Common Network tools – ping, telnet, netstat and arp
ping (Packet Internet Gropper) The Ping command allows a user to ping another network IP address. Ping command sends ICMP ECHO_REQUEST packets to other hosts, and this command can help…
Norton 360 Deluxe vs Bitdefender Total Security | Best antivirus for PC
I’ll be specifically comparing the Norton 360 Deluxe plan, their second most expensive, to Bitdefender’s most expensive Total Security plan. Why do you ask? Because they both claim to offer…
What is IPv6, and why is adoption taking so long?
IPv6 has been being developed since 1998 to address the dwindling supply of IPv4 addresses available, despite its efficiency and security redesigns, enterprise acceptance and implementation is slow. For the…
OSI Model And 7 Layers Of OSI Model Explained
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its…
How To Use Proxy chains with Kali Linux
Proxy chains are open source software for Linux systems and come pre-installed with Kali Linux, the tool redirects TCP connections through proxies like TOR, SOCKS, and HTTP (S), allowing us…
How to Fix “No route to host” SSH Error in Linux
SSH is the most secure means of connecting to Linux servers remotely. And one of the common errors encountered while using SSH is the “ssh: connect to host port 22: No…
What is DNS, and How Does DNS Work? (Domain Name Server Fundamentals)
What if you had to memorize the IP address of every website that you wanted to visit? I bet you’d go crazy in no time! This is where DNS jumps…