VLAN configuration in linux nic interface
Configuring multiple vlan's in a switch is a norm these days. If you are using windows machine as a server, most of the time's nic card manufacturers provide, a graphical utility to configure vlan...
View Articledifference between iterative and recursive dns query
DNS is the most critical infrastructure, that's publicly available for use to everybody out there. You can infact say that, its a single point of failure, that can take down the world wide web.I have...
View ArticleWhat is TCP ping and how is it used
There can be instances where a remote host, has blocked ICMP traffic towards it. Due to which you cant ping the host, to check its presence. In this kind of a situation, what you can do to check the...
View ArticleUnderstanding the working of Secure Socket Layer(SSL)
Due to the increase in widespread use of internet website's for online bank transactions, and exchange of sensitive information, over the wire, several efforts were made to secure the communication.The...
View ArticleLinux Touch command in detail
Hiiee... everyone!!Today i am going to explain in detail about the most used command in unix/linux history "touch command"New guys to linux want to know about the touch command in linuxread more
View ArticleRecord Protocol in SSL and TLS
SSL ProtocolsSSL protocol, which was initially developed by Netscape, is the base for secure communication in the internet today. SSL Being a big topic to cover in a single article/blog post, we have...
View ArticleUnderstanding SSL Handshake Protocol
SSL Handshake Protocol Due to the elaborate explanation required to comprehend SSL protocol, we have divided this SSL tutorial, into multiple parts.Read:Record Protocol in SSLRead:Working of Secure...
View ArticleChangeCipherSpec Protocol in SSL
SSL is a secure protocol, that's heavily used for encrypted data communication to prevent eavesdropping.Before going ahead with understanding ChangeCipherSpec Protocol layer in SSL, we recommend you to...
View ArticleAlert Message Protocol in SSL
Unitill now we have seen that, in an SSL handshake the server or the client, does have a mechanism to secure the communication, as well us check the integrity of the message with the help of record...
View Articleifconfig utility for linux users
Ifconfig stands for "Interface Configuration" .It is a utility for Linux machines to configure,assign,add,delete,control and query network interface in Unix/Linux machine.Common Linux users uses...
View ArticleWhat is MAC(Message Authentication Codes)
whenever security in communication is discussed, three things that come to mind is authentication,integrity, and data encryption. Although encryption and authentication are the major topics that needs...
View ArticleLinux grub(Grand Unified Bootloader) tutorial
It will be impossible to boot/start a Linux, or any other operating system, without the help of a boot loader. Boot loader plays a major role in bring up the system into running state. Infact the boot...
View ArticleRouting Information Protocol Guide
slashroot have already explained about the Now today we are going to explain you about the  Routing Information protocol(RIP) on CISCO Devices.RIP is oldest routing protocol which is still in...
View Articlerouting information protocol configuration
This notes is all about how to configure RIP Version 1 and Version 2Â on cisco routers.This tutorial on RIP will make CCNA studentrs works more easier.Here we see how to configure rip version 1 and rip...
View ArticleLinux System IO monitoring
"Every thing is a file", is a very famous Linux philosophy. There is a reason for this philosophy to get famous. The main reason behind this is the fact that, Linux operating system in itself works on...
View ArticleEIGRP (Enhanced Interior Gateway Routing Protocol)
                                                INTRODUCTION TO EIGRPEIGRP is a Cisco proprietary routing protocol. and since it is proprietary, one can use it only in a Cisco network.Technology used...
View ArticleOpen Shortest Path First (OSPF) notes
We have already discuss a lot about static routing and Dynamic routing like RIP,EIGRP.In previous posts we have learn a lot about RIP,EIGRP in details.Since OSPF is considerably more complicated to...
View ArticleIPERF: How to test network Speed,Performance,Bandwidth
Testing network performance in terms of speed and bandwidth is a norm in both production and non-production environment.A detailed report of speed and bandwidth analysis is very much necessary for the...
View ArticleYUM repository and package management: Complete Tutorial
Every operating system must have some or the other way to install a program. What's important is the fact that the user must not be given the responsibility of managing the overhead involved in the...
View Articledu command in linux
 du command line utility mostly used to display or find information related to hard disk and disk usage.du utility Explanation:-1.du command is used to see the disk usage.  At present i am inside the...
View ArticleFacebook chat codes
Facebook chat is now a daily life routine.People used to chat online with their freinds for hours on facebook, even working employee used to chat in their free time and even some people are found...
View Articledf command in linux
df(Disk Filesystem) Provides Disk space usage of our File System.df is a command line utility mostly used for checking disk space utilization in Linux. Now Let us see what happen when we type df on...
View Articlesoft links and hard links in linux
This tutorial is all about how to create and manage Soft links and Hard links to files in your linux system.Names for files are stored on disk in directories.Only the names of Files are stored in...
View ArticleHTTP(Hypertext Transfer Protocol) Request and Response
In this article we will be discussing the foundational protocol of the internet. During 1990 Tim Berners-Lee, was the first one to propose a project called world wide web. The original purpose was to...
View ArticleSLOWLORIS: HTTP DOS(Denial Of Service)attack and prevention
A DDOS(Distributed Denial of Service) attack is one of the major problem, that organizations are dealing with today. Such a kind of attack is very difficult to mitigate, especially for small...
View ArticleLinux kernel rp_filter settings (Reverse path filtering )
The main functionality of a router is to route packets from one place to another. Linux machine can be used as router on your network that will route substantial amount of traffic without any issues,...
View ArticleMicrosoft SQLIO: Disk performance test and benchmark tool
Database is a critical and on demand resource in any IT infrastructure. Database administrators and developers deploy mission critical databases for different applications. However the underlying disk...
View ArticleLinux access control using TCP WRAPPERS
Maintaining a good access control list is a nice practice, that must be adopted by any Linux system administrator.This can be achieved with the help of multiple tools. An additional layer of security...
View ArticleLinux iptraf and iftop: Monitor,Analyse Network Traffic and Bandwidth
Analyzing and monitoring network traffic of an entire network infrastructure can be done by plotting graphs based on any RRD tool. However monitoring traffic (both outgoing and incoming) on a Linux...
View ArticleRAID Levels: RAID 0,RAID1,RAID 10,RAID 5,RAID 6(Complete Tutorial)
Hard Disk drives are one of the most complex devices that are attached to a computer system(or a server machine). The complexity of a hard disk is due to the fact that it is a mechanical device, used...
View Article