Linux: Instructions for using file permission commands on Linux
Overview There are 3 types of people that affect file/dir permissions User Owner: A single person who owns the file/dir (user owner may be user Read More
Overview There are 3 types of people that affect file/dir permissions User Owner: A single person who owns the file/dir (user owner may be user Read More
Overview The article instructs the installation of CentOS operating system on VMWare Workstation, CentOS is a free Linux operating system, which can be used to Read More
Purpose of the article This article describe how to configure SSL VPN remote users to have access over a site-to-site IPsec Diagram and Scenario We Read More
Purpose of the article This article describes steps to configure multiple IPsec VPN connections for redundancy. If the ISP1 Internet VPN link does not work, Read More
The goal of the article This article will show you how to create a policy routes to route user traffic by user, user group, server, Read More
Purpose of the article This article will introduce what High Availability is and how to configure this feature on Sophos XG firewall device with mode Read More
This article will show you how to decrypt the drive after the drive has been encrypted using Sophos Central on Windows 10 and Windows 7. Read More
This article will describe the step configure Full Disk Encryption on Windows 7 using Sophos Central Diagram and Implementation steps As the diagram we see Read More
This article guides the steps to login when the user forgets the password on Windows 7 using Recovery Key Diagram and implementation steps As the Read More
Overview In this task we will configure and test localtion-based file encryption for Box cloud storage. Scenario In this task, we will create policy on Read More
Copyright © 2024 | WordPress Theme by MH Themes