All
.NET
AD CS
AD DS
AD FS
Amazon Web Services (AWS)
Atlassian
Azure Arc
BGP
Blazor Server
brief
C#
Dell PowerEdge
DevOps
E-Mail
Exchange
Failover Clustering
Fax Server
FreeBSD
General
Google Cloud
Hype-Jargon
Hyper-V
IBM X3650
IEEE 802.11 WLAN
Infrastructure as Code (IaC)
IPv4 | IPv6
Kubernetes
Let's Encrypt
Linux
Logical Volume Manager (LVM)
Microsoft 365 (Office 365)
Microsoft Azure
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Teams
Monitoring
Network File System (NFS)
Networks
OAuth2.0
OpenID Connect
Oracle Linux
pfSense
PKI
Postfix
PostgreSQL
PowerShell
Python
Red Hat
SAML 2.0
SAP
Security
Session Border Controller (SBC)
SLES
SQL Server
Storage
Sysinternals
System Center
TLS/SSL
Ubuntu
VEEAM
Virtual Machine Manager (VMM)
Visual Studio
VMware vSphere
VPN
Web server
Windows
X.509 PKI
Mastering icacls and takeown
Managing file permissions and ownership in Windows can sometimes feel like navigating a maze, especially when dealing with restricted files...
How to onboard on-premise Server to Azure Arc by using a Site-to-Site IPSec VPN and Azure Arc Private Link Scope
Azure Arc Private Link Scope is a powerful feature that allows organizations to securely connect on-premises or multi-cloud resources to...
How to set up Dante SOCKS5 Proxy on SUSE Linux Enterprise Server
In this post I will show step by step how we can set up the Dante SOCKS5 Proxy on SUSE...
Using a Jump Host (Bastion Host) for SSH (Secure Shell)
When managing remote servers, SSH (Secure Shell) is the go-to protocol for secure, encrypted connections. However, in enterprise environments, direct...
Set up NIC Teaming in Windows Server
NIC Teaming, or Network Interface Card Teaming, is a feature in Windows Server that combines multiple network adapters into a...
How to enable Remote Desktop by using Group Policies
In enterprise environments, enabling Remote Desktop manually on multiple machines can be time-consuming. Instead, Group Policies (GPOs) provides a centralized...