- How to check your public IP from cmdby dharmendraRun the below command The IP from non authoritative domain is your public IP
- Windows Powershell Commandsby dharmendraChange hostname to ‘WinSrv2022’ Join domain named “dharmendra.local” Check if the PC id joined to a domain Enable remote desktop from powershell Set-ItemProperty -Path ‘HKLM:\System\CurrentControlSet\Control\Terminal Server’ -name “fDenyTSConnections” -value 0
- Millet is worse than riceby dharmendraMillet is the worse diet, if you want to lose weight, dont eat millet.
- What is Samba in linux?by dharmendraSamba is an open-source software suite that allows Linux and Unix systems to communicate with Windows-based systems over a network. It provides file and print services, as well as authentication and authorization services, using the SMB (Server Message Block) protocol, which is used by Windows systems for sharing files and printers. Samba allows Linux and …
- What is ‘dig’ command in linx for?by dharmendraThe dig command in Linux is a powerful DNS (Domain Name System) lookup tool that is used to query DNS servers for information about domain names, IP addresses, and other DNS records. It is often used by system administrators and network engineers to troubleshoot DNS issues and verify DNS configurations. Here are some examples of …
- What is ‘find’ command in linux for?by dharmendraThe find command in Linux is used to search for files and directories in a specified directory hierarchy based on various search criteria. The find command can search for files based on their name, size, date modified, owner, and other attributes. It is a powerful tool for managing files and directories on a Linux system. …
- What is ‘top’ command in linux for?by dharmendraThe top command in Linux is a real-time system monitoring utility that shows the processes that are currently running on a system and their resource usage in real-time. It is similar to the ps command, but the output is constantly updated and provides a live view of the system’s performance. When you run the top …
- What is ‘ps’ command in linux for?by dharmendraThe ps command in Linux is used to display information about the currently running processes on a system. It shows information about the processes that are running in the foreground as well as the background. Here’s an example of how to use the ps command: $ ps aux The ps aux command displays a list …
- What is ‘df’ command in linux for?by dharmendraThe df command in Linux is used to display information about the file system usage on a particular file system or on all mounted file systems. The df command shows the amount of disk space that is used, available, and total, as well as the file system type and its mount point. Here’s an example …
- ip command in Linuxby dharmendraThe ip command in Linux is a powerful networking tool that allows you to configure and manage various aspects of network interfaces and addresses. The ip command can be used to: In summary, the ip command is a versatile tool that allows you to perform a wide range of networking tasks in Linux, from configuring …
- Difference between ‘apt-get’ and ‘yum’by dharmendraapt-get and yum are both package managers used in Linux, but they are associated with different package management systems. apt-get is used on Debian and Debian-based systems such as Ubuntu, and it uses the Advanced Packaging Tool (APT) to manage packages. APT is a powerful tool that can manage dependencies and install, update, and remove …
- Understanding File Systemby dharmendraFAT FAT (File Allocation Table) is a file system commonly used on older Windows computers and some other devices like memory cards and USB drives. There are two main versions of FAT: FAT16 and FAT32. FAT 16 FAT16 was the original version of FAT, introduced with MS-DOS 3.0 in 1987. It was the primary file …
- How to remove your IP from Gmail’s Blacklistby dharmendraImportant places to troubleshoot & submit the requests Troubleshooting for senders with email delivery issues https://support.google.com/mail/troubleshooter/2696779?visit_id=638131370158694120-2634727032&rd=3#MXToolbox Sender Contact Form https://support.google.com/mail/contact/gmail_bulk_sender_escalation Google Post Master Tool https://postmaster.google.com/u/0/managedomains
