This site works best with JavaScript enabled
Sign In
Discussions
Activity
Sign In
All
3. Describe process,purpose of option negotiation in TELNET, roles of WILL,WONT,DO,DONT
0
★
3
B
11
E
Most recent by
mohdmohsinkhanee
February 21
014.06.18.Network Virtual Terminal
2. Explain significance of 'Interpret as Control' (IAC) character in TELNET's communication protocol
0
★
3
B
7
E
Most recent by
mohdmohsinkhanee
February 21
014.06.18.Network Virtual Terminal
1. How does TELNET handle the translation of characters from a local terminal to NVT form
0
★
4
B
5
E
Most recent by
mohdmohsinkhanee
February 21
014.06.18.Network Virtual Terminal
5. In the context of TELNET, what role does the Pseudoterminal driver play
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
4. How keystrokes are transmitted from a user's terminal to a remote system using TELNET
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
3. How does TELNET differentiate between local and remote logins
0
★
3
B
26
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
2. Explain significance of TELNET's reliance on the TCP/IP protocol for virtual terminal services
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
1. What is TELNET, and how does it function within computer networks?
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 21
014.06.16.General-Working-Telnet
5. With secure protocols like SSH, in what scenarios might Telnet still be preferred or required,why
0
★
4
B
2
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
4. Given Telnet's lack of encryption and susceptibility to security threats, how would you mitigate
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
3. Discuss the negotiation process that occurs once a Telnet connection is established
0
★
4
B
5
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
2. Can you explain the client-server model in context of Telnet, its importance for remote mgt
0
★
4
B
3
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
1. What is the significance of Telnet operating on top of the TCP/IP protocol stack
0
★
4
B
2
E
Most recent by
mohdmohsinkhanee
February 21
014.06.14.General Working. Telnet
Understanding Virtual and Pure Virtual Functions in C++
0
★
1
B
7
E
Started by
mohdmohsinkhanee
February 20
Pravjot Sir Classes
1. Discuss security implications of using Telnet for remote access, explain why SSH is recommended
0
★
2
B
4
E
Most recent by
mohdmohsinkhanee
February 19
014.06.28.Secure telnet with FirewallD. Fedora.
5.a friend's machine at 192.168.34.37 is unable to send you email due to a blocked connection?
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
4. Explain the significance of the rule "iptables -A INPUT -s 192.168.34.37 -j ACCEPT"
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
3. Describe the command used to block communication from a specific IP address to your machine
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
2. What does "iptables -P FORWARD DROP," do? how does it affect the packet-filtering system
0
★
3
B
13
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
1. Can you explain how the iptables system works in practice?
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 19
014.01.58.Setting Firewall Rules
5. In the filter table of iptables, three basic chains are mentioned: INPUT, OUTPUT, and FORWARD
0
★
3
B
5
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
4. The text introduces iptables as the system for creating and manipulating firewall rules in Linux.
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
3. What criteria do firewalls typically use to drop, reject, or accept packets
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
2. In the context of Linux, how are firewall rules organized,relationship between chains and tables
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
1. Why is it essential for routers to include a firewall in network configurations?
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 19
014.01.56.Linux Firewall Basics
5. What advantages do custom Linux firmware distributions, such as OpenWRT, provide when installed
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
4. release of source code by Linksys and emergence of specialized Linux distributions like OpenWRT
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
3. Explain role of Linux in development of router software. what steps did they take to adapt
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
2. Describe the specialized router hardware that manufacturers developed in response to the demand
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
1. How did the evolution of broadband usage lead to the demand for routers, and why did Linux users,
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.54.Routers And Linux
09.File-Operations-And-Commands-queries-discussion
0
★
1
B
2
E
Started by
pravjot
February 17
011.09.File Operations and Commands
5.What kernel configurations, iptables support are required to set up a Linux machine as NAT router
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
4.whatis the need for dissecting packets beyond internet layer, particularly focusing on UDP,TCP
