- 89
- 596 138
Network Encyclopedia
Portugal
Приєднався 29 сер 2020
Network Encyclopedia Channel
SysInternals : Tools Suite to Troubleshoots Windows Systems
Sysinternals is a web site was created in 1996 by Mark Russinovich and Bryce Cogswell to host their advanced system utilities and technical information. It was called ntinternals then.
The two developers started a company named Winternals Software LP that was acquire by Microsoft on July 18, 2006.
Whether you’re an IT Pro or a developer, Sysinternals utilities will help you a lot in managing, troubleshooting and diagnosing your Windows systems and applications.
Links:
To download SysInternals Suite: learn.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite
SysInternals Live Tools: live.sysinternals.com/
SysInternals Website: learn.microsoft.com/en-us/sysinternals/
Mark Russinovich UA-cam Channel: ua-cam.com/channels/cgN7bUYW_RkoEx5EOn8XyQ.html
Network Encyclopedia Website: networkencyclopedia.com
The two developers started a company named Winternals Software LP that was acquire by Microsoft on July 18, 2006.
Whether you’re an IT Pro or a developer, Sysinternals utilities will help you a lot in managing, troubleshooting and diagnosing your Windows systems and applications.
Links:
To download SysInternals Suite: learn.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite
SysInternals Live Tools: live.sysinternals.com/
SysInternals Website: learn.microsoft.com/en-us/sysinternals/
Mark Russinovich UA-cam Channel: ua-cam.com/channels/cgN7bUYW_RkoEx5EOn8XyQ.html
Network Encyclopedia Website: networkencyclopedia.com
Переглядів: 1 985
Відео
Webcasting - What is it? How is it different from Podcasting?
Переглядів 7 тис.2 роки тому
In this video you're going to explain what is Webcasting, how is it different from podcasting. We also cover a little of history of webcasting. Have you heard of the Trojan Room Coffee Pot webcam?
What is the Caesar Cipher and how to decipher it
Переглядів 6152 роки тому
Caesar cipher is one of the simplest and most widely known encryption techniques. It’s simply a type of substitution cipher. The Caesar cipher is named after Julius Caesar. Breaking the cipher Code examples in C , Java, Javascript, PHP, and Python.
The Industrial Metaverse : Microsoft Ignite Seattle 2022
Переглядів 1,2 тис.2 роки тому
In this video we’re going to explain the differences between Consumer Metaverse, Commercial Metaverse and Industrial Metaverse. Judson Althoff, Microsoft Executive Vice President and Chief Commercial Officer, will distinguish Metaverse for consumers, businesses, and industries. Judson will share Microsoft vision for the Industrial Metaverse, making the construct real and bringing it to life wit...
DHCP Scope - What is it? How to set up?
Переглядів 4,1 тис.2 роки тому
Learn what DHCP Scope is and how to configure it. DHCP (Dynamic Host Configuration Protocol) is the magic element in the IP protocol that supplies your device with a temporary identification that allows you to connect to an IP network such as the internet. But this video’s main focus is the DHCP Scope.
10Base5 - Thicknet or Standard Ethernet - The Network Encyclopedia
Переглядів 4 тис.4 роки тому
10Base-5 is a type of standard for implementing Ethernet networks. Thicknet Ethernet is based on the 802.3 specifications of Project 802 developed by the Institute of Electrical and Electronic Engineers (IEEE). How does it work? (1:11) 10Base5 networks are wired together in a bus topology. The maximum length of any particular segment of a 10Base5 network is 500 meters. A segment should have no ...
LMHOSTS FILE | What is it? How to edit? Why not HOSTS file instead? - Network Encyclopedia
Переглядів 11 тис.4 роки тому
After installing Windows, a file called Lmhosts.sam is created in C:\Windows\system32\drivers\etc. This file is just a sample which also contains a set of instruction on how to use this resolution method. What is Lmhosts? Lmhosts file location Creating and Editing a Lmhosts file Difference between Lmhosts and host files
Bootstrap Protocol (BOOTP) - Network Encyclopedia
Переглядів 14 тис.4 роки тому
Bootstrap Protocol, also known as BOOTP, is a TCP-IP protocol and service that allows diskless workstations to obtain their IP address and their boot image file from a server. Learn how it works in this video. The DHCP, Dynamic Host Configuration Protocol, was developed as an extension of BOOTP. References: tools.ietf.org/html/rfc951 tools.ietf.org/html/rfc1084
Time-to-Live (TTL) - Network Encyclopedia
Переглядів 17 тис.4 роки тому
Time To Live is also known as TTL or HOP LIMIT. Learn what it is and how TTL works. Time to Live on IP Packets Default TTL and Hop Limit Values Time To Live and DNS Caching Time to Live in HTTP
Real-time Transport Protocol (RTP) and RTCP | Network Encyclopedia
Переглядів 59 тис.4 роки тому
In this video, we explain how RTP and its companion protocol, RTCP, works. The Real-time Transport Protocol (RTP) is a network protocol that provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video, or simulation data, over multicast or unicast network services. - RTP Basics 0:36 - RTP Packet Header Fields 4:19 - Payload Type 4:...
