Quantcast
Channel: slashmaster's blog
Browsing latest articles
Browse All 30 View Live
↧

VLAN configuration in linux nic interface

Configuring multiple vlan's in a switch is a norm these days. If you are using windows machine as a server, most of the time's nic card manufacturers provide, a graphical utility to configure vlan...

View Article


difference between iterative and recursive dns query

DNS is the most critical infrastructure, that's publicly available for use to everybody out there. You can infact say that, its a single point of failure, that can take down the world wide web.I have...

View Article


What is TCP ping and how is it used

There can be instances where a remote host, has blocked ICMP traffic towards it. Due to which you cant ping the host, to check its presence. In this kind of a situation, what you can do to check the...

View Article

Image may be NSFW.
Clik here to view.

Understanding the working of Secure Socket Layer(SSL)

Due to the increase in widespread use of internet website's for online bank transactions, and exchange of sensitive information, over the wire, several efforts were made to secure the communication.The...

View Article

Image may be NSFW.
Clik here to view.

Linux Touch command in detail

Hiiee... everyone!!Today i am going to explain in detail about the most used command in unix/linux history "touch command"New guys to linux want to know about the touch command in linuxread more

View Article


Record Protocol in SSL and TLS

SSL ProtocolsSSL protocol, which was initially developed by Netscape, is the base for secure communication in the internet today. SSL Being a big topic to cover in a single article/blog post, we have...

View Article

Image may be NSFW.
Clik here to view.

Understanding SSL Handshake Protocol

SSL Handshake Protocol Due to the elaborate explanation required to comprehend SSL protocol, we have divided this SSL tutorial, into multiple parts.Read:Record Protocol in SSLRead:Working of Secure...

View Article

Image may be NSFW.
Clik here to view.

ChangeCipherSpec Protocol in SSL

SSL is a secure protocol, that's heavily used for encrypted data communication to prevent eavesdropping.Before going ahead with understanding ChangeCipherSpec Protocol layer in SSL, we recommend you to...

View Article


Image may be NSFW.
Clik here to view.

Alert Message Protocol in SSL

Unitill now we have seen that, in an SSL handshake the server or the client, does have a mechanism to secure the communication, as well us check the integrity of the message with the help of record...

View Article


Image may be NSFW.
Clik here to view.

ifconfig utility for linux users

Ifconfig stands for "Interface Configuration" .It is a utility for Linux machines  to configure,assign,add,delete,control and query network interface in Unix/Linux machine.Common Linux users uses...

View Article

Image may be NSFW.
Clik here to view.

What is MAC(Message Authentication Codes)

whenever security in communication is discussed, three things that come to mind is authentication,integrity, and data encryption. Although encryption and authentication are the major topics that needs...

View Article

Image may be NSFW.
Clik here to view.

Linux grub(Grand Unified Bootloader) tutorial

It will be impossible to boot/start a Linux, or any other operating system, without the help of a boot loader. Boot loader plays a major role in bring up the system into running state. Infact the boot...

View Article

Image may be NSFW.
Clik here to view.

Routing Information Protocol Guide

slashroot have already explained about the Now today we are going to explain you about the   Routing Information protocol(RIP) on CISCO Devices.RIP is oldest routing protocol which is still in...

View Article


Image may be NSFW.
Clik here to view.

routing information protocol configuration

This notes is all about how to configure RIP Version 1 and Version 2  on cisco routers.This tutorial on RIP will make CCNA studentrs works more easier.Here we see how to configure rip version 1 and rip...

View Article

Image may be NSFW.
Clik here to view.

Linux System IO monitoring

"Every thing is a file", is a very famous Linux philosophy. There is a reason for this philosophy to get famous. The main reason behind this is the fact that, Linux operating system in itself works on...

View Article


Image may be NSFW.
Clik here to view.

EIGRP (Enhanced Interior Gateway Routing Protocol)

                                                 INTRODUCTION TO EIGRPEIGRP is a Cisco proprietary routing protocol. and since  it is proprietary, one can use it only in a Cisco network.Technology used...

View Article

Image may be NSFW.
Clik here to view.

Open Shortest Path First (OSPF) notes

We have already discuss a lot about static routing and Dynamic routing like RIP,EIGRP.In previous posts we have learn a lot about RIP,EIGRP in details.Since OSPF is  considerably more complicated to...

View Article


Image may be NSFW.
Clik here to view.

IPERF: How to test network Speed,Performance,Bandwidth

Testing network performance in terms of speed and bandwidth is a norm in both production and non-production environment.A detailed report of speed and bandwidth analysis is very much necessary for the...

View Article

Image may be NSFW.
Clik here to view.

YUM repository and package management: Complete Tutorial

Every operating system must have some or the other way to install a program. What's important is the fact that the user must not be given the responsibility of managing the overhead involved in the...

View Article

Image may be NSFW.
Clik here to view.

du command in linux

 du command line utility  mostly used to display or find information related to hard disk and disk usage.du utility Explanation:-1.du command is used to see the disk usage.  At present i am inside the...

View Article

Image may be NSFW.
Clik here to view.

Facebook chat codes

Facebook chat is now a daily life routine.People used to chat online with their freinds for hours on facebook, even working employee used to chat in their free time and even some people are found...

View Article


Image may be NSFW.
Clik here to view.

df command in linux

df(Disk Filesystem) Provides Disk space usage of our File System.df is a command line utility mostly used for checking disk space utilization in Linux. Now Let us see what happen when we type df on...

View Article


Image may be NSFW.
Clik here to view.

soft links and hard links in linux

This tutorial is all about how to create  and manage Soft links and Hard links to files in your linux system.Names for files are stored on disk in directories.Only the names of Files are stored in...

View Article

Image may be NSFW.
Clik here to view.

HTTP(Hypertext Transfer Protocol) Request and Response

In this article we will be discussing the foundational protocol of the internet. During 1990 Tim Berners-Lee, was the first one to propose a project called world wide web. The original purpose was to...

View Article

Image may be NSFW.
Clik here to view.

SLOWLORIS: HTTP DOS(Denial Of Service)attack and prevention

A DDOS(Distributed Denial of Service) attack is one of the major problem, that organizations are dealing with today. Such a kind of attack is very difficult to mitigate, especially for small...

View Article


Image may be NSFW.
Clik here to view.

Linux kernel rp_filter settings (Reverse path filtering )

The main functionality of a router is to route packets from one place to another. Linux machine can be used as router on your network that will route substantial amount of traffic without any issues,...

View Article

Image may be NSFW.
Clik here to view.

Microsoft SQLIO: Disk performance test and benchmark tool

Database is a critical and on demand resource in any IT infrastructure. Database administrators and developers deploy mission critical databases for different applications. However the underlying disk...

View Article

Image may be NSFW.
Clik here to view.

Linux access control using TCP WRAPPERS

Maintaining a good access control list is a nice practice, that must be adopted by any Linux system administrator.This can be achieved with the help of multiple tools. An additional layer of security...

View Article

Image may be NSFW.
Clik here to view.

Linux iptraf and iftop: Monitor,Analyse Network Traffic and Bandwidth

Analyzing and monitoring network traffic of an entire network infrastructure can be done by plotting graphs based on any RRD tool. However monitoring traffic (both outgoing and incoming) on a Linux...

View Article



Image may be NSFW.
Clik here to view.

RAID Levels: RAID 0,RAID1,RAID 10,RAID 5,RAID 6(Complete Tutorial)

Hard Disk drives are one of the most complex devices that are attached to a computer system(or a server machine). The complexity of a hard disk is due to the fact that it is a mechanical device, used...

View Article
Browsing latest articles
Browse All 30 View Live