From our Blog
Showing posts with label All. Show all posts
Showing posts with label All. Show all posts
Saturday, 7 June 2014
Friday, 30 May 2014
What is DHCP ?
- Imagine that you're working as a System Admin for a large company with 500 desktop computers. you need to set to each desktop computer IP address, subnet mask, default gateway, DNS servers, and other network settings. How could you do that? If you'll try to perform this task manually you're probably going to waste a lot of time on sitting on each computer 5-10 minutes, beside time, you can for example accidentally enter wrong IP address to
What is DNS ?
WHAT IS DNS?
- Domain Name System (DNS)
- Domain Name System (DNS) is a system for naming computers and network services that maps those names to network addresses and organizes them into a hierarchy of domains.
- DNS naming is used on TCP/IP networks, such as the Internet and most corporate networks, to locate computers and services by using user-friendly names.
Thursday, 29 May 2014
What is OSI model ?
- Open Systems Interconnect Model.
- It is defined by ISO (International Organization for standardization).
- Idea behind to develop OSI model is to avoid propriety systems and allow interoperability between two between vendors.
- Useful tool for network troubleshooting.
- It is made up of seven layers.
Wednesday, 28 May 2014
Booting Process Of a Cisco Router
In this
article I am going to show you, how the booting process of Cisco router will
take place and which is very important to know for every technical persons
which are in networking field. So let’s start... Booting process of a cisco
router are as follows step by step.
Who are Hackers ?
Who are hackers? Hackers
are very intelligent individuals with their excellent computer skills, with programming
and having with the ability to create and explore into the computer’s software
and hardware. Some of the hackers have the hobby to collect the information
like how many computers are in the network and how they can compromise. Some of
the hackers do hacking with malicious intend behind their escapades, like
stealing credit card information, email passwords, social security numbers,
business
Subscribe to:
Posts
(
Atom
)