Networking academy
Networking academy
  • Видео 24
  • Просмотров 146 750
How to Rest & Recover MacBook Pro laptop password in 2 minutes #macbookpro #macpassword
This video is about how we can #reset our #macbook Pro #laptop #passwordresetmacbookpro
#passwordreset
Here's how to do that:
Restart your Mac. …
While it is restarting, press and hold the Command + R keys until you see the Apple logo. …
Go to the Apple Menu at the top and click Utilities. …
Then click Terminal.
Type “resetpassword” in the terminal window. …
Then hit Enter. …
Type your password and a hint. …
Finally, click Restart.
Просмотров: 114

Видео

Network Essentials #ccna #ccnp #ccnpsecurity #network
Просмотров 159Год назад
Networking Essentials is designed to introduce the core networking concepts to learners who are new to IT Support. The course begins by explaining the purpose of networking and then examines how networks are configured in homes, offices, between offices, and around the world with the Internet.
Named base EIGRP Authentication Configuration
Просмотров 3512 года назад
#EIGRP #NamedEIGRPAuthentication #EIGRPAuthentication #CCNP Each named mode configuration can have multiple address families and autonomous system number combinations. In the named mode, you can have similar configurations across IPv4 and IPv6. Although Named EIGRP is configured differently from traditional EIGRP, the configurations are compatible, meaning that an EIGRP-speaking router configur...
Analyzing the live capture using Wireshark
Просмотров 70 тыс.2 года назад
#Wireshark #capture #networking #ethicalhacking #CCNP Wireshark is the world's foremost and widely-used network protocol analyzer. It lets you see what's happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions.
Wireshark Advanced Capture Scenario Analysis Methods With Wireshark
Просмотров 2,3 тыс.2 года назад
#Wireshark #networking #hacking #packetCapture Wireshark is a network protocol analyzer or an application that captures packets from a network connection, such as from your computer to your home office or the internet. A packet is a name given to a discrete unit of data in a typical Ethernet network. Wireshark is the most often-used packet sniffer in the world.
NetFlow Configuration and Verification
Просмотров 2,4 тыс.2 года назад
#NetFlowConfiguration and Verification #Netflow #networking #CCNP #CCNA A NetFlow configuration for a Cisco IOS device contains three parts: a monitor, an exporter, and the record itself. The record is where you'll tell the device what fields you want to send to your collector (IP source address, source ports, destination ports, Lastly, the monitor will be how you send it
EVE-ng complete Setup in Urdu and Hindi
Просмотров 3,5 тыс.3 года назад
#EVENGSetupHindi EVE-NG is currently released as an OVF files and ISO. An OVF is a Open Virtual Format. It’s an Open Virtualization File for the virtual machine. EVE-NG can be also directly installed on the physical hardware, without any virtualization by use of ISO image. Because EVE-NG runs many hypervisor, it’s strongly recommended a physical server dedicated for it, without any virtualizati...
Configuring and Encrypting Passwords on Cisco Routers
Просмотров 4,6 тыс.3 года назад
#PasswordsCiscoRouters Passwords are used to restrict access to a CISCO router. Passwords can be given to the virtual terminal lines and the console line. Moreover, password can be set privileged EXEC mode. This page will provide the information to set up CISCO router password to virtual terminal lines, console lines and privileged mode. Even more, you will learn how to encrypt the password also.
Port Address Translation PAT explained How to configure PAT
Просмотров 13 тыс.3 года назад
#PATConfiguration#PortAddressTranslationPAT#CCNA#CCNP#CISCO Port Address Translation (PAT) is a feature of a network device that translates communications made between hosts on a private network and hosts on a public network. PAT allows a single public IP address to be used by many hosts on the private network, which is usually a LAN.
OSPF MD5 Authentication explained How to configure MD5
Просмотров 2 тыс.3 года назад
#OSPFMD5Authentication#CCNA#CCNP#OSPFMD5#MD5Configuration Open Shortest Path First (OSPF) authentication which allows the flexibility to authenticate OSPF neighbors. You can enable authentication in OSPF in order to exchange routing update information in a secure manner. OSPF authentication can either be none (or null), simple, or MD5. The authentication method "none" means that no authenticati...
PBR Policy Based Routing Configuration
Просмотров 3813 года назад
#PolicyBasedRouting #PBR #ccna #ccnp #networking In computer networking, policy-based routing (PBR) is a technique used to make routing decisions based on policies set by the network administrator. When a router receives a packet it normally decides where to forward it based on the destination address in the packet, which is then used to look up an entry in a routing table. However, in some cas...
Telnet configuration in Hindi/Urdu configure telnet on cisco router packet tracer
Просмотров 6983 года назад
#CISCO #CCNA #TELNET #NETWORKING The Telnet protocol enables you to set up TCP/IP connections to a host. Telnet allows a person at one site to establish a TCP connection to a login server at another site and then passes the keystrokes from one device to the other. Telnet can accept either an IP address or a domain name as the remote device address.
Configuring 1 router, 2 Switches, 2 PCs network topology for multiple IP LANs
Просмотров 20 тыс.3 года назад
#ccna #Ccnp #networking #configuration Configuring 1 router, 2 Switches, 2 PCs network topology for multiple IP LANs
How to configure Named Base EIGRP Configuration Example
Просмотров 7823 года назад
#NamedEIGRPConfiguration #CCNA #CCNP #CCIE #NETWORKING Enhanced Interior Gateway Routing Protocol can be configured using either the classic mode or the named mode. The classic mode is the old way of configuring EIGRP. In classic mode, EIGRP configurations are scattered across the router mode and the interface mode. The named mode is the new way of configuring EIGRP; this mode allows EIGRP conf...
Basic EIGRP Configuration Example
Просмотров 6 тыс.3 года назад
#EIGRP #CCNP #CCNA #CCIE #CISCO #NETWORKING Enhanced Interior Gateway Routing Protocol (EIGRP) is an interior gateway protocol suited for many different topologies and media. In a well designed network, EIGRP scales well and provides extremely quick convergence times with minimal network traffic. EIGRP Theory of Operation Some of the many advantages of EIGRP are: very low usage of network resou...
Configuring a Router as a DHCP Server
Просмотров 4,8 тыс.3 года назад
Configuring a Router as a DHCP Server
How to Configure Dynamic NAT (Network Address Translation)
Просмотров 14 тыс.3 года назад
How to Configure Dynamic NAT (Network Address Translation)
How to Configure Static NAT (Network Address Translation)
Просмотров 8293 года назад
How to Configure Static NAT (Network Address Translation)
Installing EVE-NG in VMware Workstation Player LAB SET UP PART 2
Просмотров 2343 года назад
Installing EVE-NG in VMware Workstation Player LAB SET UP PART 2
Installing EVE-NG in VMware Workstation Player LAB SET UP PART 1
Просмотров 2553 года назад
Installing EVE-NG in VMware Workstation Player LAB SET UP PART 1
learn how to configure VTP VLAN Trunking Protocol
Просмотров 2483 года назад
learn how to configure VTP VLAN Trunking Protocol
How to make vlan, communication between same vlan.
Просмотров 7873 года назад
How to make vlan, communication between same vlan.
Data Folder Sharing through Lan over Ethernet Part 2
Просмотров 983 года назад
Data Folder Sharing through Lan over Ethernet Part 2
Data Folder Sharing through Lan over Ethernet Part 1
Просмотров 1073 года назад
Data Folder Sharing through Lan over Ethernet Part 1

