How to create read-only user accounts on a Cisco router using Packet Tracer

6 years ago

In this post, I will share with us on how to create read-only user accounts on a Cisco router. If…

How to configure redistribution between eigrp and RIP using Cisco Packet Tracer

6 years ago

In this LAB, I will be sharing with us on how to configure redistribution between eigrp and RIP using the…

Android 9.0 Pie is here: Here is everything you need to know

6 years ago

The much anticipated Android 9.0 Pie is here, straight out of the kitchen, and in no time, will be available…

How users can bypass Mikrotik layer 7 filtering and access blocked websites

6 years ago

One of the many things you can use a Mikrotik router for is to deny users access to websites like…

Implement RIP on Packet Tracer for a network topology with three Cisco routers

6 years ago

The routing information protocol is an industry-standard distance vector routing protocol available to all vendors. It is one of the…

Whatsapp to finallycommence Adverts placement

6 years ago

If you are one of those that believe that it is actually possible to sustain Whatsapp operation without adverts placement,…

Vulnerability in routerOS. See what Mikrotik recommends.

6 years ago

There is presently an increase in the number of Mikrotik routers being attacked online. If your devices is connected on…

Huawei replaces Apple as the second largest smartphone sellers.

6 years ago

Huawei has edged out Apple to become the second largest smartphone sellers in the world. This is according to a…

How to implement eigrp on a network topology with three Cisco routers

6 years ago

Enhanced Interior Gateway Routing Protocol, popularly known as EIGRP, is a Cisco proprietary advanced distance vector routing protocol. Eigrp uses…

Unboxing and initial configuration of Sophos Cyberoam CR 35iNG

6 years ago

The Sophos Cyberoam 35iNG is a small office security device that is available as a unified threat manager and next…