FDDI - Fiber Distributed Data Interface - Network Encyclopedia
Переглядів 10 тис.4 роки тому
This video is a complete guide to understanding FDDI network architecture. In this video you're going to show you: What is Fiber Distributed Data Interface? 0:12 FDDI Transmission Media 0:58 Why is Fiber better than Copper? Single Mode Fiber / Multimode Fiber 2:05 FDDI Specifications 3:35 Media Access Control (MAC) 4:21 Physical Layer Protocol (PHY) 4:37 Physical Medium Dependent (PMD) 4:44 Sta...
Point-to-Point Protocol (PPP) - Network Encyclopedia
Переглядів 21 тис.4 роки тому
In this video, we are going to show you what is Point-to-Point Protocol. What standards refer to PPP? What is PPP encapsulation? External References: tools.ietf.org/html/rfc1661 tools.ietf.org/html/rfc1662 tools.ietf.org/html/rfc1144 networkencyclopedia.com/point-to-point-protocol-ppp/
Carrier Signal or Carrier Wave - Network Encyclopedia
Переглядів 25 тис.4 роки тому
Learn what is the carrier signal or the carrier wave. What is Modulation? Why do we have to use a carrier signal? Why not send the signal directly? What is the difference between Amplitude Modulation and Frequency Modulation? What are the three basic properties of waves? What are Modulations Schemes? To answer all these questions invest a few minutes of your time watching this video. If you lik...
What is a Network of computers - Size | Topology | Security | Architecture | Protocol
Переглядів 5194 роки тому
In this video, learn how to classify a Computer Network, according to: - Size - Topology - Security - Architecture - Primary Protocol Watch videos on each of the topics covered here: - Wide Area Network - ua-cam.com/video/hIeaUhVbh2o/v-deo.html - Server Based Network - ua-cam.com/video/1R6Bxnho_F0/v-deo.html - Bus Topology - ua-cam.com/video/GTj70VOm2m4/v-deo.html - Network ID - ua-cam.com/vide...
What is %SystemRoot% and why is different from %WinDir% - Network Encyclopedia
Переглядів 3,8 тис.4 роки тому
SystemRoot is the directory where the core of Microsoft Windows operating systems files are stored. To learn all about %SystemRoot%, how to check the actual value of %SystemRoot%, and the difference between %SystemRoot% and %windir%, watch this video till the end. Check out our website: networkencyclopedia.com/
IPCONFIG Command | What it is | How to use it - Network Encyclopedia
Переглядів 6 тис.4 роки тому
IPCONFIG Command | What it is | How to use it - Network Encyclopedia
What is an IP Spoofing Attack? - Network Encyclopedia
Переглядів 4,7 тис.4 роки тому
What is an IP Spoofing Attack? - Network Encyclopedia
Multilink Point to Point Protocol - Network Encyclopedia
Переглядів 1,4 тис.4 роки тому
Multilink Point to Point Protocol - Network Encyclopedia
Netstat Command - Network Encyclopedia
Переглядів 6 тис.4 роки тому
Netstat Command - Network Encyclopedia
Automatically Login into Windows - a Step by Step Guide
Переглядів 6144 роки тому
Automatically Login into Windows - a Step by Step Guide
Discretionary Access Control List (DACL) - Network Encyclopedia
Переглядів 5 тис.4 роки тому
Discretionary Access Control List (DACL) - Network Encyclopedia
What is a Server-Based Network and how it works?
Переглядів 8 тис.4 роки тому
What is a Server-Based Network and how it works?
What is a 10Base2 Network - Network Encyclopedia
Переглядів 2 тис.4 роки тому
What is a 10Base2 Network - Network Encyclopedia
What is Request For Comments (RFC) - Network Encyclopedia
Переглядів 22 тис.4 роки тому
What is Request For Comments (RFC) - Network Encyclopedia
Full-Duplex Communication - Network Encyclopedia
Переглядів 1,5 тис.4 роки тому
Full-Duplex Communication - Network Encyclopedia
Baseband Transmission Network Encyclopedia
Переглядів 10 тис.4 роки тому
Baseband Transmission Network Encyclopedia
1000BaseSX Gigabit Ethernet - Network Encyclopedia
Переглядів 8914 роки тому
1000BaseSX Gigabit Ethernet - Network Encyclopedia
Asynchronous Transfer Mode - ATM - Network Encyclopedia
Переглядів 46 тис.4 роки тому
Asynchronous Transfer Mode - ATM - Network Encyclopedia
What is Remote Network Monitor (RMON) - Network Encyclopedia
Переглядів 6 тис.4 роки тому
What is Remote Network Monitor (RMON) - Network Encyclopedia
multilink point to point protocol is a fav
Teacher?
