Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

MS Server Articles:

Windows Servers

Free Webinar: Scripting & Automation in Hyper-V...

System Center Virtual Machine Manager (SCVMM) provides some great automation benefits for those organizations that can afford the hefty price tag. ...
Windows Servers

How to Enable & Configure Shadow Copy for Share...

When you shadow copy a disk volume, you are actually generating a snapshot of the changes made to the folders and files within the disk volume at a...
Windows Servers

Windows Server Group Policy Link Enforcement, I...

Our previous article explained what Group Policy Objects (GPO) are and showed how group policies can be configured to help control computers and us...
Windows Servers

Windows Server 2016 Licensing Made Easy – Under...

This article describes the new Windows Server 2016 Licensing model (per-core licensing) Microsoft has implemented for its new server-based operatin...

Featured Subcategories:

Virtualization & VM Backup Articles:

How to Enable or Disable SSH on VMware ESXi via...

SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administ...

5 Most Critical Microsoft M365 Vulnerabilities ...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...

The Backup Bible. A Free Complete Guide to Disa...

The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...

World Backup Day with Free Amazon Voucher and P...

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...

Your IP address:

3.145.186.173

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Linux BIND DNS - Part 5: Configure Secondary (Slave)...

Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...
Linux - Unix

Linux BIND DNS - Part 6: Linux BIND - DNS Caching

In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all the inf...
Linux - Unix

How To Secure Your Linux Server or Workstation - Lin...

Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation. Boot Disk One of the foremost requis...
Linux - Unix

Linux BIND DNS - Part 3: Configuring The db.192.168....

The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, th...

Popular Topics

VLAN Networks

Comparing Traditional Flat & VLAN Networks

Designing and building a network is not a simple job. VLANs are no exception to this rule, in fact they require a more sophisticated approach because of...
Cisco Routers

Cisco GRE and IPSec - GRE over IPSec - Selecting and...

GRE Tunnels are very common amongst VPN implementations thanks to their simplicity and ease of configuration. With broadcasting and multicasting support...
Network Protocol Analyzers

How to Detect SYN Flood Attacks with Capsa Network P...

This article explains how to detect a SYN Flood Attack using an advanced protocol analyser like Colasoft Capsa. We’ll show you how to identify and inspe...
Windows Workstations (XP, 7, 8, 10, 11)

Configure Windows 8 & 8.1 To Provide Secure Wireless...

Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wirele...