Комментарии

  • @trollobite1629
    @trollobite1629 11 дней назад

    Works on Packet tracer and Gns3 but not on real hardware ?

  • @damientech88
    @damientech88 Месяц назад

    Superb explanation. Much better than my professor.

  • @Inamorato9
    @Inamorato9 Месяц назад

    No information, just waste of time.

  • @tufuefiso2820
    @tufuefiso2820 4 месяца назад

    Thank you sir

  • @senditall152
    @senditall152 6 месяцев назад

    Thank you

  • @tierratowne
    @tierratowne 8 месяцев назад

    Thank youuuuuuuuu

  • @adrianvandevoorde
    @adrianvandevoorde 9 месяцев назад

    This deserves more likes. It al seems so easy and clear now! Thnx

  • @KentWirianata-l1s
    @KentWirianata-l1s 9 месяцев назад

    i got host destination unreachble

  • @sajid108016
    @sajid108016 10 месяцев назад

    Kindly share the images

  • @vijayanand1515
    @vijayanand1515 10 месяцев назад

    Well explained sir❤!!!.do we get continuation of this pls

  • @laibanawaz7789
    @laibanawaz7789 11 месяцев назад

    vey beautifull explanation

  • @lokeshmanchanda2234
    @lokeshmanchanda2234 11 месяцев назад

    Gosh! this guy is so slow even on 1.5x speed

    • @charleso6144
      @charleso6144 5 месяцев назад

      So true. Did you manage to find a better guide?

