© 2023 Hashnode
#cisco
In this article, I will demonstrate how to VNC into EVE-NG nodes if you don't have access to a Linux machine with Vinagre (like me). Target Audience This article is targeted for RHEL-based linux user…
webMethods.io Embed ChatGPT® Bot for Cisco® Webex Teams AI Driven Innovations Are you looking for driving your innovations around Artificial Intelligence with ChatGPT by Building out of the box integration capabilities with ChatGPT® for y…
What is a Computer network? According to Wikipedia, A computer network is a digital telecommunications network that allows nodes to share resources. A simple example will be 2 PCs connected together t…
If you are having issues with replicating the example on the Cisco Packter Tracer, where they attempted to build a Small Wireless Home Network, I would assume that it was a Webcam connectivity error. Here's a fix for it: Select the Webcam …
This is the first day of "Jeremy's IT Lab" series of starting the CCNA journey. I will be adding the link to each of that day's videos at the bottom of the article as a reference so that each of you c…
https://josesuarez.us
Cisco Packet Tracer should be a must-have tool for any Network Engineer. Not only for Network Engineers, packet tracer is really a handful tool to learn many computer science concepts. Despite being s…
INTRODUCTION This blog is about the journey of CCNP, and CCIE security on layer 2 attacks. In this blog, I will cover the DHCP starving and rouge attacks. Below is the simple topology we are going to …
#cybersecurity #securityplus #comptia Threat actors are entities that are responsible for an event that has an impact on the safety of another entity. Threat actors have a wide scope of variety with different intentions. 1. Insider Actors …
Securing a Web Application in Azure Leveraging the Cisco NextGen Firewall. In this blog we are going to learn how to secure the web application in Azure leveraging Cisco NextGen firewall and IDS/IPS. …