All
.NET
AD CS
AD DS
AD FS
Amazon Web Services (AWS)
Atlassian
Azure Arc
Azure Monitor
BGP
Blazor Server
brief
C#
Cheat Sheets
Check Point
Dell PowerEdge
DevOps
E-Mail
Exchange
Failover Clustering
Fax Server
FreeBSD
General
Google Cloud
Hype-Jargon
Hyper-V
IBM X3650
IEEE 802.11 WLAN
Infrastructure as Code (IaC)
IPv4 | IPv6
Juniper
Kubernetes
Let's Encrypt
Linux
Logical Volume Manager (LVM)
Microsoft 365 (Office 365)
Microsoft Azure
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Teams
Monitoring
NetApp
Network File System (NFS)
Networks
OAuth2.0
OpenID Connect
Oracle Linux
pfSense
PKI
Postfix
PostgreSQL
PowerShell
Python
Red Hat
SAML 2.0
SAP
Security
Session Border Controller (SBC)
SLES
SQL Server
Storage
Sysinternals
System Center
TLS/SSL
Ubuntu
VEEAM
Virtual Machine Manager (VMM)
Visual Studio
VMware vSphere
VPN
Web server
Windows
X.509 PKI
Step-by-Step Guide Part 5: How to build your own NetApp ONTAP 9 LAB – Root Squashing
If you’ve ever tried as root to chown, chmod, or just create a file on an NFS-mounted share and were...
Cheat Sheet – User Management Commands in Linux
In the world of Linux and Unix-based systems, user roles and permissions are the foundation of security and system integrity. In this post...
Mastering GCP Virtual Machines – Part 3
In Part 2 we saw the different access methods we can use to connect to our Linux virtual machine instances. Further we saw...
Mastering GCP Virtual Machines – Part 2
In Part 1 we saw how to create a new virtual machine instance (Linux Ubuntu), checking if the google guest...
Mastering GCP Virtual Machines – Part 1
Even with all the fancy managed services, plain old virtual machines are still the backbone of a lot of real-world...
Step-by-Step Guide: Setting up Route Based S2S VPN between Azure and on-prem by using pfSense – Part 2
Part 1 covers the setup by using static routes, ideal for simpler environments or when dynamic routing isn’t required. Now this second part explores the BGP (Border...