Skip to main content

Microsoft Server Articles:

Windows Servers
One of the first things IT Administrators and IT Managers notice after a fresh installation of Windows 2012 Server is that there are no Desktop Icons…
Windows Servers
Using Hyper-V Server virtualization technology, you can virtualize your physical environment to reduce the cost of physical hardware. As part of IT b…
Windows Servers
In a Windows server environment, it is very important that only authenticated users are allowed to log in for security reasons. To fulfill this requi…
Windows Servers
Sometimes renaming a domain is an essential business requirement. There are many situations, such as mergers, change of company name or migration fro…

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edit…
Virtualization & VM Backup
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a co…
Virtualization & VM Backup
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to all…
Virtualization & VM Backup
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divide…

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or th…
Windows Workstations (XP, 7, 8, 10, 11)
The Windows 8 Start Settings Boot Menu allows users to change the way Windows 8 starts up. This provides users with the ability to enable Safe Mode w…
Windows Workstations (XP, 7, 8, 10, 11)
This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how it…
Windows Workstations (XP, 7, 8, 10, 11)
In this article, we will show how to add a Windows 8 or Windows 8.1 client to a Windows Domain / Active Directory. The article can be considered an e…

Linux-Unix Articles:

Linux - Unix
Vsftpd is a popular FTP server for Unix/Linux systems. For thoes unaware of the vsftpd ftp server, note that this is not just another ftp server, but…
Linux - Unix
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by cr…
Linux - Unix
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be…
Linux - Unix
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communiti…
Linux - Unix
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creatin…
Linux - Unix
For many engineers and administrators,  maintaining a Linux system can be a daunting task, especially if there’s limited time or experience.  Wo…
Linux - Unix
When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operations, you…

Popular Articles:

OpManager - Network Monitoring & Management
Demands for Enterprise networks to properly support mobile users is on a continuous rise making it more than ever necessary for IT departments to provide…
OpManager - Network Monitoring & Management
ManageEngine has joint hands with IDC's Stephen Elliot, a group vice president, to discuss the truth behind organization's digitally transforming IT, the…
Virtualization & VM Backup
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtual mac…
SASE & SD-WAN Networks
Software Defined Wide Area Networking (SD-WAN) is changing the way that businesses connect to the cloud. With SD-WAN, organizations can move away from clo…
SASE & SD-WAN Networks
The Virtual Private Network (VPN) has become the go to security solution for keeping communications between networks and endpoints secure. After all, VPNs…
OpManager - Network Monitoring & Management
With a lot of enterprises switching to a work-from-home model, it is critical for admins to have a strategy in place to avoid poor performance and ensure…
Virtualization & VM Backup
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data. The g…
Palo Alto Networks
Our previous article explained how Palo Alto Firewalls make use of Security Zones to process and enforce security policies. This article will explain the…