Author: Valter Popeskic

IMAP – Internet Message Access Protocol

Internet Message Access ProtocolIMAP – Internet Message Access Protocol is a means of getting the right of entry to an e-mail. This code of behavior is also suitable for accessing the bulletin board posts which are held in reserve on a mail server and that is perhaps communal. Additionally, that commonly well known mailing IMAP protocol is an Application layer protocol which is used to grant permission to an e-mail client to get reach to the e-mail that resides over a far flung e-mail server.

Saving VLAN.dat To NVRam

Saving VLAN.dat To NVRam – How to save VLAN.dat to different place – VLAN.dat redirection

Switch VLAN.dat managementSometimes it can happen to you that the VLAN Database is lost when the switch is restarted. This is especially often when working in the lab environment. To help cross this issue you can tell the switch to save the VLAN.dat file to NVRAM instead of storing it to Flash. By default on Cisco switches that are running Cisco IOS the Flash memory is a default place to store VLAN.dat

IRC – Internet Relay Chat Protocol

Internet Relay Chat protocol is introduced in order to use for chat. Online users can perform synchronized text messaging with its help. In point of fact, users involved in chatting are required to install software at both receiver and sender sides that will perform the functions of decoding and putting on view the data by means of the IRC protocol, for example Pidgin.

IRC - Internet Relay Chat Protocol

Firewall – Defending Networks

In network security today, a firewall may be a software or hardware that makes a barrier between our internal network and untrusted external network. You can look at the firewall as a set of related programs that enforce an access control policy between two or more networks.

firewallThe name “firewall” is very strange, it has been originally used to describe the segment that separated the engine compartment from the interior of an automobile. In the networking world firewall is the first line of defense and the technology that will allow us to segment the network in physically separate subnetworks.