Turn an old PC into a LAN Server with RouterOS - Part 1
In this article, I will show you how to use RouterOS software to take advantage of an old computer as a LAN server.
System is a fairly wide category, including popular Windows operating systems, how to ghost computers, install Win, fix computer errors, remove viruses, malware, security solutions, servers, network tips
In this article, I will show you how to use RouterOS software to take advantage of an old computer as a LAN server.
In this series, I will show you how to create a Lab Domain Controller in Windows Server 2008 R2.
In this article, I will show you how to configure. When you're done, you'll have a basic router and you can experience advanced features.
We can use the FreeRADIUS server as a user authentication server, which is an open source project, developed in the GNU General Public License Version 2 (GPLv2). It is indeed a
In this article, I will show you how to open the CentOS firewall and configure access points (APs).
In this tutorial we will show you some tips on troubleshooting to make your network work as best as possible for Wireless N.
In this series, I will show you some basic knowledge about this new technology, along with a brief outline of its development.
No need to spend a lot of money to get enterprise features for your router. You can completely turn cheap wireless G or N routers into a network connection tool.
In Part 2 of this series, I will continue the discussion by showing you the current state of Wi-Fi and 802.11n technology.
To take advantage of 802.11n, businesses must plan not only for AP hardware but also for new client devices, network infrastructure development, ...
These are 10 different applications that are very useful when installing, improving security or use for private or public networks.
In this article we will introduce you to five suggestions for turning these old computers into useful devices for testing, routing, security, etc.
In this article we will show you some other hotspot solutions, most of them free.
One of the notable features in TMG Firewall 2010 version is ISP load balancing.
In this article we will configure the SSTP VPN server and configure the ISA Firewall to allow the SSTP VPN client to connect back to the SSTP VPN server.
In this section, we will configure a user account that allows dialup access, and then configure this CDP to allow anonymous HTTP connections.
In this second part, we will perform the configuration for ISP Redundancy, then learn how ISP Redundancy works.
VMware Virtual Infrastructure Alarms have the function to perform an action when a VMware event occurs.
With Remote Assistance, Remote Desktop Connection and Problem Steps Recorder, we can control a remote computer as if we are using the keyboard of the computer itself.
In this article, I will show you how to verify sharing and file privileges, how to access shared resources and how to reinstall connection devices.