Hi teacher, this video is very good for my examination. I wonder the FDM PON on optisystem. Can you help me about this issue ?
I have a presentation on the chapter!!!
I love it 🎉🎉🎉!!
Wow!!!!!!!!!❤❤❤🎉🎉
Thanks. That was a pretty good explanation.
it this literally just a TTS of the wikipedia page? minkukel!
Proxy server
Thanks you bos
Thanks you
how do analog tvs stream videos through that?
This entire video is ai generated garbage
does this work?
there are no need initiated acknowledge that may lead to packet loss common ?
What do you mean by this question? RTP is an application protocol. It's only one-way, there is no destination address, and there is no ACK defined for this protocol. It is also time-sensitive-the receiver will not wait for the missing packet for too long. It is used for real-time voice, thus missing packets are "allowed" by this protocol-a packet received 'too late' is lost anyway.
is rtcp are connectionless protocol ?
What do you mean? RTP and RTCP are both 'application protocols' - and they do not have defined 'addresses' for the sender and receiver. The sender only defines a kind of "unique" ID: Synchronization Source identifier - as described in the video. So they are used in both: point-to-point transmissions and also in broadcast
yes
in nutshell is pbx kind of private netowek engage both emplye and divece communicate each other via pstn (soory guys my keyboard letters fafed i ca not prepely wrring )
so who is the consumer after all? who uses it the isp or the clients? and also is it still used today? and for what purpose ? what famous examples can be found to use this protocol ? thanks
I promise to create ill vibrations and wobbles from the knowledge and wisdom that you have put forth here lol edit: props to your chicken kru, big up
Fucking video sucks
13502 Padberg Ville
nice explanation 😊
5421 Adams Tunnel
Ryder Ports
Mannn the video resolution dammit
I hate that voice I hate that voice I hate the lack of emotion in the voice I hate the robot voice please just talk in a microphone
His voice put me to sleep
Thanks Robert!
This sounds like Alan Rickman but depressed
are you also hacking your 3ds?
Sir , i appreciate this educational video, May i have the name of the song at the beginning, Thank you! 🙏
Very good Explanation! TTL is one of the most mis-understood concept in networking, I have tried to answer all the questions below about TTL. How TTL works? When exactly TTL is decremented? TTL decremented at ingress or egress? When packet is dropped? Demystifying IP TTL ua-cam.com/video/jJFZ1_nyULk/v-deo.html Demystifying IP TTL Quiz Scenario 1 Lab ua-cam.com/video/5Fn4hdo-TmY/v-deo.html Demystifying IP TTL Quiz Scenario 2 Lab ua-cam.com/video/WDIy766_Kts/v-deo.html Demystifying IP TTL Quiz Scenario 3 Lab ua-cam.com/video/9UiTZSujjac/v-deo.html If you find these videos useful, please like and share the videos and subscribe to Demystifying Networking !!
that resolution though, first i thought its a video from the early 1200 centries but no its only one year old...
Listener added for a synchronous 'DOMNodeRemoved' DOM Mutation Event. This event type is deprecated and work is underway to remove it from this browser. w3c needs to be abolished. these screwballs keep breaking sht over and over again and it's getting to the point where it's almost impossible to run a website without constant modification. run a small hobby site made in adobe animate. once every couple of months, i'll find that some feature broke because they depreciated something they think nobody is using. I'M USING IT. STOP TELLING BROWSER COMPANIES TO REMOVE STUFF! Adobe Animate 2019 can't even be used anymore and it's still useful to a lot of people who don't want to touch Animate 2023.
Local loop unbundling seems very american, but we suck at it.
1:05 this is so cooll
Hi
Hi
Hi
Nice pall, very easy to understand 🤍✝️
❤
the voice makes the viewer like me sleepy
I just found a etherlink ISA card with 10base2. I'm excited to use it on my 486 build
Salamat GINOO
Bakla
Nicolas astilla
Бесполезний контент
great video soon u will increase ur subscribers dont worry
FAJAR SURASNO ARCHAMUL FAJAR PRATAMA
Thanks for the explanation :)
ua-cam.com/video/8qisPAeek6Q/v-deo.html
I need it