Brilliant article, glad I slogged through the it seems that a whole lot of the details really come back to from my past project.
I once tried a Linux OS back in 2005 that i had placed on a cd, and booted it from my XP machine which I'm still using. I'm a home user. Appreciate your effort for making such useful blogs and helping the community.
If you're planning on pursuing a field in networking or just looking to expand your networking knowledge then this article is for you. TCP/IP utilities are essential -- not only will they help you on your networking exams but you'll be able to diagnose most TCP/IP problems and begin working on solutions. The top 7 tools that I will talk about today include: Ping, Tracert, ARP, Netstat, Nbtstat, NSLookup, and IPconfig. These tools will help you to check the status of your network and allow you to troubleshoot and test connectivity to remote hosts. You use these utilities in Dos and you get there by clicking on Start , going to Run and typing cmd . Here are the top 7 TCP/IP utilities and their functions. 1. Ping The PING utility tests connectivity between two hosts. PING uses a special protocol called the Internet Control Message Protocol (ICMP) to determine whether the remote machine (website, server, etc.) can receive the test packet and reply. Also a grea
What is VPN? Virtual Private Network (VPN) creates a secure network connection over a public network such as the internet. It allows devices to exchange data through a secure virtual tunnel. It uses a combination of security features like encryption, authentication, tunneling protocols, and data integrity to provide secure communication between participating peers. What is Authentication, Confidentiality & Integrity? Authentication - Verifies that the packet received is actually from the claimed sender. It verifies the authenticity of sender. Pre-shared Key, Digital Certificate are some methods that can be used for authentication. Integrity - Ensures that the contents of the packet has not been altered in between by man-in-middle. Hashing Algorithm includes MD5, SHA. Confidentiality - Encrypts the message content through encryption so that data is not disclosed to unauthorized parties. Encryption algorithms include DES (Data Encryption Standard), 3DES (Triple-DES), AES (Ad
What is a Firewall? Firewall is a device that is placed between a trusted and an untrusted network. It deny or permit traffic that enters or leaves network based on pre-configured policies. Firewalls protect inside networks from unauthorized access by users on an outside network. A firewall can also protect inside networks from each other. For example - By keeping a Management network separate from a user network. What is the difference between Gateway and Firewall? A Gateway joins two networks together and a network firewall protects a network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs. Firewalls works at which Layers? Firewalls work at layer 3, 4 & 7. What is the difference between Stateful & Stateless Firewall? Stateful firewall - A Stateful firewall is aware of the connections that pass through it. It adds and maintains information about users connections in state table, re
Comments
Brilliant article, glad I slogged through the it seems that a whole lot of the details really come back to from my past project.
I once tried a Linux OS back in 2005 that i had placed on a cd, and booted it from my XP machine which I'm still using. I'm a home user.
Appreciate your effort for making such useful blogs and helping the community.
Kind Regards,
Ganesh