VLAN configuration in linux nic interface
Configuring multiple vlan's in a switch is a norm these days. If you are using windows machine as a server, most of the time's nic card manufacturers provide, a graphical utility to configure vlan...
View Articledifference between iterative and recursive dns query
DNS is the most critical infrastructure, that's publicly available for use to everybody out there. You can infact say that, its a single point of failure, that can take down the world wide web.I have...
View ArticleWhat is TCP ping and how is it used
There can be instances where a remote host, has blocked ICMP traffic towards it. Due to which you cant ping the host, to check its presence. In this kind of a situation, what you can do to check the...
View ArticleUnderstanding the working of Secure Socket Layer(SSL)
Due to the increase in widespread use of internet website's for online bank transactions, and exchange of sensitive information, over the wire, several efforts were made to secure the communication.The...
View ArticleLinux Touch command in detail
Hiiee... everyone!!Today i am going to explain in detail about the most used command in unix/linux history "touch command"New guys to linux want to know about the touch command in linuxread more
View ArticleRecord Protocol in SSL and TLS
SSL ProtocolsSSL protocol, which was initially developed by Netscape, is the base for secure communication in the internet today. SSL Being a big topic to cover in a single article/blog post, we have...
View ArticleUnderstanding SSL Handshake Protocol
SSL Handshake Protocol Due to the elaborate explanation required to comprehend SSL protocol, we have divided this SSL tutorial, into multiple parts.Read:Record Protocol in SSLRead:Working of Secure...
View ArticleChangeCipherSpec Protocol in SSL
SSL is a secure protocol, that's heavily used for encrypted data communication to prevent eavesdropping.Before going ahead with understanding ChangeCipherSpec Protocol layer in SSL, we recommend you to...
View ArticleAlert Message Protocol in SSL
Unitill now we have seen that, in an SSL handshake the server or the client, does have a mechanism to secure the communication, as well us check the integrity of the message with the help of record...
View Articleifconfig utility for linux users
Ifconfig stands for "Interface Configuration" .It is a utility for Linux machines to configure,assign,add,delete,control and query network interface in Unix/Linux machine.Common Linux users uses...
View ArticleWhat is MAC(Message Authentication Codes)
whenever security in communication is discussed, three things that come to mind is authentication,integrity, and data encryption. Although encryption and authentication are the major topics that needs...
View ArticleLinux grub(Grand Unified Bootloader) tutorial
It will be impossible to boot/start a Linux, or any other operating system, without the help of a boot loader. Boot loader plays a major role in bring up the system into running state. Infact the boot...
View ArticleRouting Information Protocol Guide
slashroot have already explained about the Now today we are going to explain you about the Routing Information protocol(RIP) on CISCO Devices.RIP is oldest routing protocol which is still in...
View Articlerouting information protocol configuration
This notes is all about how to configure RIP Version 1 and Version 2 on cisco routers.This tutorial on RIP will make CCNA studentrs works more easier.Here we see how to configure rip version 1 and rip...
View ArticleLinux System IO monitoring
"Every thing is a file", is a very famous Linux philosophy. There is a reason for this philosophy to get famous. The main reason behind this is the fact that, Linux operating system in itself works on...
View ArticleEIGRP (Enhanced Interior Gateway Routing Protocol)
INTRODUCTION TO EIGRPEIGRP is a Cisco proprietary routing protocol. and since it is proprietary, one can use it only in a Cisco network.Technology used...
View ArticleOpen Shortest Path First (OSPF) notes
We have already discuss a lot about static routing and Dynamic routing like RIP,EIGRP.In previous posts we have learn a lot about RIP,EIGRP in details.Since OSPF is considerably more complicated to...
View ArticleIPERF: How to test network Speed,Performance,Bandwidth
Testing network performance in terms of speed and bandwidth is a norm in both production and non-production environment.A detailed report of speed and bandwidth analysis is very much necessary for the...
View ArticleYUM repository and package management: Complete Tutorial
Every operating system must have some or the other way to install a program. What's important is the fact that the user must not be given the responsibility of managing the overhead involved in the...
View Articledu command in linux
du command line utility mostly used to display or find information related to hard disk and disk usage.du utility Explanation:-1.du command is used to see the disk usage. At present i am inside the...
View Article