- Microsoft 365 Compliance Solutionsby dharmendraCompliance solutions in Microsft 365 are collections of integrated capabilities you can use to help you manage end to end compliance scenario. A solution’s capabilities and tools might include a combination of policies, alerts, reports, and more The solution catalog is organised into sections that contain information cards for each compliance solution available in your …
- Threat Protection solution of Microsoft 365by dharmendraMicrosoft 365 Defender Microsoft 365 Defender is a unified pre-and post-breach enterprise defense suite that natively coordinates to provide integrated protection against sophisticated attacks. Microsoft 365 Defender allows admins to assess threat signals from endpoints, applications, email, and identities to determine an attack’s scope and impact. It provides detailed insight on how the threat occurred …
- Microsoft Endpoint Managerby dharmendraMicrosoft 365 provides the tools and services you need to manage all kinds of devices through Microsoft Endpoint Manager (MEM). Microsoft Endpoint Manager is a secure and intelligent management solution that improves productivity and collaboration. MEM provides IT with the flexibility to support diverse scenarios for both “bring your own device (BYOD) and corporate-owned devices. …
- Deployment for Micrsoft. 365 Appsby dharmendraMicrosoft 365 Apps can be installed independantly by users on their devices. Managing updates and deploying a customised selection of Apps to users’ devices can help ensure that everyone has the apps they need. Four different methods to deploy Microsoft 365 Apps on a larger scale. Microsoft 365 Apps update channels types Microsoft provides with …
- Windows as a serviceby dharmendraWindows client is a comprehensive desktop operating system that allows you to efficiently and securely. Windows as a service (Waas) is Microsoft’s strategy of deploying, updating, and servicing the Windows operating system. Microsoft now updates Windows on a regular basis, rather than launching a new version every three to five years. With windows client, there …
- Understanding Comptia’s six steps of problem resolution processby dharmendraThe CompTIA six-step problem resolution process is a framework used to guide IT professionals in resolving technical issues effectively and efficiently. The six steps are:
- Understanding and troubleshooting issues related to video, projector, and displayby dharmendraBurned out bulb
- Understanding and troubleshooting print related issuesby dharmendraStreaks You may experience streaks on a printout with a laser printer due to the primary corona wire being dirty. To fix the problem, use a cleaning brush to clean the corona wire. Creased Paper If you are experiencing creases on your paper when printing, it could be due to the registration rollers being worn …
Understanding and troubleshooting print related issues Read More »
- Microsoft 365 Zero Trust Modelby dharmendraMicrosoft 365 zero trust model is a security framework designed to provide maximum security to Microsoft 365 users and data by treating all users and devices as potential threats, and only granting access based on a strict set of identity and access management policies. The zero trust model operates on the principle of “never trust, …
- Microsoft 365 different platforms and login linksby dharmendraMicrosoft 365 admin portal https://admin.microsoft.com/ Microsoft Exchange admin portal https://admin.exchange.microsoft.com/ Microsoft Teams admin portal https://admin.teams.microsoft.com/ Microsoft Power Apps portal https://admin.powerplatform.microsoft.com/ Microsoft 365 sharepoint portal https://tenantname-admin.sharepoint.com/ Microsoft 365 Onedrive portal https://tenantname-my.sharepoint.com/ Microsoft 365 Compliance portal https://compliance.microsoft.com/ Microsoft 365 Security | Microsoft 365 Defender https://security.microsoft.com/ Azure Active Directory | Entra https://entra.microsoft.com/ https://portal.azure.com/ Dynamic 365 Apps https://admin.powerplatform.microsoft.com/environments Office …
Microsoft 365 different platforms and login links Read More »
- Different types of network toolsby dharmendraCrimper A crimper is a tool used in networking to attach connectors to the ends of network cables, such as Ethernet cables. The process of attaching connectors to the ends of cables is known as crimping, and is used to create custom-length cables or to replace damaged connectors. The crimper tool typically consists of two …
