Skip to main content

Contact Us

We'll happy to help you, fill form given below to contact with us.

We'll like to hear from you. It feels good when you send message to us. If any issue related to broken link of any document or book. We updated link of books/newspaper that are already on internet .. If any issue related to blogs copyright then please mail us on Email jayantoms.007@gmail.com

You can reach us by filling this form

Name

Email *

Message *

Comments

Popular posts from this blog

The Top 5 Laptops Under 50,000 in India December 2023

  Explore the curated selection of the finest laptops under 50,000 Rupees available on prominent e-commerce platforms such as Amazon and Flipkart, as well as in offline market. Enhance your festive season with the perfect blend of performance and affordability this Christmas and New Year's Eve. All the 5 laptops, those are listed below, all of them are capable of playing mid-range games, video editing, practice coding, and also for those who starts journey in any IT department. All of them having outstanding performance under 50,000 Rupees. You're in the proper location! let's see all the 5 laptops in this list. 1. HP Victus Ryzen 5 Hexa core One of the best laptops at this price range, available in the market. With the HP Victus Ryzen 5 Hexa core 5600H, fall deeper in love with computing than ever before. It comes with AMD Radeon RX 6500M of GDDR6 dedicated graphic memory of 4 GB, pre-installed 8 GB DDR4 RAM and it can be maximum upgraded up to 16 GB. The CPU clock speed i...

What are the Basic Nmap commands for Cyber security enthusiast.

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service up-time.  Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.  It was designed to rapidly scan large networks but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. Let's check out the basic nmap command in our day-to day life. Host Scan Host scan is used by penetration tester to identify active host in a network by sending ARP re...

What is VLAN? And What is the purpose of using VLAN ?

What is  VLANs? (Virtual Local Area Network) Those who are learning networking first time they first misunderstood the VLAN concept and non-technical background students not able to understand it very well, so this article will describe the concept of VLAN in easy manner. Let's understand the concept of VLAN using a small example! Imagine you live in a big apartment building with lots of units, and there are many other people living there too. Each apartment has its own set of rooms and, usually, the people in one apartment don't want other people from different apartments coming into their rooms. They are private and have their own area. Now, think of a VLAN (Virtual Local Area Network) like creating separate areas in this apartment building. It's as if you can use a magic paint to draw invisible lines that divide the building into sections, and each section has its own set of rooms. With VLANs in a computer network: You can have different groups of computers, kind of like...