IT

ALL IT Technology Information

introduction to dark web, anonymity,and crypto currency

 Introduction To Dark Web,  Anonymity, And Crypto Currency


Cryptocurrencies are popular on the dark web because they provide a convenient method of obfuscating identities and transaction details.

Burp Suite Portswigger Install Step by Step

👉 Burp Suite portswigger Install Step by Step



Burp Suite is an integrated platform and graphical tool for performing security testing of web applications, it supports the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities.

How to View and Delete Incognito History

How to View and Delete Incognito History


 

Best Tech Tips and technology

👉Useful Tech Tips

Top Free Website Traffic Generator

Top Free Website Traffic Generator (SCO)
 
 

Python Install & Tutorial

Install Python


Statistics

Statistics


: a branch of mathematics dealing with the collection, analysis, interpretation, and presentation of masses of numerical data
: a collection of quantitative data

Excel in interactive chart

 

Create your first interactive chart in Excel

Ever wanted to make a cool, snazzy interactive chart in Excel? Something like this:

Interactive chart in Excel - howto

 

Excel join data

 Introduction to the combine sheets problem

- New file to consolidate the data - Updating "power query" steps - Cleaning up the combined data - Loading data to Excel - Testing with new data - More Power Query

Excel Data cliening


 

 BECOME A GREAT

DATA ANALYST 


 

Microsoft Excel

 Microsoft Excel

C++ Tutorial

 

 C++ Tutorial


 

Devops Tutorial for beginners

Devops Tutorial for beginners

DevOps is the combination of cultural philosophies, practices, and tools that increases an organization's ability to deliver applications and services at high velocity: evolving and improving products at a faster pace than organizations using traditional software development and infrastructure management processes.

Amazon linux machine install in vmware

 👉Amazon Linux Machine Install in Vmware 


It supports the latest EC2 instance type features and includes packages that enable easy integration with AWS. Amazon Web Services provides ongoing security and maintenance updates to all instances running the Amazon Linux AMI. The Amazon Linux AMI is provided at no additional charge to Amazon EC2 users.

DevOps Kubernetes

DevOps  Kubernetes yml file


What is Kubernetes and why it is used?

 Kubernetes helps you to build cloud-native microservices-based apps. It also supports containerization of existing apps, thereby becoming the foundation of application modernization and letting you develop apps faster.

Devops Tutorial Book 4

 Devops Tutorial


Devops Tutorial Book 3

Devops Tutorial


microsoft server 2016 VPN

 Microsoft server 2016 VPN


microsoft Server 2016

 Microsoft Server 2016

 

Ethical Hacking & Cloud Computing

 Ethical Hacking & Cloud Computing

ETHICAL HACKING

ETHICAL HACKING


 Definition. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.

 CLOUD COMPUTING

 CLOUD COMPUTING


Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

REDHAT LINUX

RH124 REDHAT LINUX

Today, Red Hat Enterprise Linux supports and powers software and technologies for automation, cloud, containers, middleware, storage, application development, microservices, virtualization, management, and more. Linux plays a major role as the core of many of Red Hat's offerings.

MCSA (Microsoft Certified Solutions Associate)

 MCSA (Microsoft Certified Solutions Associate) 

(MCSE(Microsoft Certified Solutions Expert)

 An MCSE (Microsoft Certified Systems Engineer) is someone who has passed exams about the Microsoft Windows NT operating system, related desktop systems, networking, and Microsoft's BackOffice server products.

Cisco Certified Network Associate (CCNA)

 Cisco Certified Network Associate (CCNA)

The fact is talented CCNA certified professionals will have no dearth of jobs in the coming future. The scope of CCNA certification is in the security domain instead of the CCNA routing and switching . This is simply because of the growing need for data security protection across all organizations

COMPTIA NETWORK+

 COMPTIA NETWORK+ 

CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks. CompTIA Network+ validates the technical skills needed to securely establish, maintain and troubleshoot the essential networks that businesses rely on.
 

