Complete Computer networking notes guides tutorials This tutorial explains how to configure PAT (Port Address Translation) also known NAT Overload in Cisco Router step by step with Packet Tracer examp.. To deal wi.. How to list currently logged in users When a user l.. Absolute path a.. RHCSA ( Red Hat Certified System Administrator ) an.. Each step is explained in detail with screenshot.
If you would like to read the other parts in this series please go to. Troubleshooting Windows 7 Wireless Networking Problems (Part 2) Troubleshooting Windows 7.
This tutorial explains RHE.. When we talk about OSI Layers mode..
Cisco Access Con.. Knowing these vulnerabilities wi.. SPF algorithm was invented in 1.
Edsger W. OSPF uses the concept of process ID, area number .. EIGRP uses the concept of AS and Wildcard mask which.. This formu.. It is a Cisco- proprietary routing protocol for TCP/IP. It is based on IGRP routing p.. RIP is the simplest and one of the oldest Dis.. IP route command is used to configure the static route. Cisco router configuration commands are explained in packet tracer.
Cisco rou.. Show command is the most powerful command in Cisco IOS. It lists run.. When we talk about routing protocol, first thing that comes in our .. Same lab can be used for the practice of VTP Ser..
These commands are highly tested in CCNA exam an.. Series Switc.. Although CCNA exam does not test your product specific knowledge, still you need.. Security Device Manager (SDM) is a web .. Cisco IOS has several built in ..
Router follows a boot sequence to bring it up. Knowing this sequence will help .. Cisco IOS is the proprietary operating sy.. Cisco makes a l.. It includes all necessary features required by routers .. VLSM is a process of dividing an IP network into the subnets of..
You can manually check for Windows 7 updates (to fix software bugs and security flaws) at any time. Although automatically checking for updates is the recommended.
This tutorial is divided in three sections. First section provides a basic ove.. Layers model is a the.. At the time of writing this tutorial Gmail has 4. In this tutorial we.. It requires technical skills and diagnostic approach.
Once you get back into Windows, click on Start and then type in regedit into the search box and press Enter. Now navigate to the following registry key in Windows 7. Recently one of our reader "James" asked us about following. Tips and Tricks to Make Windows 7 Networking Easier. By Eric Geier. Microsoft made many changes and enhancements to the networking features in Windows 7. What is my Windows serial number / product ID in Windows 7 or Windows Vista? Each version of Windows has its own unique serial number (the license product ID) which.
In this article we will explain most .. Proxy server is used to share controlled internet in the network. Proxy serv.. No one is geek in the computer world. Everyone needs hel.. With remote desktop we can connect to a computer running windows XP from another co.. Net. Meeting is the popular communication software for windows user..
Instead of buying an individual internet connec.. Either we can use this setup wizard for easy and hassle free sharing or we can use manu.. Windows XP allows us to share a folder with two differe.. It has a new network discovery service that automatically discover supporting network.
Windows XP includes several features that make sharing easier. Among these features, workgroup feature .. Windows XP supports workgroup networking.
We need to adjust some settings befor.. Printer is an essential device for home and office network.. Sharing allows us to use a single inte..
We can share files, folder, Internet, printer, hard disk, media, vide.. Members are free to leave this group any time. They do not requir.. We need a homegroup password to join the existing homegroup. We can obtain t.. Windows uses random letters, numbers and symbols to generate.. All members require a homegroup password to join it.
Homegroup password is automatically generated during the.. We can use these links to manage the related services.. This wizard prompts user.. Windows 7 has followed the same footprint of ongoing improvement track by introducing a new fea..
But discovering and using it was a tough task for average users. This situa.. Both terms are used synonymously i.. Through the networking, computers share information such as email, file, do.. LVM is a disk management solution that allow admini.. These pre- deployment options are left for the..
With this method you can reset any users password in window 7. Or sometime .. USB flash drives are typically removable and rewritable, and physically much smaller than .. You are tasked to build a new Linux workstati.. Due to power fluctuation, your system starts up from a powered off stat.. Why should you periodically update the kernel and package ve.. What command do you use to format a partition with a file system? You could.. Which file have runlevel configuration?
What is Kerberos used for? Kerberos is used for secure netw.. What Squid service do? Squid provides the Proxy service, whi.. What is the Minix? Minix is the UNIX clone wr..
Which version of RHEL officially supports LUKS encryption? Apache is the most popular, secure, robust, re..
Network File System (NFS) protocol allow .. Microsoft window use Common Internet File System (CI.. In this tutorial I will configure FTP Server on RHEL6. RHCE Exam objective covered in this tuto..
