We are Creative
Technical skills are a fundamental requirement for most job positions in the industry today. These skills are crucial as they enable individuals to effectively perform their roles and contribute to the success of their teams.
Watch My Technical Video Series
Explore technical videos showcasing tips and tricks.
Windows Command Line
cd [directory]
Change the directory.dir
List files and directories in the current directory.cls
Clear the command prompt screen.echo [message]
Display messages on the screen.exit
Close the command prompt window.
copy [source] [destination]
Copy files from one location to another.del [file]
Delete files.move [source] [destination]
Move files to a new location.ren [oldname] [newname]
Rename files.type [file]
Display the contents of a text file.
systeminfo
Display detailed system information.ipconfig
Display network configuration.hostname
Show the computer’s hostname.tasklist
Display a list of currently running processes.taskkill /IM [processname] /F
Terminate a process by name.
chkdsk [disk]:
Check a disk for errors.diskpart
Launch disk partition management.format [drive]:
Format a disk.- vol:
Display the volume label and serial for a volume
- ping [address]
Send packets to test connectivity. - tracert [address]
Trace the route to a network address. - netstat
Display network connections and statistics. - nslookup [domain]
Query DNS for domain name resolution. - arp -a
Display the ARP table (IP to MAC address mapping). - ipconfig /all
Display detailed network configuration, including MAC and DNS. - ipconfig /release
Release the current IP address. - ipconfig /renew
Renew the IP address from the DHCP server. - netsh wlan show profile
Display wireless network profiles saved on the system. - netsh wlan show interfaces
Show details about wireless network interfaces. - telnet [address] [port]
Connect to a remote server using the Telnet protocol. - ftp [address]
Connect to an FTP server. - route print
Display the system’s routing table. - net use [drive]: \[server][share]
Map a network drive.
Networking Basics
- Router: Connects different networks and routes traffic.
- Switch: Connects devices within the same network and uses MAC addresses to forward data.
- Hub: A basic device that connects multiple devices in a network (repeats data to all ports).
- Modem: Modulates and demodulates signals for Internet access.
- Access Point: Provides wireless connectivity to a wired network.
- HTTP/HTTPS: Hypertext Transfer Protocol (Secure), used for web traffic.
- FTP: File Transfer Protocol, used for transferring files.
- SMTP: Simple Mail Transfer Protocol, used for sending emails.
- IMAP/POP3: Used for retrieving emails.
- DHCP: Dynamic Host Configuration Protocol, automatically assigns IP addresses.
- DNS: Resolves domain names to IP addresses.
- ARP: Maps IP addresses to MAC addresses.
- 802.11a: 5 GHz, 54 Mbps
- 802.11b: 2.4 GHz, 11 Mbps
- 802.11g: 2.4 GHz, 54 Mbps
- 802.11n: 2.4/5 GHz, up to 600 Mbps
- 802.11ac: 5 GHz, up to 3 Gbps
- 802.11ax (Wi-Fi 6): 2.4/5 GHz, up to 9.6 Gbps
- Firewall: Controls incoming and outgoing network traffic based on security rules.
- VPN: Securely connects to a remote network over the Internet.
- Encryption: Protects data by converting it into a secure format.
- Authentication: Verifies the identity of users/devices.
- IDS/IPS: Intrusion Detection/Prevention Systems monitor and prevent malicious activity.
- FTP: 20, 21
- Telnet: 23
- SMTP: 25
- DNS: 53
- HTTP: 80
- POP3: 110
- IMAP4: 143
- HTTPS: 443
OSI Model (Open Systems Interconnection Model)
The OSI model consists of seven layers that standardize network communication:
- Physical Layer: Handles the transmission of raw bit streams over physical media.
- Data Link Layer: Manages error detection, correction, and MAC addressing within a local network.
- Network Layer: Determines the best path for data and handles logical addressing (IP addresses).
- Transport Layer: Ensures reliable data transfer with error checking and flow control.
- Session Layer: Manages sessions and connections between applications.
- Presentation Layer: Translates data formats and handles encryption.
- Application Layer: Interfaces directly with user applications (e.g., web browsers, email clients).
