Mastering Windows Updates & Microsoft Updates – Part 2
In Part 1 we will see how to master Windows Updates successfully, why they sometimes fail, and what we can do in…
Mastering Windows Updates & Microsoft Updates – Part 1
Behind that simple “Check for updates” button lies a complex system of services, agents, stacks, and rules. In this post,…
Step-by-Step Guide Part 6: How to build your own NetApp ONTAP 9 LAB – NFSv4 Pitfalls
When you switch from NFSv3 to NFSv4, things definitely change under the hood, and suddenly your permissions or ownership mappings…
Step-by-Step Guide Part 5: How to build your own NetApp ONTAP 9 LAB – Root Squashing
If you’ve ever tried as root to chown, chmod, or just create a file on an NFS-mounted share and were…
Cheat Sheet – User Management Commands in Linux
In the world of Linux and Unix-based systems, user roles and permissions are the foundation of security and system integrity. In this post…
Mastering GCP Virtual Machines – Part 3
In Part 2 we saw the different access methods we can use to connect to our Linux virtual machine instances. Further we saw…
Mastering GCP Virtual Machines – Part 2
In Part 1 we saw how to create a new virtual machine instance (Linux Ubuntu), checking if the google guest…
Mastering GCP Virtual Machines – Part 1
Even with all the fancy managed services, plain old virtual machines are still the backbone of a lot of real-world…
Step-by-Step Guide: Setting up Route Based S2S VPN between Azure and on-prem by using pfSense – Part 2
Part 1 covers the setup by using static routes, ideal for simpler environments or when dynamic routing isn’t required. Now this second part explores the BGP (Border…
Step-by-Step Guide: Setting up Route Based S2S VPN between Azure and on-prem by using pfSense – Part 1
Establishing a secure and reliable VPN tunnel between your on-premises network and Azure is a critical step in enabling hybrid…