Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

MS Server Articles:

Windows Servers

How to Enable & Configure Shadow Copy for Share...

When you shadow copy a disk volume, you are actually generating a snapshot of the changes made to the folders and files within the disk volume at a...
Windows Servers

Hyper-V Best Practices - Replica, Cluster, Back...

Hyper-V has proven to be a very cost effective solution for server consolidation. Evidence of this is also the fact that companies are beginning to...
Windows Servers

New Upcoming Features in Hyper-V vNext - Free ...

With the release of Hyper-V vNext just around the corner, Altaro has organized a Free webinar that will take you right into the new Hyper-V vNext r...
Windows Servers

Easy, Fast & Reliable Hyper-V & VMware Backup w...

As more companies around the world adopt the virtualization technology to increase efficiency and productivity, Microsoft’s Hyper-V virtualization ...

Featured Subcategories:

Virtualization & VM Backup Articles:

The Backup Bible. A Free Complete Guide to Disa...

The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...

Understanding Deduplication. Complete Guide to ...

When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...

6 Key Areas to Consider When Selecting a VM Bac...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busi...

How to Fix VMware ESXi Virtual Machine 'Invalid...

In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a ...

Your IP address:

3.144.28.65

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Updating Your Linux Server - How to Update Linux Wor...

Like any other software, an operating system needs to be updated. Updates are required not only because of the new hardware coming into the market, but ...
Linux - Unix

Linux BIND DNS - Part 1: Introduction To The DNS Dat...

BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This articl...
Linux - Unix

Critical 15 Year-old Linux Security Hole (Ghost) Rev...

Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux systems ...
Linux - Unix

Why Use Linux?

The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communi...

Popular Topics

Windows Workstations (XP, 7, 8, 10, 11)

Configuring Windows 7 To Provide Secure Wireless Acc...

Not many people are aware that Windows 7 has built-in capabilities that allow it to be transformed into a perfectly working access point so that wireles...
Cisco Routers

Cisco Router Modes

One of the greatest perhaps features of Cisco routers is that most commands used in the IOS software they run on, are identical across multiple platform...
VLAN Networks

VLAN Tagging - Understanding VLANs Ethernet Frames

We mentioned that Trunk Links are designed to pass frames (packets) from all VLANs, allowing us to connect multiple switches together and independently ...
OpManager - Network Monitoring & Management

Free Webinar: Clients' network configuration and com...

Defending your client's network from faulty configuration changes, poor compliance, and bringing the network back quickly from downtime can be challengi...