An IP address is a unique identifier assigned to devices on a network to enable communication. IPv4 uses a 32-bit format (e.g., 192.168.1.1) and supports about 4.3 billion addresses, while IPv6 uses a 128-bit format (e.g., 2001:0db8::1) to accommodate a vastly larger number of devices.
IP addresses in IPv4 are divided into five classes (A, B, C, D, E) based on their leading bits. Here’s a breakdown of the most commonly used classes (A, B, C) along with their ranges:
Class A
- Range: 1.0.0.0 to 126.255.255.255
- Default Subnet Mask: 255.0.0.0
- Purpose: Used for large networks with millions of devices.
- Number of Networks: 128 (2^7 – 2 for reserved)
- Hosts per Network: ~16.7 million (2^24 – 2 for network and broadcast addresses)
Class B
- Range: 128.0.0.0 to 191.255.255.255
- Default Subnet Mask: 255.255.0.0
- Purpose: Medium-sized networks like those used by universities or businesses.
- Number of Networks: 16,384 (2^14)
- Hosts per Network: ~65,534 (2^16 – 2)
Class C
- Range: 192.0.0.0 to 223.255.255.255
- Default Subnet Mask: 255.255.255.0
- Purpose: Small networks, commonly used for private or local business networks.
- Number of Networks: ~2 million (2^21)
- Hosts per Network: 254 (2^8 – 2)
Class D (Multicast)
- Range: 224.0.0.0 to 239.255.255.255
- Purpose: Reserved for multicast groups, not for host assignment.
Class E (Experimental)
- Range: 240.0.0.0 to 255.255.255.255
- Purpose: Reserved for research and experimental use, not for general public use.
Subnetting divides a larger network into smaller subnetworks, improving efficiency and security. The subnet mask determines how the IP address is split between the network and host portions.
- Example: In Class C, with a default subnet mask of
255.255.255.0, there’s only one subnet and 254 hosts.- By using a subnet mask of
255.255.255.192, you can create 4 subnets with 62 hosts each.
- By using a subnet mask of
Benefits of Subnetting:
- Efficient Use of IP Addresses: Avoid wasting IPs by dividing into subnets.
- Improved Security: Isolate parts of the network.
- Reduced Broadcast Traffic: Each subnet is its own broadcast domain.
A default gateway is the device (typically a router) that routes traffic from a local network to other networks, including the internet. It acts as an intermediary for devices to communicate outside their subnet.
- Example: If a device has an IP of
192.168.1.10and a subnet mask of255.255.255.0, its default gateway might be192.168.1.1. This gateway routes traffic beyond the local192.168.1.xnetwork.
Windows Server Configuration
Windows servers should always have a static IP address.
Create an account and login here for VMware Fusion Pro and VMware Workstation Pro. Please refer to the downloads labeled with “for Personal Use” at the end of the product name.
Link : Download and license VMware Desktop Hypervisor for personal use (Fusion Pro and Workstation Pro)
Active Directory and Group Policy: Command-Line Guide
Step 1: Active Directory Setup
Use the following command to install the Active Directory Domain Services role on a Windows Server:
Install-WindowsFeature AD-Domain-Services
Promote the server to a Domain Controller using this command:
Install-ADDSForest -DomainName “YourDomainName.com”
Step 2: Creating and Managing Organizational Units (OUs)
Create a new Organizational Unit (OU):
New-ADOrganizationalUnit -Name “OUName” -Path “DC=YourDomainName,DC=com”
Move a user or computer object to the new OU:
Move-ADObject -Identity “CN=Username,OU=OldOU,DC=YourDomainName,DC=com” -TargetPath “OU=OUName,DC=YourDomainName,DC=com”
Step 3: Group Policy Management
Open Group Policy Management Console (GPMC):
gpmc.msc
Create a new GPO in a specific domain:
New-GPO -Name “GPOName” -Domain “YourDomainName.com”
Link the GPO to an OU:
New-GPLink -Name “GPOName” -Target “OU=OUName,DC=YourDomainName,DC=com”
Step 4: Viewing and Editing Group Policy Settings
Edit a specific GPO:
Get-GPO -Name “GPOName” | Edit-GPO
Apply the GPO immediately using Group Policy Update:
gpupdate /force
Verify the applied Group Policy settings:
gpresult /r
Step 5: Additional Security Configurations
Set password policy via command line:
secedit /export /cfg “C:\PasswordPolicy.txt”
Edit the file to enforce specific rules, then:
secedit /configure /db secedit.sdb /cfg “C:\PasswordPolicy.txt”
Step 6: Troubleshooting and Reporting
Check replication status in the domain:
repadmin /replsummary
Check the status of Active Directory services:
Get-Service -Name *AD*
Export GPO reports:
Get-GPOReport -Name “GPOName” -ReportType HTML -Path “C:\Reports\GPOName.html”
WordPress Tips
If you’re not using WordPress or want a custom solution, you can add a clickable WhatsApp chat icon using code.
