Skip to main content

Microsoft Server Articles:

Windows Servers
With Windows 2016 Server already making its way into data centers Windows 2016 Server Licensing is becoming a very hot topic. Windows 2016 Server is…
Windows Servers
Microsoft Licensing for Virtual environments can become a very complicated topic, especially with all the misconceptions and false information out th…
Windows Servers
Windows 2003 Group Policies allow the administrators to manage a group of people accessing a resource efficiently. The group policies can be used to…
Windows Servers
The Windows Server 2008 first carried FSRM or Fie Server Resources Manager, which allowed administrators to define the file types that users could sa…

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective but…
Virtualization & VM Backup
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a co…
Virtualization & VM Backup
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busine…
Virtualization & VM Backup
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladd…

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
Windows 8 & 8.1 hides two types of files so that normally, you do not see them while exploring your computer. The first type is the files or fold…
Windows Workstations (XP, 7, 8, 10, 11)
In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or th…
Windows Workstations (XP, 7, 8, 10, 11)
Not many users are aware that Windows 7 provides more than one way to configure a workstation’s network adaptor IP address or force it to obtain an I…
Windows Workstations (XP, 7, 8, 10, 11)
A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead With Windows XP End of Life & En…

Linux-Unix Articles:

Linux - Unix
Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation. Boot Disk One of the foremost req…
Linux - Unix
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be…
Linux - Unix
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller…
Linux - Unix
When you are running your own web hosting, it is important to monitor how much space is being used by each user. This is not a simple task to be done…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other wa…
Linux - Unix
When you are running your own web hosting, it is important to monitor how much space is being used by each user. This is not a simple task to be done manu…
Linux - Unix
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This article…
Linux - Unix
In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all the infor…

Popular Articles:

SASE & SD-WAN Networks
With so much enterprise network traffic now destined for the cloud, backhauling traffic across an expensive MPLS connection to a data center to apply secu…
Virtualization & VM Backup
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data. The g…
OpManager - Network Monitoring & Management
The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring security…
SASE & SD-WAN Networks
SD-WAN is the answer for enterprises and organizations seeking to consolidate network functions and services while at the same time simplify their WAN inf…
Virtualization & VM Backup
Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishaps and n…
SASE & SD-WAN Networks
Enterprises have been successfully running WAN optimization appliances at their many distributed sites for years. The devices have done a good job of help…
Palo Alto Networks
During the past decade, we’ve seen the global IT security market flooded with new network security and firewall security appliances. New vendors emerging…
SASE & SD-WAN Networks
Global connectivity is top of mind for many IT teams at organizations of all sizes. We are currently in the middle of a dramatic shift in business and tec…