Build your own simple NAS system for storage needs
Today, in parallel with the increasing quality of the Internet and the cost of gigabytes of storage, the need to download and store digital data, especially audio and video data.
System is a fairly wide category, including popular Windows operating systems, how to ghost computers, install Win, fix computer errors, remove viruses, malware, security solutions, servers, network tips
Today, in parallel with the increasing quality of the Internet and the cost of gigabytes of storage, the need to download and store digital data, especially audio and video data.
After we have finished preparing the NAS system, in this second article, we will go through the steps of installing NAS4Free (FreeNAS 7) on our old system.
After you have completed the OS installation on the NAS box and finished configuring the IP according to your needs, we usually won't need to touch this machine again unless there
Yahoo! has just confirmed that their server was hacked earlier this week but user data is still safe.
Not long after the 'Back up & Restore' application was hacked, the Sony Pictures server system was also attacked by hackers.
If you are using a domain account, GoDaddy hosting is best, you should enable this 2-layer security feature, to be safer when administering the system.
Windows integrates functionality as a VPN server even if this option is hidden. This trick applies to both Windows 7 and Windows 8. This server uses tunneling protocols from point
In the previous article, TipsMake.com mentioned 1 definition, knowledge can be called classics since the time of Internet appearance, it is PROXY. And in this article, we will
DNS servers are an important component for a better web experience, but very few people understand what problems their work or security will cause. Specifically, change DNS to do?
It can be said that one of the most 'problematic' issues in managing and working with Active Directory is mistakenly deleting data or objects accidentally or incorrectly handled by
In the previous article, I showed you how to recover deleted components in Active Directory, which are related to the lifecycle properties of tombstone objects. Technically this
In the previous sections of the article, we introduced you to some points in the process of configuring Incoming Email with SharePoint 2010, and this time we will continue with the
In fact, there are a lot of Windows Server 2008 tasks that we can do a lot faster with PowerShell than the GUI-based application or tool. In the following article, we will
When it is necessary to deploy a system to ensure safety, stability and flexibility to meet the requirements of businesses and organizations, one of the most selected and applied
In the previous article, I have shown you some of the basic functions and tricks that can be done with PowerShell in Windows Server 2008. And this time, we will continue with part
In essence, Microsoft Exchange Server 2010 has been improved and integrated with new Role Based Access Control - RBAC, and this model has provided users with more ways to monitor
In the previous section of the article, we showed you how to set up and configure the level of authorization with RBAC - Role Based Access by deploying Predefined Role Groups via
In the following article, we will introduce you some basic characteristics of Security Configuration Wizard - SCW of Exchange Server 2007, with the main purpose of minimizing the
For many of us, using the command line - Command Line to control and use some of the functions in the Windows system will cause them to have headaches and problems. However, if
In the following article, we will introduce and guide you a few basic steps to install and deploy the technology platform that supports virtualization of Hyper-V on Windows Server