Discovery Protocol | CDP & LLDP
Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol for network discovery on the data link layer. It can share information such as device...
Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol for network discovery on the data link layer. It can share information such as device...
Inter-VLAN routing is the ability to route, or send, traffic between VLANs that are normally blocked by default. Switches and VLANs work at the MAC...
Layer 2 switch provides connectivity between two or more different devices within a local area network. Switch allow data transfer between end...
The Cyber Kill Chain offers a comprehensive framework as a part of the Intelligence Driven Defense model. In this article, we will discuss what the...
The rm command is used to delete files and directories. It is important to keep in mind that deleted files and directories do not go into a...
The mv command is used to move a file from one location in the filesystem to another.mv SOURCE DESTINATION The mv command...
Creating copies of files can be useful for numerous reasons: cp [OPTIONS] SOURCE DESTINATION The cp command is used to copy files. Similar...
There are a few Linux commands available to view the content of files. The cat command, which stands for “concatenate”, is often used...
Initially, the owner of a file is the user who creates it. The chown command is used to change the ownership of files and directories....
The chmod command is used to change the permissions of a file or directory. Only the root user or the user who owns the file is able to...
Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.