Notes, summaries, assignments, exams, and problems for Technology

Sort by
Subject
Level

Simple Machines: Principles, Types, and Applications

Classified in Technology

Written on in English with a size of 3.42 KB

Common Characteristics of Machines

  • Involve a kind of motion.
  • Involve a kind of force.
  • Make a job easier to do.
  • Need some kind of input to make them work.
  • Produce some kind of output.

Basic Types of Motion

  • Rotary: Going round and round.
  • Oscillating: Swinging backwards and forwards.
  • Linear: In a straight line.
  • Reciprocating: Backwards and forwards in a straight line.

A machine is a device that helps make work easier to perform.

Mechanical Advantage Defined

Mechanical Advantage: When a machine takes a small input force and increases the magnitude of the output force, a mechanical advantage has been produced.

Conservation of Energy Principle

Conservation of Energy: No machine can produce more work than the amount of work that is put into the machine.

The Six Simple

... Continue reading "Simple Machines: Principles, Types, and Applications" »

Cybersecurity Labs for Industrial Control Systems (ICS/SCADA)

Posted by Anonymous and classified in Technology

Written on in English with a size of 12.59 KB

Experiment 01: Network Traffic Analysis in ICS/SCADA

Tools

  • Wireshark

Objectives

  • Use Wireshark to capture and analyze network traffic to detect anomalies such as unauthorized commands or network scanning.

Deliverable

  • A detailed report of traffic patterns and recommendations for mitigations.

Wireshark

Wireshark is a network protocol analyzer used to capture and inspect data packets in real time.

Installing Wireshark on Linux

  1. Step 01: Update package lists: sudo apt update
  2. Step 02: Install Wireshark: sudo apt install wireshark -y
  3. Step 03: Allow non-root packet capture. When prompted, select to allow non-root users to capture packets. If not prompted, run:
    • sudo dpkg-reconfigure wireshark-common
    • sudo usermod -aG wireshark $USER
  4. Step 04: Restart your session (log
... Continue reading "Cybersecurity Labs for Industrial Control Systems (ICS/SCADA)" »

Cisco Router and Switch Configuration: PPP, DHCP, VLAN, RIP, OSPF, EIGRP

Classified in Technology

Written on in English with a size of 4.33 KB

Cisco Router and Switch Configuration

PPP Authentication

1. User Configuration (Matching Passwords on Both Routers)

router(config)# username <hostname_remote_router> password <password>

2. Interface Encapsulation Change

router(config-if)# encapsulation ppp

3.1 Enabling PAP Authentication

router(config-if)# encapsulation ppp
router(config-if)# ppp authentication pap
router(config-if)# ppp pap sent-username <local_username> password <password>

3.2 Enabling CHAP Authentication

router(config-if)# encapsulation ppp
router(config-if)# ppp authentication chap

DHCP Scope Configuration

router(config)# ip dhcp pool <POOL_NAME>
router(config-dhcp)# network <NETWORK_ADDRESS> <NETMASK>
router(config-dhcp)# default-router <GATEWAY_

... Continue reading "Cisco Router and Switch Configuration: PPP, DHCP, VLAN, RIP, OSPF, EIGRP" »

The Internet: A Comprehensive Overview

Classified in Technology

Written on in English with a size of 16.63 KB

The Internet: A Global Network

The Internet is a global network of interconnected computer networks, linking billions of devices worldwide using TCP/IP. It comprises millions of networks, including private, public, academic, business, and government, and provides extensive information resources.

The History of the Internet

The Internet, originating from ARPANet, an experimental network created in the 1960s by the US military, was launched online in 1969 under a contract by ARPA, connecting four US universities. The history of the Internet reflects the continuous growth of this network, connecting millions of people, businesses, governments, schools, and universities.

The ARPANet

The ARPAnet, created in 1969, began with four computers connecting.... Continue reading "The Internet: A Comprehensive Overview" »

Domestic Electrical Installations

Classified in Technology

Written on in English with a size of 14.02 KB

ELECTRICAL INSTALLATIONS:
The electricity used to meet our energy needs (housing, buildings and industries) But there are serious dangers such as fires and electrocucions if facilities do not meet the appropriate security.
Low Voltage Electrotechnical Regulations (REBT) technical conditions and guarantees must be met by electrical installations connected to a low voltage supply in order to:
-Preserve the safety of persons and property.
-Ensure the normal operation of these facilities and prevent disruptions that could cause other facilities and prevent disruptions that could cause other facilities and services.
-Contribute to the technical reliability and efficiency of economic facilities.
Complementary technical instructions (ITC - BT)... Continue reading "Domestic Electrical Installations" »

Cloud Computing Essentials: DFS, HDFS, Security, and Virtualization

Classified in Technology

Written on in English with a size of 319.79 KB

Cloud Computing Essentials

What is a Distributed File System (DFS)?

