Skip to main content

Microsoft Server Articles:

Windows Servers

Download Altaro Free VM Backup & Win a PlayStat...

We have some exciting news for you today! Altaro has launched a great contest in celebration of SysAdmin Day on 27th July! They will be giving aw...
Windows Servers

How to Install Windows Server 2012 from USB Fla...

Most would remember the days we had to have a CDROM or DVDROM in order to proceed with the installation of an operating system. Today, it is very c...
Windows Servers

Creating a Virtual Machine in Windows Hyper-V. ...

Our previous articles covered basic concepts of Virtualization along with the installation and monitoring of Windows 2012 Hyper-V. This article tak...
Windows Servers

How to Enable & Configure Shadow Copy for Share...

When you shadow copy a disk volume, you are actually generating a snapshot of the changes made to the folders and files within the disk volume at a...

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup

How to Fix VMware ESXi Virtual Machine 'Invalid...

In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a ...
Virtualization & VM Backup

Differences Between VMware vSphere, vCenter, ES...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere ed...
Virtualization & VM Backup

8 Critical Features to Have in a VM Backup Solu...

Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...
Virtualization & VM Backup

FREE Webinar - Fast Track your IT Career with V...

Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career la...

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)

Microsoft Windows XP - End of Life / End of Sup...

A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead With Windows XP End of Life & ...
Windows Workstations (XP, 7, 8, 10, 11)

Configure Windows 8 & 8.1 To Provide Secure Wir...

Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure w...
Windows Workstations (XP, 7, 8, 10, 11)

Installing The ‘Unsupported’ Profilic USB-to-Se...

Thanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers ...
Windows Workstations (XP, 7, 8, 10, 11)

The Importance of Windows Hosts File - How to U...

This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how i...

Linux-Unix Articles:

Linux - Unix

Linux File & Folder Permissions

File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can ...
Linux - Unix

Updating Your Linux Server - How to Update Linu...

Like any other software, an operating system needs to be updated. Updates are required not only because of the new hardware coming into the market,...
Linux - Unix

Configuring Linux to Act as a Firewall - Linux ...

What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer wo...
Linux - Unix

Linux CentOS - Redhat EL Installation on HP Sma...

This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controlle...

Your IP address:

3.141.152.173

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Installing & Configuring Linux Webmin - Linux Web-Ba...

For many engineers and administrators,  maintaining a Linux system can be a daunting task, especially if there’s limited time or experience.  ...
Linux - Unix

The Linux Command Line

You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is the he...
Linux - Unix

Critical 15 Year-old Linux Security Hole (Ghost) Rev...

Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux systems ...
Linux - Unix

Installing Software On Linux

Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows you ...

Popular Articles:

OpManager - Network Monitoring & Management

Special Free Podcast Series: IT Operations Managemen...

Learn how IT Experts and Managers take on their organization’s challenges while working remotely. How do you continue your IT Operation Management Strat...
Virtualization & VM Backup

6 Key Areas to Consider When Selecting a VM Backup S...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your business ...
SASE & SD-WAN Networks

The Most Common Worst Networking Practices and How T...

In the rush to keep pace with the many challenges facing today’s organizations, all too often networking teams end up adopting practices and processes t...
SASE & SD-WAN Networks

SASE and VPNs: Reconsidering your Mobile Remote Acce...

The Virtual Private Network (VPN) has become the go to security solution for keeping communications between networks and endpoints secure. After all, VP...
OpManager - Network Monitoring & Management

Free Webinar: Enterprise-Grade Security and Manageme...

The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring securi...
Palo Alto Networks

Palo Alto Firewalls Security Zones – Tap Zone, Virtu...

Palo Alto Networks Next-Generation Firewalls rely on the concept of security zones in order to apply security policies. This means that access lists (fi...
SASE & SD-WAN Networks

SD-WAN is the Emerging, Evolving Solution for the Br...

A lot has changed in how people work during the past twenty years. Co-working spaces, mobility, and the cloud now are common. Businesses are spread out ...
Virtualization & VM Backup

Differences Between VMware vSphere, vCenter, ESXi Fr...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edition...