fbpx

We are glad that you are following our tutorials. Our team tries to provide you with the best educational and resources in the field of web, network, internet, and related sciences. If you have any comments, questions, or suggestions, please leave a comment to help us improve.

What is the history of 3D Printing?

What is the history of 3d Printing? It also known as additive manufacturing, has a rich history that dates back several decades. Here’s a brief overview of the key milestones in the history of 3D printing, along with some images to illustrate its evolution: Charles W. Hull   1960s Invention of Stereolithography (SLA): The concept of this printers began with the invention of stereolithography by Charles W. Hull in 1983. He later co-founded 3D Systems, a pioneering 3D printing company. 1980s Fused Deposition Modeling (FDM) Patented: Scott Crump patented Fused Deposition Modeling in the late 1980s, which laid the foundation…

MITRE ATT&CK

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a framework developed by MITRE Corporation, a not-for-profit organization dedicated to solving problems for a safer world. ATT&CK is a knowledge base that categorizes the tactics, techniques, and procedures (TTPs) used by adversaries or attackers during cyber intrusions. The framework provides a comprehensive understanding of how cyber adversaries operate by organizing their behaviors into a matrix. This matrix consists of various tactics that represent high-level objectives an attacker may have (such as initial access, execution, persistence, privilege escalation, etc.) and techniques that represent specific methods or actions used to achieve those…
Linux Command - (apt-get)-logo

Linux Command – (apt-get)(Shutdown)(tree)(which-where)

Linux Command In this course of Linux commands, we will introduce four Linux Command – (apt-get)(Shutdown)(tree)(which-where): apt-get Shutdown tree which-where (apt-get): The apt-get update command updates the list of available packages (programs) that can be downloaded. *If you type this command as a non-root user, the system will refuse to execute the command because the user does not have the necessary privileges. > apt-get update -y > sudo apt-get update -y let’s to see video from our YouTube channel (Shutdown): • The shutdown command allows you to schedule device shutdowns and restarts, sends a warning message, and prevents other users…
Create user in Microsoft 365

Create user in Microsoft 365

Create user in Microsoft 365 The Microsoft Office 365 Administration Center is a web-based portal administrator. We use this portal to manage accounts and configure services such as Intune, SharePoint, Teams, Exchange, OneDrive, and all office products. In this part, we want to create user in Microsoft 365 with Admin Center. Users section: create, delete, manage users, set permissions, edit user details, and reset passwords. Groups section: create, organize, manage, and delete groups With the Admin role we can login and try to create users. For starting we login to this link. https://admin.microsoft.com/ In the menu we click on User\Active…
What is Azure?

What is Azure?

What is Azure? Microsoft Azure is a cloud computing platform and infrastructure created by Microsoft for building, deploying, and managing applications and services through a global network of Microsoft-managed data centers. It provides a variety of services such as computing power, storage, and networking, as well as many pre-built tools and frameworks for different programming languages and platforms, making it easy for developers to build and deploy applications on the cloud.   Now, let’s to see the video from our YouTube channel:   You can find all learning for Azure by clicking here.
Problems running Hyper-V & VirtualBox

Problems running Hyper-V & VirtualBox

Problems running Hyper-V & VirtualBox   The use of virtual machines is being used day by day. In companies, institutions and even at home for practice and learning. We can install virtual machines on personal computers that have minimal functionality. When we install these softwares on Windows 10 or 11, in some cases, problems arise to run it. One of them is, “Problems running Hyper-V & VirtualBox” at the same time. Here we are going to explain how to solve this problem. If you installed Hyper-V and you want to install VirtualBox, you will have this issue: mes you get…
Firewall-CentOS-logo

Firewall in CentOS

Firewall in CentOS In this tutorial we want to try Firewall in CentOS but before that we ask: What is a firewall? Firewalls are the first line of defense in network security. They are a network security device that can be hardware or software and control incoming and outgoing traffic.   Firewall is a part of network security that controls and filters traffic. The firewall place between the Internet and the end user and filters the Internet based on the rules previously defined for it and whether it allows access or not. In Linux, Netfilter use to allow access or…
PowerShell

