DIFFERENCE BETWEEN TCP AND UDP
TCP vs UDPThe flow of traffic across the Internet is on the basis of protocols which are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).While TCP is more popular across the...
View ArticleCONFIGURE DNS SERVER ON CISCO ROUTER
How To Configure DNS Server On A Cisco Router?The DNS protocol is used to resolve FQDN (Fully Qualified Domain Names) to IP addresses around the world. This allows us to successfully find and connect...
View ArticleSNORT AND OSSEC COMPARISON
COMPARISON OF SNORT AND OSSECSNORT: Snort is an open source network intrusion prevention and detection system, IDS and IPS. This tool developed by Sourcefire team, combining the benefits of signature,...
View ArticleENCRYPT THE DATA YOU STORE
ENCRYPT THE DATA YOU STOREThis protects your data from being read by people with access to your computer.Encrypt your hard drive so that if you lose your computer or you get hacked, your information...
View ArticleDIFFERENCE BETWEEN IDS AND IPS
What is an IDS?IDS (Intrusion Detection System) are systems that detect activities that are inappropriate, incorrect or anomalous in a network and report them. Furthermore, IDS can be used to detect...
View ArticleCOMMAND TO LIST ALL SHARED FOLDERS ON WINDOWS SERVER
How to List down shared folders on a windows server?Below are the powershell commands to list the shared folders and access rights of shared folders.open powershell with Administrator privileges and...
View ArticleVLAN DIFFERENCE BETWEEN JUNIPER AND CISCO
VLAN Difference between Juniper and Cisco SwitchesA VLAN (Virtual Local Area Network) is a logical LAN segment which have unique broadcast domain. Basically, VLAN divides one physical switch to...
View ArticleHOW TO CONFIGURE SSH ON A CISCO SWITCH
How to Configure SSH on a Cisco Switch?Telnet is a widely used protocol for accessing and administering Cisco devices. But this protocol is not exactly secure and transmits data over a network in plain...
View ArticleLAYER 3 SWITCH AND A ROUTER
Is Layer-3 Switch More than a Router?You might think that layer-3 switches perform bridging and routing, while routers do only routing. That hasn’t been the case at least since Cisco introduced...
View ArticleNETWORK MANAGEMENT TOOLS 2014
Top Network Management Tools in 20141- Solarwinds Network Performance Manager 10.5Solarwinds is a heavyweight in the network-monitoring world, and for good reason. For years, Solarwinds NPM has...
View ArticleHOW STP WORKS
How Spanning Tree Protocol Works?When a switch first power up it assumes that it is the Root Bridge itself and switch begins by sending out BPDUs with a Root Bridge ID and Sender ID equal to its own...
View ArticleHOW ETHERCHANNEL WORKS?
The Inner Workings of EtherChannelEtherChannel is a very important technology for modern networks. As bandwidth demands continue to increase with more and more traffic forms converging onto the single...
View ArticleMBSA AUTHORIZED REMOTE SCAN
How to run Microsoft Baseline Security Analyzer remotely with a user credentials?1. Run command prompt as an administrator.2. Switch the path to the MBSA parth.cd c:\Program Files\Microsoft Baseline...
View ArticleCISCO ROUTER BUFFERS TUNING
How to Tuning Cisco Router Buffers?The router maintains two different sets of buffers: public buffers and interface buffers. The router uses these as temporary storage while processing packet data. You...
View ArticleCONFIGURE SITE-TO-SITE IPSEC VPN
Cisco Router - Configure Site to Site IPSEC VPN1. Setup a policy for phase 1 of the tunnel (ISAKMP).R1(config)# crypto isakmp policy 1R1(config-isakmp)# encr aesR1(config-isakmp)# hash...
View ArticleNESSUS NOT WORKING WITH LOCALHOST IN WINDOWS
IF YOU ACCIDENTELY CHANGED THE LISTEN ADDRESS IN SETTINGS --> ADVANCED --> LISTEN_ADDRESS --> 0.0.0.0 TO ANY OTHER THEN IT WILL NOT SHOW WITH FOLLOWING URL...https://localhost:8834IF YOU WANT...
View ArticleIBM QRadar and McAfee Nitro SIEM FEATURES
IBM QRADAR AND MCAFEE NITRO ESM COMPARISONIBM QRadar SIEM FEATURESThe QRadar Integrated Security Solutions (QRadar) Platform is an integrated set of products for collecting, analyzing, and managing...
View ArticleDoS ATTACK TO WINDOWS & LINUX
A Live DOS on your Windows/Linux MachineWe are going to execute a script/command in the Windows machine/Linux terminal that will cripple the operating system and make it freeze.Following is a code to...
View ArticleWINDOWS COMMANDS TO EXTRACT HARDWARE INFO
How to extract the hardware information in Windows using commands.Following commands will list detailed information of RAMwmic MemoryChip get BankLabel, Capacity, MemoryType, TypeDetail, Speedwmic...
View Article