Techbast

Technical knowledge sharing

  • Firewall
  • Storage
  • Switch/Router
  • Wireless
  • Security
  • Tools
  • Visio Stencils
  • Brand
    • Azure
    • Citrix
    • Netgear
    • Sophos

Windows Server: How to configure WSUS function on Windows Server 2012

June 14, 2019 Vincent 0

Overview Microsoft Windows Server Update Services (WSUS) is an effective solution for businesses in system update issues. WSUS offers a solution to this problem, WSUS Read More

How to enable Windows Sandbox on Windows 10 to run unreliabe exe file

June 13, 2019 Micheal 0

Overview Microsoft is trying to solve a problem that has long existed for Windows users, that is how to run an unknown .exe file on Read More

Visio Stencils: Basic Network Diagram with 2 firewalls

June 13, 2019 Vincent 0

Overview This article describes a network with 2 firewall devices that helping protect LAN network and DMZ network Drawing Description The network diagram helps the Read More

Zabbix: How to configure Zabbix Agent on Windows Server

June 13, 2019 Vincent 0

Overview How to configure Step 1: Download Agent Source Code Download the Agent installation package according to the respective operating system, in this case Windows: Read More

Sophos Central: How to find malicious PowerShell implementations with Intercept X

June 12, 2019 Micheal 0

Overview Intercept X Advanced with EDR now captures all PowerShell executions so that they can be reviewed and analyzed. This article will guide you how Read More

Sophos XG Firewall: How to reset the admin password

June 12, 2019 Micheal 0

Overview This article provides information on how to reset the admin password on the Sophos XG Firewall. Configuring Via SFLoader Connect the console cable and Read More

Zabbix: How to configure Zabbix Server on CentOS 7

June 12, 2019 Vincent 0

Overview Zabbix is an open source enterprise software that monitors networks and applications It is designed to help network administrators monitor and monitor the status Read More

How to protect Microsoft Outlook from unauthorized access?

June 11, 2019 Micheal 0

Overview Nowdays, everyone use MS Outlook as mail tool to Send/Receive the email for my daily work. I ensure that you did not want to Read More

5 super fast ways to block coin miner on web browser

June 11, 2019 Micheal 0

Overview Cryptocurrency is a digital or virtual coin that uses encryption for security. Because they are anonymous and decentralized, many people can use them for Read More

Linux: Instructions for using Process Management command on Linux

June 11, 2019 Vincent 0

Create proceses Lists the jobs running in the background, giving the job number Bring a background job to the foreground Change suspend the current foreground Read More

Posts pagination

« 1 … 30 31 32 … 61 »

Copyright © 2025 | WordPress Theme by MH Themes