure your using latest SmelkusMod Recovery Recomended
– Put ROM & Gapps on SD Card
– Reboot into Recovery
– Wipe Factory Data Reset
– Wipe Superwipe
– Wipe Format All
– Wipe Caches
– Install ROM
– Install Gapps
– Reboot

Cricket Mms Instructions::
– Turn On Bluetooth
– Open App Voice Dialer
– Say “Open Apn’s”
– Click Cricket Apn
– Click Username
– Enter Cell# Were Is Says MDN “”
– Click Menu Button and Save
– Click the bubble on right side of Cricket To Enable APN FOR Mms
– Disable Bluetooth
– Restart Phone and Send & Receive Mms

Installing A2SD:
– Open Terminal Emulator (app in the app drawer)
– Type “su” without the quotes
– Allow Terminal Emulator super user access
– Type “a2sd install” without the quotes
– Type ‘y’ for cache without the quotes
– Type ‘n’ for data without the quotes
– Type ‘y’ for reboot without the quotes

Rom: Mazwoz-Supersonic-JB-B4 (Cricket Version)
MD5 – 491847e51c066f2edb2152751136bf7c
MD5 – c4a07a24e11448824b84e314600cd357

Added Replacement Cricket (4.2) MMS.apk
Modified eri.xml To Have Cricket Carrier label
Modified apns-conf.xml W/ Cricket’s Apn

Special Thanks:
Evervolv (Prelude Drew) for the Initial Work
Mazwoz (Rom) XDA Page


Two venomous vipers vanish from Swedish zoo

Two venomous vipers vanish from Swedish zoo

Staff at the Djurparken Zoo in Helsingborg think that two missing snakes have been stolen by a snake expert intending to sell the rare species.

“They came here some time between Monday night and Tuesday morning. They took one yellow snake, and one that was striped green,” Mats Hafström, the owner of the zoo, told The Local.

IN PICTURES: Take a closer look at the snakes

The thieves broke down the door and through the terrarium, and even into the private offices of the zoo, in what Hafström believes was an attempt to find more snakes to pinch.

“We had 15 that were born here in July, and we only left two out on show. They must have been looking for the other 13,” he said. “It’s extremely rare that pit vipers are born in captivity.”

Hafström hopes the media attention will mean the thieves have trouble selling the pair of pit vipers. He added that the public has no need for concern, even though the snakes are highly venomous.

“There’s no way they’ll let the snakes loose, they’re too valuable. And even if they did, the snakes wouldn’t survive the cold here. No one has anything to worry about.”

The police have launched an investigation.

The pit viper, also known as the Trimeresurus, is nicknamed the 100 pace snake as those bitten by it are said to only manage 100 steps before dropping dead. It is mostly found in the wild in southern Asia, and eats rodents and birds.


Experience The Number 28