All
.NET
AD CS
AD DS
AD FS
Amazon Web Services (AWS)
Atlassian
Azure Arc
BGP
Blazor Server
brief
C#
Dell PowerEdge
DevOps
E-Mail
Exchange
Failover Clustering
Fax Server
FreeBSD
General
Google Cloud
Hype-Jargon
Hyper-V
IBM X3650
IEEE 802.11 WLAN
Infrastructure as Code (IaC)
IPv4 | IPv6
Kubernetes
Let's Encrypt
Linux
Logical Volume Manager (LVM)
Microsoft 365 (Office 365)
Microsoft Azure
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Teams
Monitoring
Network File System (NFS)
Networks
OAuth2.0
OpenID Connect
pfSense
PKI
Postfix
PostgreSQL
PowerShell
Python
Red Hat
SAML 2.0
SAP
Security
Session Border Controller (SBC)
SLES
SQL Server
Storage
Sysinternals
System Center
TLS/SSL
Ubuntu
VEEAM
Virtual Machine Manager (VMM)
Visual Studio
VMware vSphere
VPN
Web server
Windows
X.509 PKI
VMware ESXi change /etc/hosts by using the ESXCLI
Because of changing the IP addresses of my ESXi Hosts and the vCenter appliance, I also wanted to adjust the...
Linux Execute Shell Scripts – Source script.sh vs ./script.sh vs exec ./script.sh
In Linux executing ./my_script.sh and source my_script.sh are two different ways to run a shell script, but they behave differently...
What is PowerShell Dot Sourcing?
Dot sourcing in PowerShell is a method used to execute a script or a function in the current scope rather...
What’s the Difference in Linux between the Commands SU – vs. SU without the Dash
The difference between su – and su in Linux is primarily related to how they handle the user environment after...
Using Match Directives in SSH (Secure Shell)
The Match directive in SSH (Secure Shell) configuration files is used to apply specific settings conditionally based on criteria such...
Changing SSH Port on SELinux – Error: Bind to port failed: Permission denied
In case you want to change the default SSH port 22 on your system and you are running into the...