Dark Web, Deep Web and Surface Web
If we imagine web as an ocean, the surface web is the top of the ocean which appears to spread for...
Zero Trust Security Model (ZTNA)
Zero Trust security is an IT security model that requires strict identity verification for every...
Tips for Troubleshooting Microsoft Outlook
Microsoft Outlook is the most popular business software program in the world, and its top ranking...
VLAN and Switch Port | Types and Configuration
A VLAN is a group of devices on one or more LANs that are configured to communicate as if they were...
L2 Switching | MAC Learning, Aging and Removing
Switching is process to forward packets coming in from one port to a port leading towards the...
Let’s understand DMZ – Demilitarized Zone
A DMZ or demilitarized zone is a perimeter network that protects and adds an extra layer of...
Basic Linux Command Syntax
Here we will deals exclusively with the CLI or Command Line Interface, rather than a GUI or...
Delete Windows.old folder on Windows
When you upgrade your computer to a new version of Windows 10, or you install a preview build, the...
Firewall types (Network based Vs Host based)
Nowadays protecting IT assets is most important and critical part for anyone. A “Firewall” is...
IP Subnet Cheat sheet
Struggling when you have to work on CIDR, Subnet mask and IP’s for CIDR? Look at below sheet...