- Understanding and troubleshooting issues related to networkby dharmendraIntermittent wireless connectivity There can be several causes of intermittent wireless connectivity, including: To address intermittent wireless connectivity, users can try several troubleshooting steps such as moving closer to the access point, reducing network congestion, updating drivers, configuring the router properly, and minimizing physical obstacles between the device and access point. Slow network speed There …
Understanding and troubleshooting issues related to network Read More »
- Understanding and troubleshooting issues related to storage drives and RAID arraysby dharmendraLED status indicators for hard drives in the server LED status indicators for hard drives in a server can vary depending on the server manufacturer and model. However, some common LED status indicators for hard drives in a server include: It is recommended to consult the server’s documentation or the manufacturer’s website to determine the …
Understanding and troubleshooting issues related to storage drives and RAID arrays Read More »
- Troubleshooting computer issues related to motherboard, RAM, CPU, and powerby dharmendraBlue screen of death The Blue Screen of Death (BSOD) is an error screen that appears on a Windows computer when the system encounters a critical error that it cannot recover from. There are several possible causes of a BSOD, including: When a BSOD occurs, it will display an error message with a specific error …
Troubleshooting computer issues related to motherboard, RAM, CPU, and power Read More »
- Power on Self Test Post Beepsby dharmendraThe POST (Power-On Self-Test) is a diagnostic process that runs when a computer boots up. During this process, the computer’s hardware is checked to ensure that it is functioning correctly. If there is a problem with any of the hardware components, the POST will produce a series of beeps to alert the user to the …
- Printersby dharmendraPCL vs PostScript drivers PCL (Printer Control Language) and PostScript are two different printer driver languages that allow computers to communicate with printers and produce printed output. While both languages serve the same purpose, there are some differences between them. In summary, while both PCL and PostScript drivers are used to communicate between computers and …
- Display Technology -Video Cablesby dharmendraMonitor Technology Liquid Crystal Display LCD All LCD monitors have to have some kinds of back lighting to them. In the first generation LCD, we used CCFL (Cold Cathode Flourscent Lamp) lamp. But in today’s world, we use LED (Light Emitting Diodes). So LCD panels have either LCD lamp or LED(mostly LED). Different types of …
- Hard Drive Cablesby dharmendraSerial Advanced Technology Attachment (SATA) For power For Data Small Computer System interface (SCSI) External SATA (eSATA) Integrated Drive Electronics (IDE) IDE is old tehnology with 40 pin ribon cbale connector. It is also called PAT – Parallel AT Bus Attachment. It supports two drives so thee are three connections in the cable. It does …
- Useful Powershell scriptsby dharmendraGet AD user with domain admin rights
- Types of power connectors for different computer componentsby dharmendra
- Repair tools in windowsby dharmendra
- Types of Backupby dharmendra
- Types of Video cardsby dharmendra
- Peripheral Cables – Types of adaptors, USB, and other connectorsby dharmendraUSB technology Transfer rate or Throughput USB 1.1 12 MBps USB 2.0 480 MBps USB 3.0 5 GBps USB 3.1 10 GBps USB connector Description Mini USB Popular for camera Micro USB Popular for mobile devices, which needs even smaller space USB C Because USB A only plugs in one way. So this frustration led …
Peripheral Cables – Types of adaptors, USB, and other connectors Read More »
- Process of Laser Printingby dharmendra
- Different types of portsby dharmendraProtocols Port Number FTP 20/21 Telnet 23 POP3 110 SSH 22 SMTP 25 DNS 53 DHCP 67/68 HTTP 80 SSL/TLS/HTTPS 443 RDP 3389 Network Basic Input Output System NETBIOS/NETBIOS Over TCP 137/139 IMAP 143 SNMP 161/162 LDAP 389 SMB/CIFS 445
- Malicious Software and Viruses & Social engineering attacks & Threatsby dharmendraMalware & Vuruses Name Characteristics Macro virus A macro virus is a type of malicious software (malware) that is designed to infect a computer system by exploiting vulnerabilities in software that uses macros, such as Microsoft Office programs like Word, Excel, and PowerPoint.A macro is a series of commands and instructions that can be recorded …
Malicious Software and Viruses & Social engineering attacks & Threats Read More »
- Types of Expansion Cardsby dharmendra
- BIOS & UEFIby dharmendra
- Types of Motherboardsby dharmendra
- Types of storage devices, their speeds and capacityby dharmendraOptical Media Name Speed Capacity DVD 5 SS SL (Single-sided, Single Layer) 4.7 GB DVD-9 SS DL (Single-sided, Double Layer) 8.5 GB DVD-10 DS SL (Double-sided Single Layer) 9.4 GB DVD-18 DS DL (Double-sided, Double Layer) 17 GB
- Types of RAMby dharmendraSpeed DDR PC3200 400 MHz DDR RAM Type No of Notche Number of Pins SDRAM 2 168 pins DDR 1 184 pins DDR2 1 240 pins DDR3 1 240 pins DDR4 1 288 pins DDR5 1 288 pins Synchronous RAM SDRAM – It is synchronised to the same crystal. It has 168 pins with two …
- Types of connectorsby dharmendra
- Types of hard drive cablesby dharmendra
- Types of Video cablesby dharmendra
- Types of Peripheral Cablesby dharmendra
- Types of Network Cablesby dharmendra
- Types of Display Technologyby dharmendra
- Different WiFi technology, frequency, speed, and available channelsby dharmendraWifi Technology Speed Frequency Channels Maximum Range 802.11a 5 GHz 12 non overlapping channels 802.11b 11 MBps 2.4 GHz 14 Channels 802.11g2003 54 MBps 2.4 GHz 100 feet 802.11n 200 MBps 2.4 & 5 GHz 802.11ac WiFi 5 500 GBps 2.4 & 5 GHz 802.11ax WiFi 6 2.4 & 5 GHz 12 Channels Technology Maximum …
Different WiFi technology, frequency, speed, and available channels Read More »
- Different types of RAID configurationby dharmendraRAID Type Description Disks needed RAID 0 Two or more hard drives that are bound together into a single virtual disk volume. Data is written to the stripe set across the array instead of one disk at a time. This provides RAID 0 with a definite performance improvement over non-RAID storage simply because you’re drastically …
- RAID Typeby dharmendraRAID Description
- Different types of processors and their sockets, speeds, cache, and bus architectureby dharmendraIntel Processors Processor Chip & Socket Processor Speeds Cache Bus Architecture Pentium1993 PGA ChipSocket 5, Socket 7 60, 66, 75, 90, 199, 120, 133, 150, 166 & 200 MHz 16K of L1 cache divided into two 8k channelsOne channel is the data cache and another is the application code cache Address: 32 bitRegisters: 32 bitData: …
Different types of processors and their sockets, speeds, cache, and bus architecture Read More »
- Public and Private IP Address Rangesby dharmendraPrivate IP Address Ranges Public IP Address Ranges All public IP addresses belong to one of the following public IP address ranges: The number in Class B addresses’ first octet ranges from 128 to 191. The number in Class A addresses’ first octet ranges from 1 to 126, and the number in Class C IP …
- OSI Modelby dharmendraLayer Description Notes 7 Application Responsible for making or receiving a network request and a typically the networking software. For example, a web server, FTP Server, and DNS Server run at thihs layer. -Closest to the end user-Communicates with software application-HTTP, HTTPS are protocols used-Doesn’t include the applications itself but just the protocol-Identifies communication partners …
- IEEE Standardsby dharmendraStandard Description 802.1 Internetworking 802.2 Logical Link Control (LLC) 802.3 Ethernet (CSMA/CD) 802.3af POE 802.3at POE+ 802.4 Token Bus LAN 802.5 Token Ring LAN 802.6 Metropolitan Area Network 802.7 Broadband Technical Advisory Group 802.8 Fiber Optic Technical Advisory Group 802.9 Integrated Voice/Data Network 802.10 Network Security 802.11 Wireless Networks 802.12 Demand Priority Access LAN IEEE-1394 …
- Network cablesby dharmendraCategory Max Speed Max Length Cat 5 100 Mbps 100 metre Cat 5e 1 Gbps 100 metre Cat 6 10 Gbps 1GBps at lengths upto 100 metre, 10GBps upto lengths 55 metre. Cat 6a 10 Gbps 100 metre Cat 7 10 Gbps Wiring standard When looking at UTP cabling, two common standards have been defined …
- How to setup AWS SES SMTP Relay on Windows Serverby dharmendraSMTP is used in CRM Applications, websites, scanners, databses, and many systems for the purpose of sending the email notification. Some CRM supports basic authenticatoin as well as TLS. However, some only supports basic authentication but doesn’t support TLS. In this scenario, we can utilise AWS SMTP SES. If you have CRM that only supports …
How to setup AWS SES SMTP Relay on Windows Server Read More »