Author

ICTKB Admin

ICKTB is team of experience and expert in ICT industry sharing their knowledge.

90 Articles
ICTKB_IMG

Keeping Your Stuff Safe Online – Password Security

In today’s world, where we do so much online, having strong passwords is super important. They’re like the locks on the doors of your online accounts, keeping out bad guys who might try to steal your stuff. Passwords serve as the primary...

ICTKB_IMG

Discovery Protocol | CDP & LLDP

Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol for network discovery on the data link layer. It can share information such as device names and IOS versions, with other physically connected Cisco devices. Link Layer Discovery Protocol...

ICTKB_IMG

Inter-VLAN Routing | SVI, RoS

Inter-VLAN routing is the ability to route, or send, traffic between VLANs that are normally blocked by default. Switches and VLANs work at the MAC address Layer (Layer 2). Traffic can’t be routed between VLANs at Layer 2 based on MAC addresses....

ICTKB_IMG

Cyber Kill Chain Process & Purpose

The Cyber Kill Chain offers a comprehensive framework as a part of the Intelligence Driven Defense model. In this article, we will discuss what the cyber kill chain is and what its steps are. Cyber intrusions are the worst nightmare of many of us....

ICTKB_IMG

Removing/Deleting Files in Linux

The rm command is used to delete files and directories. It is important to keep in mind that deleted files and directories do not go into a “trash can” as with desktop-oriented operating systems. When a file is deleted with the rm...

ICTKB_IMG

Moving Files in Linux

The mv command is used to move a file from one location in the filesystem to another.mv SOURCE DESTINATION The mv command requires at least two arguments. The first argument is the source, a path to the file to be moved. The...

ICTKB_IMG

Copying Files in Linux

Creating copies of files can be useful for numerous reasons: cp [OPTIONS] SOURCE DESTINATION The cp command is used to copy files. Similar to the mv command, it requires at least two arguments: a source and a destination. For...

ICTKB_IMG

Viewing Files in Linux

There are a few Linux commands available to view the content of files. The cat command, which stands for “concatenate”, is often used to quickly view the contents of small files. The cat command will display the entire...

ICTKB_IMG

Changing File Ownership in Linux

Initially, the owner of a file is the user who creates it. The chown command is used to change the ownership of files and directories. Changing the user owner requires administrative access. A regular user cannot use this command to change...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.