Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Nilay Sharma

Level 30
Ask Nilay Sharma
482 Visits
0 Followers
0 Questions
Home/ Nilay Sharma/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 12, 2022In: Q & A

    Nmap You Requested a Scan Type Which Requires Root Privileges?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:28 pm

    Nmap does not require root privileges to run port scans. However, in order for Nmap to perform some of the more advanced scan types (such as OS fingerprinting and version detection), you will need root privileges. This is because these scans require sending special probes and require access to Raw IRead more

    Nmap does not require root privileges to run port scans. However, in order for Nmap to perform some of the more advanced scan types (such as OS fingerprinting and version detection), you will need root privileges. This is because these scans require sending special probes and require access to Raw IP Sockets which normal users don’t have access to.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 12, 2022In: Q & A

    Which One Of These Can Connect Directly To The Internet?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:27 pm

    A modem.

    A modem.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 12, 2022In: Q & A

    How To Find a Ip Camera On Network?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:27 pm

    1. Use IP Scanner software like Advanced IP Scanner or Angry IP Scanner to detect the IP address of a camera on a network. 2. Use the manufacturer's software to locate and identify the IP camera. 3. Use nmap command in command prompt to scan for devices on the network that might be cameras. 4. VerifRead more

    1. Use IP Scanner software like Advanced IP Scanner or Angry IP Scanner to detect the IP address of a camera on a network.

    2. Use the manufacturer‘s software to locate and identify the IP camera.

    3. Use nmap command in command prompt to scan for devices on the network that might be cameras.

    4. Verify the MAC address of the device using a tool like Wireshark.

    5. If a camera is not listed, then manually assign an IP address to the camera and open the configuration page of the camera.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 12, 2022In: Q & A

    How To Go On Dark Web?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:26 pm

    To access the dark web, you need to use a special browser called Tor (The Onion Router). Tor is a free and open-source software that allows users to browse the internet anonymously. It encrypts user data and sends it through a series of nodes, making it nearly impossible to track their location or iRead more

    To access the dark web, you need to use a special browser called Tor (The Onion Router). Tor is a free and open–source software that allows users to browse the internet anonymously. It encrypts user data and sends it through a series of nodes, making it nearly impossible to track their location or identity. Once you have downloaded the Tor browser, you can enter .onion URLs to access the dark web.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 12, 2022In: Q & A

    How To Ping Ip With Port?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:25 pm

    To ping an IP address with a specific port, you need to use the telnet command. The syntax is: telnet <IP Address> <Port> For example, if you wanted to ping the IP address 192.168.1.1 and port 80, you would type: telnet 192.168.1.1 80

    To ping an IP address with a specific port, you need to use the telnet command. The syntax is:

    telnet <IP Address> <Port>

    For example, if you wanted to ping the IP address 192.168.1.1 and port 80, you would type:

    telnet 192.168.1.1 80

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 12, 2022In: Q & A

    How To Samba Share In Linux?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:24 pm

    1. Make sure Samba is installed and running on your Linux system. To install, run "sudo apt-get install samba" and to start the Samba service, run "sudo service smbd start". 2. Create a folder in your file system which you would like to share using Samba. For example, "sudo mkdir /public" will creatRead more

    1. Make sure Samba is installed and running on your Linux system. To install, run “sudo apt–get install samba“ and to start the Samba service, run “sudo service smbd start“.

    2. Create a folder in your file system which you would like to share using Samba. For example, “sudo mkdir /public“ will create a folder named “public“ in the root directory.

    3. Change the ownership of the folder so that Samba can access it. For example, “sudo chown –R nobody:nogroup /public“ will give the “nobody“ user group ownership of the folder.

    4. Configure Samba for sharing the folder. Edit the “/etc/samba/smb.conf“ file with the following settings:

    [global]

    workgroup = WORKGROUP

    server string = Samba

    Server security = user log

    file = /var/log/samba/log.%m

    max log size = 5

    name resolve order = bcast

    hosts allow =

    hosts deny =

    [Public]

    path = /public

    browsable = yes

    writable = yes

    guest

    ok = yes

    5. Restart the Samba service to apply the new settings. Run “sudo service smbd restart“ to restart Samba.

    6. Connect to the shared folder from another computer on the same network. On Windows, open Windows Explorer and navigate to “\\[linux–computer–name]\public“. Replace “[ linux–computer–name]” with the name of your Linux computer. You can also use its IP address instead.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 12, 2022In: Q & A

    How To Enable Remote Desktop Firewall Windows 10?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:22 pm

    1. Click the Start button and type "allow remote access..." into the search box, then select Allow Remote Access to Your Computer. 2. On the System Properties window, click the Remote tab. 3. Under Remote Desktop, select Allow connections from computers running any version of Remote Desktop. 4. ClicRead more

    1. Click the Start button and type “allow remote access…” into the search box, then select Allow Remote Access to Your Computer.

    2. On the System Properties window, click the Remote tab.

    3. Under Remote Desktop, select Allow connections from computers running any version of Remote Desktop.

    4. Click the Select Users or Groups button.

    5. On the Select Users or Groups window, select the user accounts that you want to be able to connect remotely.

    6. Click OK to confirm your changes.

    7. Click the Apply button, then click the OK button to save your changes.

    8. Open Windows Firewall and select Allow and app or feature through Windows Firewall.

    9. On the Allowed apps and features window, scroll down and select Remote Desktop, then choose Allow another app.

    10. On the Add an App window, locate the Remote Desktop app, then select Add.

    11. Click OK to save your changes.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 12, 2022In: Q & A

    Which Is True Regarding Dynamic Routing?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:21 pm

    Dynamic routing is the process of determining the best path for data packets to travel from one network node to another based on real-time conditions such as link congestion and load. It is used in larger networks and is more adaptive than static routing.

    Dynamic routing is the process of determining the best path for data packets to travel from one network node to another based on real–time conditions such as link congestion and load. It is used in larger networks and is more adaptive than static routing.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 12, 2022In: Q & A

    How To Take Screenshot In Cisco Webex Meeting?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:21 pm

    1. During the Cisco Webex meeting, navigate to the menu and click on the “More” option. 2. From the drop-down menu, select the “Screenshot” option. 3. Once the screenshot is taken, it will be stored in the computer's local folder. 4. A notification in the chat box will appear to confirm a successfulRead more

    1. During the Cisco Webex meeting, navigate to the menu and click on the “More” option.

    2. From the drop–down menu, select the “Screenshot” option.

    3. Once the screenshot is taken, it will be stored in the computer‘s local folder.

    4. A notification in the chat box will appear to confirm a successful capturing of the screenshot.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 12, 2022In: Q & A

    What Is The Media Access Method Used By Ethernet?

    Nilay Sharma
    Nilay Sharma Level 30
    Added an answer on December 12, 2022 at 6:20 pm

    The media access method used by Ethernet is Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

    The media access method used by Ethernet is Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 368 369 370 371 372 … 499

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut