This document provides an overview of networking and security concepts including the OSI model, functions of common network devices like routers, switches, firewalls and IDS/IPS systems. It describes technologies like NAT, VPNs, encryption, file integrity monitoring and SIEM. It also includes brief introductions to Linux, the CCNA and a case study on site-to-site VPN deployment considerations.
In this talk, we will explain the functioning of Wireless LANs in theory and in practice.
We will present the IEEE 802.11 standard in general and MAC protocols in particular, by discussing the functions of MAC sublayer management entity and the MAC layer frames in detail.
We will discuss the changes in the states of a WiFi client as it goes through the process of WiFi communication.
Towards the end, we will briefly talk about various vantage points ( at the client side as well as in the air ) that allow us to capture network traffic.
In this talk, we will explain the functioning of Wireless LANs in theory and in practice.
We will present the IEEE 802.11 standard in general and MAC protocols in particular, by discussing the functions of MAC sublayer management entity and the MAC layer frames in detail.
We will discuss the changes in the states of a WiFi client as it goes through the process of WiFi communication.
Towards the end, we will briefly talk about various vantage points ( at the client side as well as in the air ) that allow us to capture network traffic.
This tutorial gives very good understanding on CCNA Dynamic Routing Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
CCNA ppt designed on project remote connectivity using frame relay, and many more... best for project purpose. anyone want project will also contact me..
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Julien Vermillard
M2M/IoT is rapidly growing and since its early days different “standard” protocols have emerged (e.g. OMA-DM, TR-069, MQTT, …) or are emerging (e.g. CoAP or Lightweight M2M). Understanding which protocol to use for which application can be intimidating, therefore we propose to give an overview of these protocols to help you understand their goals and characteristics. We’ll present common M2M use cases and why they usually require more than just one protocol ; we will also see whether CoAP associated with Lightweight M2M allows to forge “one protocol to rule them all”.
This tutorial gives very good understanding on CCNA Dynamic Routing Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
CCNA ppt designed on project remote connectivity using frame relay, and many more... best for project purpose. anyone want project will also contact me..
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Julien Vermillard
M2M/IoT is rapidly growing and since its early days different “standard” protocols have emerged (e.g. OMA-DM, TR-069, MQTT, …) or are emerging (e.g. CoAP or Lightweight M2M). Understanding which protocol to use for which application can be intimidating, therefore we propose to give an overview of these protocols to help you understand their goals and characteristics. We’ll present common M2M use cases and why they usually require more than just one protocol ; we will also see whether CoAP associated with Lightweight M2M allows to forge “one protocol to rule them all”.
The Complete Questionnaires About FirewallVishal Kumar
Hello Guys, here are the answers to the most frequently asked questions in an interview about Network firewalls. you will get here the answers of all the Firewall related Question asked in the interview.
A network switch is a device used to connect network segments or network devices.Network switch receive messages and send them to the targeted audience.It is a telecommunication device that uses the packet switching to receive,process and forward data to the destination address.
This presentation is about the introduction to network switch layer technology. A network switch is a device tha is used to connect different segments over the network.This ppt includes introduction to switch,types of switches or layer specification,advantages and disadvantages of switch..
I hope it will be very helpful for the engineering students and the others who are interested to search in deep about network switch.
Vitalization & HP TippingPoint
Virtual Firewall for Virtual machines, to validate the east west communications. As growth is tremendous in ES communication than legacy Datacenter architects more focus on North South traffic.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Network & security startup
1. Finto Thomas
Created 18 Nov 2011
Reviewed : Mar 2015
Ver 3.0
Network & security Startup
Before we enter to LAB
1
2. Agenda
OSI Model Overview
Function of network & security devices
Routers / Switches
Firewall
Proxy firewall
State full firewall
Packet filter firewall
IDS /IPS
Web Application Firewall – WAF
File Integrity manager – FIM
Anti Spam / MTA / Email Gateway (MX)
Encryption - VPN
File & Whole Disk Encryption
Vulnerability Vs Risk
Security Event & Incident Management - SIEM
Network Cheat Sheet
Linux overview
CASE STUDY
2
3. Open Systems Interconnection model (OSI model)
Application 7
Presentation 6
Session 5
Transport 4
Network 3
Data Link 2
Physical 1
DATA
Format
Logical
Connection
TCP /UDP /
ICMP
IP / IPX /
SNA
MAC
bit
DATA
Segment
Packet
Frames
bit
Layers Function DATA UNIT
Why ISO – OSI Model
To be in standardized
communication between
multivendor devices in
networked scenarios, else
we have to strict to purchase
always one vendor products
to communicate each other
!!!
