Mastering icacls and takeown
Managing file permissions and ownership in Windows can sometimes feel like navigating a maze, especially when dealing with restricted files…
How to onboard on-premise Server to Azure Arc by using a Site-to-Site IPSec VPN and Azure Arc Private Link Scope
Azure Arc Private Link Scope is a powerful feature that allows organizations to securely connect on-premises or multi-cloud resources to…
How to set up Dante SOCKS5 Proxy on SUSE Linux Enterprise Server
In this post I will show step by step how we can set up the Dante SOCKS5 Proxy on SUSE…
Using a Jump Host (Bastion Host) for SSH (Secure Shell)
When managing remote servers, SSH (Secure Shell) is the go-to protocol for secure, encrypted connections. However, in enterprise environments, direct…
Set up NIC Teaming in Windows Server
NIC Teaming, or Network Interface Card Teaming, is a feature in Windows Server that combines multiple network adapters into a…
How to enable Remote Desktop by using Group Policies
In enterprise environments, enabling Remote Desktop manually on multiple machines can be time-consuming. Instead, Group Policies (GPOs) provides a centralized…
Mastering the mitmproxy (MITM interactive HTTPS Proxy) on Linux
In this post I want to show step by step how we can install the mitmproxy on different Linux distributions…
Mastering Oracle Linux Updates and Repos
In this post I want to show how we can manage updates and repositories in Oracle Linux, to demonstrate this…
Veeam Backup & Replication – Permanent failover failed – Error: There is no oib with id
In case you will run into the following error in Veeam Backup & Replication, when triggering a Permanent Failover for…
How to elevate a Linux User Account with Sudo Rights
In the world of Linux and Unix-based systems, user roles and permissions are the foundation of security and system integrity….