DoS Attack With Your Home Pc To Any WebSite U Want To Be Killed!!
------------------------DoS Attack Stands For Denial of Service Attack
------------------------
What Is DoS?A: Denial of Service (DoS) atta
Ethernet is a way to access media in which all hosts on a network share same bandwidth of a link. Ethernet is comparatively popular, easy to integrate to new technologies , simple to implement with easy troubleshooting methods.
It uses Carrier sense multiple access with collision detection ( CSMA/CD) prot
Facebook : This site holds the huge internet business after Google at internet this is like addiction at at online as social networking site ,which is created by mark zuckerburg.who started this site with his roommates at 2005 in Harvard university students Eduardo Saver-in, Andrew McConnell, Dustin Mo
The Static routing is routing which had been done manually.it is concept of describing single way of configuring path selection of routersin networking.each and configration has to be done at administrator end.
Default Routing:basically a default gateway is path provided to local devices to the internet or
In last article we explained VLAN trunking Protocol...This time we are working on an example taking the scenario of a Company having sections like administrative Block, Management block, Marketing Block, Sales section, Production and Security. All other Blocks using switch in client mode work according to Admin bloc
VLAN TRUNKING PROTOCOL
Configuring VLAN and VLAN trunking for large networks with many
interconnected switches can be a very difficult task. VTP is a protocol created by Cisco
to create
and manage VLANs for a large network with many interconnected switches
.
Standard Access Control List
In this article we will configure Standard Access List
We will use EIGRP routing protocol in the following topology.
A standard access list filters
only traffic based on source traffic, all you need is the IP add
OSI Model Concept :-
The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each laye