How to Enable Master Control Panel or Enable God Mode in Windows 7, 8 & 8.1
Around 2007, an undocumented feature of Windows, called the God Mode, was published outside of documentation provided by Microsoft. This is the Windows Master Control Panel shortcut. Bloggers named it...
View ArticleEasy, Fast & Reliable Hyper-V Backup with Altaro's Free Backup Solution
As more companies around the world adopt the virtualization technology to increase efficiency and productivity, Microsoft’s Hyper-V virtualization platform is continuously gaining ground in the global...
View ArticleChoosing a Web Application Security Scanner - The Importance of Using the...
In the world of information security there exist many tools, from small open source products to full appliances to secure a system, a network, or an entire corporate infrastructure. Of course,...
View ArticleThe Importance of a Network Analyzer – Packet Sniffer. Must-Have Features for...
Network Analyzers, also known as Packet Sniffers, are amongst the most popular network tools found inside any Network Engineer’s toolkit. A Network Analyzer allows users to capture network packets as...
View ArticleInstalling The ‘Unsupported’ Profilic USB-to-Serial Adapter PL-2303HXA &...
Thanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers as they are used to perform the initial configuration...
View ArticleRevealing & Backing Up Your Windows 8 – Windows 8.1 Pro License Product Key
Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the Genuine Microsoft Label or Certificate Of Authenticity...
View ArticleConfigure Windows 8 & 8.1 To Provide Secure Wireless Access Point Services to...
Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wireless access point, allowing wireless clients...
View ArticleWordPress DOM XSS Cross-site Scripting Vulnerability Identified By Netsparker
8th of May 2015, Netsparker annouced yesterday the discovery of critical security vulnerability contained an HTML file found on many WordPress themes, including WordPress.org hosted websites. As...
View ArticleHow to Capture Packets on your Cisco Router with Embedded Packet Capture -...
If you’re tired of setting up SPAN sessions to capture network traffic transiting your network and Cisco router, it’s time to start using Cisco’s Embedded Packet Capture (EPC), available from IOS...
View ArticleCisco CCNP Routing & Switching v2.0 – Official Cert Guide Library Review...
Title: Cisco CCNP Routing & Switching v2.0 – Official Cert Guide LibraryAuthors: Kevin Wallace, David Hucaby, Raymond Lacoste ISBN-13: 978-1-58720-663-4Publisher: Cisco...
View Article7 Security Tips to Protect Your Websites & Web Server From Hackers
Recent and continuous website security breaches on large organizations, federal government agencies, banks and thousands of companies world-wide, has once again verified the importance of website and...
View ArticleColasoft Announces the Release of Capsa Network Analyzer 8.0
June 16, 2015 – Colasoft LLC, a leading provider of innovative and affordable network analysis software solutions, today announced the release of the latest version of Capsa network analyzer, a...
View ArticleWindows Server 2012 File Server Resources Manager (FSRM) Installation &...
The Windows Server 2008 first carried FSRM or Fie Server Resources Manager, which allowed administrators to define the file types that users could save to file servers. Windows FSRM has been a part of...
View ArticleHow to Enable & Configure Shadow Copy for Shared Folders on Windows Server...
When you shadow copy a disk volume, you are actually generating a snapshot of the changes made to the folders and files within the disk volume at a certain point in time. Windows 2012 R2 shadow copy...
View ArticleHow to Install/Enable Telnet Client for Windows Server 2012 via GUI, Command...
IT professionals frequently need connectivity and management tools. The Telnet Client is one of the most basic tools for such activities. Using this tool, you can connect to a remote Telnet server and...
View ArticleWeb Application Security Interview on Security Weekly – Importance of...
A few weeks back Security Weekly interviewed Ferruh Mavituna, Netsparker’s CEO and Product Architect. Security Weekly is a popular podcast that provides free content within the subject matter of IT...
View ArticleInstallation and Configuration of Fine-Grained Password Policy for Windows...
Microsoft introduced Fine-Grained Password Policy for the first time in Windows Server 2008 and the policy has been part of every Windows Server since then. Fine-Grained Password Policy allows...
View ArticleTroubleshooting Windows Server 2012 R2 Crashes. Analysis of Dump Files &...
There are umpteen reasons why your Windows Server 2012 R2 decides to present you with a Blue Screen of Death (BSOD) or the stop screen. As virtual machines become more prominent in enterprise...
View ArticleEnabling & Configuring SSH on Cisco Routers. Restrict SSH for Management &...
This article shows how to configure and setup SSH for remote management of Cisco IOS Routers. We’ll show you how to check if SSH is supported by your IOS version, how to enable it, generate an RSA key...
View ArticleDemystifying Cisco AnyConnect 4.x Licensing. Plus, Plus Perpetual, Apex &...
In late 2014, Cisco announced the new licensing model for the latest AnyConnect Secure Mobility client v4.x. With this new version, Cisco introduced a number of new features, but also simplified the...
View Article