Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Yepuri Kalyani

Bronze
Ask Yepuri Kalyani
107 Visits
0 Followers
0 Questions
Home/ Yepuri Kalyani/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: December 28, 2022In: Q & A

    How To Find Out If Your Email Has Been Hacked?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 6:00 pm

        1. Check your sent mail folder. If you notice emails that you didn’t send, then it is likely that your account has been hacked. 2. Monitor your account activity. Log in to your email account and check your recent activity. If you see any suspicious activity, such as emails sent to peopRead more

     

     

    1. Check your sent mail folder. If you notice emails that you didn’t send, then it is likely that your account has been hacked.

    2. Monitor your account activity. Log in to your email account and check your recent activity. If you see any suspicious activity, such as emails sent to people you don’t know or emails with strange content, then your email may have been hacked.

    3. Check for unfamiliar logins. Look for any logins from unfamiliar IP addresses that you don’t recognize. This could mean that someone has logged into your account from a different location.

    4. Look for suspicious emails. If you receive emails from people you don’t know, or email from companies you’ve never interacted with, then your account may have been hacked.

    5. Change your password. If you’re still not sure if your account has been hacked, change your password as a precaution. Make sure to choose a strong, unique password that you haven’t used before.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: December 28, 2022In: Q & A

    How To Check Cpu Usage Of a Process In Linux?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:59 pm

    To check the CPU usage of a process in Linux, you can use the command “top”. This command provides an overview of the CPU usage of all processes running on the system, including the ones that are currently active. You can also use the command “ps” to list all running processes and their CPU usage.

    To check the CPU usage of a process in Linux, you can use the command “top”. This command provides an overview of the CPU usage of all processes running on the system, including the ones that are currently active. You can also use the command “ps” to list all running processes and their CPU usage.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: December 28, 2022In: Q & A

    How Long Is a Subnet Mask?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:59 pm

    A subnet mask is typically expressed as a 32-bit number with four octets, separated by periods. For example, 255.255.255.0 is a commonly used subnet mask.

    A subnet mask is typically expressed as a 32-bit number with four octets, separated by periods. For example, 255.255.255.0 is a commonly used subnet mask.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: December 28, 2022In: Q & A

    How To Start Your Own Wifi Company?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:58 pm

    1. Research your local market and competitors. Gather data on the current demand for wifi services, as well as the existing competition in your area. 2. Develop a business plan. This should include an assessment of your local market, an analysis of your competition, a description of your target custRead more

    1. Research your local market and competitors. Gather data on the current demand for wifi services, as well as the existing competition in your area.

    2. Develop a business plan. This should include an assessment of your local market, an analysis of your competition, a description of your target customer, and a financial plan.

    3. Acquire the necessary licenses and permits. Check with your local and state governments to determine what licenses and permits are necessary to operate a wifi business in your area.

    4. Purchase the necessary equipment. You will need to purchase routers, modems, and other wifi-related equipment.

    5. Set up your network. You will need to configure your routers, modems, and other equipment to create your wifi network.

    6. Market your services. Create a website, advertise in local newspapers, and pursue other marketing strategies to attract customers.

    7. Monitor your network. Monitor your network to ensure that it is running smoothly and that customers are able to connect without any issues.

    8. Explore other services. Consider offering additional services such as web hosting, VoIP, and cloud storage to increase your revenue.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: December 28, 2022In: Q & A

    How To Count Hops In Traceroute?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:58 pm

    To count the hops in a traceroute, you can use the command line tool tracert. This tool will output a list of each hop along the route from your computer to the target destination. Each hop is numbered in the list, so you can easily count them. You can also use a traceroute visualizer, such as VisuaRead more

    To count the hops in a traceroute, you can use the command line tool tracert. This tool will output a list of each hop along the route from your computer to the target destination. Each hop is numbered in the list, so you can easily count them. You can also use a traceroute visualizer, such as VisualRoute or WinMTR, to graphically display the traceroute with each hop numbered.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: December 28, 2022In: Q & A

    How To Configure Extended Access List?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:57 pm

    1. Log into the router. 2. Enter the configuration mode. 3. Enter the command “access-list [number] [permit/deny] [source] [destination]” where [number] is the number of the extended access list, [permit/deny] is the action to take on the specified source/destination, [source] is the source addressRead more

    1. Log into the router.

    2. Enter the configuration mode.

    3. Enter the command “access-list [number] [permit/deny] [source] [destination]” where [number] is the number of the extended access list, [permit/deny] is the action to take on the specified source/destination, [source] is the source address of the packet, and [destination] is the destination address of the packet.

