Featured
-
7 points every software developer should know about Linux administration
Linux is a particular field in itself, however, in
by pravesh.singh -
quick run commands for Windows XP.
here are some useful commands which we can use to
by lalit.bisht -
Linux basics
Here is some basic information about Linux. Lin
by lalit.bisht -
Install Image Magick on linux CentOS
We can easily install image magick on linux centos
by lalit.singh -
How to Clear Skype User Name History from the Log-in screen
When you sign in to Skype, your Skype Log-In name
by sachin.joshi
Tags
What is MTR and How to install MTR
MTR is a network monitoring tool having the functionality of PING and TRACEROUTE. It monitors the performance and latency across the machine/hop from source or local machine to destination machine.
MTR helps in checking:
1....
11 Best Ways Increase Your Ecommerce Business Traffic and Sales
1. Concentrate on your present customers
Exactly when business experience trouble creating, they rapidly accept this is because they need more customers. This is a run of the mill misinformed judgment, so don't make a hurried judgment. Ins...
10 Things to Consider When buying a Router (Beginner Guide)
Today, the government offices, companies, banks, schools, colleges, and all other locations have a router. Internet will be like a basic need these days without which you are unable to survive. Within many companies, employees find it difficult t...
Why to Get a CCNA Certification and How to Prepare for Better IT Job?
CCNA (Cisco Certified Network Associate) is one of the most prestigious certifications in the industry. The certification increases your chances of landing to a high profile job in a reputed organisation easily with a handsome pay. It not only pr...
Choose The Best Website Hosting Type For Your Business
These days businesses are making the use of online platforms in order to represent their company brand, products, and services to a huge number of online users There are several web hosting companies out there that are providing dif...
About Zepto Virus
Introduction to Zepto Virus
Zepto Ransomware:
Zepto is unique type of virus whose purpose is to infect the system through ' spam ' emails. Most of the virus program uses algorithm, similarly Ransomware also uses algorithm ...
Concept of multiplexing
Welcome to Findnerd. Today we are going to discuss the concept of multiplexing in networking. Please have a look.
Multiplexing
Multiplexing is nothing but a process or a way to transmit the two or more signals over a communication channel a...
Concept of switching
Welcome to FindNerd. Today we are going to discuss the switching concept and its types in networking.
My aim is to describe the concept of networking so we are going to start with switching. Please have a look.
Switching
Switching is a t...
5 Easy Steps Your Business Can Take To Stand Out
The world of business is growing exponentially as time passes. Entrepreneurs and small business are practically coming out of the woodwork in the United States – which is a great thing! Small businesses mean more niche products and services...
What is Difference Between HTTP 1.1 and HTTP/2 ?
Difference between HTTP 1.1 and HTTP/2
HTTP/2 is a new version of the Hypertext Transport Protocol. HTTP/2 is used to deliver pages to the browser from server on the Web. It is the first major update of HTTP. In 1999 HTTP was introduced, durin...
Define ALOHA Method used in Networking
Aloha,also called the Aloha method used in networking it is a multiple access protocol at the datalink layer.
It refers to a simple communications scheme in which each source i.e transmitter in a network sends a data whenever there i...
Ring Topology
As the name itself defines Ring Topology is the topology which forms a ring in network. In Ring Topology one computer is connected to second computer and second computer is connected to third computer and following the same wa...
WAN Connection Types
WAN stands for Wide Area Network. It is often used to cover a large geographical distance.
Wan connection can be established in many ways. The commonly used WAN Connection Types are:
Leased Line
Dedicated Line
Permanent c...
Application Layer Protocols
The application layer provides an interface between software running on a computer and network itself.
There are various application layer protocols, majorly used ones are listed below :
HTTP
Allows to access web page.
80 port...
What are Routers
Router is an inter-networking device which is used to connect two or more networks.
Cisco Hierarchy Design Model:
Access layer Router
(Low cost/ Low processing/ Less
port)
Routers which are used by small
organization and a...
RTO while making requests
RTO mainly means Request Time Out
It occurs when we send request to the server and it does not give response. But it does not mean that we dont have internet connectivity sometimes RTO occurs because of delay by the responding server.
So R...
Thin Client
Thin Client
A thin client is a desktop terminal that has no hard drive. All features typically found on the desktop PC, including applications,memory,RAM except of the hard disk.
You have your data at the main server and all the system act...
Use of Network Address Translator
Network Address Translater
In office and in places where we have multiple systems sharing the same internet connection single IP Internet Protocol is used for it assigned by the ISP Internet Service Provider.
But how is it possible to use s...
