Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

MS Server Articles:

Windows Servers

Download Altaro Free VM Backup & Win a PlayStat...

We have some exciting news for you today! Altaro has launched a great contest in celebration of SysAdmin Day on 27th July! They will be giving aw...
Windows Servers

How to Enable & Configure Shadow Copy for Share...

When you shadow copy a disk volume, you are actually generating a snapshot of the changes made to the folders and files within the disk volume at a...
Windows Servers

Installing Active Directory Services & Domain C...

This article serves as an Active Directory tutorial covering installation and setup of Windows 2012 Active Directory Services Role & Domain Con...
Windows Servers

Creating a Virtual Machine in Windows Hyper-V. ...

Our previous articles covered basic concepts of Virtualization along with the installation and monitoring of Windows 2012 Hyper-V. This article tak...

Featured Subcategories:

Virtualization & VM Backup Articles:

How to Enable or Disable SSH on VMware ESXi via...

SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administ...

Understanding Deduplication. Complete Guide to ...

When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...

8 Critical Features to Have in a VM Backup Solu...

Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...

The Backup Bible. A Free Complete Guide to Disa...

The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...

Your IP address:

54.225.1.66

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer


Linux - Unix

Linux File & Folder Permissions

File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can acces...
Linux - Unix

Installing Software On Linux

Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows you ...
Linux - Unix

Critical 15 Year-old Linux Security Hole (Ghost) Rev...

Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux systems ...
Linux - Unix

Linux System Resource & Performance Monitoring

You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be ma...

Popular Topics

Cisco Switches

Discover Features & Capabilities - Cisco Catalyst 38...

There’s a new switch around the block and its name is Catalyst 3850 – Cisco’s latest addition to its successful Catalyst series switches. The Cisco Cata...
Cisco Switches

End-of-Sale and End-of-Life Announcement for the Cis...

Cisco announces the end-of-sale and end-of-life dates for the Cisco Catalyst 3750G, 3560G, 3750-E, and 3560-E Series Switches. The last day to order the...
VLAN Networks

InterVLAN Routing - Routing between VLAN Networks

This article deals with the popular topic of InterVLAN routing, which is used to allow routing & communication between VLAN networks. Our article an...
Cisco Routers

Cisco GRE and IPSec - GRE over IPSec - Selecting and...

GRE Tunnels are very common amongst VPN implementations thanks to their simplicity and ease of configuration. With broadcasting and multicasting support...