Search This Blog


.... Welcome . . . . . .If You Have Any Question ... Write me: . . . Hire me : Deepak Kumar ...

Friday, July 15, 2016


OSPF uses a LSDB (link state database) and fills this with LSAs (link state advertisement).

Here Some details about all SLA types:-

  • LSA Type 1 (Router LSA)

Router Link State Advertisements Type 1 are generated by every router for each link that belongs to an area. They are flooded only inside of area to which they belong. Link ID of this LSA is the Router ID of the router that generated it.

  • LSA Type 2 (Network LSA)

Generated by Designated Router (DR) for multiaccess networks and describe the routers that are connected to that segment. They are sent inside the area to which the network segment belong.

  • LSA Type 3 (Summary LSA)

Type 3 LSAs are generated by Area Border Routers (ABRs). In type 3 LSAs are advertised networks from an area to the rest of the areas in AS. Advertised networks in Type 4 LSA can be summarized or not. The link-state id used by this LSA is the network number advertised.

  • LSA Type 4 (ASBR Summary LSA)

Generated by ABRs, this type of LSA contain routes to ASBRs. Link id used is router ID of the ASBR described. Are not flooded in stub areas.

  • LSA Type 5 (External LSA)

Autonomous system external LSAs are generated by ASBRs and contain routes to networks that are external to current AS. Link-state ID is network number advertised in LSA. Type 5 LSAs are not flooded inside any stub areas.

  • LSA Type 6 (Multicast LSA)

This type of LSA is used for multicast applications. Not supported on Cisco.

  • LSA Type 7 (NSSA External LSA)

Type 7 LSA allow injection of external routes through Not-so-Stubby-Areas (NSSA). Generally external routes are advertised by type 5 LSA but they are not allowed inside any stub area.
 Type 7 LSA is generated by NSSA ASBR and is translated into type 5 LSA as it leaves the area by NSSA ABR, which is then propagated throughout the network as type 5 LSA.

  • LSA Type 8 (External LSA for BGP)

Used to work with BGP.

  • LSA Type 9,10,11 (Opaque LSAs)

Friday, January 29, 2016

Technical difference between Router and Layer 3 (L3) Switch

What is Technical difference between Router and Layer 3 (L3) Switch ?

 What is Packet Switching difference between Router and Layer 3 Switch ?

Do you know that Router and L3 Switch are both L3 Devices ?.. Lets start Reading in panel.

Saturday, May 9, 2015

Cisco Real Time Configurations‏ - OSPF on L3 Switches

Dear Friends,

Today is my first series on Cisco Real Time Configuration.

Now you can Download PKT and Test on your system.

Today Topic -  OSPF Configuration on L3 Switch (Routing).

I hope you will like it.

Note -  Your Comments are very important for me.

Download:- Download Packet Tracer Real Time Configuration .. OSPF Routing on L3 Switch.

Devices User Name -  deepak
Devices Password - deepak

Click on Download Option for save it on your computer.

Tuesday, September 9, 2014

Pak hackers target Indian Gmail users

A Media Report says that Pakisthan Hacker target the Indian Gmail Users with Fake Email Login Page, Which is hosted in Karachi (Pakisthan). About 160 Person has reported under the IT act.

" Pakistani cyber criminals now have their eyes fixed on the Gmail accounts of Indian users. The hackers have created a page that looks extremely similar to that of Gmail and they are using this page to break into the accounts of the Indian users. The page looks so similar to that of Gmail home page that it is very difficult for the users to notice the minor differences and thus they fall in the trap laid out by the Pakistani cyber criminals. 
When Bhaskar group investigated the matter it was revealed that the group of hackers based in Karachi have hacked into hundreds of accounts of the Indian businessmen and caused them a loss running into crores. 
'Special sign-in prevented'
Gmail users in India have been getting an email, the subject of which says ‘special sign-in prevented’ and the email of the sender is, the hackers have created an app which can be used to sign in to your account. The mail besides showing the time of the mail sent and the person’s name also reflects the location and IP address. To track the user a button has been inserted in the mail which says ‘sign-in activities’.
The domain traced back to Pakistan
According to cyber experts domain can be traced back to Pakistan and has been registered under the name of Altan Janu, this domain has been hosted on If a user enters his id and password in this domain then the information can be accessed by the cyber criminals.
160 cases of hacking registered under IT act
According to the data 160 cases have been registered under the IT act with the Jodhpur commissionerate, Out of these cases 48 have been referred to  FR as the police is not equipped and trained to handle cyber crime. In March 2014, a resident of Jaipur had registered a case of cyber crime in which Rs 30 lakh had been withdrawn from his account. Number of such cases have been registered with the police. " @Daily Bhaskar

Here I am Sharing Some Tips to secure your account..
1. Always Make Sure That URL is same as you type in address bar.
2. Google Never Used Self Certificate for SSL.
3. Never Give Permission to Untrust Self Certificate
4. Make Sure That You have a Green Pandle in Address Bar.
5. Make Sure that you have "https://..." in starting of your URL.
6. Always Make Sure that which Organization Issued the SSL Certification and Which Organization used it. You have the same name in Issued to filed, which is you have typed the URL in Address Bar.

