Keeping Your Stuff Safe Online – Password Security
In today’s world, where we do so much online, having strong passwords is super important....
Discovery Protocol | CDP & LLDP
Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol for network discovery on the data...
Inter-VLAN Routing | SVI, RoS
Inter-VLAN routing is the ability to route, or send, traffic between VLANs that are normally...
Interswitch Connectivity | VLAN Tagging | Trunk Port
Layer 2 switch provides connectivity between two or more different devices within a local area...
Cyber Kill Chain Process & Purpose
The Cyber Kill Chain offers a comprehensive framework as a part of the Intelligence Driven Defense...
Removing/Deleting Files in Linux
The rm command is used to delete files and directories. It is important to keep in mind...
Moving Files in Linux
The mv command is used to move a file from one location in the filesystem to...
Copying Files in Linux
Creating copies of files can be useful for numerous reasons: cp [OPTIONS] SOURCE DESTINATION...
Viewing Files in Linux
There are a few Linux commands available to view the content of files. The cat command,...
Changing File Ownership in Linux
Initially, the owner of a file is the user who creates it. The chown command is used to...