Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

MS Server Articles:

Windows Servers

The Importance of a Hyper-V & VMware Server Bac...

Using Hyper-V Server virtualization technology, you can virtualize your physical environment to reduce the cost of physical hardware. As part of IT...
Windows Servers

The Importance of a Comprehensive Backup Strate...

People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong...
Windows Servers

Configuring Windows Server Roaming Profiles

Windows roaming profiles allow the mobile users of a company to always work with their personal settings from any network computer in a domain. Roa...
Windows Servers

Windows Server 2016 Licensing Made Easy – Under...

This article describes the new Windows Server 2016 Licensing model (per-core licensing) Microsoft has implemented for its new server-based operatin...

Featured Subcategories:

Virtualization & VM Backup Articles:

How to Fix VMware ESXi Virtual Machine 'Invalid...

In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a ...

FREE Webinar - Fast Track your IT Career with V...

Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career la...

World Backup Day with Free Amazon Voucher and P...

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...

How to Enable or Disable SSH on VMware ESXi via...

SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administ...

Your IP address:

18.188.152.162

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Linux BIND DNS - Part 1: Introduction To The DNS Dat...

BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This articl...
Linux - Unix

Installing & Configuring Linux Webmin - Linux Web-Ba...

For many engineers and administrators,  maintaining a Linux system can be a daunting task, especially if there’s limited time or experience.  ...
Linux - Unix

Installation and Configuration of Linux DHCP Server

For a cable modem or a DSL connection, the service provider dynamically assigns the IP address to your PC. When you install a DSL or a home cable router...
Linux - Unix

Configuring Linux Samba (SMB) - How to Setup Samba (...

Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or SMB....

Popular Topics

Cisco Routers

Configuring Dynamic NAT (NAT Overload) On A Cisco Ro...

NAT (Network Address Translation) is a method that allows the translation (modification) of IP addresses while packets/datagrams are traversing the netw...
ManageEngine Firewall Analyzer

Challenges & Solutions to Managing Firewall Rules in...

In today's interconnected digital landscape, where businesses rely heavily on networked systems and the internet for their operations, the importance of...
OpManager - Network Monitoring & Management

Free Webinar: Learn How Zero-Trust & Cloud Technolog...

Work transformation is not 'one and done,'" says  IDC's vice president, Holly Muscolino. Most enterprises understand that a hybrid workforce is the...
VLAN Networks

VLANs - Access & Trunk Links

If you've read our previous article The VLAN Concept - Introduction to VLANs  then you should feel comfortable with terms such as 'VLAN', 'Sta...