All
.NET
AD CS
AD DS
AD FS
Amazon Web Services (AWS)
Atlassian
Azure Arc
BGP
Blazor Server
brief
C#
Cheat Sheets
Check Point
Dell PowerEdge
DevOps
E-Mail
Exchange
Failover Clustering
Fax Server
FreeBSD
General
Google Cloud
Hype-Jargon
Hyper-V
IBM X3650
IEEE 802.11 WLAN
Infrastructure as Code (IaC)
IPv4 | IPv6
Juniper
Kubernetes
Let's Encrypt
Linux
Logical Volume Manager (LVM)
Microsoft 365 (Office 365)
Microsoft Azure
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Teams
Monitoring
NetApp
Network File System (NFS)
Networks
OAuth2.0
OpenID Connect
Oracle Linux
pfSense
PKI
Postfix
PostgreSQL
PowerShell
Python
Red Hat
SAML 2.0
SAP
Security
Session Border Controller (SBC)
SLES
SQL Server
Storage
Sysinternals
System Center
TLS/SSL
Ubuntu
VEEAM
Virtual Machine Manager (VMM)
Visual Studio
VMware vSphere
VPN
Web server
Windows
X.509 PKI
Using a Jump Host (Bastion Host) for SSH (Secure Shell)
When managing remote servers, SSH (Secure Shell) is the go-to protocol for secure, encrypted connections. However, in enterprise environments, direct...
Mastering the mitmproxy (MITM interactive HTTPS Proxy) on Linux
In this post I want to show step by step how we can install the mitmproxy on different Linux distributions...
Mastering Oracle Linux Updates and Repos
In this post I want to show how we can manage updates and repositories in Oracle Linux, to demonstrate this...
How to elevate a Linux User Account with Sudo Rights
In the world of Linux and Unix-based systems, user roles and permissions are the foundation of security and system integrity....
Linux Cheat Sheet for essential Commands
Linux is a versatile operating system, packed with powerful tools and commands to streamline tasks, troubleshoot issues, and manage systems...
Linux handles SSH and SFTP Port Specification different
When working with SSH and SFTP, you may have noticed a curious difference in how ports are specified: SSH uses...