The network calculator allows, using the network address and subnet, to calculate the IP addresses of the nodes and subnets, the subnet mask, the wildcard bits of the subnet, the maximum number of hosts on the subnet.
Subnet count results provide an IP address, subnet mask, subnet ID, broadcast address, subnet address range.
Based on the data received from the browser and the operating system of the user's computer, the parameters of the user's information environment are determined.
- IP address
- type of browser
- operating system language
- connection type
- Ability to use java
- type of processor
- screen resolution
- color settings
- the current time and date on the user's computer
Based on the domain name of the server or IP address, the server's geographical location is determined. The geographic location data is used from the domain name registrar database.
Check the speed of access to the network node. The test uses the ICMP network protocol.
ICMP (nternet Control Message Protocol) is an error reporting protocol. Network devices, such as routers, use it to generate error messages and send them to the source IP address when network problems prevent the delivery of IP packets. ICMP creates and sends messages to the source IP address indicating that the gateway to the Internet can not be reached by the router, service, or host to deliver the packets. Any IP device on the network can send, receive, or process ICMP messages.
Antivirus file scan
The tool scans the file for viruses (the scanner's anti-virus database contains information about more than 15 million viruses, trojans and other malicious programs).
QR code generator
A cryptographic hash function, often referred to simply as a hash, is a mathematical algorithm that converts an arbitrary array of data into a string of fixed length consisting of letters and numbers. And under the condition of using the same type of hash, this length will remain unchanged, regardless of the amount of input data.
In this case, changing at least one character in the source data ensures that the resulting fixed string will also be different. You can say that hashing is "taking a fingerprint" off a large data set.
MD5 - 128-bit hash algorithm
SHA1 - 160-bit hash algorithm
SHA256 - 512-bit hash algorithm
SHA512 - 1024-bit hash algorithm
The tool generates a random sequence of characters.