Join the social network of Tech Nerds, increase skill rank, get work, manage projects...
 

Why to Get a CCNA Certification and How to Prepare for Better IT Job?

CCNA (Cisco Certified Network Associate) is one of the most prestigious certifications in the industry. The certification increases your chances of landing to a high profile job in a reputed organisation easily with a handsome pay. It not only pr...

Choose The Best Website Hosting Type For Your Business

  These days businesses are making the use of online platforms in order to represent their company brand, products, and services to a huge number of online users There are several web hosting companies out there that are providing dif...

About Zepto Virus

Introduction to Zepto Virus Zepto Ransomware:   Zepto is unique type of virus whose purpose is to infect the system through ' spam ' emails. Most of the virus program uses algorithm, similarly Ransomware also uses algorithm ...

Concept of multiplexing

Welcome to Findnerd. Today we are going to discuss the concept of multiplexing in networking. Please have a look. Multiplexing Multiplexing is nothing but a process or a way to transmit the two or more signals over a communication channel a...

Concept of switching

Welcome to FindNerd. Today we are going to discuss the switching concept and its types in networking. My aim is to describe the concept of networking so we are going to start with switching. Please have a look. Switching Switching is a t...

5 Easy Steps Your Business Can Take To Stand Out

The world of business is growing exponentially as time passes. Entrepreneurs and small business are practically coming out of the woodwork in the United States – which is a great thing! Small businesses mean more niche products and services...

What is Difference Between HTTP 1.1 and HTTP/2 ?

Difference between HTTP 1.1 and HTTP/2 HTTP/2 is a new version of the Hypertext Transport Protocol. HTTP/2 is used to deliver pages to the browser from server on the Web. It is the first major update of HTTP. In 1999 HTTP was introduced, durin...

Define ALOHA Method used in Networking

Aloha,also called the Aloha method used in networking it is a multiple access protocol at the datalink layer.   It refers to a simple communications scheme in which each source i.e transmitter in a network sends a data whenever there i...

Ring Topology

As the name itself defines Ring Topology is the topology which forms a ring in network. In Ring Topology one computer is connected to second computer and second computer is connected to third computer and following the same wa...

WAN Connection Types

WAN stands for Wide Area Network. It is often used to cover a large geographical distance. Wan connection can be established in many ways. The commonly used WAN Connection Types are: Leased Line Dedicated Line Permanent c...

Application Layer Protocols

The application layer provides an interface between software running on a computer and network itself. There are various application layer protocols, majorly used ones are listed below : HTTP Allows to access web page. 80 port...

What are Routers

Router is an inter-networking device which is used to connect two or more networks. Cisco Hierarchy Design Model: Access layer Router (Low cost/ Low processing/ Less port) Routers which are used by small organization and a...

RTO while making requests

RTO mainly means Request Time Out It occurs when we send request to the server and it does not give response. But it does not mean that we dont have internet connectivity sometimes RTO occurs because of delay by the responding server. So R...

Thin Client

Thin Client A thin client is a desktop terminal that has no hard drive. All features typically found on the desktop PC, including applications,memory,RAM except of the hard disk. You have your data at the main server and all the system act...

Use of Network Address Translator

Network Address Translater In office and in places where we have multiple systems sharing the same internet connection single IP Internet Protocol is used for it assigned by the ISP Internet Service Provider. But how is it possible to use s...

Internet bandwidth

Welcome to Findnerd. Today we are going to discuss the network bandwidth. We do all the personal as well as business things online. Network speed is depend upon the bandwidth. We use the internet on specific bandwidth. If you upload the file or ...

Virtual Private Network and it's type

VPN is a network technology that is used to create secure network connection over a public network Corporations like government organizations , educational institutions use VPN technology so as to help remote users to securely communicate with ...

Create Subdomains on the fly using .htaccess file?

