Quantcast
Channel: Brain Book
Browsing all 195 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

DIFFERENCE BETWEEN IPV4 AND IPV6

Difference between IPV4 and IPV6

View Article


DIFFERENCE BETWEEN TCP AND UDP

TCP vs UDPThe flow of traffic across the Internet is on the basis of protocols which are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).While TCP is more popular across the...

View Article


Image may be NSFW.
Clik here to view.

CONFIGURE DNS SERVER ON CISCO ROUTER

How To Configure DNS Server On A Cisco Router?The DNS protocol is used to resolve FQDN (Fully Qualified Domain Names) to IP addresses around the world. This allows us to successfully find and connect...

View Article

SNORT AND OSSEC COMPARISON

COMPARISON OF SNORT AND OSSECSNORT: Snort is an open source network intrusion prevention and detection system, IDS and IPS. This tool developed by Sourcefire team, combining the benefits of signature,...

View Article

ENCRYPT THE DATA YOU STORE

ENCRYPT THE DATA YOU STOREThis protects your data from being read by people with access to your computer.Encrypt your hard drive so that if you lose your computer or you get hacked, your information...

View Article


Image may be NSFW.
Clik here to view.

DIFFERENCE BETWEEN IDS AND IPS

What is an IDS?IDS (Intrusion Detection System) are systems that detect activities that are inappropriate, incorrect or anomalous in a network and report them. Furthermore, IDS can be used to detect...

View Article

COMMAND TO LIST ALL SHARED FOLDERS ON WINDOWS SERVER

How to List down shared folders on a windows server?Below are the powershell commands to list the shared folders and access rights of shared folders.open powershell with Administrator privileges and...

View Article

Image may be NSFW.
Clik here to view.

VLAN DIFFERENCE BETWEEN JUNIPER AND CISCO

VLAN Difference between Juniper and Cisco SwitchesA VLAN (Virtual Local Area Network) is a logical LAN segment which have unique broadcast domain. Basically, VLAN divides one physical switch to...

View Article


HOW TO CONFIGURE SSH ON A CISCO SWITCH

How to Configure SSH on a Cisco Switch?Telnet is a widely used protocol for accessing and administering Cisco devices. But this protocol is not exactly secure and transmits data over a network in plain...

View Article


Image may be NSFW.
Clik here to view.

LAYER 3 SWITCH AND A ROUTER

Is Layer-3 Switch More than a Router?You might think that layer-3 switches perform bridging and routing, while routers do only routing. That hasn’t been the case at least since Cisco introduced...

View Article

NETWORK MANAGEMENT TOOLS 2014

Top Network Management Tools in 20141- Solarwinds Network Performance Manager 10.5Solarwinds is a heavyweight in the network-monitoring world, and for good reason. For years, Solarwinds NPM has...

View Article

Image may be NSFW.
Clik here to view.

HOW STP WORKS

How Spanning Tree Protocol Works?When a switch first power up it assumes that it is the Root Bridge itself and switch begins by sending out BPDUs with a Root Bridge ID and Sender ID equal to its own...

View Article

Image may be NSFW.
Clik here to view.

HOW ETHERCHANNEL WORKS?

The Inner Workings of EtherChannelEtherChannel is a very important technology for modern networks. As bandwidth demands continue to increase with more and more traffic forms converging onto the single...

View Article


Image may be NSFW.
Clik here to view.

MBSA AUTHORIZED REMOTE SCAN

How to run Microsoft Baseline Security Analyzer remotely with a user credentials?1. Run command prompt as an administrator.2. Switch the path to the MBSA parth.cd c:\Program Files\Microsoft Baseline...

View Article

Image may be NSFW.
Clik here to view.

CISCO ROUTER BUFFERS TUNING

How to Tuning Cisco Router Buffers?The router maintains two different sets of buffers: public buffers and interface buffers. The router uses these as temporary storage while processing packet data. You...

View Article


Image may be NSFW.
Clik here to view.

CONFIGURE SITE-TO-SITE IPSEC VPN

Cisco Router - Configure Site to Site IPSEC VPN1. Setup a policy for phase 1 of the tunnel (ISAKMP).R1(config)# crypto isakmp policy 1R1(config-isakmp)# encr aesR1(config-isakmp)# hash...

View Article

Image may be NSFW.
Clik here to view.

NESSUS NOT WORKING WITH LOCALHOST IN WINDOWS

IF YOU ACCIDENTELY CHANGED THE LISTEN ADDRESS IN SETTINGS --> ADVANCED --> LISTEN_ADDRESS --> 0.0.0.0 TO ANY OTHER THEN IT WILL NOT SHOW WITH FOLLOWING URL...https://localhost:8834IF YOU WANT...

View Article


IBM QRadar and McAfee Nitro SIEM FEATURES

IBM QRADAR AND MCAFEE NITRO ESM COMPARISONIBM QRadar SIEM FEATURESThe QRadar Integrated Security Solutions (QRadar) Platform is an integrated set of products for collecting, analyzing, and managing...

View Article

DoS ATTACK TO WINDOWS & LINUX

A Live DOS on your Windows/Linux MachineWe are going to execute a script/command in the Windows machine/Linux terminal that will cripple the operating system and make it freeze.Following is a code to...

View Article

WINDOWS COMMANDS TO EXTRACT HARDWARE INFO

How to extract the hardware information in Windows using commands.Following commands will list detailed information of RAMwmic MemoryChip get BankLabel, Capacity, MemoryType, TypeDetail, Speedwmic...

View Article
Browsing all 195 articles
Browse latest View live