Linux and Unix

Linux Disk Management

In Linux there is only one file system; so storage devices are not a root in itself, as is the case in Windows systems. However each storage hardware device corresponds to an object in the/dev directory; However, we cannot access the data that it contains from there. Hardware devices are identified by two names: first, […]

Cisco IOS Technologies

Cisco CCNA – EtherChannel

EtherChannel (Link aggregation) : In this chapter, we’ll take a look at EtherChannel which is also known as link aggregation or port-channel. EtherChannel is a technology that lets you bundle multiple physical links into a single logical link. We’ll take a look at how it works and what the advantages of EtherChannel are. Take a […]


Why You Should Avoid Public USB Charging Areas

On a trip, being in possession of a fully charged phone is almost essential. Whether for the trip itself or simply for entertainment, a charged phone remains the basis of a perfect trip. Only here, rare are the geniuses of everyday life who think to recharge their smartphone before their arrival at the station, or […]

Sûreté et sécurité informatique

Outils de sécurité et surveillance du réseau

ethereal Ethereal est un analyseur de protocole de réseau gratuit pour Unix et Windows. Il examine les données à partir d’un résau en direct ou à partir d’une capture de fichier sur disque. Vous pouvez naviguer de façon interactive sur les données capturées, visionner le résumé et l’information détaillée pour chaque ensemble. Ethereal possède quelques […]

Cisco IOS Technologies

Understanding and Configuring VLANs – Cisco Course

Let’s start off by showing you a picture of a network: Look at this picture for a minute, we have many departments and every department has its own switch. Users are grouped physically together and are connected to their switch. what do you think of it? Does this look like a good network design? If […]

Safety And Security Tips

What is Wiretap Violation?

Accessing e-mails or computer files by a spouse with the help of PIN(s) or Password of the other, but without their permission, is a clear violation of the Wiretap Statute. Nevertheless, it is a violation only if the information is in the transmission stage and not if it is in the post-transmission storage. Additionally, such […]

Safety And Security

Solving Crime With Computer Forensics

Computer Forensics is the scientific study of computers or computer related data in relation to an investigation by a law enforcement agency for use in a court of law. While this technology may be as old as computers themselves, the advances in technology are constantly revising this science. In the technological old days, computer forensics […]


Computer Security Ethics and Privacy

Computer Security Risk Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For […]


Computer Help – Where and How to Get It

Well there’s no denying it – No matter how new or how well maintained our computers are, we all encounter computer problems sooner or later. The good news is that we don’t have to face them alone. There are a ton of resources available to walk us through computer issues but it may take a […]


A Computer And Internet Beginner Glossary

When you use computers and the Internet in your business, it’s all too easy to start feeling like you’re drowning in a sea of nonsense. Computer-related things tend to have a language all their own, and while you don’t need to know all of it, there are many confusing words and phrases that you’re going […]