Internet bandwidth
Welcome to Findnerd. Today we are going to discuss the network bandwidth. We do all the personal as well as business things online. Network speed is depend upon the
bandwidth. We use the internet on specific bandwidth. If you upload the file or ...
Virtual Private Network and it's type
VPN is a network technology that is used to create secure network connection over a public network Corporations like government organizations , educational institutions use VPN technology so as to help remote users to securely communicate with a ...
Create Subdomains on the fly using .htaccess file?
If you are creating subdomains using htaccess for this, you have to set the virtual host
Follow the below steps.
Step 1: Create a wildcard DNS entry first.
*.domain.com. 3600 A 127.0.0.1
Step 2: Now Setup the Virtual Host, in yo...
htaccess to allow for more then one address without asking for Authentication
Suppose we are working on a project in a local area network where all developer have same IP Address. then most of times its a requirement that project must be accessed directly without authentication.
But at the same case if any one tryin...
Why do we use Subnetting
Subnetting is the process of dividing a single network into multiple small networks.
Converting host bits into network bits i.e. converting 0s into 1s
Subnetting helps in minimizing the wastage of IP address.
For Example ...
Basics of IP addressing
What is IP Address ?
IP is an address which is given to each and every device in a network.
It's a logical address given to devices in a network.
It Works in Network layer
IP Versions:
1> IPv4
- 32 bits(represented by 0 and...
How to make pendrive bootable using command prompt for windows?
If you are trying to make Pen-drive bootable, you can do this by using cmd prompt.
Follow the below steps-
First make sure to insert the usb drive and then go to Command Prompt---> press start+r key to open run and type cmd in to open comm...
Bandwidth and Latency in a network?
Bandwidth: - Throughput of the network is known as Bandwidth of network.
Latency : - Delay of the network is known as Latency of network.
Network performance is basically measured in both of the above entity Bandwidth (throughput) and La...
How to get network information using different commands
This tutorial will help user to learn how to trace hop by hop destination of end host , use commands nslookup,netstat,pathping command with different switches to get more information over network.
The tracert command is a Command Prompt com...
How to hide or disable directory listing via htaccess - Linux
It's hard to believe in coincidence but the truth is that lot of developers including senior ones, don't know or bother about this security issue.
A lot of times we found that we can see list of all Images, CSS, JavaScript files hosted on serv...
How to import large .sql file to mysql via terminal
If you want to import large sql file to mysql via terminal, here are the steps:
First go to terminal, for Linux (UBNTU) user can go directly by pressing Ctrl-Alt-t key.
Now write down the following commands in Terminal.
mysql -u <userna...
7 points every software developer should know about Linux administration
Linux is a particular field in itself, however, in the event as a developer you know how to handle some regular assignments. You can get great turn around and also can upgrade your application for execution. Simple and effective organization proc...
quick run commands for Windows XP.
here are some useful commands which we can use to run the application quickly .
Description
Command
Administrative Tools
control.exe admintools
Device Managerdevmgmt.msc
Direct X Control Panel directx.cpl
Auto...
Linux basics
Here is some basic information about Linux.
Linux is basically a UNIX operating system, it is a open source OS which is easily available in market, Linux is made with only one thought in mind :- Everything is a file.
Means almost everything y...
Install Image Magick on linux CentOS
We can easily install image magick on linux centos by following the below given steps :
$ yum install make
$ yum install gcc
$ yum install php php-fpm php-devel php-pear
$ yum install ImageMagick ImageMagick-devel
$ pecl install imagick
$...
How to Clear Skype User Name History from the Log-in screen
When you sign in to Skype, your Skype Log-In name is saved automatically on the sign in screen top-down menu, only if you log-in successfully.
So to remove Skype name from the log-in screen follow the steps below:
For Linux users:
First...
How to copy entire folder in linux
While working on linux we usually need command to copy folder from one location to another , this can be archived by simple console commands in a simple way :
cp -r sourcedir targetdir : Where -r means recursively i.e all the files in a folder...
zip/unzip file on linux server through command prompt
Create zip file of existing folder on linux server use below command -
"zip -r folder.zip target_foldername"
To unzip an zip file -
"unzip filename.zip"
Restart MySql on linux server through command
To restart MySql on Linux server through command prompt follow the below steps -
i) First go to root through -
"sudo -i "
ii) Then use the below command -
"service mysqld restart"
Stateless Protocol Vs Stateful Protocol
In stateless protocol there is no record of the state is saved at server end.Client send request to the server and server response back according to current state. A stateless server does not keeps state between connections.So,When you send a req...