E-books & Knowledge Base
Security Professionals or Cyber Criminals?
Most people keep in mind that people called hackers are criminals who destroy or gain unauthorized access to Network systems, Stealing government’s confidential information and so on. Yes it is, but those people are one kind of hackers. So in this article let’s see who really are the hackers. In hacking world [...]
Portforwarding Explained [GeekLK]
If you want to reach your friend through the phone call you’ll need his/her phone number. Likewise in IP Network environment to reach a host or a server you need an address called IP Address Eg- 192.168.1.10. And the network services requesting on that host or server is separated by protocols which also have numbers assigned known [...]
Difference between Layer 2 and Layer 3 switches
Layer 2 switches and Layer 3 switches – you may have heard the terms before. So what exactly are they? Both switch types have the capability of linking network devices together from one port to another. Unlike hubs, switches distribute data more intelligently as it interprets them and sends it out to the right destination. Layer 2 and [...]
How Global Positioning System (GPS) Works
The Global Positioning System (GPS) is a satellite-based navigation system made up of a network of 24 satellites placed into orbit by the U.S. Department of Defense.
Create Your Own Customized Run Commands
The Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon.