Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Nilay Sharma

Level 30
Ask Nilay Sharma
482 Visits
0 Followers
0 Questions
Home/ Nilay Sharma/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 13, 2022In: Q & A

    How To Set Password Complexity In Redhat Linux 7?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 11:00 pm

    To set password complexity in Redhat Linux 7 follow the steps below: 1. Log into your server as root. 2. Open the file /etc/pam.d/system-auth. 3. Look for the line that reads: password requisite pam_cracklib.so try_first_pass retry=3 minlen=8 difok=4. 4. To enable complex passwords on your system, mRead more

    To set password complexity in Redhat Linux 7 follow the steps below:

    1. Log into your server as root.

    2. Open the file /etc/pam.d/system–auth.

    3. Look for the line that reads: password requisite pam_cracklib.so try_first_pass retry=3 minlen=8 difok=4.

    4. To enable complex passwords on your system, modify this line to read: password requisite pam_cracklib.so try_first_pass retry=3 minlen=14 difok=4 ucredit=-1 lcredit=-1 dcredit=-1 ocredit=-1.

    5. Save and close the file. 6. Run the “authconfig” command. 7. Reboot the server.

    This will ensure that users must use passwords that are at least 14 characters long with at least one character from four different categories (lowercase letter, uppercase letter, number, and symbol).

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 13, 2022In: Q & A

    How To Stop Dos Attacks On Router?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 10:59 pm

    1. Disable unused ports and services: By disabling ports and services that you don't need, you can help protect your router from malicious hacker attacks. 2. Use a firewall: Implementing a good firewall on the router is the best way to prevent DOS (denial of service) attacks and other malicious actiRead more

    1. Disable unused ports and services: By disabling ports and services that you don‘t need, you can help protect your router from malicious hacker attacks.

    2. Use a firewall: Implementing a good firewall on the router is the best way to prevent DOS (denial of service) attacks and other malicious activities.

    3. Change passwords regularly: Be sure to change your router‘s passwords on a regular basis. This will help prevent unauthorized access to the device.

    4. Use VPNs: Virtual Private Networks (VPNs) can provide an extra layer of security for your router by encrypting all incoming and outgoing traffic.

    5. Monitor network traffic: Use tools such as NetFlow or a Network Performance Monitoring tool to monitor your network traffic. These tools can help you identify suspicious activity and block any malicious traffic before it reaches your router.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 13, 2022In: Q & A

    How To Check User Login History In Active Directory?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 10:59 pm

    To check user login history in Active Directory, you can use the native Windows ‘Event Viewer’ tool. To do this, open Event Viewer, navigate to the ‘Security’ log, and look for events with the event ID 4624 and 4648. These event IDs record both successful and failed user logon attempts. You can alsoRead more

    To check user login history in Active Directory, you can use the native Windows ‘Event Viewer’ tool. To do this, open Event Viewer, navigate to the ‘Security’ log, and look for events with the event ID 4624 and 4648. These event IDs record both successful and failed user logon attempts. You can also use third–party software to get more detailed reports about user login history.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 13, 2022In: Q & A

    What Is The Difference Between Switch And Router?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 10:58 pm

    A switch is a device used to join two or more computer networks together within a local area network (LAN). They allow devices on different network segments to communicate as if they were on the same network. Switches make forwarding decisions based on MAC addresses, and also manage collisions on thRead more

    A switch is a device used to join two or more computer networks together within a local area network (LAN). They allow devices on different network segments to communicate as if they were on the same network. Switches make forwarding decisions based on MAC addresses, and also manage collisions on the network.

    A router is a device that forwards data between networks, including LANs and WANs. Routers can analyze incoming data packets and decide where to forward them based on IP address, allowing users to connect to the internet or other remote networks. Routers are responsible for routing packets of data across multiple networks, using protocols such as IP and ICMP to determine the best path to take.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 13, 2022In: Q & A

    Which Operating Systems Are Common In Cloud Data Centers?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 10:58 pm

    Common operating systems used in cloud data centers include Linux, Windows Server, Ubuntu, CentOS, Red Hat Enterprise Linux, and Oracle Linux.

    Common operating systems used in cloud data centers include Linux, Windows Server, Ubuntu, CentOS, Red Hat Enterprise Linux, and Oracle Linux.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 13, 2022In: Q & A

    How To Find Out Redhat Version On Linux?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 10:57 pm

    To find out the Red Hat version on Linux, you can use the command "cat /etc/redhat-release" This command will return the exact version of the Red Hat operating system running on the machine.

    To find out the Red Hat version on Linux, you can use the command “cat /etc/redhat–release“ This command will return the exact version of the Red Hat operating system running on the machine.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 13, 2022In: Q & A

    How To Check Broadcast Storm In Cisco Switch?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 10:57 pm

    1. Use the “show interface” command to check for high input and output errors on a specific port. If there are unusually high numbers for either of these, then it could be indicative of a broadcast storm. 2. You can also use the “show controllers” command to see if the port has excessive buffer dropRead more

    1. Use the “show interface” command to check for high input and output errors on a specific port. If there are unusually high numbers for either of these, then it could be indicative of a broadcast storm.

    2. You can also use the “show controllers” command to see if the port has excessive buffer drops. If this is the case, then this is a strong indication of a broadcast storm.

    3. You can run the “show mac–address” command to see which MAC addresses are sending or receiving too many frames. This can be used to pinpoint the source of the broadcast storm.

    4. If you are still not sure, you can use the “debug spanning–tree” command to see if any of the port states are transitioning between blocking/forwarding, this could also be caused by a broadcast storm.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 13, 2022In: Q & A

    How To Use Wifi When You Are Blocked?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 10:57 pm

    If you are blocked from using wifi, you may be able to access the internet using a mobile hotspot or a mobile data plan. You can also use a VPN (Virtual Private Network) to access the internet securely, although some websites may still block your access. Additionally, if your wifi is secured with aRead more

    If you are blocked from using wifi, you may be able to access the internet using a mobile hotspot or a mobile data plan. You can also use a VPN (Virtual Private Network) to access the internet securely, although some websites may still block your access. Additionally, if your wifi is secured with a password, you can try asking the network administrator for the password.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 13, 2022In: Q & A

    What Is Brute Force Attack In Cyber Security?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 10:56 pm

    A brute force attack is a method of cyber attack that involves forcing one's way into a system, website or database by systematically trying usernames, passwords and other combinations of information. It involves repeatedly trying different combinations of characters in an attempt to guess the correRead more

    A brute force attack is a method of cyber attack that involves forcing one’s way into a system, website or database by systematically trying usernames, passwords and other combinations of information. It involves repeatedly trying different combinations of characters in an attempt to guess the correct answers to gain entry. Brute force attacks usually try every letter and number combination possible until the correct answer is found.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 13, 2022In: Q & A

    How To Check If a Port Is Opened?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 13, 2022 at 10:55 pm

    The best way to check if a port is opened is to use the command prompt and type in netstat -a. This will list all of the opened ports on your system. Additionally, you can use various port scanning tools such as nmap or CurrPorts to scan for open ports.

    The best way to check if a port is opened is to use the command prompt and type in netstat –a. This will list all of the opened ports on your system. Additionally, you can use various port scanning tools such as nmap or CurrPorts to scan for open ports.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 337 338 339 340 341 … 499

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut