Articles
To read the articles in this section, simply click on the article title or read button on the far right (if visible).
Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.
Articles | |
---|---|
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
MS Server Articles:
Windows Servers
How to Recover & Create "Show Desktop" Icon Fun...
The Show Desktop feature, included with almost all versions of Windows up to Windows 7, allows a user to minimize or restore all open programs and ...
Windows Servers
Guide to Windows Server 2016 Hyper-V Hypervisor...
One of Windows Server 2016 highlights is the newer Hyper-V server that not only extends the hypervisor’s features and capabilities but also introdu...
Windows Servers
The Importance of a Hyper-V & VMware Server Bac...
Using Hyper-V Server virtualization technology, you can virtualize your physical environment to reduce the cost of physical hardware. As part of IT...
Windows Servers
How to Install Windows 2012 Hyper-V via Server ...
Our previous article covered the basic concepts of Virtualization and Windows Server 2012 Hyper-V. This article takes a closer look at Micros...
Featured Subcategories:
Virtualization & VM Backup Articles:
SysAdmin Day 2020 - Get your Free Amazon Vouche...
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us ...
World Backup Day with Free Amazon Voucher and P...
Celebrate World Backup Day and WIN with Altaro!
We all remember how grateful we were to have backup software when facing so many data loss mishap...
6 Key Areas to Consider When Selecting a VM Bac...
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud.
Your busi...
How to Fix VMware ESXi Virtual Machine 'Invalid...
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a ...
Your IP address:
3.144.222.208
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Linux BIND DNS - Part 6: Linux BIND - DNS Caching
In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all the inf...
Linux - Unix
Understanding The Linux Init Process & Different Run...
Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For example, ...
Linux - Unix
Linux System Resource & Performance Monitoring
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be ma...
Linux - Unix
How To Secure Your Linux Server or Workstation - Lin...
Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation.
Boot Disk
One of the foremost requis...
Popular Topics
ManageEngine Firewall Analyzer
Dealing with Security Audit Challenges: Discovering ...
The utilization of log analyzers, such as Firewall Analyzer, in network infrastructure plays a pivotal role in enhancing cybersecurity and fortifying th...
OpManager - Network Monitoring & Management
Ensuring Enterprise Network Readiness for Mobile Use...
Demands for Enterprise networks to properly support mobile users is on a continuous rise making it more than ever necessary for IT departments to provid...
Cisco Routers
Cisco Router Password Recovery
Password recovery is a fairly frequently used procedure for administrators and engineers. Even though we usually stack our passwords in some word, excel...
Windows Workstations (XP, 7, 8, 10, 11)
How to View Hidden Files & Folders in Windows 7
This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see them w...