Steps:
- Generate a WhatsApp chat link:
https://wa.me/1234567890?text=Hello!%20I%20have%20a%20question%20about%20your%20website. - Replace
1234567890with your phone number in international format (no + or spaces).
Create an HTML and CSS snippet to display the button:
<a href=”https://wa.me/1234567890?text=Hello!%20I%20have%20a%20question%20about%20your%20website.” target=”_blank” style=”position: fixed; bottom: 20px; right: 20px; background-color: #25D366; color: white; padding: 10px 15px; border-radius: 50px; box-shadow: 0 2px 5px rgba(0,0,0,0.3); font-size: 18px; z-index: 1000;”>
<img src=”https://upload.wikimedia.org/wikipedia/commons/5/5e/WhatsApp_icon.png” alt=”WhatsApp” style=”width: 24px; height: 24px; vertical-align: middle;”> Chat with us </a> - Add this code to your website’s footer (if you’re on WordPress, use Appearance > Theme Editor > footer.php).
Just add this to the CSS:
.elementor-widget-text-editor p:last-child{ margin-bottom:0px;}
Add the following code to your custom shortcode panel and update the class on “custom-share-widget1.2.3.4.5 like this “
<div class=”custom-share-widget” data-link=”https://pathtopower.global/wp-content/uploads/2025/02/UK-Final-Report.pdf”>
<button class=”shareButton”>
<svg xmlns=”http://www.w3.org/2000/svg” width=”20″ height=”20″ viewBox=”0 0 24 24″ fill=”white”>
<path d=”M18 16.08c-.76 0-1.44.3-1.96.77L8.91 12.7c.05-.23.09-.46.09-.7s-.04-.47-.09-.7l7.05-4.11c.53.5 1.22.81 1.95.81 1.66 0 3-1.34 3-3s-1.34-3-3-3-3 1.34-3 3c0 .24.04.47.09.7L8.04 9.81C7.5 9.31 6.79 9 6 9c-1.66 0-3 1.34-3 3s1.34 3 3 3c.79 0 1.5-.31 2.04-.81l7.13 4.15c-.05.21-.08.43-.08.66 0 1.66 1.34 3 3 3s3-1.34 3-3-1.34-3-3-3z”/>
</svg> Share
</button>
</div>
<script>
document.addEventListener(“DOMContentLoaded”, function () {
document.querySelectorAll(“.custom-share-widget10”).forEach(widget => {
const shareButton = widget.querySelector(“.shareButton”);
// Read the URL from the data-link attribute
const pdfLink = widget.getAttribute(“data-link”);
if (navigator.share) {
shareButton.addEventListener(“click”, async () => {
try {
await navigator.share({
title: “UK Policy Report”,
text: “Check out this UK Policy Report document!”,
url: pdfLink // Use the link from the data attribute
});
} catch (error) {
console.error(“Error sharing:”, error);
}
});
} else {
// Hide button if the share API is not supported
shareButton.style.display = “none”;
}
});
});
</script>
<style>
.custom-share-widget10 {
width: 100%;
text-align: center;
}
.custom-share-widget10 .shareButton {
display: flex;
width: 100%;
align-items: center;
justify-content: center;
gap: 8px;
background-color: #10367E;
color: white;
padding: 10px 15px;
border: none;
cursor: pointer;
font-size: 16px;
border-radius: 5px;
font-weight: bold;
}
.custom-share-widget10 .shareButton svg {
fill: white;
}
.custom-share-widget10 .shareButton:hover {
background-color: #01B4B4;
}
</style>