Skip to main content

Microsoft Server Articles:

Windows Servers

Configuring Domain Group Policy for Windows 2003

Windows 2003 Group Policies allow the administrators to manage a group of people accessing a resource efficiently. The group policies can be used t...
Windows Servers

Creating Windows Users and Groups with Windows ...

In a Windows server environment, it is very important that only authenticated users are allowed to log in for security reasons. To fulfill this req...
Windows Servers

Windows Server 2012 File Server Resources Manag...

The Windows Server 2008 first carried FSRM or Fie Server Resources Manager, which allowed administrators to define the file types that users could ...
Windows Servers

How to Install/Enable Telnet Client for Windows...

IT professionals frequently need connectivity and management tools. The Telnet Client is one of the most basic tools for such activities. Using thi...

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup

6 Key Areas to Consider When Selecting a VM Bac...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busi...
Virtualization & VM Backup

SysAdmin Day 2020 - Get your Free Amazon Vouche...

SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us ...
Virtualization & VM Backup

Differences Between VMware vSphere, vCenter, ES...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere ed...
Virtualization & VM Backup

5 Most Critical Microsoft M365 Vulnerabilities ...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)

Configuring Windows 7 To Provide Secure Wireles...

Not many people are aware that Windows 7 has built-in capabilities that allow it to be transformed into a perfectly working access point so that wi...
Windows Workstations (XP, 7, 8, 10, 11)

Configure Windows 8 & 8.1 To Provide Secure Wir...

Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure w...
Windows Workstations (XP, 7, 8, 10, 11)

Revealing & Backing Up Your Windows 8 – Windows...

Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the G...
Windows Workstations (XP, 7, 8, 10, 11)

How to Start Windows 8 and 8.1 in Safe Mode – E...

This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would rec...

Linux-Unix Articles:

Linux - Unix

Implementing Virtual Servers and Load Balancing...

What is Server Virtualization? Server virtualization is the process of apportioning a physical server into several smaller virtual servers. Du...
Linux - Unix

Linux VIM / Vi Editor - Tutorial - Basic & Adva...

When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operatio...
Linux - Unix

The Linux File System

A file system is nothing more than the way the computer stores and retrieves all your files. These files include your documents, programs, help fil...
Linux - Unix

Critical 15 Year-old Linux Security Hole (Ghost...

Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux sys...

Your IP address:

3.236.145.153

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer


Linux - Unix

The Linux Command Line

You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is the he...
Linux - Unix

Finding More Information On The Linux Operating System

Since this document merely scratches the surface when it comes to Linux, you will probably find you have lots of questions and possibly problems. Whethe...
Linux - Unix

Linux BIND DNS - Part 3: Configuring The db.192.168....

The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, th...
Linux - Unix

Linux BIND DNS - Part 2: Configuring db.domain Zone...

It's time to start creating our zone files. We'll follow the standard format, which is given in the DNS RFCs, in order to keep everything neat and less ...

Popular Articles:

Virtualization & VM Backup

How to Fix VMware ESXi Virtual Machine 'Invalid Status'

In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a commo...
Palo Alto Networks

Palo Alto Firewall Application-based Policy Enforcem...

Our previous article examined the benefits of Palo Alto Networks Firewall Single Pass Parallel Processing (SP3) architecture and how its combine with th...
Palo Alto Networks

Palo Alto Networks Firewall - Web & CLI Initial Conf...

This article is the second-part of our Palo Alto Networks Firewall technical articles. Our previous article was introduction to Palo Alto Networks Firew...
Palo Alto Networks

Palo Alto Firewall Configuration Options. Tap Mode, ...

Our previous article explained how Palo Alto Firewalls make use of Security Zones to process and enforce security policies. This article will explain th...
Virtualization & VM Backup

5 Most Critical Microsoft M365 Vulnerabilities Revea...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data. The...
SASE & SD-WAN Networks

Check Point Software and Cato Networks Co-Founder Sh...

By: Shlomo Kramer, Check Point Software & Cato Networks Co-Founder As one of the founders of Check Point Software and more recently Cato Networks, ...
OpManager - Network Monitoring & Management

Free March 2021 Training/Seminars: Endpoint Manageme...

ManageEngine continues its commitment to help IT staff around the globe manage their organization's endpoints and the IT operations for the remote and o...
OpManager - Network Monitoring & Management

Free Webinar: Enterprise-Grade Security and Manageme...

The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring securi...