    4. Repeat step 3 for each rule you want to add to the access list.

    5. Enter the command “exit” to save the configuration.

    6. Enter the command “show access-lists [number]” to view the access list.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: December 28, 2022In: Q & A

    How To Open a Port In Symantec Endpoint Protection 14?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:57 pm

      1. Open the Symantec Endpoint Protection Manager console. 2. Click the Policies tab. 3. Select the policy that you want to modify and click Edit. 4. Expand the Firewall policy and select Firewall Settings. 5. Select the Ports and Protocols tab. 6. Click the Add button and enter the port numbeRead more

     

    1. Open the Symantec Endpoint Protection Manager console.
    2. Click the Policies tab.
    3. Select the policy that you want to modify and click Edit.
    4. Expand the Firewall policy and select Firewall Settings.
    5. Select the Ports and Protocols tab.
    6. Click the Add button and enter the port number, protocol, and action you want to take.
    7. Click the OK button to save your changes.
    8. Click the Save button to save the policy.
    9. Right-click the policy you just modified and select Deploy.
    10. Select the clients you want to deploy the policy to and click OK.
    11. Click the Close button to close the window.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: December 28, 2022In: Q & A

    How To Fix My Hacked Email Account?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:56 pm

      1. Change your password - The first and most important thing to do if your email account has been hacked is to change your password. You should make sure to choose a strong, unique password that is not easily guessed. 2. Check for suspicious activity - After changing your password, you shouldRead more

     

    1. Change your password – The first and most important thing to do if your email account has been hacked is to change your password. You should make sure to choose a strong, unique password that is not easily guessed.

    2. Check for suspicious activity – After changing your password, you should check your account for any suspicious activity. Look for emails or files that you don’t recognize, or check your sent mail folder for emails that you didn’t send.

    3. Enable two-factor authentication – If your email provider offers two-factor authentication, be sure to enable it. This will add an extra layer of security to your account and make it more difficult for attackers to gain access.

    4. Contact your email provider – If you suspect that your account has been hacked, contact your email provider immediately. They may be able to provide additional security measures or help you recover your account.

    5. Scan your computer for malware – If your email account was hacked, it’s possible that your computer is infected with malware. Run a scan with an anti-virus program to make sure that your system is clean.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: December 28, 2022In: Q & A

    How To Remove Macros From Excel?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:55 pm

    1. Open your Excel document and click the "Developer" tab. 2. Select "Visual Basic" in the Developer tab. 3. In the Visual Basic window, select "Modules" in the Project Explorer window. 4. Right-click the module that contains the macro you want to delete and select "Remove Module" from the drop-downRead more

    1. Open your Excel document and click the “Developer” tab.
    2. Select “Visual Basic” in the Developer tab.
    3. In the Visual Basic window, select “Modules” in the Project Explorer window.
    4. Right-click the module that contains the macro you want to delete and select “Remove Module” from the drop-down menu.
    5. Click the “Yes” button in the pop-up window to confirm your selection.
    6. Close the Visual Basic window and save your document. The macro will no longer be available in the Excel file.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: December 28, 2022In: Q & A

    How To Put 2 Routers On The Same Network?

    Yepuri Kalyani
    Yepuri Kalyani Bronze
    Added an answer on December 29, 2022 at 5:54 pm

      1. Start by connecting each router to the same modem or internet connection. 2. Configure the primary router with basic settings such as an IP address, subnet mask, and default gateway. 3. Set up the secondary router with a different IP address, but the same subnet mask and default gateway asRead more

     

    1. Start by connecting each router to the same modem or internet connection.

    2. Configure the primary router with basic settings such as an IP address, subnet mask, and default gateway.

    3. Set up the secondary router with a different IP address, but the same subnet mask and default gateway as the primary router.

    4. Connect both routers with an Ethernet cable, linking their LAN ports together.

    5. Configure the secondary router to act as a “bridge” or “wireless access point” by disabling its DHCP server and enabling the “Bridge Mode” or “Access Point” feature.

    6. Configure the wireless security settings on the secondary router to match the settings of the primary router.

    7. Reboot both routers and test the connection.

    See less
      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 151 152 153 154 155 … 598

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • Farwa Khalid

    What Is A Typical Symptom Of A CMOS Battery Failure?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut