Multicast is the combination of Multi and Cast. Multi means more than one and cast means streaming data (Packets) from the Source to Destination. PIM stands for Protocol Independent Multicast; this is one of the types of multicasts. In this blog, we will understand the basics of Multicasting with PIM with (DM)Dense Mode, and cover […]
What Is Routing? Routing is a process by which we are selecting the path between one or more networks. Routing selects the path for internet Protocol (IP) packets when they are traveling from source to destination. These routing decisions are made by a spatial type of device which is known as a router, or we […]
Push notifications are very dramatic I must say, they shove each mail in your face no matter if it is important to mail or not. Even the ones which we don’t require flash on our mobile screens begging to be opened. This gives an opportunity to those sneaky emails who want to get into our […]
Basically, port security is used to protect our LAN interface from the attacker. The attacker may be anyone in the organization or outside. You can allow mac addresses manually You can change or allow the maximum number of the mac address. If you do not configure manually, in that condition switch will allow the first […]
VLAN hopping is a type of attack where the attacker sends traffic from one VLAN to another VLAN. An attacker can then steal passwords or other protected information and install viruses or corrupt, modify, or delete critical data. How VLAN Hopping Attack is Performed? VLAN hopping attack can be performed in two different ways: – […]
VTP stands for VLAN Trunking Protocol. It is a Cisco proprietary protocol that is present at layer 2. VLAN is used to transfer VLAN information from one switch to another switch and also to centralized VLAN management. It uses multicast mac address 0100. 0ccc.cccc for VTP updates (CDP, VTP, UDLD). HOW MANY TYPES OF VTP […]
Understanding the VDOMS? Virtual domains (VDOMS) are a way to divide physical FortiGate devices into multiple Logical devices with different configurations. Each logical device can have completely different configurations, routes, NAT, and users. By default, every FortiGate device is in default VDOM “root”. All the configuration of the FortiGate device is saved in “root” VDOM. […]
What is a Linux NFS server? Network File Sharing (NFS) is a protocol that allows you to share directories and files with other Linux clients over a network. Shared directories are typically created on a file server, running the NFS server component. Users add files to them, which are then shared with other users who […]
We all have heard the phrase “Sharing is Caring” but not in the case of your digital information which is to be kept personal. You don’t share your bank details, passwords, name, DOB, address, and other details with an unknown person. The hacker is that unknown person who plants himself in the middle of the […]
Host Intrusion Prevention System solutions protect the computer against known and unknown malicious attacks. In case of attempted major changes by a hacker or malware, HIPS blocks the action and alerts the user so an appropriate decision about what to do can be made. This helps to keep your system secure without having to rely […]