3
4. Application (7) – is provide end-user interface & process Everything at this layer is
application-specific. This layer provides application services for file transfers, e-mail, and
other network software services. Telnet and FTP are applications that exist entirely in the
application level. Tiered application architectures are part of this layer.
Presentation (6) - provides independence from differences in data representation, which
format we save the content and processing while accessing the from file system. . It is
sometimes called the syntax layer.
Session (5) - , manages and terminates connections between applications and between
hosts The session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end machines. It deals with session and
connection coordination.
Transport (4) - This layer provides transparent transfer of data between end systems, or
hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete
data transfer. By define the traffic TCP/ UDP. And for PING using ICMP protocol.
Network (3) - provides routing technologies, creating logical paths, known as virtual circuits,
for transmitting data from node to node. Routing and forwarding are functions of this layer, as
well as addressing, internetworking, error handling, congestion control and packet
sequencing. By define routing & routed protocols. Routed protocol are IP , IPX and IBM’s
SNA. Routing protocal are OSPF, EIGRP.. etc (Routers & layer 3 Switches)
Data link (2) - At this layer, data packets are encoded and decoded into bits. It furnishes
transmission protocol knowledge and management and handles errors in the physical layer,
flow control and frame synchronization. The data link layer is divided into two sub layers: The
Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub
layer controls how a computer on the network gains access to the data and permission to
transmit it. The LLC layer controls frame synchronization, flow control and error checking.
(Switches)
Physical (1) - This layer conveys the bit stream - electrical impulse, light or radio signal --
GoldenRulesofNetwork&
Security
4
5. Function of network & security devices
In present Network infrastructure we can meet multiple types of devices, each
devices have its own functions,
Routers - Layer 3 Routing device working routed Protocols like IP, IPX. If there
is two different subnet machine must need a router to communicate between
those. Also known as Packet filter Firewall because it can block or allow
traffic on packet based (IP based). (Cisco IOS, 7500, Juniper JUNOS)
Switches – Layer 2 Switching devices for switching the path between hosts with
MAC on same subnet. If we have only two machine we can setup direct
connection, but if have more then two we bring Switches or HUB to
interconnects.(Cisco IOS, Juniper , Nortel). There are Two kind –
Manageable & non Manageable Switches for VLAN creation.
Note : Layer 3 switches are capable with routing function.
HUB – Layer 1 device older version for interconnect multiple machine in same
subnet, with single broadcast & Collision domain, which was over come in
Switches. (Dlink, Netgear)
State full Firewall – Layer 7 Device for Gate way function to allow or deny the
network traffic passing though this device based on IP address or/and TCP/
UDP port. And its keep a state table of each session passing through this FW,
so when a return packet came will match to this table to allow to inside
back.(Juniper Screen OS, Cisco PIX /ASA, Microsoft ISA, Check point, Cross
beam, Nokia, Sonicwall)
Load Balancers (LB) - Load balancers used for Network or Server based
5
6. Computers are working on all Layers, so its can show all natures of any network security
device, still we are going for specific appliance because of performance and reliability.
When a packet passing through L2 Switch always its modify the MAC address of Source
and Destination.
When a packet passing through Router its always change MAC address and may IP for
NATing
When a packet pass through IPS, its will alter the MAC. IP address according to device
deployment mode
When a packet pass through Firewall , will change MAC. IP address & port number can
change according to deployment – NAT & PAT.
NAT - IP Address Translation can we achieved in different way according to architecture
of network customers needed. Routers & Firewalls can perform these actions. One to
One is Static NAT, Group of Private IPs to one or more IP translations known as PAT
(Port address translation.)
MIP & VIP - Statically mapped Public IP’s known as MIP (Mapped IP). Group based
(Server Forms ) to limited Public knowm VIP.
