ALL IT Technology Information

AWS Services ,Migration, Storage, Security Services, Database Services

 AWS Services || Migration || Storage || Security Services || Database Services

Amazon Web Services (AWS) is the world's most comprehensive and broadly adopted cloud, offering over 200 fully featured services from data centers globally.

What is AWS?

 What is AWS? EC2

AWS का पूरा नाम Amazon Web Services है। यह एक ऐसा प्लेटफ़ॉर्म है जो लचीला, विश्वसनीय, स्केलेबल, उपयोग में आसान और लागत प्रभावी क्लाउड कंप्यूटिंग समाधान प्रदान करता है। AWS अमेज़ॅन द्वारा पेश किया गया एक व्यापक, उपयोग में आसान कंप्यूटिंग प्लेटफ़ॉर्म है। प्लेटफ़ॉर्म को एक सेवा के रूप में बुनियादी ढांचे (IaaS), एक सेवा के रूप में प्लेटफ़ॉर्म (PaaS) और एक सेवा के रूप में पैकेज्ड सॉफ़्टवेयर (SaaS) की पेशकश के संयोजन के साथ विकसित किया गया है।

Android introduction

              Android introduction

What is the simple definition of Android? Android is a mobile operating system designed by the American company Google. Based on the Linux operating system, its initial objective was to promote the use of an open, free, multiplatform and very secure system, adapted to mobile devices such as smartphones and tablets. 

introduction to dark web, anonymity,and crypto currency

 Introduction To Dark Web,  Anonymity, And Crypto Currency

Cryptocurrencies are popular on the dark web because they provide a convenient method of obfuscating identities and transaction details.

Burp Suite Portswigger Install Step by Step

👉 Burp Suite portswigger Install Step by Step

Burp Suite is an integrated platform and graphical tool for performing security testing of web applications, it supports the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities.

How to View and Delete Incognito History

How to View and Delete Incognito History


Best Tech Tips and technology

👉Useful Tech Tips

Top Free Website Traffic Generator

Top Free Website Traffic Generator (SCO)

Python Install & Tutorial

Install Python



: a branch of mathematics dealing with the collection, analysis, interpretation, and presentation of masses of numerical data
: a collection of quantitative data

Excel in interactive chart


Create your first interactive chart in Excel

Ever wanted to make a cool, snazzy interactive chart in Excel? Something like this:

Interactive chart in Excel - howto


Excel join data

 Introduction to the combine sheets problem

- New file to consolidate the data - Updating "power query" steps - Cleaning up the combined data - Loading data to Excel - Testing with new data - More Power Query

Excel Data cliening





Microsoft Excel

 Microsoft Excel

C++ Tutorial


 C++ Tutorial


Devops Tutorial for beginners

Devops Tutorial for beginners

DevOps is the combination of cultural philosophies, practices, and tools that increases an organization's ability to deliver applications and services at high velocity: evolving and improving products at a faster pace than organizations using traditional software development and infrastructure management processes.

Amazon linux machine install in vmware

 👉Amazon Linux Machine Install in Vmware 

It supports the latest EC2 instance type features and includes packages that enable easy integration with AWS. Amazon Web Services provides ongoing security and maintenance updates to all instances running the Amazon Linux AMI. The Amazon Linux AMI is provided at no additional charge to Amazon EC2 users.

DevOps Kubernetes

DevOps  Kubernetes yml file

What is Kubernetes and why it is used?

 Kubernetes helps you to build cloud-native microservices-based apps. It also supports containerization of existing apps, thereby becoming the foundation of application modernization and letting you develop apps faster.

Devops Tutorial Book 4

 Devops Tutorial

Devops Tutorial Book 3

Devops Tutorial

microsoft server 2016 VPN

 Microsoft server 2016 VPN

microsoft Server 2016

 Microsoft Server 2016


Ethical Hacking & Cloud Computing

 Ethical Hacking & Cloud Computing



 Definition. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.



Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.



Today, Red Hat Enterprise Linux supports and powers software and technologies for automation, cloud, containers, middleware, storage, application development, microservices, virtualization, management, and more. Linux plays a major role as the core of many of Red Hat's offerings.

MCSA (Microsoft Certified Solutions Associate)

 MCSA (Microsoft Certified Solutions Associate) 

(MCSE(Microsoft Certified Solutions Expert)

 An MCSE (Microsoft Certified Systems Engineer) is someone who has passed exams about the Microsoft Windows NT operating system, related desktop systems, networking, and Microsoft's BackOffice server products.

Cisco Certified Network Associate (CCNA)

 Cisco Certified Network Associate (CCNA)

The fact is talented CCNA certified professionals will have no dearth of jobs in the coming future. The scope of CCNA certification is in the security domain instead of the CCNA routing and switching . This is simply because of the growing need for data security protection across all organizations



CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks. CompTIA Network+ validates the technical skills needed to securely establish, maintain and troubleshoot the essential networks that businesses rely on.

CompTIA A+

CompTIA A+

This certification validates entry-level skills in today's IT domains that including computer repair, network administration, information security, cloud computing, software, operating systems, Networking Course troubleshooting of both mobile devices and desktops.

Private Cloud SCVMM

System Center - Virtual Machine Manager(SCVMM)


private cloud || SCVMM || SCOM || DPM

 Private Cloud

Top 10 Hard Drive Recovery Software for Windows and Mac

Top 10 Hard Drive Recovery Software for Windows and Mac

Hadoop Tutorial

Hadoop Tutorial: All you need to know about Hadoop!


Firewall Information

Firewall Overview

What is firewall and why it is used?

 >A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer. ... They key is determining how much protection you need.








How to install vmware in ubuntu

 How to install vmware in Ubuntu

Network Firewall Question Answer

  TOP Network Firewall Question



Q1. What is Network Security?

Ans: Network security is a process of securing IT infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure. IT infrastructure includes firewalls, routers, switches, servers, and other devices, which help host the software applications.

In simple terms, network security refers to all activities related to protecting the confidentiality, integrity, and availability of an organization’s software and hardware assets.

Server interview questions answers



1)      Explain what is Windows Server?

Window server is a series of server operating system developed by Microsoft Corporation.






Q1. What are the two types of transmission technology available?
Ans. The two types of transmission technology are – broadcast and point-to-point.

Distributed File System (DFS) Replication

 Distributed File System (DFS) Replication


Distributed File System (DFS) || ADDS Server to access file but 2ed server to access file storage

 Distributed File System (DFS)

 is a set of client and server services that allow an organization using Microsoft Windows servers to organize many distributed SMB file shares into a distributed file system. ... It is also called "MS-DFS" or "MSDFS" in some contexts, e.g. in the Samba user space project.


Network Load Balance

 Network Load Balance


1)Network Bridge

2)NIC Teaming 

Disk Type and Performance

 Disk Type and Performance

Hyper-v Network type

 Hyper-v Network type 

Three type in hyper -v :

1)Private Network 

2)Internal Network

3)External network 

How to creat a virtual disk step by step

 How to create a virtual disk in vmware ,All Type Windows Machine step by step


A key advantage of virtual disks is their portability. Because the virtual disks are stored as files on the host machine or a remote computer, you can move them easily to a new location on the same computer or to a different computer.


Windows Shortcut Key and Cmd Command

Run commands


RAID || Data Storage and Backups

 Cloud || RAID || Data Storage and Backups || All Type Diskmgmt

A volume is a storage device, such as a fixed disk, floppy disk, or CD-ROM, that is formatted to store directories and files. A large volume can be divided into more than one logical volume, also called a partition