Article on the subject of "servers"
-
Configure the Lightweight Directory Service service - Part 7
in the final part of this series, we will introduce you to site linking objects, the process of creating replicas between sites and some issues to consider in disaster recovery.
-
Checkover Failover Cluster Strategy - Part 1
this article will show you how to use system center operations manager to test failover clusters.
-
Delete log information in Windows Server Backup
windows server backup is one of windows server 2008 / r2's useful features that allows users to easily back up, restore files, data and other important components in the system like system state, full server or the entire hard drive according to user needs. after such processes, windows server
-
Configuring the Lightweight Directory Service service - Part 1
in this article series, i will show you how and how to use the lightweight directory service services.
-
Configuring the Lightweight Directory Service service - Part 2
in this second part we will continue the introduction of ad lds service by exploring some of the usable technologies and how to deploy ad lds services.
-
Configure the Lightweight Directory Service service - Part 3
in this article, i will show you the procedure for creating an appropriate ad lds instance and application directory partition.
-
Configure the Lightweight Directory Service service - Part 4
in this article, i will continue the discussion by showing you how to create an ad lds instance copy.
-
Configure Cisco ASA system with Android, VPN and Active Directory Authentication devices
in the following article, we will cover some basic operations to configure and set up cisco asa systems with devices based on android, vpn operating system and active directory authentication.
-
Domain Controller virtualization solutions - Part 2
in part 2 of this series, i will continue the discussion by showing you some options for domain controller virtualization.
-
Domain Controller virtualization solutions - Part 3
to follow the previous two parts of this series, i will show you the options for domain controller virtualization.
-
Domain Controller virtualization solutions - Part 1
in this article we will show you the advantages and disadvantages of some common domain controller settings.
-
HP announced that it has integrated the 3PAR utility storage system
today april 15, 2011, hp group announced the integration of 3par utility storage system into the product portfolio under hp's converged infrastructure solution, the integration to simplify the deployment of computing services. cloud...
-
Security for web applications
in recent years, e-commerce services (e-commerce) such as online payment, ebanking online transactions ... have developed constantly.
-
Track changes in sensitive security in Windows
attack surface analyzer is a tool released by microsoft that allows users to easily detect sensitive security changes of the windows operating system.
-
Security in virtualization and worrying things
in a conference of it industry leaders in march, it managers expressed their concerns about the security of virtual infrastructure.
-
Remote workstation security in Windows Server 2008 R2
in this article we will discuss some of the security mechanisms included in rds along with how to use group policy and configuration settings.
-
More than 1 million computers are infected by hackers
hackers design fake websites to scare internet users to download and install fake antivirus software.
-
10 things to remember when upgrading the server
network administration - you can avoid some problems and get the most out of it by following some advice when upgrading the server.
-
Control Processor resources in Hyper-V clients
in this article, i will show you the options for controlling processor resources and how to use them.
-
Create a backup schedule for Database with Cron Job
to back up the database for wordpress, there are many plugins that can help you do this. however, if you are a longtime wordpress user, you will probably realize that the plugins are unreliable.
-
What Are the Three Types of Proxy Servers?
proxies are servers that act on behalf of your computer or network to provide access to the internet. they help you bypass geo-blocking and filter out unwanted content for privacy and security reasons.
-
The basic advantages of Linux servers and Window servers
you plan to hire a server service to build a website for small businesses, but you need to know the basics of network servers. the whole purpose and total characteristics of a website are the factors that form the server selection
-
Balancing download of Exchange 2007 SP1 Hub Transport servers with Windows Network Load Balancing (Part 1)
exchange server 2007 hub transport servers (rtm and sp1) are capable of failover by default. that means that if you install multiple hub transport servers in an active directory and one of those servers has problems, the other server will maintain the connections.
-
[Theory] What is Proxy Server?
probably a lot of people have heard from proxy, or server proxy, or proxy server! so do you know exactly what it is? in the article below, tipsmake.com will introduce you to this proxy concept.
-
6 ways to fix 'Sorry, There Is a Problem With the OneDrive Servers' error on Windows
if you own a windows computer, there's no reason not to take advantage of onedrive. with 5gb of free storage and deep office integration, microsoft's storage service is a great productivity tool.
-
Top best antivirus software for servers
server server systems are often known as systems that require the highest level of security & protection. introducing to you the top best anti-virus software for servers.
-
Yahoo! attacked, no damage
yahoo! has just confirmed that their server was hacked earlier this week but user data is still safe.
-
Open multiple Exchange Servers mailboxes with Outlook 2010
in previous versions of outlook, this means you will have to use different outlook profiles or use outlook web app (owa) to make it harder to copy data between mailboxes or access the information. details from all servers.
-
Install ISPConfig 3 ProFTPd for Debian
if you are using a vps server with openvz, unfortunately you cannot run the pureftpd that comes with ispconfig by default. the following article will show you how to use proftpd to replace pureftpd easily.
-
SaltStack has the most serious vulnerability ever, thousands of servers can be seriously affected
unlike previous vulnerabilities, this one of saltstack can affect all servers in the system, causing a much bigger impact.
-
ProFTPD remote code execution vulnerability affects more than 1 million servers worldwide
more than 1 million is the number of proftpd servers that are vulnerable to remote code execution worldwide.
-
The best free anonymous proxy servers
an anonymous proxy server, also known as a cgi proxy, is a server that operates through a web form so that all requests on the internet are filtered through this form, hiding the identity of the user. in this article, tipsmake.com will provide you with the best anonymous proxy server list.
-
5 reasons why you should avoid free proxy servers
although proxy servers are useful in dealing with geographic area restrictions when accessing the web, the level of security of free proxy servers is something that users are more interested in.
-
Rumors that foreign players are about to be separated from international servers are just fake news?
with the long-standing achievement of this national gaming community, the news that they are isolated from international servers makes players from other countries happy.
-
Serious vulnerability in OpenSSH threatens millions of servers
according to techradar, a serious security vulnerability called 'regresshion' (cve-2024-6387) has existed in openssh for more than 4 years and is threatening many servers around the world.
-
Symantec introduced NetBackup 7
netbackup 7 is a data duplication solution that protects new virtual servers and integrates backup replication capabilities to help recover from disaster faster ..,
-
Blade Server - New server architecture
suppliers are advertising blade servers as a new architecture to replace traditional server designs - stand alone or rack-mounted. however, experts also c & og
-
Install the patch immediately for Windows Server & Windows 10 to run IIS so that it will not be attacked by DOS
windows server and windows 10 servers running internet information services (iis) easily become targets of denial of service (dos) attacks.
-
Deploy Data Protection Manager 2007 (Part 1)
data protection manager (dpm) is designed to protect microsoft applications and servers in an active directory environment. dpm uses continuous data protection. dpm server protects servers by creating and maintaining a copy of the information stored at c
-
Deploy Data Protection Manager 2007 (Part 4)
data protection manager (dpm) is designed to protect microsoft applications and servers in an active directory environment. dpm uses continuous data protection. dpm server protects servers by creating and maintaining a copy of the information stored at c