Here I posted the a screen shot for an example

Fake & Real Page Of Gmail Login Page - 

SSL Certificate Test -

Your Account Security & Privacy is your right. Stay Safe & Updated. 

Monday, September 8, 2014

I am Back

Hello Friends,

After A long time absent I am coming back here, Now I will write regular post.


Thursday, September 5, 2013

Secure your WordPress Website

I know you are aware about online security and maintain security policy. Today I am writing about WordPress security. I hope you are using WordPress with your website or WordPress on A person who is scanning your WordPress week point and take control on your blog, is called hacker and your WordPress hacked.
Wordfence is a WordPress plugin for maintain security, Real time scanning, firewall, geolocation and cyber security. This is offer many features for free and payed user. It is offering following features.
  • Cellphone Sign-in
  • Remote Scans
  • Country Blocking
  • Frequent Scans
  • Scheduled Scans

View USB History without Software and with software

You are away from your Desktop or Laptop and someone trying to copy your personal data in USB flash drive. Now this is an important question that Who was used USB device in your System.
There are two ways to view USB history.
1. Using the Registry
2. Using third party software
Solution 1::
You can read USB devices history using Registry keys.
Open RUN menu
Type Regedit Click on OK 

USB History

Viber not working on Office Wifi Network

My Viber application is not working on my office wifi network.
(Email Received from Blog Reader).

Dear Reader,
Thanks for visit at my blog. This is a security or your office IT policy issue. Contact to your Network administrator.
For your best help:::
(1. Your office Network is secure with Firewall security and firewall block your viber application communication ports.
(2. It may be that your office network is working with Proxy Server.
we will redirect on new website :: 

Windows 8 Says Good Bye to F8 Key for Safe or Advanced Boot Menu

In previous versions of Windows,  booting into Safe Mode by press on the F8 button on start-up —  with Windows 8, this process has been disabled by Microsoft.
This is completely new menu in windows 8 for start windows 8 in Advanced Boot Option.
How to access Safe-mode?
  • Press W + I to access the Charm Bar or from Desktop
  • Click on “Change PC settings“.

win 8 - General
We will redirect to you on our new website ::

Thursday, July 25, 2013

Happy System Administrator Days

Your network is secure, your computer is up and running, and your printer is jam-free. Why? Because you’ve got an awesome sysadmin (or maybe a whole IT department) keeping your business up and running. So say IT loud; say IT proud …

Friday, July 26, 2013, is the 14th annual System Administrator Appreciation Day. On this special international day, give your System Administrator something that shows that you truly appreciate their hard work and dedication. (All day Friday, 24 hours, your own local time-zone).
Wait… what exactly is SysAdmin Day? Oh, it’s only the single greatest 24 hours on the planet… and pretty much the most important holiday of the year. It’s also the perfect opportunity to pay tribute to the heroic men and women who, come rain or shine, prevent disasters, keep IT secure and put out tech fires left and right.
At this point, you may be thinking, “Great. I get it. My sysadmin is a rock star. But now what?” Glad you asked! Proper observation of SysAdmin Day includes (but is not limited to):
  • Cake & Ice cream
  • Pizza
  • Cards
  • Gifts
  • Words of gratitude
  • Custom t-shirts celebrating the epic greatness of your SysAdmin(s)
  • Balloons
  • Streamers
  • Confetti
Happy System Administrator Day