Client PC Switch -L2 Router – L3 IDS/IPS Firewall
6
7. IDS/ IPS –all Layer 7, can report or block significant traffic/code on specific ports,
Example – firewall can block/allow entire traffic through port http (80), IPS can
block content based filtering on (Suspicious) traffic and genuine packets still
allow to inside through HTTP port.
Host based IDS/IPS can install over a OS to protect the specific machine
(Proventia for Windows, Endpoint security.)
Network based IDS/IPS using to monitor the traffic over a network. Draw back is
only can block (Inline protection) the traffic if the packet passing through the
appliance. Example, if need to monitor a traffic on single switch can only do
Detection, but between two switch / Router /firewall can put in inline protection
mode to block suspicious traffic.
An IDS can only configure as Detection only mode but IPS can be both Detection
(Promiscuous) or Prevention mode (Inline).
Note : Please refer next page Diagram to understand better.
ISS have two line of product Proventia (IPS) and real sensor (IDS), Proventia
have Software version for Linux & windows serves and Desktop along with
Appliance (HW + customized OS + Application) GX series.
Other vendors are Cisco’s IDM, Juniper IDM, Soucrefire (Snort IDS), McAfee’s
Intrushield
7
IDS or IPS
8. Promiscuous / TAP
mode: Here we can
only put the agent in
Detection mode only
even its IPS support
Inline mode: Here
we can put the
agent in Detection /
Prevention mode
according to device
capability or design
wise.
PIC -1
PIC - 2
8
9. Web Application Firewall
9
A web application firewall (WAF) is an appliance, server
plugin, or filter that applies a set of rules to an HTTP
conversation. Generally, these rules cover common
attacks such as cross-site scripting (XSS) and SQL
injection. By customizing the rules to your application,
many attacks can be identified and blocked ; Wiki-OWASP
ADC – Application Defense Center (Research-Driven Security Policies)
Threat Radar
Drop in deployment
Four Mode of Implementations
OWASP_Best_Practices:_Use_of_Web_Application
_Firewalls
Cont.
11. File Integrity Manager - FIM
11
File integrity monitoring (FIM) is an internal control or
process that performs the act of validating the integrity of
operating system and application software files using a
verification method between the current file state and the
known, good baseline. This comparison method often
involves calculating a known cryptographic checksum of the
file's original baseline and comparing with the calculated
checksum of the current state of the file.[1] Other file
attributes can also be used to monitor integrity.[2]
Generally, the act of performing file integrity monitoring is
automated using internal controls such as an application or
process. Such monitoring can be performed randomly, at a
defined polling interval, or in real-time.
Regulatory requirement
12. Proxy – work on upper layer (7,6 5 & 4 layers). Its also known as
Application firewall or Proxy firewall. where both ends of a connection
are forced to conduct the session through the proxy. turns a two-party
session into a four-party session, with the middle process emulating
the two real hosts. So firewall proxy servers centralize all activity for
an application into a single server for SMTP (Emails), HTTP
(Internets), etc.. Below picture is an example of forward Proxy.
(Blucoat, Websense, Iron Port)
Note :A reverse proxy taking requests from the Internet and
forwarding them to servers in an internal network. So Serve identity is
safe, LB and SSL will doing by these reverse proxies.
PIC – 3
12
Proxy Server
13. Web & Mail | Anti Spam Traffic flow
PIC - 4
Web traffic (http & https) will choose Proxy server route by PROXY setting on
web browser. If there is no PROXY setting will take the default routing route
available on machine.
Note : To see Routes & Default Route on machine use command ‘route print’ Or
‘netstat –r’.13
14. Email Gateway & Anti Spam
mail transfer agent (MTA) or mail relay is software that transfers
electronic mail messages from one computer to another using a client–
server application architecture (MS exchange server Or Lotus Domino
Server). An MTA implements both the client (sending) and server
(receiving) portions of the Simple Mail Transfer Protocol.
