Quantcast
Channel: slashmaster's blog
Browsing all 30 articles
Browse latest View live

VLAN configuration in linux nic interface

Configuring multiple vlan's in a switch is a norm these days. If you are using windows machine as a server, most of the time's nic card manufacturers provide, a graphical utility to configure vlan...

View Article



difference between iterative and recursive dns query

DNS is the most critical infrastructure, that's publicly available for use to everybody out there. You can infact say that, its a single point of failure, that can take down the world wide web.I have...

View Article

What is TCP ping and how is it used

There can be instances where a remote host, has blocked ICMP traffic towards it. Due to which you cant ping the host, to check its presence. In this kind of a situation, what you can do to check the...

View Article

Image may be NSFW.
Clik here to view.

Understanding the working of Secure Socket Layer(SSL)

Due to the increase in widespread use of internet website's for online bank transactions, and exchange of sensitive information, over the wire, several efforts were made to secure the communication.The...

View Article

Image may be NSFW.
Clik here to view.

Linux Touch command in detail

Hiiee... everyone!!Today i am going to explain in detail about the most used command in unix/linux history "touch command"New guys to linux want to know about the touch command in linuxread more

View Article


Record Protocol in SSL and TLS

SSL ProtocolsSSL protocol, which was initially developed by Netscape, is the base for secure communication in the internet today. SSL Being a big topic to cover in a single article/blog post, we have...

View Article

Image may be NSFW.
Clik here to view.

Understanding SSL Handshake Protocol

SSL Handshake Protocol Due to the elaborate explanation required to comprehend SSL protocol, we have divided this SSL tutorial, into multiple parts.Read:Record Protocol in SSLRead:Working of Secure...

View Article

Image may be NSFW.
Clik here to view.

ChangeCipherSpec Protocol in SSL

SSL is a secure protocol, that's heavily used for encrypted data communication to prevent eavesdropping.Before going ahead with understanding ChangeCipherSpec Protocol layer in SSL, we recommend you to...

View Article


Image may be NSFW.
Clik here to view.

Alert Message Protocol in SSL

Unitill now we have seen that, in an SSL handshake the server or the client, does have a mechanism to secure the communication, as well us check the integrity of the message with the help of record...

View Article


Image may be NSFW.
Clik here to view.

ifconfig utility for linux users

Ifconfig stands for "Interface Configuration" .It is a utility for Linux machines  to configure,assign,add,delete,control and query network interface in Unix/Linux machine.Common Linux users uses...

View Article

Image may be NSFW.
Clik here to view.

What is MAC(Message Authentication Codes)

whenever security in communication is discussed, three things that come to mind is authentication,integrity, and data encryption. Although encryption and authentication are the major topics that needs...

View Article

Image may be NSFW.
Clik here to view.

Linux grub(Grand Unified Bootloader) tutorial

It will be impossible to boot/start a Linux, or any other operating system, without the help of a boot loader. Boot loader plays a major role in bring up the system into running state. Infact the boot...

View Article

Image may be NSFW.
Clik here to view.

Routing Information Protocol Guide

slashroot have already explained about the Now today we are going to explain you about the   Routing Information protocol(RIP) on CISCO Devices.RIP is oldest routing protocol which is still in...

View Article


Image may be NSFW.
Clik here to view.

routing information protocol configuration

This notes is all about how to configure RIP Version 1 and Version 2  on cisco routers.This tutorial on RIP will make CCNA studentrs works more easier.Here we see how to configure rip version 1 and rip...

View Article

Image may be NSFW.
Clik here to view.

Linux System IO monitoring

"Every thing is a file", is a very famous Linux philosophy. There is a reason for this philosophy to get famous. The main reason behind this is the fact that, Linux operating system in itself works on...

View Article


Image may be NSFW.
Clik here to view.

EIGRP (Enhanced Interior Gateway Routing Protocol)

                                                 INTRODUCTION TO EIGRPEIGRP is a Cisco proprietary routing protocol. and since  it is proprietary, one can use it only in a Cisco network.Technology used...

View Article

Image may be NSFW.
Clik here to view.

Open Shortest Path First (OSPF) notes

We have already discuss a lot about static routing and Dynamic routing like RIP,EIGRP.In previous posts we have learn a lot about RIP,EIGRP in details.Since OSPF is  considerably more complicated to...

View Article


Image may be NSFW.
Clik here to view.

IPERF: How to test network Speed,Performance,Bandwidth

Testing network performance in terms of speed and bandwidth is a norm in both production and non-production environment.A detailed report of speed and bandwidth analysis is very much necessary for the...

View Article

Image may be NSFW.
Clik here to view.

YUM repository and package management: Complete Tutorial

Every operating system must have some or the other way to install a program. What's important is the fact that the user must not be given the responsibility of managing the overhead involved in the...

View Article

Image may be NSFW.
Clik here to view.

du command in linux

 du command line utility  mostly used to display or find information related to hard disk and disk usage.du utility Explanation:-1.du command is used to see the disk usage.  At present i am inside the...

View Article
Browsing all 30 articles
Browse latest View live




Latest Images