Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

MS Server Articles:

Windows Servers
One of the first things IT Administrators and IT Managers notice after a fresh installation of Windows 2012 Server is that there are no Desktop Icons…
Windows Servers
The Domain Name System (DNS) is perhaps one of the most important services for Active Directory. DNS provides name resolution services for Active Dir…
Windows Servers
DNS is used for translating host names to IP addresses and the reverse, for both private and public networks (i.e.: the Internet). DNS does this by u…
Windows Servers
Windows 2003 Group Policies allow the administrators to efficiently manage a group of people accessing a resource. Group policies can be used to cont…

Featured Subcategories:

Virtualization & VM Backup Articles:

SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administra…
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divide…
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a co…
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective but…

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Free PatchManager

Free PatchManager

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
It's time to start creating our zone files. We'll follow the standard format, which is given in the DNS RFCs, in order to keep everything neat and less co…
Linux - Unix
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be main…
Linux - Unix
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This article…
Linux - Unix
The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, this…

Popular Topics

Cisco Switches
Errdisable is a feature that automatically disables a port on a Cisco Catalyst switch. When a port is error disabled, it is effectively shut down and…
Cisco Routers
This article shows how to configure the embedded or integrated access point in a Cisco 880W series router (e.g Cisco 887W, Cisco 886W, Cisco 881W, Cisco 8…
Cisco Routers
Our DMVPN Introduction article covered the DMVPN concept and deployment designs. We explained how DMVPN combines a number of technologies that give it its…
OpManager - Network Monitoring & Management
The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring security…