sometime I need to know who is loged on specific computer, but I do not know where is this computer, and do not have access to this one. Continue reading “Find logged in user of a remote computer using CMD”
What is IPAM
IPAM is short for IP address management. It is enabled from MS Windows Server 2012. Continue reading “What is IPAM”
How to reset a Samsung that is locked?
Sometimes locking code is forgoten or not known, and there is need to factory reset the phone. All data will be lost, but in this case this is only way to access and again use Android phone. Continue reading “How to reset a Samsung that is locked?”
Check laptop battery healt
To check your battery detailed information, use next steps: Continue reading “Check laptop battery healt”
70-741: Networking with Windows Server 2016
Check are you ready for exam 70-741
Continue reading “70-741: Networking with Windows Server 2016”
Laptop Function (Fn) key
Sometimes is Function (Fn) key constanly on. Problem is how to swith it off. Continue reading “Laptop Function (Fn) key”
How to make screenshot on Android devices
Sometime we needs to make screenshots on Android devices, as phones or tablets. Solution is simple. Continue reading “How to make screenshot on Android devices”
Create butable USB
Often we have need to instal OS from bootable USB, instad from CD / DVD. There is meny ways to do it, eaven without any additiona software. Continue reading “Create butable USB”
MPLS
MPLS (Multiprotocol Label Switching) – It is a way of data caryng in demandings networks. It works between 2. and 3. ISO layer. It encapsulate package in to MPLS LSP. Continue reading “MPLS”
Smurf attack
The Smurf attack is a distributed denial-of-service (DDpS) attack in which large numbers of ICMP (Internet Control Message Protocol) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address. Most devices on a network will, by default, send a reply to the source IP address. If the number of machines on the network that receive and respond to these packets is very large, the victim’s computer will be flooded with traffic. This can slow down the victim’s computer to the point where it becomes impossible to work on. Continue reading “Smurf attack”