If you are creating subdomains using htaccess for this, you have to set the virtual host Follow the below steps. Step 1: Create a wildcard DNS entry first. *.domain.com. 3600 A 127.0.0.1 Step 2: Now Setup the Virtual Host, in yo...

htaccess to allow for more then one address without asking for Authentication

Suppose we are working on a project in a local area network where all developer have same IP Address. then most of times its a requirement that project must be accessed directly without authentication. But at the same case if any one tryin...

Why do we use Subnetting

Subnetting is the process of dividing a single network into multiple small networks. Converting host bits into network bits i.e. converting 0s into 1s Subnetting helps in minimizing the wastage of IP address. For Example ...

Basics of IP addressing

What is IP Address ? IP is an address which is given to each and every device in a network. It's a logical address given to devices in a network. It Works in Network layer IP Versions: 1> IPv4 - 32 bits(represented by 0 and...

How to make pendrive bootable using command prompt for windows?

If you are trying to make Pen-drive bootable, you can do this by using cmd prompt. Follow the below steps- First make sure to insert the usb drive and then go to Command Prompt---> press start+r key to open run and type cmd in to open comm...

Bandwidth and Latency in a network?

Bandwidth: - Throughput of the network is known as Bandwidth of network. Latency : - Delay of the network is known as Latency of network. Network performance is basically measured in both of the above entity Bandwidth (throughput) and La...

How to get network information using different commands

This tutorial will help user to learn how to trace hop by hop destination of end host , use commands nslookup,netstat,pathping command with different switches to get more information over network. The tracert command is a Command Prompt com...

How to hide or disable directory listing via htaccess - Linux

It's hard to believe in coincidence but the truth is that lot of developers including senior ones, don't know or bother about this security issue. A lot of times we found that we can see list of all Images, CSS, JavaScript files hosted on serv...

How to import large .sql file to mysql via terminal

If you want to import large sql file to mysql via terminal, here are the steps: First go to terminal, for Linux (UBNTU) user can go directly by pressing Ctrl-Alt-t key. Now write down the following commands in Terminal. mysql -u <userna...

7 points every software developer should know about Linux administration

Linux is a particular field in itself, however, in the event as a developer you know how to handle some regular assignments. You can get great turn around and also can upgrade your application for execution. Simple and effective organization proc...

quick run commands for Windows XP.

here are some useful commands which we can use to run the application quickly . Description Command Administrative Tools control.exe admintools Device Managerdevmgmt.msc Direct X Control Panel directx.cpl Auto...

Linux basics

Here is some basic information about Linux. Linux is basically a UNIX operating system, it is a open source OS which is easily available in market, Linux is made with only one thought in mind :- Everything is a file. Means almost everything y...

Install Image Magick on linux CentOS

We can easily install image magick on linux centos by following the below given steps : $ yum install make $ yum install gcc $ yum install php php-fpm php-devel php-pear $ yum install ImageMagick ImageMagick-devel $ pecl install imagick $...

How to Clear Skype User Name History from the Log-in screen

When you sign in to Skype, your Skype Log-In name is saved automatically on the sign in screen top-down menu, only if you log-in successfully. So to remove Skype name from the log-in screen follow the steps below: For Linux users: First...

How to copy entire folder in linux

While working on linux we usually need command to copy folder from one location to another , this can be archived by simple console commands in a simple way : cp -r sourcedir targetdir : Where -r means recursively i.e all the files in a folder...

zip/unzip file on linux server through command prompt

Create zip file of existing folder on linux server use below command - "zip -r folder.zip target&#95;foldername" To unzip an zip file - "unzip filename.zip"

Restart MySql on linux server through command

To restart MySql on Linux server through command prompt follow the below steps - i) First go to root through - "sudo -i " ii) Then use the below command - "service mysqld restart"

Stateless Protocol Vs Stateful Protocol

In stateless protocol there is no record of the state is saved at server end.Client send request to the server and server response back according to current state. A stateless server does not keeps state between connections.So,When you send a req...
Sign In
                           OR                           
                           OR                           
Register

Sign up using

                           OR                           
Forgot Password
Fill out the form below and instructions to reset your password will be emailed to you:
Reset Password
Fill out the form below and reset your password: