How To Tips & Trics

5 Ways to avoid a Phishing attack

Don’t take the bait! Phishing happens when an attempt is made to get access to your personal information, like username, password, credit card details online by directing you to fraudulent websites that are made to look like the genuine ones. Here’s how you can avoid being phished: Remain alert to any suspicious emails, SMSs or […]

How To

Most useful Networking Commands used in RIP routing protocol

RIP (Routing Information Protocol) is one of the oldest distance vector routing protocols. It is usually used in small networks. RIP is simple to configure and maintain but lacks some advanced features of routing protocols like OSPF or EIGRP.   Command  Description Router(Config)#router rip Enable RIP routing protocol. Router(Config-router)#network b.c.d.e Add b.c.d.e network in RIP […]

How To

Basic Networking commands used to create VLAN

VLAN (Virtual LANs) VLANs are the logical grouping of devices in the same broadcast domain. VLANs are usually configured on switches by placing some interfaces into one broadcast domain and some interfaces into another. VLANs can be spread across multiple switches.A VLAN acts like a physical LAN, but it allows hosts to be grouped together in […]