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
3. Why is NAT necessary for hosts on a private network to communicate with the internet
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
2. Walk through the steps involved in the NAT process as described in the text.
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
1. Can you explain the concept of Network Address Translation (NAT) and its significance
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 17
014.01.52.Network Address Translation. IP Masquerading
5.What challenge arises when hosts on private subnets attempt to communicate with the outside world
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
4. Why is a small subnet like 10.23.2.0/24 considered a suitable choice, what is class C subnets
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
3.explain the significance of RFC 1918, 6761 in the context of selecting IP subnets for private nw
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
2. What is the primary difference between using a block of internet addresses from your ISP
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
1. When setting up your own network, why is the choice of IP subnet an important consideration
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.50.Private Networks IPv4
5. Why is Network Address Translation (NAT) essential for providing internet connectivity to hosts
0
★
4
B
2
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
4. What command is used to enable IP forwarding in the Linux router's kernel
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
3. Explain the purpose of the routing table entries shown in the provided excerpt
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
2. In the given example(figure below), what are the IP addresses assigned to the router for the LAN
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
1.How can you configure a Linux machine to function as a router with multiple physical n/w
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 17
014.01.48.Configuring Linux as Router
2. Describe process of connecting to a web server using telnet, retrieving HTML source of webpage
0
★
1
B
2
E
Started by
pravjot
February 16
014.06.30.Using Telnet in Linux
1. How would you use telnet to troubleshoot a connectivity issue with an SMTP server
0
★
1
B
3
E
Started by
pravjot
February 16
014.06.30.Using Telnet in Linux
5. For Telnet usage, why is it recommended to create a new user instead of using the root account
0
★
1
B
2
E
Started by
pravjot
February 15
014.06.26.Using Telnet in Linux
4. How do you allow the Telnet port through firewall on both Red Hat-based, Ubuntu/Debian systems
0
★
1
B
1
E
Started by
pravjot
February 15
014.06.26.Using Telnet in Linux
3. What steps are involved in configuring the Telnet service on a remote machine to ensure it's up
0
★
1
B
2
E
Started by
pravjot
February 15
014.06.26.Using Telnet in Linux
01.Introduction to Networks and Configurations. Queries and Points to Ponder
0
★
1
B
5
E
Started by
pravjot
February 11
014.01.Intro to NW and Configurations
Network Applications and Services: Queries and Points to Ponder...
0
★
1
B
1
E
Started by
pravjot
February 11
014.02.Network Applications and Services
3. Discuss specific use cases for Telnet. Why Telnet might still be chosen over more secure alternat
0
★
2
B
6
E
Most recent by
gaurav133232
February 8
014.06.12.Introduction-To-Telnet
2. Can you explain the client-server model of Telnet and how it establishes a connection
0
★
2
B
2
E
Most recent by
gaurav133232
February 8
014.06.12.Introduction-To-Telnet
1. The evolution of nw protocols impacted relevance, security of Telnet in networking
0
★
2
B
3
E
Most recent by
gaurav133232
February 8
014.06.12.Introduction-To-Telnet
5.Linux utilities iw and wpa_supplicant in the context of configuring wireless networks.
0
★
2
B
4
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
4. How does Linux handle wireless network authentication and encryption
0
★
2
B
2
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
3. Describe roles of access points in managing wireless nws,how they bridge wired, wireless nws
0
★
2
B
2
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
2. What are the key components of wireless networks that require additional configuration tools in L
0
★
2
B
1
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
1. Explain main diff bwn wired, wireless Ethernet networks, wrt. components in the physical layer
0
★
2
B
7
E
Most recent by
gaurav133232
February 8
014.01.64.Wireless Ethernet
3. Apart from using firewalld,what other security measures should be implemented to enhance security
0
★
2
B
2
E
Most recent by
nirmalpg124
February 8
014.06.28.Secure telnet with FirewallD. Fedora.
Queries
0
★
1
B
3
E
Started by
pravjot
February 6
014.06.Network Protocol Telnet
2. How to configure a firewall in Fedora Linux to secure a Telnet connection
0
★
1
B
2
E
Started by
pravjot
February 6
014.06.28.Secure telnet with FirewallD. Fedora.
5. Why does ARP only apply to machines on local subnets
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
4.explain the step-by-step process through which the MAC addresses get added to the cache
0
★
2
B
2
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
3.ARP cache ($ ip -4 neigh), what does each field represent
0
★
2
B
3
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
014.01.62.2. How does the ARP cache facilitate efficient communication in a network
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
1.role of the Address Resolution Protocol (ARP) in the context of IP over Ethernet
0
★
2
B
2
E
Most recent by
gaurav133232
February 5
014.01.62.Ethernet-IP-ARP-NDP-IQs
5. Discuss the significance of the global network prefix in stateless IPv6 configuration
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
4. global IPv6 address in a stateless configuration? router advertisement (RA) messages play
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
3. Describe the initial steps involved in stateless IPv6 network configuration
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
2.Explain the concept of stateless configuration in IPv6
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
1.What are some of the assumptions on which DHCP relies for its effective functioning
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.46.Automatic IPv6 Network Configuration. IQs
5.Discuss the two DHCP clients ISC dhclient and systemd-networkd DHCP client
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
4.Explain the lease concept in DHCP
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
3.what device typically acts as the DHCP server
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
2.Describe the process a host follows to obtain its configuration using DHCP
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
1.Why is DHCP commonly used in IPv4 networks,what advantages does it offer to nw admin
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 5
014.01.44.Understanding DHCP
5. Discuss the potential consequences and precautions mentioned regarding the execution of iptables
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
4.Explain steps involved in configuring iptables to allow ICMP traffic, particularly for ping
0
★
2
B
3
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
3. Why is it crucial to allow only trusted packets and deny everything else when configuring firewal
0
★
2
B
2
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
2.firewall strategies,what are the two fundamental scenarios discussed for protecting machines
0
★
2
B
1
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
1. Enhancing the security of an individual machine by configuring firewall rules in the INPUT chain
0
★
2
B
5
E
Most recent by
gaurav133232
February 5
014.01.60.Firewall Strategies
10.How does UDP handle error detection
0
★
3
B
17
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
9.an application that uses UDP,explain why it is well-suited for that particular app
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
8.Why is UDP considered a simpler transport layer than TCP
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
7.Compare and contrast TCP and UDP, highlighting their approaches to data transmission
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
6.Describe the characteristics of TCP as a transport layer protocol
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
5.purpose of the /etc/services file in relation to well-known port numbers
0
★
3
B
6
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
4.open TCP connections on a Linux machine using the netstat command
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
3.How does a process initiate a TCP connection,what distinguishes the client from server
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
2.the concept of TCP ports and their significance in establishing connections
0
★
3
B
1
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
1. What is the role of transport layer protocols in networking
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 4
014.01.42.The Transport Layer TCP UDP Services.
