Skip to main content

Microsoft Server Articles:

Windows Servers
With the release of Hyper-V vNext just around the corner, Altaro has organized a Free webinar that will take you right into the new Hyper-V vNext rel…
Windows Servers
Our previous article covered introduction to the Domain Name System (DNS) and explained the importance of the DNS Server role within the network infr…
Windows Servers
Tombstone is a container object that contains the deleted objects from Active Directory. Actually when an object is deleted from Active Directory, it…
Windows Servers
In this article, we will cover more advanced DHCP features and topics such as server options, superscopes, multicast scopes, dynamic DNS, DHCP databa…

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administra…
Virtualization & VM Backup
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtua…
Virtualization & VM Backup
In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edit…
Virtualization & VM Backup
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective but…

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or th…
Windows Workstations (XP, 7, 8, 10, 11)
Not many users are aware that Windows 7 provides more than one way to configure a workstation’s network adaptor IP address or force it to obtain an I…
Windows Workstations (XP, 7, 8, 10, 11)
Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the Gen…
Windows Workstations (XP, 7, 8, 10, 11)
Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wir…

Linux-Unix Articles:

Linux - Unix
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller…
Linux - Unix
Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows y…
Linux - Unix
Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the oth…
Linux - Unix
File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can ac…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This article…
Linux - Unix
File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can access…
Linux - Unix
This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address, Defa…
Linux - Unix
What is Server Virtualization? Server virtualization is the process of apportioning a physical server into several smaller virtual servers. During se…

Popular Articles:

OpManager - Network Monitoring & Management
The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring security…
Virtualization & VM Backup
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladder in…
OpManager - Network Monitoring & Management
Defending your client's network from faulty configuration changes, poor compliance, and bringing the network back quickly from downtime can be challenging…
Palo Alto Networks
During the past decade, we’ve seen the global IT security market flooded with new network security and firewall security appliances. New vendors emerging…
SASE & SD-WAN Networks
Enterprises have been successfully running WAN optimization appliances at their many distributed sites for years. The devices have done a good job of help…
OpManager - Network Monitoring & Management
ManageEngine has joint hands with IDC's Stephen Elliot, a group vice president, to discuss the truth behind organization's digitally transforming IT, the…
Security Service Edge (SSE)
This article explores the Security Service Edge (SSE) portion of Secure Access Service Edge (SASE) and the need for holistic cybersecurity protections. W…
Palo Alto Networks
Palo Alto Networks Next-Generation Firewalls rely on the concept of security zones in order to apply security policies. This means that access lists (fire…