PowerShell (DNS Record)

PowerShell (DNS Record) How to check DNS records on domain by PowerShell? To check the DNS records of a domain using PowerShell, you can use the Resolve-DnsName cmdlet. Here’s how you can do it: Open PowerShell: Launch PowerShell by searching for “PowerShell” in the Start menu or by pressing Win + X and selecting “Windows PowerShell” open “Windows PowerShell (Admin)”. Run the command: In the PowerShell window, run the following command: Powershell code: Resolve-DnsName -Name example.com Replace “example.com” with the actual domain you want to check. This command will query the DNS records for the specified domain. View the results:…

Sample Exams (Blockchain, U.S. Dep Certification)

Sample Exams of Cybersecurity In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests” Which certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government? As of my last knowledge update in January 2022, the U.S. Department of Defense Directive 8570.01-M (DoD 8570) established requirements for the certification and training of personnel working in Information Assurance (IA) roles within the Department of Defense (DoD). These requirements were important for anyone looking to work in IT…
Network-Security-logo

Network Security

What is Network Security? One of the main topics of computer networks is Network Security. After configuring and deploying the hardware, we must pay special attention to this topic. In this section, we will examine the following: What is computer network security? Wireless networks Firewall What is computer network security? It includes things like software used, data stored, and information theft. Everything that is used in a computer network system (both software and hardware) must be protected against attacks and risks. Three principal factors are needed in the security of a computer network, these three factors (CIA) are the basic…
Install ESXi on VMware

How to add HDD to Esxi?

How to add HDD to Esxi? To add a hard disk drive (HDD) to an ESXi host, you typically follow these steps: Physically Install the HDD: – Shut down the ESXi host. – Physically install the HDD into the server, making sure it’s properly connected and recognized by the hardware. Access ESXi Host: – Power on the ESXi host. – Connect to the ESXi host using VMware vSphere Client or VMware vSphere Web Client. You’ll need administrative credentials to log in. Navigate to Storage: – In the vSphere Client, go to the ESXi host you want to add the HDD…

Sample Exams (McCumber Cube, Cyberwarfare)

Sample Exams of Cybersecurity In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests”   McCumber CUBE: This could refer to a cybersecurity risk management framework developed by John McCumber, known as the McCumber Cube. It provides a structured way of understanding and managing security risks within an organization by considering three dimensions: confidentiality, integrity, and availability (often referred to as the CIA triad). McCumber diagram: In software engineering, the McCumber diagram is a graphical representation used to depict various dimensions of security in a system. It can display information…

Application in Intune (for windows)?

How to add application in Intune? In this tutorial we want to learn how we can add Application in Intune (for windows)? To add an app in Microsoft Intune, you can follow these general steps: Sign into the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com) using your administrator account. Navigate to “Apps” from the left-hand menu. Click on “Add” to start the process of adding a new app. Select the app type you want to add. Intune supports several types of apps, including “Managed Google Play app,” “iOS/iPadOS app,” “Android app,” “Windows app (Win32),” “Windows app (store),” and more. Choose the…
Green Lantern

3D Printing (Green Lantern)

3D Printing (Green Lantern) Green Lantern is a superhero character appearing in comic books published by DC Comics. The character first appeared in 1940 and has been portrayed by multiple individuals, each chosen to be a part of the intergalactic police force known as the Green Lantern Corps. The Green Lantern’s power comes from a ring that grants the wearer the ability to create constructs made of solid light energy, limited only by the wearer’s willpower and imagination. Each Green Lantern is chosen by a specific alien race and wields a power ring fueled by a central power battery on…
PowerShell

PowerShell (Shutdown-Restart)

