Blog

30 Articles
ICTKB_IMG

IP Subnet Cheat sheet

Struggling when you have to work on CIDR, Subnet mask and IP’s for CIDR? Look at below sheet for your convenience. Bookmark this fast. CIDR Subnet Mask No. of IP’s /32 255.255.255.255 1 /31 255.255.255.254 2 /30 255.255.255.252 4 /29...

ICTKB_IMG

Understand your Internet Speed. MBps vs. Mbps

One thing that often gives people confusion is the difference between a Megabyte (MB) and a Megabit (Mb). People often assume that a download speed of 1 Megabit per second (1 Mbps) will allow them to download a 1 Megabyte (MBps) file in one second....

ICTKB_IMG

Configure Router as Access Point

The Internet has become a vital part in almost everyone’s life in this century. Nobody can afford to work with a slow internet. In this case, we always look for upgrades and ways to enhance our internet speed. We would never like to miss a chance...

ICTKB_IMG

Useful IP commands for Windows

IP Command Output ipconfig/all display full ip configuration ipconfig/release release all ip configuration ipconfig/release6 release ipv6 address for specified adaptor ipconfig/renew renew the ip configuration from DHCP server ipconfig/renew6 renew...

ICTKB_IMG

Must know Wireshark filters

Wireshark is a powerful tool that can be used to troubleshoot network problems, analyze network traffic, and learn about network protocols. It is a valuable tool for network administrators, security professionals, and anyone else who wants to learn...

ICTKB_IMG

Disable USB Ports to Prevent Malware Infection

Malware can arrive via connected USB devices on your PC. Today we some how to shut off USB ports to prevent that possible method of attack. If you use your laptop or computer in shared spaces such as cafes, libraries, or even offices, you should...

ICTKB_IMG

Security Misconfiguration | Importance & Prevention

Website security is a critical concern for businesses, organizations, and individuals. One of the most common website security threats is security misconfiguration. Security misconfiguration refers to the improper setup or configuration of a website...

ICTKB_IMG

Broken Access Control

Access control is a crucial element in maintaining the integrity and confidentiality of information. Access control ensures that only authorized users can access sensitive information, thereby protecting it from unauthorized access, modification, or...

ICTKB_IMG

How to Use the Windows Registry Editor

The Windows Registry Editor is a powerful tool that allows you to edit various settings and configurations on your Windows PC. It’s essential to use the Registry Editor carefully because modifying the wrong settings can cause problems with...

ICTKB_IMG

Speed Up Your Windows PC

Is your Windows PC running slow? Does your application take forever to load or launch? Don’t worry; you’re not alone. Many people experience slow performance on their Windows PC, but there are ways to speed up your system. This blog post...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.