Skip to main content

Microsoft Server Articles:

Windows Servers
This article explains what Group Policies are and shows how to configure Windows Server 2012 Active Directory Group Policies. Our next article will c…
Windows Servers
Windows 2003 Group Policies allow the administrators to efficiently manage a group of people accessing a resource. Group policies can be used to cont…
Windows Servers
Sometimes renaming a domain is an essential business requirement. There are many situations, such as mergers, change of company name or migration fro…
Windows Servers
Microsoft Licensing for Virtual environments can become a very complicated topic, especially with all the misconceptions and false information out th…

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to…
Virtualization & VM Backup
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busine…
Virtualization & VM Backup
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladd…
Virtualization & VM Backup
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtua…

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wir…
Windows Workstations (XP, 7, 8, 10, 11)
Around 2007, an undocumented feature of Windows, called the God Mode, was published outside of documentation provided by Microsoft. This is the Windo…
Windows Workstations (XP, 7, 8, 10, 11)
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would recal…
Windows Workstations (XP, 7, 8, 10, 11)
This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see the…

Linux-Unix Articles:

Linux - Unix
You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is the…
Linux - Unix
Since this document merely scratches the surface when it comes to Linux, you will probably find you have lots of questions and possibly problems. Whe…
Linux - Unix
Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or S…
Linux - Unix
File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can ac…

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Free PatchManager

Free PatchManager

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, need…
Linux - Unix
For many engineers and administrators,  maintaining a Linux system can be a daunting task, especially if there’s limited time or experience.  Wo…
Linux - Unix
Vsftpd is a popular FTP server for Unix/Linux systems. For thoes unaware of the vsftpd ftp server, note that this is not just another ftp server, but a ma…
Linux - Unix
Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or SMB. F…

Popular Articles:

SASE & SD-WAN Networks
This article explores the need for Secure Access Service Edge (SASE) in today’s organizations. We show how one of the most advanced SASE platforms availab…
OpManager - Network Monitoring & Management
ManageEngine has joint hands with IDC's Stephen Elliot, a group vice president, to discuss the truth behind organization's digitally transforming IT, the…
Palo Alto Networks
Our previous article examined the benefits of Palo Alto Networks Firewall Single Pass Parallel Processing (SP3) architecture and how its combine with the…
SASE & SD-WAN Networks
By: Shlomo Kramer, Check Point Software & Cato Networks Co-Founder As one of the founders of Check Point Software and more recently Cato Networks, I’…
Virtualization & VM Backup
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data. The g…
OpManager - Network Monitoring & Management
Learn how IT Experts and Managers take on their organization’s challenges while working remotely. How do you continue your IT Operation Management Strateg…
SASE & SD-WAN Networks
Secure Access Service Edge (SASE) is an architecture widely regarded as the future of enterprise networking and security. In previous articles we talked a…
Virtualization & VM Backup
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to keep…