Blog

35 Articles
ICTKB_IMG

Zero Trust Security Model (ZTNA)

Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter....

ICTKB_IMG

Tips for Troubleshooting Microsoft Outlook

Microsoft Outlook is the most popular business software program in the world, and its top ranking is well deserved. It manages so much of our business and personal life in one big window. Because we rely on it for our e-mail communications, meeting...

ICTKB_IMG

Let’s understand DMZ – Demilitarized Zone

A DMZ  or demilitarized zone is a perimeter network that protects and adds an extra layer of security to an organization’s internal local-area network from untrusted traffic. The purpose of a DMZ is to add an additional layer of security to...

ICTKB_IMG

Delete Windows.old folder on Windows

When you upgrade your computer to a new version of Windows 10, or you install a preview build, the installation process saves a copy of the previous version in the “Windows.old” folder. This is part of the safety mechanism in case the upgrade...

ICTKB_IMG

Firewall types (Network based Vs Host based)

Nowadays protecting IT assets is most important and critical part for anyone. A “Firewall” is one of the most popular computer and network security devices that professionals use to protect their enterprise IT assets and networks. Just like a...

ICTKB_IMG

IP Subnet Cheat sheet

Struggling when you have to work on CIDR, Subnet mask and IP’s for CIDR? Look at below sheet for your convenience. Bookmark this fast. CIDR Subnet Mask No. of IP’s /32 255.255.255.255 1 /31 255.255.255.254 2 /30 255.255.255.252 4 /29...

ICTKB_IMG

Understand your Internet Speed. MBps vs. Mbps

One thing that often gives people confusion is the difference between a Megabyte (MB) and a Megabit (Mb). People often assume that a download speed of 1 Megabit per second (1 Mbps) will allow them to download a 1 Megabyte (MBps) file in one second....

ICTKB_IMG

Configure Router as Access Point

The Internet has become a vital part in almost everyone’s life in this century. Nobody can afford to work with a slow internet. In this case, we always look for upgrades and ways to enhance our internet speed. We would never like to miss a chance...

ICTKB_IMG

Useful IP commands for Windows

IP Command Output ipconfig/all display full ip configuration ipconfig/release release all ip configuration ipconfig/release6 release ipv6 address for specified adaptor ipconfig/renew renew the ip configuration from DHCP server ipconfig/renew6 renew...

ICTKB_IMG

Must know Wireshark filters

Wireshark is a powerful tool that can be used to troubleshoot network problems, analyze network traffic, and learn about network protocols. It is a valuable tool for network administrators, security professionals, and anyone else who wants to learn...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.