
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1032 Articles

Satish Kumar
10K+ Views
Cisco routers are a popular choice for network administrators due to their robustness and reliability. They are used in a wide range of environments, from small home networks to large enterprise networks. To effectively manage a Cisco router, it is essential to have a good understanding of the basic commands ... Read More

Satish Kumar
723 Views
Redistribution is a process of sharing routing information between different routing protocols. In Cisco ASA, redistribution is used to share information between different routing protocols or between different routing domains. This allows for the integration of various networks and improves overall network efficiency. In this article, we will provide a ... Read More

Satish Kumar
346 Views
In today's digital age, privacy is a major concern for individuals and organizations alike. With the rise of online transactions and the increasing amount of personal data being shared online, it is more important than ever to ensure that sensitive information is protected. One way to do this is through ... Read More

Satish Kumar
559 Views
Chat conferencing is a method of communication that allows multiple users to participate in a virtual conversation in real-time. This can be done through a variety of different protocols and technologies, each with its own set of features and capabilities. In this article, we will discuss the most commonly used ... Read More

Satish Kumar
7K+ Views
Virtualization is a technology that allows multiple virtual machines to run on a single physical machine. It is a powerful tool that has revolutionized the way we use computers and has become an essential component of modern IT infrastructure. The concept of virtualization has been around for decades, but it ... Read More

Satish Kumar
1K+ Views
Challenge Response Authentication Mechanism (CRAM) is a type of authentication method that is used to verify the identity of a user or device. This method of authentication is based on the principle of challenging the user or device to prove their identity by providing a specific response to a challenge. ... Read More

Satish Kumar
1K+ Views
Challenge Handshake Authentication Protocol (CHAP) is a widely used authentication method that provides an added layer of security to network connections. This protocol is commonly used in Point-to-Point Protocol (PPP) connections, such as those used for dial-up internet access or virtual private network (VPN) connections. The basic principle of CHAP ... Read More

Satish Kumar
649 Views
Computer networks are becoming more and more complex as technology advances. One of the key protocols that helps manage this complexity is the Common Address Redundancy Algorithm (CATA) protocol. This protocol is designed to help manage the process of assigning and managing IP addresses in a network. In this article, ... Read More

Satish Kumar
3K+ Views
Introduction XPath is a powerful language used for navigating and selecting elements within an XML document. It is commonly used in conjunction with XSLT, a language used for transforming XML documents, to extract specific information from a document. In this article, we will discuss how to evaluate XPath expressions in ... Read More

Satish Kumar
522 Views
Bash history is a powerful tool that can help you keep track of all the commands you've executed in your terminal. It can be especially useful when you're working with multiple terminal windows, as it allows you to easily switch between them and pick up where you left off. In ... Read More