Posts

Change Management Explained

Change Management process has great importance in an IT Environment and this process...

Intrusion Detection And Prevention Systems (IDS&IPS) Explained

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are very...

Step by Step - Installing pfSense

The pfSense software is an open-source firewall and router solution based on the...

Server Types Explained

Ten of the server types are described in this post. This post also gives information...

Commonly Used Linux Commands

Top 50 Commonly Used Linux Commands

Cloud Computing Explained

Cloud computing is a technology that enables the delivery of computing resources,...

PowerShell Script to Scan Open Ports

This PowerShell script scan the devices which are connected to network. After that...

Types of Cyber Attacks Explained

Cyber-attacks occur when an individual, group, or organized gang attempts to maliciously...

PowerShell Script to Get Active Directory Builtin Groups...

Built-in groups are predefined security groups, defined with domain local scope,...

Network Models -OSI and TCP/IP- Explained

The OSI (Open Systems Interconnection) model and the TCP/IP (Transmission Control...

TCP/IP -Cheat Sheet

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are foundational...

PowerShell Script to Delete All Files and Folders in a...

This PowerShell script deletes all folders and files in a spesific directory. Before...

Infosec - CIA Triad Explained

As a part of Information Security, also referred as InfoSec, any attempt to minimize...

Network Topologies Explained

Network topology refers to the structural arrangement of a network. This structure...

Disaster Recovery Planning Explained

What is disaster recovery and how to ensure business continuity? Disaster recovery...

Network Subnetting - Cheat Sheet

Subnetting divides broadcast domains, so traffic is routed efficiently, improving...

G-TMR3K8FQQP