Skip to main content

Microsoft Server Articles:

Windows Servers

How to Install/Enable Telnet Client for Windows...

IT professionals frequently need connectivity and management tools. The Telnet Client is one of the most basic tools for such activities. Using thi...
Windows Servers

How to Install Windows Server 2012 from USB Fla...

Most would remember the days we had to have a CDROM or DVDROM in order to proceed with the installation of an operating system. Today, it is very c...
Windows Servers

How to Enable ‘Web Server’ Certificate Template...

In this article we will show you how to enable the ‘Web Server’ certificate template option on a Windows Certification Authority (Windows CA) Serve...
Windows Servers

Introduction to Windows DNS – The Importance of...

The Domain Name System (DNS) is perhaps one of the most important services for Active Directory. DNS provides name resolution services for Active D...

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup

How to Enable or Disable SSH on VMware ESXi via...

SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administ...
Virtualization & VM Backup

Differences Between VMware vSphere, vCenter, ES...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere ed...
Virtualization & VM Backup

SysAdmin Day 2020 - Get your Free Amazon Vouche...

SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us ...
Virtualization & VM Backup

8 Critical Features to Have in a VM Backup Solu...

Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)

Revealing & Backing Up Your Windows 8 – Windows...

Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the G...
Windows Workstations (XP, 7, 8, 10, 11)

How to Add and Remove Applications from Windows...

In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or ...
Windows Workstations (XP, 7, 8, 10, 11)

The Importance of Windows Hosts File - How to U...

This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how i...
Windows Workstations (XP, 7, 8, 10, 11)

How to Enable Master Control Panel or Enable Go...

Around 2007, an undocumented feature of Windows, called the God Mode, was published outside of documentation provided by Microsoft. This is the Win...

Linux-Unix Articles:

Linux - Unix

The Linux File System

A file system is nothing more than the way the computer stores and retrieves all your files. These files include your documents, programs, help fil...
Linux - Unix

Configuring Linux Samba (SMB) - How to Setup Sa...

Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or...
Linux - Unix

Linux BIND DNS - Part 3: Configuring The db.192...

The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introductio...
Linux - Unix

Linux VIM / Vi Editor - Tutorial - Basic & Adva...

When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operatio...

Your IP address:

3.141.166.242

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Why Use Linux?

The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communi...
Linux - Unix

Linux BIND DNS - Part 3: Configuring The db.192.168....

The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, th...
Linux - Unix

Linux File & Folder Permissions

File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can acces...
Linux - Unix

Working with Linux TCP/IP Network Configuration Files

This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address, De...

Popular Articles:

Palo Alto Networks

Palo Alto Firewall Configuration Options. Tap Mode, ...

Our previous article explained how Palo Alto Firewalls make use of Security Zones to process and enforce security policies. This article will explain th...
Palo Alto Networks

Palo Alto Firewall Application-based Policy Enforcem...

Our previous article examined the benefits of Palo Alto Networks Firewall Single Pass Parallel Processing (SP3) architecture and how its combine with th...
OpManager - Network Monitoring & Management

Free Webinar: Enterprise-Grade Security and Manageme...

The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring securi...
OpManager - Network Monitoring & Management

Free Webinar - Dealing with Remote VPN Challenges, P...

With a lot of enterprises switching to a work-from-home model, it is critical for admins to have a strategy in place to avoid poor performance and ensur...
Palo Alto Networks

Configuring QoS on Palo Alto Firewalls: Class-based ...

This article’s purpose is to help you quickly master Palo Alto QoS concepts and learn to configure QoS on Palo Alto Firewalls in a simple and efficient ...
Virtualization & VM Backup

6 Key Areas to Consider When Selecting a VM Backup S...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your business ...
Virtualization & VM Backup

SysAdmin Day 2020 - Get your Free Amazon Voucher & G...

SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to ke...
SASE & SD-WAN Networks

Understanding Secure Access Service Edge (SASE) and ...

Software Defined Wide Area Networking (SD-WAN) is changing the way that businesses connect to the cloud. With SD-WAN, organizations can move away from c...