Articles
To read the articles in this section, simply click on the article title or read button on the far right (if visible).
Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.
Articles | |
---|---|
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
MS Server Articles:
Windows Servers
How to Recover & Create "Show Desktop" Icon Fun...
The Show Desktop feature, included with almost all versions of Windows up to Windows 7, allows a user to minimize or restore all open programs and...
Windows Servers
Windows 2012 Server NIC Teaming – Load Balancin...
NIC Teaming, also known as Windows Load Balancing or Failover (LBFO), is an extremely useful feature supported by Windows Server 2012 that allows t...
Windows Servers
New Upcoming Features in Hyper-V vNext - Free ...
With the release of Hyper-V vNext just around the corner, Altaro has organized a Free webinar that will take you right into the new Hyper-V vNext r...
Windows Servers
How to Install Windows 2012 Hyper-V via Server ...
Our previous article covered the basic concepts of Virtualization and Windows Server 2012 Hyper-V. This article takes a closer look at Micros...
Featured Subcategories:
Virtualization & VM Backup Articles:
How to Enable SNMP on VMware ESXi Host & Config...
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to a...

Ultimate Guide: Install Windows 11 on VMware ES...
In this article, we’ll show you how to setup or install Microsoft Windows 11 on VMware’s ESXi servers and bypass the Trusted Platform Module versio...
World Backup Day with Free Amazon Voucher and P...
Celebrate World Backup Day and WIN with Altaro!
We all remember how grateful we were to have backup software when facing so many data loss mishap...
Understanding Deduplication. Complete Guide to ...
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...
Your IP address:
3.135.185.96
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Understanding Linux File System Quotas - Installatio...
When you are running your own web hosting, it is important to monitor how much space is being used by each user. This is not a simple task to be done ma...
Linux - Unix
Linux BIND DNS - Part 2: Configuring db.domain Zone...
It's time to start creating our zone files. We'll follow the standard format, which is given in the DNS RFCs, in order to keep everything neat and less ...
Linux - Unix
Linux BIND DNS - Part 4: Common BIND Files - Named.l...
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168.0, ...
Linux - Unix
Linux BIND DNS - Part 5: Configure Secondary (Slave)...
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...
Popular Topics
Network Protocol Analyzers
How to Detect P2P (peer-to-peer) File Sharing, Torre...
Peer-to-Peer file sharing traffic has become a very large problem for many organizations as users engage in illegal (most times) file sharing processes ...
Cisco Routers
How to Restrict Cisco IOS Router VPN Client to Layer...
In our article Cisco VPN Client Configuration - Setup for IOS Router we explained how to setup up a Cisco IOS router to support Cisco IPSec VPN cl...
Cisco Routers
Configuring Policy-Based Routing (PBR) with IP SLA T...
What is Policy-Based Routing?
Policy-Based Routing (PBR) is a very popular feature in Cisco routers, it allows the creation of policies that can select...
Cisco Routers
How To Configure DHCP Server On A Cisco Router
DHCP (Dynamic Host Configuration Protocol) is the protocol used by network devices (such as PCs, network printers, etc) to automatically obtain correct ...