You might be wondering about What TCPdump Command Can be Used to Filter Out All Traffic Except SSH Traffic? well. The TCPdump is essentially the command-line based packet that captures and allowing us to capture and monitoring any type of ...
Snabay Networking Latest Articles
At What Layer Of The Osi Model Do The 802.11 Standards Vary?
We all have known about the OSI model, the OSI stands for Open Systems Interconnection. It is called the conceptual framework and the work done over it. Basically, the OSI model is of seven layers, these users are normally using ...
What is Wireless Network? Advantages and Disadvantages
With knowing or without knowing, daily we come across and use the wireless network. The device which we are holding at present is a wireless device. Devices like mobile phones, laptop, tabs are wireless devices which we use in the ...
Extended Access Control List (ACL) | Cisco Extended ACL Configuration
Rules used to reduce network traffic and network attack. ACLs are used to filter the incoming and outgoing network. The ACL contains two types of list and the Extended Control List is one among them. The extended access control list ...
What Unit Is Used To Measure The Frequency Of Memory, Fsb, And The Processor?
You might be wondering What Unit used to measure the frequency of memory, FSB, and the processor? well. To measure the frequency values, it is specific to the microwave range. The values of the frequency range are from one gigahertz ...
What is Symmetric Encryption, Symmetric Key
Can you imagine leaving your house unlocked when you go out and not getting robbed because of your stupid mistake? Chances are you are not likely to escape a theft on your property if you do such a thing and ...
How to Minimize Direct Denial of Service (DoS) Attack Impact
Denial of Service Attack and Distributed Denial of Service Attack (abbreviated form; DoS for former and DDoS for latter) are almost the same things. Sometimes a DDoS attack is put into the records as a subcategory of a DoS attack ...
SQL Injection Attacks in Cyber Security
SQL Injection Attacks in Cyber Security: SQL Injection Attacks in Cyber Security: Structured Query Language (SQL) is the domain language which is used in handling structured data and managing database for building customized. When targeted in a cyberattack, it is ...
What is Loopback Interface in a Cisco Router
The loopback interface is the virtual interface that is always available and ready to be used, it is not mandatory that it will be tied with 127.0.0.1 it an interface like any other interface that could have its own IP ...
What is a Subinterface in a Cisco Router
A Subinterface is a virtual interface that is created by dividing one physical interface into many logical interfaces, the subinterface uses the parent physical interface in order to send and receive messages like Fast Ethernet 0/0.1 is the subinterface Fast ...