The terms mail server, mail exchanger, and MX host may also refer to
a computer performing the MTA function. The Domain Name System
(DNS) associates a mail server to a domain with mail exchanger (MX)
resource records containing the domain name of a host providing MTA
services
Anti Spam & anti virus appliances will use at gate way level to reduce
the SPAM coming inside. (Proventia Mail scanner, Iron port )
14
PIC - 5
15. Encryption is the process of transforming data into an unintelligible
form to prevent the unauthorized use of the data. To read an
encrypted file, you must have access to a secret key or password that
enables you to decrypt it. Unencrypted data is called plain text;
encrypted data is called cipher text. A cipher is an encryption-
decryption algorithm.
User ID & Password | Documents & mails - Certificates
Desktop / removable disk Encryption - PGP
VPN - Site to Site , Client access & SSL - HTTPS & Cisco / Juniper VPN
client
Encryption
15
PIC – 6
16. VPN
A virtual private network (VPN) is a network that uses primarily public
telecommunication infrastructure, such as the Internet, to provide remote offices
or traveling users access to a central organizational network.
VPNs typically require remote users of the network to be authenticated, and often
secure data with encryption technologies to prevent disclosure of private
information to unauthorized parties.
VPNs may serve any network functionality that is found on any network, such as
sharing of data and access to network resources, printers, databases, websites,
etc. A VPN user typically experiences the central network in a manner that is
identical to being connected directly to the central network. VPN technology via
the public Internet has replaced the need to requisition and maintain expensive
dedicated leased-line telecommunication circuits once typical in wide-area
network installations.
• Between Offices (Sites) using Site to
Site VPN (IPSec), other name is
LAN to LAN Tunnel.
• Remote single users using ‘Client
VPN’ or ‘Remote User VPN ‘ (Exp
BHPB- Cisco VPN, SSB – Juniper)
IPSec framework.
• SSL VPN is different than IPSec,
used on WEB based VPNs – HTTPS
and citrix VPN (SSB citrix
connection)
• SOCKS is again a different frame
work for Secure communications.
16
PIC - 7
18. Threat Vs Vulnerability Vs Risk
The term “vulnerability” refers to the security flaws (Weakness ) in a system
that allow an attack to be successful.
Threat is the frequency of potentially adverse events.
Risk = Threat * Vulnerability * Asset Value
Scenario 1: forgot the Car key in side the Car is an Vulnerability, threat here is
where we put the car & key, in City or Village, ie how potential on vulnerability.
Asser value is what kind car we using Maruti or Ferrari .
Scenario 2:Think we left server / laptop unlocked in home or office
a vulnerability assessment is the process of identifying and quantifying
vulnerabilities in an environment. It is an in-depth evaluation of your posture,
indicating weaknesses as well as providing the appropriate mitigation
procedures required to either eliminate those weaknesses or reduce them to
an acceptable level of risk.
On the other hand, a pen test simulates the actions of an external and/or
internal attacker that aims to breach the security of the organization. Using
many tools and techniques, the penetration tester attempts to exploit critical
systems and gain access to sensitive data. Depending on the scope, a pen
test can expand beyond the network to include social engineering attacks or
physical security tests. (White Box, Gray Box, Black Box) (Back Track 5 - OS)18
19. SIEM
19
Event & Log Collection to a centralized console
Normalize the event
Correlate the events
Identify the suspected activity
Link to the VA reports
Report and visibility to the security.
21. Linux Overview
21
Everything in Linux is a file including the hardware and even the directories.
# : Denotes the super(root) user
$ : Denotes the normal user
No capital letters on linux commands / file names . And all are case
sensitive.
/root: Denotes the super user’s directory
/home: Denotes the normal user’s directory.
Up arrow key: To redisplay the last executed command. The Down arrow
key can be used to print the next command used after using the Up arrow
key previously.
cd : The cd command can be used trickily in the following ways:
cd : To switch to the home user
cd * : To change directory to the first file in the directory (only if the first file is a
directory)
cd .. : To move back a folder
cd - : To return to the last directory you were in
Files starting with a dot (.) are a hidden file.
To view hidden files: ls -a
ls: The ls command can be use trickily in the following ways:
ls *.* : To view a list of all the files with extensions only.
Pwd : to show the present location we stand
22. Thank you
Case Study :
•Why need Site to Site VPN instead more
secure and reliable Leased line ?
•Why Firewall not placed directly from
internet and link terminations
•How Failover Works
•Why need VLANs
•Where and all can placed IDS or IPS
22 PIC- 8