    • @lokeshmanchanda2234
      @lokeshmanchanda2234 5 месяцев назад

      ​@@charleso6144 I analysed it using postman using proxy using this video ruclips.net/video/bjrCHUITZ3k/видео.html. In new version of postman it is shown at bottom bar

  • @ColSergol
    @ColSergol 11 месяцев назад

    Host unreachable

  • @dmitryabramov8618
    @dmitryabramov8618 Год назад

    Many thanks!

  • @tahersadeghi6773
    @tahersadeghi6773 Год назад

    How many days back the wireshark can show the captured packets? Can it show the packets one week or two weeks ago if they have sent you an email or they have browsed your website?

    • @priyankapawar7060
      @priyankapawar7060 8 месяцев назад

      No. It only shows the capture for the time you have taken the capture

  • @saqibwilliam
    @saqibwilliam Год назад

    how can we filter ingress discards ?

  • @mahuubao
    @mahuubao Год назад

    Excellent .. well done ...

  • @haisesasaki8786
    @haisesasaki8786 Год назад

    Thanks

  • @ahmedtanvir9299
    @ahmedtanvir9299 Год назад

    What is the system requirements for eve -ng?

    • @usman_hassan87
      @usman_hassan87 Год назад

      4-core processor and 16 GB RAM for CCNA-level labs

    • @ahmedtanvir9299
      @ahmedtanvir9299 Год назад

      @@usman_hassan87 so many thanks brother.

  • @mansinayak10100
    @mansinayak10100 Год назад

    can't be able to see my password

  • @MrRabidmole
    @MrRabidmole Год назад

    Thanks for the video, some good information there 👍

  • @alo_m4772
    @alo_m4772 Год назад

    Why do we use the gigabit ethernet cable from the switch to the router instead of the fast ethernet ? TIA

  • @CarlosSanchez-hw3bv
    @CarlosSanchez-hw3bv Год назад

    Can you manually asign a port number, or is it only dynamic?

  • @umairparacha3470
    @umairparacha3470 Год назад

    Router. Switches ki Images ko Kahin Google drive py rkha hai kia sir to pls share

  • @JahanzebKaramatAli
    @JahanzebKaramatAli Год назад

    30:50 Khan Sahb ZInda Badd 😍😍😍😍😍😍😍😍 Dil khush ker dia aap ny. Khan Sahb yeh IOS images ko apni gDrive waghera mn upload ker k uska link he share ker dn kindly. Aap ki barri mehar bani ho.

  • @kennethmacfadyen8839
    @kennethmacfadyen8839 2 года назад

    Wow! You saved me explaining this as I had a lab due and was in over my head. Very well explained!

  • @mdzmzm
    @mdzmzm 2 года назад

    Thanks, the best explanation for PAT on youtube

  • @VLOGUEROMAR
    @VLOGUEROMAR 2 года назад

    Hi , Thanks for your video . but unfortunately I was not successful after following your topo;ogy, can you explain more please....

  • @dipankarray1743
    @dipankarray1743 2 года назад

    Sir WinScap ka alternative Linux me kya hoga??

  • @tharindumadhushan7776
    @tharindumadhushan7776 2 года назад

    Why we give default gateway sir

    • @theo_st
      @theo_st Год назад

      when a packet needs to travel to a different network than the one it originates from, the gateway (router) is responsible for forwarding the request to the other network. The PC needs to be informed about who is responsible for that forwarding.

  • @mujeebhussain3324
    @mujeebhussain3324 2 года назад

    bhai can you send me those iso images of router fortinet

  • @davidblaise6809
    @davidblaise6809 2 года назад

    Very good explanation. Thank you, Sir! At 1:44, you merge the file "website_traffic" with file1 but what is in file1? Thank you

  • @syedmuhammadabdullah982
    @syedmuhammadabdullah982 2 года назад

    yar mjy lgta hy app khud student ho seikh rhy ho abhi! Piyary bhai jysy app smjha rhy ho VTP aise nhe hota dear sb sy phly VTP ka brief intro dety hain usky versions aur Phr VTP k modes btaty hain Phr Domain Name bna ky password set kr ky phr VLANs bna ky switch ki ports trunks bnaty hain phr VLANs ki replication show krty takh confrm ho jaye !!! phr Revision number verify krty hain !!!

  • @jackreacher1434
    @jackreacher1434 2 года назад

    Thank you!

  • @sulmanahmed3867
    @sulmanahmed3867 2 года назад

    Asslam-O-Alikum Sir, thank you very much, can you send me iso images.

  • @Bishboyscomics2
    @Bishboyscomics2 2 года назад

    Simply amazing!

  • @yacinebouriche3309
    @yacinebouriche3309 3 года назад

    How we can do it on a sagemcom router

  • @MjK1
    @MjK1 3 года назад

    Good work sir keep it up 🙂