Articles
To read the articles in this section, simply click on the article title or read button on the far right (if visible).
Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.
Articles | |
---|---|
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
MS Server Articles:
Windows Servers
Easy, Fast & Reliable Hyper-V & VMware Backup w...
As more companies around the world adopt the virtualization technology to increase efficiency and productivity, Microsoft’s Hyper-V virtualization ...
Windows Servers
Windows 2003 DNS Server Installation & Configur...
DNS is used for translating host names to IP addresses and the reverse, for both private and public networks (i.e.: the Internet). DNS does this by...
Windows Servers
Windows 2003 DHCP Server Installation & Configu...
DHCP (Dynamic Host Configuration Protocol) is a protocol that allows clients on a network to request network configuration settings from a server r...
Windows Servers
Free Webinar: Migrating from Hyper-V to VMware
If your organization is planning to migration from a Hyper-V virtualization environment to VMware then this FREE webinar is just for you.
Aimed to...
Featured Subcategories:
Virtualization & VM Backup Articles:
5 Most Critical Microsoft M365 Vulnerabilities ...
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...
8 Critical Features to Have in a VM Backup Solu...
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...
6 Key Areas to Consider When Selecting a VM Bac...
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud.
Your busi...
How to Fix VMware ESXi Virtual Machine 'Invalid...
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a ...
Your IP address:
54.242.75.224
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Finding More Information On The Linux Operating System
Since this document merely scratches the surface when it comes to Linux, you will probably find you have lots of questions and possibly problems. Whethe...
Linux - Unix
Configuring Linux to Act as a Firewall - Linux IPTab...
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer world t...
Linux - Unix
Linux System Resource & Performance Monitoring
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be ma...
Linux - Unix
The Linux Command Line
You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is the he...
Popular Topics
Windows Workstations (XP, 7, 8, 10, 11)
Installing The ‘Unsupported’ Profilic USB-to-Serial ...
Thanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers as th...
Cisco Routers
Cisco GRE and IPSec - GRE over IPSec - Selecting and...
GRE Tunnels are very common amongst VPN implementations thanks to their simplicity and ease of configuration. With broadcasting and multicasting support...
Windows Workstations (XP, 7, 8, 10, 11)
The Importance of Windows Hosts File - How to Use Yo...
This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how it can...
Cisco Routers
Introduction To Routers
Welcome to the Routers section. Here we will analyse routers quite some depth; what they do and how they work. We must point out that knowlege on the OS...