Skip to main content

MS Server Articles:

Windows Servers

How to Install Windows Server 2012 from USB Fla...

Most would remember the days we had to have a CDROM or DVDROM in order to proceed with the installation of an operating system. Today, it is very c...
Windows Servers

How to Recover & Create "Show Desktop" Icon Fun...

The Show Desktop feature, included with almost all versions of Windows up to Windows 7, allows a user to minimize or restore all open programs and ...
Windows Servers

New Upcoming Features in Hyper-V vNext - Free ...

With the release of Hyper-V vNext just around the corner, Altaro has organized a Free webinar that will take you right into the new Hyper-V vNext r...
Windows Servers

Renaming Windows 2000 Domain Name

Sometimes renaming a domain is an essential business requirement. There are many situations, such as mergers, change of company name or migration f...

Featured Subcategories:

Virtualization & VM Backup Articles:

5 Most Critical Microsoft M365 Vulnerabilities ...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...

FREE Webinar - Fast Track your IT Career with V...

Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career la...

The Backup Bible. A Free Complete Guide to Disa...

The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...

6 Key Areas to Consider When Selecting a VM Bac...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busi...

Your IP address:

35.168.113.41

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer


Linux - Unix

Linux BIND DNS - Part 2: Configuring db.domain Zone...

It's time to start creating our zone files. We'll follow the standard format, which is given in the DNS RFCs, in order to keep everything neat and less ...
Linux - Unix

Installing Software On Linux

Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows you ...
Linux - Unix

Installation and Configuration of Linux DHCP Server

For a cable modem or a DSL connection, the service provider dynamically assigns the IP address to your PC. When you install a DSL or a home cable router...
Linux - Unix

Implementing Virtual Servers and Load Balancing Clus...

What is Server Virtualization? Server virtualization is the process of apportioning a physical server into several smaller virtual servers. During ...

Popular Topics

Windows Workstations (XP, 7, 8, 10, 11)

How to Enable Master Control Panel or Enable God Mod...

Around 2007, an undocumented feature of Windows, called the God Mode, was published outside of documentation provided by Microsoft. This is the Windows ...
Cisco Routers

Enabling & Configuring SSH on Cisco Routers. Restric...

This article shows how to configure and setup SSH for remote management of Cisco IOS Routers. We’ll show you how to check if SSH is supported by your IO...
Network Protocol Analyzers

How to Detect P2P (peer-to-peer) File Sharing, Torre...

Peer-to-Peer file sharing traffic has become a very large problem for many organizations as users engage in illegal (most times) file sharing processes ...
ManageEngine Firewall Analyzer

Dealing with Security Audit Challenges: Discovering ...

The utilization of log analyzers, such as Firewall Analyzer, in network infrastructure plays a pivotal role in enhancing cybersecurity and fortifying th...