PowerShell (Shutdown-Restart) PowerShell is a platform that consists of a command line, a programming language, and a configuration manager. You can run it on Windows, Linux, and MacOS. With it, we can do the things that we do graphically in Windows with the command line. in this learning, we want to know, how we can use Shut down or Restart computer by command. let’s start PowerShell (Shutdown-Restart). First, we open it from the Start menu. This command will shut down computer as Force without any confirmation: when we use this command, system will shut down without any confirmation, this command…

Storage Area Network (SAN)

Storage Area Network (SAN) A Storage Area Network (SAN) is a specialized network that provides high-speed block-level access to data storage. Unlike Network Attached Storage (NAS), which provides file-level access to data, SANs are designed to provide direct access to individual storage devices, such as hard drives, solid-state drives, or tape drives. A SAN typically consists of a dedicated network of servers, storage devices, and switches that are optimized for high-speed data transfer. The servers in a SAN are often connected to the storage devices via Fibre Channel, a high-speed networking technology that allows for low-latency and high-bandwidth data transfer.…

What is the GPO? Include an example

What is the GPO? Group Policy Object, which is a feature of Microsoft Active Directory that allows administrators to manage and enforce policies across a network of computers. A GPO is a collection of settings and rules that define the behavior and configuration of a set of computers or users within an Active Directory domain. These settings can include security policies, software installation and configuration, network settings, and many others. GPOs are created, managed, and linked to Active Directory objects such as sites, domains, or organizational units (OUs). Once a GPO is linked to an object, it applies its settings to…

GPO: Remove Recycle Bin

GPO: Remove Recycle Bin Discover how to hide the Recycle Bin for specific End Users using Group Policy Objects (GPO) in this video tutorial and learn how to customize End User settings by following along as we demonstrate how to remove the Recycle Bin through GPO in this video. let’s to see video from our YouTube channel Please check more videos for This Topic
How to Create Users in Linux (useradd Command)

How to Create Users in Linux (useradd Command)

How to Create Users in Linux (useradd Command) In this course of Linux commands, we will introduce How to Create Users in Linux (useradd Command). We start tutorial by mentioning the structure and example. In Linux, the adduser command is for creating a user. There are several commands and methods to create a user in Linux, such as useradd, adduser. One of the features of the Linux operating system is multi-user support. It is possible to create different users and separate groups by specifying the access level for each user or group in Linux. The two commands adduser and useradd work…
help desk support, IT support, website, web design, pc repair

Backup and Recovery

Backup and Recovery In this part we want to know, what is Backup and Recovery? Backup refers to storing information in external memory to protect information from accidents and loss. Recovery refers to returning data from a saved copy to the original location or to an alternate location where information has been lost or damaged. To store information, we use a separate system or media such as virtual hard drives, data storage servers or cloud storage space to protect them against the possibility of data damage. Why do we need backups? Why do we need backups? By making a backup…

Thanks

bussiness-man1
John Doe

Thanks for your information

business-man2
Eric Melan

[vc_tabs interval=”3″][vc_tab title=”Cisco” tab_id=”7c9e6b5f-4f2f-4″]

[/vc_tab][vc_tab title=”PowerShell” tab_id=”0ad27cb7-f7e7-0″]
[/vc_tab][vc_tab title=”Python” tab_id=”1672618581754-2-9″]
[/vc_tab][vc_tab title=”Microsoft Azure” tab_id=”1672624966524-3-4″]
[/vc_tab][vc_tab title=”Microsoft 365″ tab_id=”1672624967419-4-3″]
[/vc_tab][vc_tab title=”Windows Server” tab_id=”1672624968171-5-8″][/vc_tab][vc_tab title=”Virtualization” tab_id=”1672624968779-6-1″]
[/vc_tab][vc_tab title=”Network Security” tab_id=”1672624969451-7-2″][/vc_tab][vc_tab title=”Linux” tab_id=”1672625234812-8-4″]
[/vc_tab][vc_tab title=”Web Design” tab_id=”1672625259819-9-7″]
No results found.
[/vc_tab][/vc_tabs]

keyboard_arrow_up