Tags » Configure

Track Datastore Add & Removes With PowerCLI

While working with the data protection team at my job I was asked if there was any way to track new datastores being added to a vSphere cluster. 1,318 more words


IPSec Site-to-Site VPN Cisco ASA - Openswan

1. How IPsec VPN Site-to-Site Tunnels Work?

In order to understand how IPsec VPN site-to-site tunnels work, it is important to fully understand what each term individually means, and what part does each of the mentioned object play in a complete IPsec VPN site-to-site network setup. 1,979 more words


Behavior and Content Reports

The next stage of development in Google Analytics Essential Training is Behavior and Content Reports. This section covers Analyzing top content by metrics, Sorting top content according to page title, Understanding when to use Content Drilldown, Exploring Behavior Flow and landing pages, Identifying slow-performing pages with the Site Speed report, Understanding the Internal Site Search reports and Configuring Site Search.


Mobile SEO

The final stage of development in SEO Fundamentals is Mobile SEO, This area covers Understanding mobile SEO, Configuring your site for mobile, Optimizing your site for feature phones and smartphones and Developing mobile-friendly content.


Solaris 10: how to install and configure Artifactory as a service

Artifactory is a well structured solution for storing, organizing and managing the binaries (artifacts) of your software projects. In this article I’ll present you how to install the Open Source version of this application, which I personally recommend for sharing and coordinating multiple versions of different binaries among the members of your developer’s team. 1,235 more words


Zimbra Spam Filtering Using Fail2ban

Before you read my post. I want to apologize for my bad english because i still learn to write in english,thankyou.

Spam in an e-mail server is a headache, although it has been used mail transfer agent (mta), spam can still keep coming massively. 957 more words

Open Source

Configure Windows 8 & 8.1 To Provide Secure Wireless Access Point Services to Wi-Fi Clients - Turn Windows 8 into an Access Point

Learn how to enable secure WiFi access point in Windows 8 & 8.1 and turn it into a Wi-Fi hotspot for wireless clients. We provide detailed easy-to-follow instructions and screenshots.