Your Secure Email ID – 1

1. Share your e-mail address with only trusted sources: Only your family, friends, and trusted business contacts should have your personal e-mail address. Do not post your e-mail address on Web sites, forums, or in chat rooms. If you post your e-mail address, you are vulnerable to receiving spam or having your e-mail passed on to others. If you would like to subscribe to a newsletter or Web site and receive confirmation e-mail for online transactions, consider using a generic e-mail address that is not linked to any of your personal information.
2. Use Separate Email Accounts: Use separate email account for your Job application, Facebook, Twitter, Personal and other type information. You can email alias for separate purpose.   
3.  Use strong passwords: Create a strong password as example as “StWtl@859/”. Never Use your name, nick name, passport number, DL number etc as your password and use separate password for your each email and other account as like as bank or ATM.
4.  Use Digital Certificate Security : Use Digital Certificate for  Secure Authentication,  Privacy Management , Integrity etc. Create Digital Certificate
5. Beware Of Phishing Scams: there’s another level to this scam and it’s called “phishing.” Basically, malicious users will imitate and impersonate high-profile websites (e.g., eBay, Amazon, Facebook, etc.) and say that they’re experiencing trouble with your account; all you have to do to fix it is to send them your username and password to verify your authenticity. Sometimes they’ll even link you to a false website that looks exactly like the real thing.
6. Do Not Open Unsolicited attachments: Attachments are a tricky thing when it ...........

Read More >>>

What is cPanel and how do I log in

What is cPanel ?

cPanel, also referred to as your control panel, is the website management program that we provide to you so that you can manage various aspects of your website. In your CPanel you can do things like set up email accounts, create subdomains, and install software on your site.

how do I log in ?

If you wish to log into cPanel over an encrypted SSL connection with port number, you can use the following URLs

https://yourwebsiteipaddress:2083 (“yourwebsiteipaddress” replace with your website IP address as example : “″) (“” replace with your website domain name as like as ““)

If you wish to log into cPanel over an encrypted SSL connection with URl, you can use the following URLs

https://yourwebsiteipaddress/cpanel (“yourwebsiteipaddress” replace with your website IP address as example : “”)   (“” replace with your website domain.................. 

Friday, July 5, 2013

What about CON folder

Today I am open my facebook profile and View an interesting topic about CON folder in Windows OS.
“CON” name is the microsoft stuff. There are many reserved name in the operating system for accessing the shearing files folder. like con, lpt, com1, com2, com3 and many more. That why u can not create the folder of such name on desktop. But in dos system this is not happen, thats why dos create the folder of such name but its again a Virtual folder, when you see the properties of such folder it shows 0 bytes even it contain the data of MBs or GBs.

Read More>>

Make Bootable USB Drive with Windows Server 2008

A bootable USB Drive is a alternative way to install operating systems on netbooks without optical drives, or carrying around a Live OS with you at all times. It especially makes sense if you’re installing software on a machine that otherwise has no need for an optical drive:
Open “CMD”
C:\> diskpart

DISKPART> list disk

     Select the USB device from the list and substitute the disk number below
     when necessary

DISKPART> select disk 1
DISKPART> create partition primary
DISKPART> select partition 1
DISKPART> active
DISKPART> format fs=fat32
DISKPART> assign

xcopy Y:\*.* /s/e/f Z:\


Monday, June 24, 2013

Real time traffic monitor on Cisco Router

Real time traffic monitor on Cisco Router
1. Enable the ‘ip route-cache flow’ to the interface to monitor using the ff command:
conf t
interface fa0/0
ip route-cache flow
2. Run the ff command in privilegde mode:
show ip cache flow
You should see somethind similar to this:
SrcIf         SrcIPaddress    DstIf         DstIPaddress    Pr SrcP DstP  Pkts
Fa0    Se0.500     06 08B6 01BB   565
Fa0    Se0.500     06 CC10 01BB   290
Fa0    Se0.500     06 CC07 01BB   439
Fa0    Se0.500     06 CC08 01BB  4050

Realtime traffic monitoring

Today I am writing about troubleshooting of your networking.  If you are network Engineer then you want to monitor real-time traffic monitor of your network.
If you are using FirePro or MikroTik Router then how you can monitor network traffic ?
A torch tool is available  for monitor realtime traffic monitor in WinBox
Torch is realtime traffic monitoring tool that can be used to monitor the traffic flow through an interface.
You can monitor traffic classified by protocol name, source address, destination address, port. Torch shows the protocols you have chosen and tx/rx data rate for each of them.
More attractive Torch interface is available from Winbox (Tool>Torch). In Winbox you can also trigger a Filter bar by hitting the F key on the keyboard.
turch tool
 Tool > Turch … Winbox GUI tool

Windows xp SP2 hangs up on the windows is shutting down screen

I am very much happy to see your tech support blogs, but I’m not able to get below error proper answer, So, please provide me Ans. If you have any solution regardind below error.
Windows xp SP2 hangs up on the windows is shutting down screen.
  Prabhu Nath Das,
As per trail mail I hope you have following error
When you shut down your Microsoft Windows XP-based computer, Windows may intermittently stop responding (hang), and you receive the following message:
Saving your settings.
During this time, you may be able to move the pointer, but the computer may not respond when you press CTRL+ALT+DEL.
If yes then you need to upgrade your service Pack