10.significance of the loopback interface (lo) in network configuration
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
9./etc/nsswitch.conf file and its role in controlling name-related precedence settings
0
★
3
B
5
E
Most recent by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
8.How can you check the current DNS settings on a Linux system
0
★
3
B
4
E
Most recent by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
7.Multicast DNS (mDNS),Link-Local Multicast Name Resolution (LLMNR) in zero-configuration
0
★
3
B
7
E
Most recent by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
6. How does systemd-resolved enhance traditional DNS configurations, combining name lookup
0
★
3
B
3
E
Most recent by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
5. What are the challenges with the traditional DNS configuration, how are they addressed
0
★
3
B
2
E
Most recent by
mohdmohsinkhanee
February 4
014.01.40.Resolving Hostnames
‹
1
…
5
6
7
8
9
10
11
…
20
›
Powered by
Vanilla
Howdy, Stranger!
It looks like you're new here. If you want to get involved, click one of these buttons!
Sign In
Apply for Membership
Categories
All Discussions
0
000 Linux System Administration
25
001 C Programming, Data Structures
101
» 001.01.Introduction to C
1
» 001.16.Structures
21
002 OOPs using C++ with Eclipse on Linux
23
» 002.06.Streams and File Processing
1
003 Linux System Programming
375
» 003.01.Processes-and-Resources-Utilization
26
» 003.01.91.Interview-Questions-Introductory-Concepts
20
» 003.01.92.Interview-Questions-Introductory-Concepts
5
» 003.02.Process-Management. Introduction
21
» 003.02.91.Interview Questions. Intro-to-Processes
20
» 003.03.Process-Management - Process Duplication
91
» 003.03.92.Interview-Questions-Process-Duplication
20
» 003.03.93.Interview-Questions-Process-Duplication
20
» 003.03.94.Interview-Questions-Process-Duplication
20
» 003.03.95.Interview-Questions-Process-Duplication
20
» 003.03.96.Interview-Questions-Process-Duplication
10
» 003.04.Process-Management - Process Replacement
67
» 003.04.81.Assignment. Process Replacement
24
» 003.04.91.Interview-Questions-Process-Replacement
20
» 003.04.92.Interview-Questions-Process-Replacement
22
» 003.05.01.Inter-Process-Communication. Pipes
22
» 003.06.Inter Process Communication. FIFOs
21
» 003.07.Signals and Handlers
43
» 003.07.91.Assignment. Signals and Handlers
20
» 003.07.92.Assignment. Signals and Handlers
22
» 003.08.Inter Process Communication Message Queues
1
» 003.09.Inter Process Communication. Shared Memory
1
» 003.10.Synchronization Techniques. Semaphore
21
» 003.11.POSIX-Threads
21
004 Linux Network Programming
34
» 004.01.Introduction to Networks and Configurations
1
» 004.02.Networking Basics
1
» 004.03.Introduction-to-Sockets
21
» 004.04.Linux Network stack
1
» 004.05.Transmission Control Protocol
1
005 Character Device Drivers Development
32
» 005.01.Introduction To Device Drivers
11
006.Project Evolution with GitLab
2
» 01.Introduction To GitLab
1
008 Block Device Driver Development
4
» 008.01.Introduction to Block Device Drivers
1
009 Embedded Linux-ARM. Storage
91
» 009.01.Linux Boot Process
28
» 009.01.14.Linux-Boot-Process
5
» 009.01.15.Introduction to BIOS
0
» 009.01.16.Introduction-to-BIOS-IQs
5
» 009.01.18.Introduction-to-BIOS-IQs
5
» 009.01.20.BIOS CMOS UEFI. IQs
5
» 009.02.Introduction To Embedded Linux
1
» 009.03.01.ARM Processor Architecture
1
» 009.03.02.Programmers Model
1
» 009.04.Boot Loaders