This tutorial explains configuration files which are used to manage network in detail. This tutorial is prepared for Centos / RHEL 6 or lower v.. In Linux several networking tools are available to manage t.. During the RHCE exam no internet access is available. But you can use local resources avail.. In this article we would see how diff command can help us in RHCE exam.
Everything in Linux is m.. Linux system is managed through the several configuration files. Most of configuration files have associated d..
It scans given file or fil.. With sort command you can sort the contents in several ways. By default, the sort command sor.. In this article we would cover following topics What is tar tar file Syntax of tar command .. Default aliases provide safety features. For a Linux system administrator it is a handy tool. Environmental variable plays significant role in linux system.
We would cover f.. Flash player is the must have plugin for web browser. Flash player can be install.. Komodo is the powerful editor for programming language. In our previous art.. Komodo is the powerful editor for programming language. In our previous arti..
Komodo edit is developed by Active. State. Active. State release two version of Komodo. Ubuntu 1. 2. 0. 4 uses unity as default desktop. Unity is only the desktop environment availa..
Filezilla is the popular ftp client. Best things about Filezilla are its free, open source p.. You would get following error if you run chrome as root user Google Chrome can not.. Chrome is the powerful web browser. We can install chrome form Ubuntu software center or manua.. Chrome is the powerful web browser.
We can install chrome form Ubuntu software center or manua.. Sound service does not start when you logged in from root user. We need to add so.. In our previous articles we have installe.. In last article we installed XAMPP in Ubuntu. But we need to exec.. XAMPP stand for X (to be read as .
Firefox shipped with Ubuntu. However Firefox shipped with Ubuntu will be older version. Firefox is an op.. Skype is the most popular communication software. It was developed by Ahti Heinla, Priit Kases.. VLC is a open source project.
VLC player can play most multimedia files as well as DV.. Ubuntu 1. 2. 0. 4 is the LST version and would be supported until April .. You can do whatever you want to do while you logged in from root account.
This causes security ri.. Ubuntu is the most popular Linux. You can install Ubuntu in virtual box to use it with window..
You can install Ubuntu form any medium like DVD, pen drive, network. It's up to you which medium.. In this article I will show you how to make Ubuntu bootable USB disk.
From this bootable.. If you hav.. ICT wizard also have option to update it. You can update these settings any time by following th.. To do this follow this process click on..
Windows Server 2. Standard Edition Windows Server 2. Enterprise Editi..
In this article we would discuss about those features. Server Mana.. In this article we would discuss about those features. Server Mana.. With the release of Server 2. R2 in 2. 00. 9, Microsoft discontinued the developmen.. Core edition includes minimal roles and services.
Core edition stripped down any unnecessary serv.. Each edition have several specific features. In this article we will try to list those f..
This is reliable, secure, and easier to administer. WINDOW SERVER 2. 00. SERV.. Replication ensures that changes to a domain controller are reflected in all domain controller.. In this article we will configure the ADS service on server 2. Pre quest of .. In this article we would configure ADS.
ADS configuration wizard can be invoke.. In this tutorial I will guide you how to check ads installation. ADS installation can be verify fro.. All clients are controlled by the server. In our previous articl..
Administrator account can be used in LAB environment. We have completed server side configuration. Pre quest of this tutorial Create a user named Vi.. Microsoft Windows Server 2. A profile is associated with a user account and contains information such as customized desktop settings, network ..
This requirement arise because IP address consist of four group.. DNS server would automatically be installed during the installation of ADS. During the install.. Without a reliable DNS infrastructure, domain controllers on your network.. This information include an IP address.. Now as you know how DHCP Server works it is time to install it.
You should learn about the options used in DHCP Server before you start configuration. A scope is a range, o.. DHCP Server must be activated and authorized before it can lease IP addresses. Now we would configure DCHP client. Before we start make sure you have c.. With the help of this sample resume you can ea.. With the help of this sam..
Career objective is the most important part of resume which describe your moti.. Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped togethe.. How does it get a message to the network looking for its IP address and the location of its operating sy.. OSI model was developed in February. A feature that's allow user to manage computers remotely.
On server side My computer ==> properties ==> remote ==&.. To make a baseband network practical for many computers to share, the data ..
Subnet mask is a 4 byte (3. ID and the host ID from an IP address. All the h.. In cmd type C: \> assoc . How to c.. Hub is a layer 1 device. It will out the signal from all of its port except the one from where i..