Quantcast
Channel: Brain Book
Browsing latest articles
Browse All 195 View Live

NETWORK MANAGEMENT TOOLS 2014

Top Network Management Tools in 20141- Solarwinds Network Performance Manager 10.5Solarwinds is a heavyweight in the network-monitoring world, and for good reason. For years, Solarwinds NPM has...

View Article


Image may be NSFW.
Clik here to view.

HOW STP WORKS

How Spanning Tree Protocol Works?When a switch first power up it assumes that it is the Root Bridge itself and switch begins by sending out BPDUs with a Root Bridge ID and Sender ID equal to its own...

View Article


Image may be NSFW.
Clik here to view.

HOW ETHERCHANNEL WORKS?

The Inner Workings of EtherChannelEtherChannel is a very important technology for modern networks. As bandwidth demands continue to increase with more and more traffic forms converging onto the single...

View Article

Image may be NSFW.
Clik here to view.

MBSA AUTHORIZED REMOTE SCAN

How to run Microsoft Baseline Security Analyzer remotely with a user credentials?1. Run command prompt as an administrator.2. Switch the path to the MBSA parth.cd c:\Program Files\Microsoft Baseline...

View Article

Image may be NSFW.
Clik here to view.

CISCO ROUTER BUFFERS TUNING

How to Tuning Cisco Router Buffers?The router maintains two different sets of buffers: public buffers and interface buffers. The router uses these as temporary storage while processing packet data. You...

View Article


Image may be NSFW.
Clik here to view.

CONFIGURE SITE-TO-SITE IPSEC VPN

Cisco Router - Configure Site to Site IPSEC VPN1. Setup a policy for phase 1 of the tunnel (ISAKMP).R1(config)# crypto isakmp policy 1R1(config-isakmp)# encr aesR1(config-isakmp)# hash...

View Article

Image may be NSFW.
Clik here to view.

NESSUS NOT WORKING WITH LOCALHOST IN WINDOWS

IF YOU ACCIDENTELY CHANGED THE LISTEN ADDRESS IN SETTINGS --> ADVANCED --> LISTEN_ADDRESS --> 0.0.0.0 TO ANY OTHER THEN IT WILL NOT SHOW WITH FOLLOWING URL...https://localhost:8834IF YOU WANT...

View Article

IBM QRadar and McAfee Nitro SIEM FEATURES

IBM QRADAR AND MCAFEE NITRO ESM COMPARISONIBM QRadar SIEM FEATURESThe QRadar Integrated Security Solutions (QRadar) Platform is an integrated set of products for collecting, analyzing, and managing...

View Article


DoS ATTACK TO WINDOWS & LINUX

A Live DOS on your Windows/Linux MachineWe are going to execute a script/command in the Windows machine/Linux terminal that will cripple the operating system and make it freeze.Following is a code to...

View Article


WINDOWS COMMANDS TO EXTRACT HARDWARE INFO

How to extract the hardware information in Windows using commands.Following commands will list detailed information of RAMwmic MemoryChip get BankLabel, Capacity, MemoryType, TypeDetail, Speedwmic...

View Article

Image may be NSFW.
Clik here to view.

PENETRATION TESTING WITH METASPLOIT FRAMEWORK 4 IN KALI

I am performing it in Kali Linux, assuming that you have gone through the installation steps of Kali Linux.start the metasploit framework using following command in terminalmsfconsoleNote: It will take...

View Article

Windows can't stop your 'Generic volume' device because a program is still...

Windows can't stop your 'Generic volume' device because a program is still using it. Close any programs that might be using the device, and then try again laterSolution:1. Right click on my computer,...

View Article

Image may be NSFW.
Clik here to view.

DRUPAL INSTALLATION AND CONFIGURATION ON WAMP

DRUPAL 7.34 CONFIGURATION ON WAMPPre-requirements: Wamp must be installed with default settings1. Download drupal from following urlhttps://www.drupal.org/project/drupal2. Place the downloaded .zip...

View Article


Image may be NSFW.
Clik here to view.

COMPUTER NETWORKING BASICS

CCNA CHEAT SHEET

View Article

Image may be NSFW.
Clik here to view.

IBM QRADAR WINCOLLECT AGENT INSTALLATION AND CONFIGURATION

WinCollect Agent Installation, Configuration and TroubleshootingNOTE: Always install wincollect agent with Admin privilegesAlways stop service then startAlways stop service before uninstalling...

View Article


UNHIDE THE HIDDEN FILES AND FOLDERS IN WINDOWS

How to un-hide all the files and folders in windows?How to un-hide all the files and folders in windows with hide option locked?How to un-hide all the files and folders in windows hidden and locked by...

View Article

NMAP PORT SCANNING COMMANDS

NMAP PORT SCANNING COMMANDS1. To scan a udp port of a hostnmap -v -sU -Pn 10.10.x.xx2. To scan TCP ports ranging from 1 to 65535 of a hostnmap -v -Pn -p1-65535 10.10.x.xx

View Article


NETWORK SCANNING TOOLS

NETWORK SCANNING/TROUBLESHOOTING TOOLSAdvanced IP Scanner: Scanning System and Network ResourcesID Serve: Banner Grabbing to Determine a Remote Target SystemAmap: Fingerprint Open Ports for Running...

View Article

Image may be NSFW.
Clik here to view.

IBM QRADAR WINCOLLECT AGENT INSTALLATION AND CONFIGURATION

IBM QRADAR WINCOLLECT AGENT INSTALLATION AND CONFIGURATIONDownload wincollect agent and wincollect management console http://www-01.ibm.com/support/docview.wss?uid=swg27045054Managed Mode1. Only...

View Article

Image may be NSFW.
Clik here to view.

HOW TO CREATE IBM QRADAR SIEM RULE AND RULE GROUP

How to create siem rule group1. Goto to Offenses tab --> Rules in left pane --> Groups at top in right pane2. It will open following wizard. click New Group at top3. Add group name and...

View Article

Image may be NSFW.
Clik here to view.

XTREME DOWNLOAD MANAGER INSTALLATION IN UBUNTU

XTREME DOWNLOAD MANAGER INSTALLATION IN UBUNTUsudo add-apt-repository ppa:noobslab/apps        sudo apt-get update        sudo apt-get install xdmanHOW TO INSTALL XDM PLUGIN INTO MOZILLA FIREFOX1. Open...

View Article


WINCOLLECT ERROR THE EVENT LOG FILE IS CORRUPTED

WINCOLLECT ERRORTHE EVENT LOG FILE IS CORRUPTED<13>May 11 13:04:29 10.10.1.13 LEEF:1.0|IBM|WinCollect|7.2|4|src=10.10.XX.XX     dst=10.10.XX.XX        sev=5...

View Article


HOW TO GENERATE AND VERIFY MD5 HASH IN WINDOWS & LINUX

HOW TO CHECK THE INTEGRITY OF THE DOWNLOADED IMAGE IN WINDOWS & LINUXLINUX:GENERATE THE MD5 HASH BY USING FOLLOWING COMMANDMD5SUM FILE.ISO > HASH.MD5CHECK THE MD5 HASH WITH FOLLOWING COMMAND...

View Article

Cyber Security Management

1. Manage the IT assets·         Identify the assets in an environment and its life·         disable/restrict the vendor defaults·         define the patch cycle for firmware·         review the assets...

View Article

XUbuntu 16.04 Screen Brightness Controls

XUbuntu 16.04 Screen Brightness Controls Not WorkingOpen the grub file using following command in terminalsudo nano /etc/default/grubaddacpi_osi=Linux at the end of the following line as...

View Article

Browsing latest articles
Browse All 195 View Live