dontgetphishedkd
How To Tips & Trics

5 Ways to avoid a Phishing attack

Don’t take the bait! Phishing happens when an attempt is made to get access to your personal information, like username, password, credit card details online by directing you to fraudulent websites that are made to look like the genuine ones. Here’s how you can avoid being phished: Remain alert to any suspicious emails, SMSs or […]

rip-protocol-kdocx
How To

Most useful Networking Commands used in RIP routing protocol

RIP (Routing Information Protocol) is one of the oldest distance vector routing protocols. It is usually used in small networks. RIP is simple to configure and maintain but lacks some advanced features of routing protocols like OSPF or EIGRP.   Command  Description Router(Config)#router rip Enable RIP routing protocol. Router(Config-router)#network b.c.d.e Add b.c.d.e network in RIP […]

vlankdcommand
How To

Basic Networking commands used to create VLAN

VLAN (Virtual LANs) VLANs are the logical grouping of devices in the same broadcast domain. VLANs are usually configured on switches by placing some interfaces into one broadcast domain and some interfaces into another. VLANs can be spread across multiple switches.A VLAN acts like a physical LAN, but it allows hosts to be grouped together in […]

freewaresoftkd
How To SOFTWARE

Let’s Know About Open Source Software, Freeware, Shareware & Proprietary Software

Open Source Software A software whose source code is freely distributed with a license to study, change and further distributed to anyone for any purpose is called open source software. Open source software is generally a team effort where dedicated programmers improve upon the source code and share the changes within the community. Open source software provides these […]