CompTIA A+

CompTIA A+


 
This certification validates entry-level skills in today's IT domains that including computer repair, network administration, information security, cloud computing, software, operating systems, Networking Course troubleshooting of both mobile devices and desktops.

Private Cloud SCVMM

System Center - Virtual Machine Manager(SCVMM)

 

private cloud || SCVMM || SCOM || DPM

 Private Cloud


Top 10 Hard Drive Recovery Software for Windows and Mac

Top 10 Hard Drive Recovery Software for Windows and Mac


Hadoop Tutorial

Hadoop Tutorial: All you need to know about Hadoop!


 

Firewall Information

Firewall Overview

What is firewall and why it is used?

 >A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer. ... They key is determining how much protection you need.


 

 

 

 

 

 

 

How to install vmware in ubuntu

 How to install vmware in Ubuntu

Network Firewall Question Answer

  TOP Network Firewall Question


 

 

Q1. What is Network Security?

Ans: Network security is a process of securing IT infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure. IT infrastructure includes firewalls, routers, switches, servers, and other devices, which help host the software applications.

In simple terms, network security refers to all activities related to protecting the confidentiality, integrity, and availability of an organization’s software and hardware assets.

Server interview questions answers

 Server-interview-questions-answers


 

1)      Explain what is Windows Server?

Window server is a series of server operating system developed by Microsoft Corporation.

                                                    

Networking-interview-questions-answers

 Networking-interview-questions-answers

 


 

Q1. What are the two types of transmission technology available?
Ans. The two types of transmission technology are – broadcast and point-to-point.

Distributed File System (DFS) Replication

 Distributed File System (DFS) Replication


 

Distributed File System (DFS) || ADDS Server to access file but 2ed server to access file storage

 Distributed File System (DFS)

 is a set of client and server services that allow an organization using Microsoft Windows servers to organize many distributed SMB file shares into a distributed file system. ... It is also called "MS-DFS" or "MSDFS" in some contexts, e.g. in the Samba user space project.


 

Network Load Balance

 Network Load Balance


 

1)Network Bridge

2)NIC Teaming 

Disk Type and Performance

 Disk Type and Performance

Hyper-v Network type

 Hyper-v Network type 

Three type in hyper -v :

1)Private Network 

2)Internal Network

3)External network 


How to creat a virtual disk step by step

 How to create a virtual disk in vmware ,All Type Windows Machine step by step

 ===============================================

A key advantage of virtual disks is their portability. Because the virtual disks are stored as files on the host machine or a remote computer, you can move them easily to a new location on the same computer or to a different computer.

                             

Windows Shortcut Key and Cmd Command

Run commands


 

RAID || Data Storage and Backups

 Cloud || RAID || Data Storage and Backups || All Type Diskmgmt


 
A volume is a storage device, such as a fixed disk, floppy disk, or CD-ROM, that is formatted to store directories and files. A large volume can be divided into more than one logical volume, also called a partition

 

Cloud || hyper-v movement || migration

 Cloud || hyper-v movement || migration

 


SERVER IN Install AD-DS ROLES

 SERVER IN Install AD-DS (Active Directory Domain Services)ROLES

The part of the directory in charge of management of domains, which was previously a core part of the operating system, was renamed Active Directory Domain Services (ADDS) and became a server role like others. "Active Directory" became the umbrella title of a broader range of directory-based services.
Protocols used: Lightweight Directory Access ...
Developer: Microsoft Corporation
 

cloud hyper-v ALL Setting || IN vmware

 cloud hyper-v ALL Setting || IN vmware

 

windows dual boot remove

 windows dual boot remove

 


cloud hyper-v OS install || IN vmware

 Cloud hyper-v || IN VMware

 

How to Install Hyper-V on vmware Workstation 10 ?

If you have connected your Server Manager to another server you could install Hyper-V remotely to that server is you are running Windows Server 2012 or Windows Server 2012 R2. On the Select server roles, select Hyper-V, when the Add features that are required for Hyper-V appears, click Add Features.

As we know we can’t install Hyper-V on vmware Workstation and when install it from Server Manager we get an Error.