Skip to main content

Microsoft Server Articles:

Windows Servers
Tombstone is a container object that contains the deleted objects from Active Directory. Actually when an object is deleted from Active Directory, it…
Windows Servers
NIC Teaming, also known as Windows Load Balancing or Failover (LBFO), is an extremely useful feature supported by Windows Server 2012 that allows the…
Windows Servers
With Windows 2016 Server already making its way into data centers Windows 2016 Server Licensing is becoming a very hot topic. Windows 2016 Server is…
Windows Servers
In this article, we will cover more advanced DHCP features and topics such as server options, superscopes, multicast scopes, dynamic DNS, DHCP databa…

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divide…
Virtualization & VM Backup
In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edit…
Virtualization & VM Backup
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a co…
Virtualization & VM Backup
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladd…

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
In this article, we will show how to add a Windows 8 or Windows 8.1 client to a Windows Domain / Active Directory. The article can be considered an e…
Windows Workstations (XP, 7, 8, 10, 11)
Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wir…
Windows Workstations (XP, 7, 8, 10, 11)
In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or th…
Windows Workstations (XP, 7, 8, 10, 11)
Windows 8 & 8.1 hides two types of files so that normally, you do not see them while exploring your computer. The first type is the files or fold…

Linux-Unix Articles:

Linux - Unix
A file system is nothing more than the way the computer stores and retrieves all your files. These files include your documents, programs, help files…
Linux - Unix
It's time to start creating our zone files. We'll follow the standard format, which is given in the DNS RFCs, in order to keep everything neat and le…
Linux - Unix
What is Server Virtualization? Server virtualization is the process of apportioning a physical server into several smaller virtual servers. Duri…
Linux - Unix
For a cable modem or a DSL connection, the service provider dynamically assigns the IP address to your PC. When you install a DSL or a home cable rou…

Cybersecurity Framework Update

2026 Cybersecurity Essentials Framework Update

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Free PatchManager

Free PatchManager

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer world too…
Linux - Unix
In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all the infor…
Linux - Unix
In a multi-user environment like Linux, every file is owned by a user and a group. There can be others as well who may be allowed to work with the file. W…
Linux - Unix
The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, this…

Popular Articles:

SASE & SD-WAN Networks
Software Defined Wide Area Networking (SD-WAN) is changing the way that businesses connect to the cloud. With SD-WAN, organizations can move away from clo…
SASE & SD-WAN Networks
Global connectivity is top of mind for many IT teams at organizations of all sizes. We are currently in the middle of a dramatic shift in business and tec…
SASE & SD-WAN Networks
By: Shlomo Kramer, Check Point Software & Cato Networks Co-Founder As one of the founders of Check Point Software and more recently Cato Networks, I’…
Palo Alto Networks
Discover the ins and outs of using Palo Alto Networks’ Software NGFW (Flex) credits to seamlessly renew your cloud-based or virtualized software NGFW devi…
OpManager - Network Monitoring & Management
Work transformation is not 'one and done,'" says  IDC's vice president, Holly Muscolino. Most enterprises understand that a hybrid workforce is the f…
SASE & SD-WAN Networks
The Virtual Private Network (VPN) has become the go to security solution for keeping communications between networks and endpoints secure. After all, VPNs…
Virtualization & VM Backup
In this article, we’ll show you how to setup or install Microsoft Windows 11 on VMware’s ESXi servers and bypass the Trusted Platform Module version 2.0 (…
Virtualization & VM Backup
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your business de…