Skip to main content

Microsoft Server Articles:

Windows Servers
One of Windows Server 2016 highlights is the newer Hyper-V server that not only extends the hypervisor’s features and capabilities but also introduce…
Windows Servers
Most would remember the days we had to have a CDROM or DVDROM in order to proceed with the installation of an operating system. Today, it is very com…
Windows Servers
Using Hyper-V Server virtualization technology, you can virtualize your physical environment to reduce the cost of physical hardware. As part of IT b…
Windows Servers
This article serves as an Active Directory tutorial covering installation and setup of Windows 2012 Active Directory Services Role & Domain Contr…

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a co…
Virtualization & VM Backup
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to…
Virtualization & VM Backup
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladd…
Virtualization & VM Backup
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data…

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or th…
Windows Workstations (XP, 7, 8, 10, 11)
A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead With Windows XP End of Life & En…
Windows Workstations (XP, 7, 8, 10, 11)
This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how it…
Windows Workstations (XP, 7, 8, 10, 11)
This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see the…

Linux-Unix Articles:

Linux - Unix
The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux comm…
Linux - Unix
A file system is nothing more than the way the computer stores and retrieves all your files. These files include your documents, programs, help files…
Linux - Unix
Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux syste…
Linux - Unix
Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or S…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is the hear…
Linux - Unix
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This article…
Linux - Unix
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer world too…
Linux - Unix
When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operations, you…

Popular Articles:

Virtualization & VM Backup
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective but also…
Palo Alto Networks
This article provides comprehensive guidance on the manual processes involved in downloading, uploading, and installing (import) any PAN-OS version on a P…
Virtualization & VM Backup
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data. The g…
Palo Alto Networks
Palo Alto Networks Next-Generation Firewalls rely on the concept of security zones in order to apply security policies. This means that access lists (fire…
SASE & SD-WAN Networks
Global connectivity is top of mind for many IT teams at organizations of all sizes. We are currently in the middle of a dramatic shift in business and tec…
Palo Alto Networks
What makes Palo Alto Networks Next-Generation Firewall (NGFW) so different from its competitors is its Platform, Process and Architecture. Palo Alto Netwo…
OpManager - Network Monitoring & Management
ManageEngine has joint hands with IDC's Stephen Elliot, a group vice president, to discuss the truth behind organization's digitally transforming IT, the…
Palo Alto Networks
Upgrading your Palo Alto Firewall or Panorama Management System to the preferred PAN-OS release is always recommended as it ensures it remains stable, saf…