50
» 009.05.Understanding-ARM-Board-Bringup
1
» 009.06-Board Bringup Raspberry Pi
1
» 009.06.Board Bringup. Raspberry Pi4
1
010 Embedded Linux ARM, Configuring and Porting using Storage
0
011 Shell Scripting using Bash
90
» 011.01.Introduction to Shells and Shell Scripts
1
» 011.02.Basics of Shell Scripting - Bash
1
» 011.03.Conditions and Branching
23
» 011.04.Loops and Iterations/
31
» 011.04.81.Assignment. Branching and Looping
10
» 011.05.Reserved-Words-Bullitin-Commands-Command-Line-Parsing
1
» 011.06.Parameters and Variables
1
» 011.07.Structured Scripting. Functions
11
» 011.08.Arrays-Strings-in-bash
11
» 011.09.File Operations and Commands
1
» 011.10.Writing-Manual-Pages
1
» 011.11.Makefile
1
» 011.12.sed-awk
1
012 Linux Kernel Architecture and Internals
3
014. Linux Network Administration
296
» 014.01.Intro to NW and Configurations
220
» 014.01.12.Introduction to Networking
10
» 014.01.14.Packets-IQs
10
» 014.01.16.NetworkLayers
10
» 014.01.18.The Internet Layer
20
» 014.01.20.routes and the kernel routing table
10
» 014.01.22.The Default Gateway
5
» 014.01.24.IPv6 Addresses And Networks
20
» 014.01.26.Basic ICMP And DNS Tools
10
» 014.01.28.The Physical Layer And Ethernet
5
» 014.01.30.Understanding Linux Network Interface
5
» 014.01.32.Intro To Network Interface Configuration
5
» 014.01.34.Boot Activated Network Configuration
5
» 014.01.36.Manual and Boot Activated Nw Config
5
» 014.01.38.Network Configuration Managers
10
» 014.01.40.Resolving Hostnames
19
» 014.01.42.The Transport Layer TCP UDP Services.
10
» 014.01.44.Understanding DHCP
5
» 014.01.46.Automatic IPv6 Network Configuration. IQs
5
» 014.01.48.Configuring Linux as Router
5
» 014.01.50.Private Networks IPv4
5
» 014.01.52.Network Address Translation. IP Masquerading
5
» 014.01.54.Routers And Linux
5
» 014.01.56.Linux Firewall Basics
5
» 014.01.58.Setting Firewall Rules
5
» 014.01.60.Firewall Strategies
10
» 014.01.62.Ethernet-IP-ARP-NDP-IQs
5
» 014.01.64.Wireless Ethernet
5
» 014.02.Network Applications and Services
11
» 014.02.12.Basics of Services
3
» 014.02.14.Introduction to Network Servers
2
» 014.02.16.Network Servers. Secure Shell
5
» 014.06.Network Protocol Telnet
38
» 014.06.12.Introduction-To-Telnet
3
» 014.06.14.General Working. Telnet
5
» 014.06.16.General-Working-Telnet
5
» 014.06.18.Network Virtual Terminal
3
» 014.06.20.More About Telnet
3
» 014.06.22.Installing Telnet on Fedora
5
» 014.06.24.Telnet Commands-Fedora
3
» 014.06.26.Using Telnet in Linux
5
» 014.06.28.Secure telnet with FirewallD. Fedora.
3
» 014.06.30.Using Telnet in Linux
2
» 014.06.DHCP. A network management protocol
26
015 Python with Eclipse on Linux
27
025.Rust Programming
1
101 Advanced Data Structures using C
18
104.Mastering Linux Network Stack
1
» 104.01.Linux Network Stack User-Space
1
105 Parallel Port Device Drivers Development
5
205 Serial Port Device Drivers Development
3
303 Linux System Programming
32
Project 22. Ethernet Network Device Driver Development
0
Query
557
Project.203 Linux System Programming. MySQL
0
Pravjot Sir Classes
161
Events at EmbLogic
2
Project 16: SPI Device Driver Development
2
Project 17: I2C Device Driver Development
0
Project 18: PCI Device Driver Development
0
Project 19: Embedded Linux on ARM Using Network TFTP
0
Project 20: CAN Bus Protocol and Driver Development
0
Project 21: USB Device Drivers Development
0
Embedded Linux
0
ARM Embedded Processor
0
Training
2
Members Area
1
Word From Admin
1