sudhir sharma

sudhir sharma

975 Articles Published

Articles by sudhir sharma

975 articles

How to setup firewall in Linux?

sudhir sharma
sudhir sharma
Updated on 17-Mar-2026 2K+ Views

Firewalls are an integral component of every contemporary computer system, safeguarding the network and protecting the system from unauthorized access. This guide explores Linux firewalls and demonstrates how to configure them effectively. A firewall is a network security device that monitors and restricts network traffic based on predefined security rules. Its primary function is to block unauthorized access to a computer system or network while allowing legitimate traffic. It functions as a gatekeeper, controlling what may enter and leave a network. There are two major options for configuring a firewall in Linux: iptables and firewalld. iptables ...

Read More

Working with tmux session

sudhir sharma
sudhir sharma
Updated on 17-Mar-2026 474 Views

Tmux is a terminal multiplexer for Unix-based operating systems that enables multiple terminal sessions within a single window. It is particularly valuable when working with cloud-based services like AWS or Azure, allowing users to create separate terminal sessions for different tasks or remote users while maintaining persistent connections. When working with web services, you often need to create an EC2 instance on a web server and establish a session to work remotely. Tmux ensures that your work continues even if your connection drops, as sessions remain active on the server. Getting Started with AWS EC2 Here are ...

Read More

How to Keep Your Browser Safe on Work and Home Networks (with an Optional Chrome VPN Layer)

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 1K+ Views

A single thoughtless click on a browser tab can cause hours of frantic IT calls, network scans, and security resets in numerous workplaces. When you seek a recipe or a good offer online, you may encounter pop-ups or phishing attempts that compromise security. These incidents happen frequently in our interconnected world. The browser serves as the front entrance to the Internet, whether you're in a busy office or at home. Like any front door, it can be secured and reinforced, or left open for threats to enter. This article discusses practical, step-by-step methods to strengthen your browser security across ...

Read More

Master TCL Scripting: Discover How to Sum Up n Natural Numbers with Looping Statements

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 634 Views

TCL (Tool Command Language) scripting is a powerful scripting language commonly used for automating network device configuration and management tasks. In networking environments, TCL scripts help automate repetitive operations such as configuring interfaces, monitoring performance, and generating reports on routers and switches. One fundamental programming concept that demonstrates TCL's versatility is calculating the sum of n natural numbers using looping statements. This mathematical operation forms the foundation for many network automation calculations and serves as an excellent introduction to TCL scripting techniques. Algorithm for Summing Natural Numbers To calculate the sum of n natural numbers using TCL ...

Read More

Revolutionize the TCL Scripting Skills: Master Arithmetic Operations with the Switch Statement!

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 394 Views

TCL (Tool Command Language) is a powerful scripting language widely used in network automation, testing, and system administration. One of its most useful control structures is the switch statement, which provides an elegant way to handle multiple conditional branches when performing arithmetic operations. This article explores how to effectively use switch statements in TCL scripts to perform basic arithmetic operations like addition, subtraction, multiplication, and division with clean, maintainable code. Understanding Switch Statements in TCL Switch statements in TCL provide a cleaner alternative to multiple if-else constructs. They test a given variable against multiple values and execute ...

Read More

How to hide an IP address

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 835 Views

An IP address is like a digital fingerprint, revealing your location and identity online. Just as you can use a disguise to hide your physical identity, you can also conceal your IP address to protect your privacy and security. Here are several effective methods to hide your IP address: Methods to Hide Your IP Address Virtual Private Network (VPN) A VPN creates a secure, encrypted tunnel for all your online activity and assigns you a new IP address from a different location. This makes it appear as though you are browsing from somewhere else entirely. ...

Read More

Poison Reverse vs Split Horizon

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 3K+ Views

Routing protocols determine optimal paths for data transmission through networks by maintaining and updating routing tables. Two important loop-prevention techniques used in distance-vector routing protocols like RIP and EIGRP are Poison Reverse and Split Horizon. Both techniques address the counting-to-infinity problem that occurs when routers continuously exchange routing information, potentially creating loops that cause packets to circulate indefinitely. Split Horizon Split Horizon is a simple rule that prevents a router from advertising a route back through the same interface from which it learned that route. This technique stops routing information from bouncing between routers. ...

Read More

Schiper Eggli Sandoz Protocol

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 980 Views

The Schiper Eggli Sandoz (SES) protocol is a distributed routing protocol designed to find optimal paths for data packets traversing a network. Unlike centralized routing approaches, SES distributes routing information across all routers in the network, creating a democratic system that enhances fault tolerance and network resilience. The protocol employs the Bellman-Ford algorithm to calculate shortest distances to destinations and implements split horizon techniques to prevent routing loops. Split horizon prevents routers from advertising routes back to the source from which they learned them, ensuring loop-free topology maintenance. SES Protocol: Distributed Routing Architecture ...

Read More

The Symmetric Cipher Model

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 4K+ Views

The Symmetric Cipher Model is a fundamental cryptographic approach where both sender and receiver use the same secret key for encryption and decryption. This model forms the backbone of modern secure communication, providing fast and efficient protection for sensitive data. In symmetric cryptography, the same key that encrypts plaintext into ciphertext is used to decrypt the ciphertext back to plaintext. This shared secret must remain confidential between communicating parties to maintain security. How the Symmetric Cipher Model Works The symmetric cipher process involves five essential components working together to secure data transmission: ...

Read More

2-tier and 3-tier Architecture in Networking

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 4K+ Views

Architecture in networking refers to the way a network is designed and organized, serving as the blueprint for the interaction and cooperation between different components and systems. Effective network architecture is crucial for successful network setup and requires careful planning and design. When classifying network architecture, a common division is single-tier, two-tier, or three-tier. In a two-tier architecture, the network is separated into a client tier where the end-user interacts with the system, and a server tier where applications, data, and processing power reside. This clear separation of responsibilities makes the network easier to manage, secure, and scale. ...

Read More
Showing 1–10 of 975 articles
« Prev 1 2 3 4 5 98 Next »
Advertisements