All				
.NET					
AD CS					
AD DS					
AD FS					
Amazon Web Services (AWS)					
Atlassian					
Azure Arc					
Azure Monitor					
BGP					
Blazor Server					
brief					
C#					
Cheat Sheets					
Check Point					
Dell PowerEdge					
DevOps					
E-Mail					
Exchange					
Failover Clustering					
Fax Server					
FreeBSD					
General					
Google Cloud					
Hype-Jargon					
Hyper-V					
IBM X3650					
IEEE 802.11 WLAN					
Infrastructure as Code (IaC)					
IPv4 | IPv6					
Juniper					
Kubernetes					
Let's Encrypt					
Linux					
Logical Volume Manager (LVM)					
Microsoft 365 (Office 365)					
Microsoft Azure					
Microsoft Defender					
Microsoft Entra					
Microsoft Intune					
Microsoft Teams					
Monitoring					
NetApp					
Network File System (NFS)					
Networks					
OAuth2.0					
OpenID Connect					
Oracle Linux					
pfSense					
PKI					
Postfix					
PostgreSQL					
PowerShell					
Python					
Red Hat					
SAML 2.0					
SAP					
Security					
Session Border Controller (SBC)					
SLES					
SQL Server					
Storage					
Sysinternals					
System Center					
TLS/SSL					
Ubuntu					
VEEAM					
Virtual Machine Manager (VMM)					
Visual Studio					
VMware vSphere					
VPN					
Web server					
Windows					
X.509 PKI					
Cheat Sheet – User Management Commands in Linux
In the world of Linux and Unix-based systems, user roles and permissions are the foundation of security and system integrity. In this post...
Mastering GCP Virtual Machines – Part 3 (Connect to Windows VMs)
In Part 2 we saw the different access methods we can use to connect to our Linux virtual machine instances. Further we saw...
Mastering GCP Virtual Machines – Part 2 (Connect to Linux VMs)
In Part 1 we saw how to create a new virtual machine instance (Linux Ubuntu), checking if the google guest...
Mastering GCP Virtual Machines – Part 1
Even with all the fancy managed services, plain old virtual machines are still the backbone of a lot of real-world...
Step-by-Step Guide: Setting up Route Based S2S VPN between Azure and on-prem by using pfSense – Part 2
Part 1 covers the setup by using static routes, ideal for simpler environments or when dynamic routing isn’t required. Now this second part explores the BGP (Border...
Step-by-Step Guide: Setting up Route Based S2S VPN between Azure and on-prem by using pfSense – Part 1
Establishing a secure and reliable VPN tunnel between your on-premises network and Azure is a critical step in enabling hybrid...
 
