Posts

Showing posts from September, 2014

Cell Phone Location witthout Software

Image
hello Today will how too cell phone location without any software and free of cost frist Step Go Check ur Play Store .and Simply u Install Avg Anti-Virus Download and Installation of AVG Antivirus for Android Instructions: What are the minimum system requirements for installing and running AVG AntiVirus? In order to install and run AVG AntiVirus for Android, you need a mobile device with a touch screen running Android 2.2 or higher. What are the Android™ system requirements for supporting each feature? Some of the product features have specific system requirements regarding the Android version on the device. The following table lists the Android operating system requirement for each of these features: Feature Android OS requirement App Backup 2.x or higher Performance tools 2.x or higher Remote Locate 2.1 or higher Remote Lock 2.2 or higher Remote wipe 2.2 or higher Location service 2.1 or higher Where can I download AVG AntiVirus? You can downloa

Set up SSL connections

Image
Applies To: Windows Server 2003 with SP1 This section provides a detailed explanation of the SSL/TLS protocol, specifically the handshake protocol, its associated messages and alerts, and the record protocol. The Handshake Protocol The handshake protocol is a series of sequenced messages that negotiate the security parameters of a data transfer session. Figure 2 illustrates the message sequence in the handshake protocol. Initial Client Message to Server Client Hello. The client initiates a session by sending a Client Hello message to the server. The Client Hello message contains: Version Number. The client sends the version number corresponding to the highest version it supports. Version 2 is used for SSL 2.0, version 3 for SSL 3.0, and version 3.1 for TLS. Although the IETF RFC for TLS is TLS version 1.0, the protocol uses 3.1 in the version field to indicate that it is a higher level (newer and with more functionality) than SSL 3.0. Randomly Generated Data. ClientRandom[32]

CCNA QUESTION PART2

Q.  What is Subnetting? Why is it used? A  Used in IP Networks to break up larger networks into smaller subnetworks. It is used to reduce network traffic, Optimized network performance, and simplify management i.e. to identify and isolate network problems. Q. How do you change the Enable Secret password to CCNA? A: Router(config)# enable secret CCNA Q. How many access-lists are possible on an interface per protocol? A: There can be only one access list for in and one for out on each interface per protocol. 3. What happens to a packet which is not permitted in the access list? A: There is an implicit deny any at the end of an access list. So if the packet is not explicitly permitted, it will be dropped. 4. Which command is used to view what access-lists are on serial0 interface? A: show interface serial0 Q. Which show interface serial 1 status statement indicates that the shutdown command has been issued? A: Serial 1 is administratively down, the line protocol is dow

CCNA QUESTION & ANSWER

Image
A. What are two benefits of implementing a VLSM addressing scheme? (Choose two.) allows efficient use of address space supports hierarchical addressing capability supports only one subnet mask length throughout the entire network allows efficient use of larger routing tables to eliminate the need for route summarization solves the problem of discontiguous networks with classful routing protocols B. When running NAT, what is the purpose of address overloading? limit the number of hosts that can connect to the WAN allow multiple inside addresses to share a single global address force hosts to wait for an available address allow an outside host to share inside global addresses 1. What is the Network ID for the IP address 192.168.12.6, assuming default subnet mask? A: 192.168.12.0 2. What is the Node ID for the IP address 192.168.12.6, assuming default subnet mask? A: 0.0.0.6 3. What is the Network ID for the IPX address 2c.0000.0c56.de34? A: 2c 4. What i

Computer Cable

Image
 Today I Explain Type of cable ,please see image ,

OSI MODEL (Open Systems Interconnection model )

Image
To Day I Explain OSI MODEL,   Open Systems Interconnection model  ( OSI ) is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into  abstraction  layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO), maintained by the identification ISO/IEC 7498-1. The model groups communication functions into seven logical layers. A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of that path. Two instances at one layer are connected by a horizontal connection on that layer.  The Below Shown Diagram is helpful to understand the OSI seven Layer Model. OSI MODEL EXPLANATION The Physical Layer describ