A distributed file system (DFS) in cloud computing manages data across multiple servers for scalability, fault tolerance, and efficient access. It replicates data for high availability, balances loads, ensures data consistency, and can be cost-effective.

Examples include Hadoop Distributed File System (HDFS), Google File System (GFS), Amazon Elastic File System (EFS), and Azure Blob Storage. DFS is essential for handling large-scale data storage and processing in cloud environments.

HDFS Architecture

HDFS: Hadoop Distributed File System. Google published its paper GFS and on the basis of that HDFS was developed.

It states that the files will be broken into blocks and stored in nodes... Continue reading "Cloud Computing Essentials: DFS, HDFS, Security, and Virtualization" »

Centos 5.5

Classified in Technology

Written on in English with a size of 5.39 KB

#useradd nombredeusuario :: para crear usuarios

#passwd :: nombredelusuario

#groupadd :: nombredelgrupo :: (forma normal)

#groupadd -g 600 nombredelgrupo :: (guid sobre 650)

#userdel nombredelusuario :: para deletear usuarios

#groupdelnombredelgrupo :: borrar el grupo

#usermod -G nombredelgrupo nombredeusuario :: para asignar usuario a grupo.

opcion 2: editar archivo /etc/group -> grupo:x:600:usuarioqueseagregara

#nano /etc/shadow :: para poder ver los usuarios y poder bloquearlos

#passwd -l nombredeusuario :: para bloquear usuario

#passwd -u nombredeusuario :: para desbloquear usuario

#sudo passwd :: para cambiar la contraseña de root

# tail /etc/passwd :: paraver informacion de usuarios

#su nombredelotrousuario :: para iniciar sesion como el usuario... Continue reading "Centos 5.5" »

I is correct ii is correct

Classified in Technology

Written on in English with a size of 1.35 KB

tecnology= is an applied science used 4 solve problems in real life. Create or design goods or services. 2 allows us the adaptation of the enviroment 4 our needs and to pleases our desires

algorithm=Is a set of instructions for resolve problems or performate an action

project aproach: Is Create something to solve a problem. 10 steps: 1. Problem (see and analyze the problem / 2. Research= find information fo problem / 3. Possible solution = we propose all posible solutions / 4. Choose 1 possible solution / 5. Design= we think , design to build the solution / 6. Planning = we do a sceetch of the building / 7. Build= we build the final solution / 8. Check = we check if its correct * if it isn´t correct, we go to find another solution / 9. Presentation... Continue reading "I is correct ii is correct" »

Palo Alto Networks: Core Concepts and Product Ecosystem

Classified in Technology

Written on in English with a size of 633.61 KB

Core Concepts of Palo Alto Networks

Strata

PA-Series: PA-220, PA-800, PA-3200, PA-5200, PA-7000

VM Series: VM-50, VM-100, VM-300, VM-500, VM-700

  • Amazon Web Services
  • Cisco ACI
  • Citrix NetScaler SDX
  • Google Cloud Platform
  • Kernel-based Virtual Machine (KVM)
  • Microsoft Azure and Microsoft Hyper-V
  • OpenStack
  • VMware ESXi, VMware NSX, and VMware vCloud Air

Panorama

  • Policy Management
  • Centralized Visibility
  • Network Security Insights
  • Automated Threat Response
  • Network Security Management
  • Enterprise-Level Reporting and Administration

Prisma (Cloud, SASE, SaaS, VM Series ML-Powered NGFWs)

  • Cloud Security - Delivers complete security across the development lifecycle on any cloud.
  • Prisma Cloud - Cloud Security Posture Management and Workload Protection (Uses API)
    • Alibaba Cloud
    • Amazon
... Continue reading "Palo Alto Networks: Core Concepts and Product Ecosystem" »

Computer Networks: Types and Definitions

Classified in Technology

Written on in English with a size of 2.73 KB

Computer Network and Its Types

A network refers to a collection of interconnected nodes or entities that can communicate and share information with each other. These nodes can be computers, devices, or even people. Networks are used to facilitate the exchange of data, resources, or services among the connected entities.

Types of Networks

There are several types of networks, including:

  • Local Area Network (LAN): LANs are typically limited to a small geographic area, such as a home, office, or campus. They are used for connecting devices within a relatively close proximity, often using Ethernet cables or Wi-Fi.
  • Wide Area Network (WAN): WANs cover larger geographical areas and connect LANs over long distances. The internet is the most extensive example
... Continue reading "Computer Networks: Types and Definitions" »