10 Types of Digital Currencies and how they work.

Digital currencies are the payment methods for the future. The currencies are changing business, money and the world. As some governments accept the digital currency as a mode of payment, we feel it is important for you to know some of these digital currencies and how they operate. The following are 10 types of digital currencies and … Continue reading 10 Types of Digital Currencies and how they work.

Advertisements

Configuring Basic File Transfer Services

Configuring a Router as a TFTP or RARP Server It is too costly and inefficient to have a machine that acts only as server on every network segment. However, when you do not have a server on every segment, your network operations can incur substantial time delays across network segments. You can configure a router … Continue reading Configuring Basic File Transfer Services

Install the GNS3 VM on ESXi

WARNINGVMware ESXi and VMware workstation are two totally different products. If you want instructions for VMware Workstation or VMware Fusion read this document. GNS3 provides a GNS3 VM for ESXi. It has Ubuntu preinstalled with GNS3 and preconfigured.  GNS3 will not control your ESXi and by default ESXi limit what GNS3 can do, you will need … Continue reading Install the GNS3 VM on ESXi

Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know

Network troubleshooting tools are a necessity for every network administrator. When getting started in the networking field, it is important to amass a number of tools that can be used to troubleshoot a variety of different network conditions. While it is true that the the use of specific tools can be subjective and at the … Continue reading Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know

Configuring IPSec Network Security

This chapter describes how to configure IPSec, which is a framework of open standards developed by the Internet Engineering Task Force (IETF). IPSec provides security for transmission of sensitive information over unprotected networks such as the Internet. IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices ("peers"), such as … Continue reading Configuring IPSec Network Security

Configuring 3G and 4G Wireless WAN

Overview of 3G Wireless WAN 3G Wireless WAN offers a highly secure, simplified, and cost-effective WAN alternative to DSL or Frame Relay. In areas where terrestrial broadband services (cable, DSL, or T1) are not available or are expensive, 3G Wireless WAN connectivity can be a viable alternative. Using the integrated services available on the Cisco … Continue reading Configuring 3G and 4G Wireless WAN

Create a Bootable USB Flash Drive

To create a bootable USB flash drive Insert a USB flash drive into a running computer. Open a Command Prompt window as an administrator. Type diskpart. In the new command line window that opens, to determine the USB flash drive number or drive letter, at the command prompt, type list disk, and then click ENTER. The list disk command … Continue reading Create a Bootable USB Flash Drive