
How to Remove Password From Windows Account | CMD
How to log on to Windows without hitting the logon screen ... Read More

You have a new Exchange installation. You've just clicked on the Setup Finished window, lean back in your chair and sip on your steamy coffee, saying to yourself: great, now I have a mail server, I could start setting up ... Read More

Our local diner, AlwaysHot Café hired us to build a mail server. They have a small network that consists of a switch and a firewall with a single static public IP. After discussing our options we decided to go with ... Read More

We established in part1 why the key exchange takes place, if you missed that part click HERE to check it out. Basically the client and the server agree on a key that they can use to encrypt the rest of ... Read More

Math in PowerShell is very simple and straightforward, the basic operators work as they usually do in any programming or scripting language: 1 + 1, 64 - 16, 4 * 32, 1024 / 128, etc. However, many times I faced ... Read More

The task for today is to join a Microsoft Active Directory domain with our CentOS box. We use the sssd package to accomplish this, first we start with a basic CentOS installation, we go through the initial setup, then the ... Read More

Our goal is to make our website protected, configuring the HTTPS service on it to ensure encrypted traffic between the client and our server. We utilize Let’s Encrypt’s certbot, that will create and automatically renew the publicly signed SSL certificates ... Read More

So what are Virtual Hosts and what are they for? John has a web server, connected to the internet with a single IP address. He has a website, called JohnBlog.com which is pointing to this web server. He ... Read More

Before You Begin Our job is really easy this time as we already have the process of installing Apache, MySQL and PHP on Debian based machines, as it is really similar to the process on RHEL based boxes. For the ... Read More

I’ve recently encountered a situation where a smaller company needed a VPN server, using SSTP, so they tried to set up an SSL certificate for their service to encrypt their client VPN tunnels with. It was a Windows server, and ... Read More

What is PKI and why do we need it? PKI stands for Public Key Infrastructure, that utilizes public and private key asymmetric encryption to create an encrypted channel between two parties through a public medium. Let’s see what we mean ... Read More

Modify the Limits If you get the following error message, saying the max upload filesize in php.ini is too small, you simply need to edit the php.ini file, increasing the required values as seen below. Note that both 1 ... Read More

You might have been wondering: do I really need to type in my long password every time I SSH into a remote server, possibly making a typo and starting the password all over again without seeing any feedback on the ... Read More

Making the PowerShell connection to the remote Exchange Online Office365 servers and connecting to an on premises server that is local to the organization are slightly different. Connect to Office365 Connecting to Office365 consists of three different, separate connections. One ... Read More

To see how to deploy a WordPress site from scratch please check out this previous article where we went through the process step by step. In this article we set up automatic HTTPS, that means all the HTTP requests are ... Read More

In this tutorial we will deploy a WordPress site for http://protectigate.com We assume that a web server is already ready for us. If you don’t have one you can check the installation process for Debian (like Ubuntu) and RHEL (CentOS) ... Read More

Before You Begin A minimal installation of Debian or Ubuntu linux is the starting point, with network connectivity. L.A.M.P is an acronym, stands for the building elements of a fully working website:
- Linux is probably the most stable and ... Read More