How to Configure Exchange Server Journaling Rules Using PowerShell
In this article we are going to discuss a long standing Exchange Server feature, journaling, and how it can be managed through PowerShell.Although it is possible to perform basic Exchange Server...
View ArticleHow to Restore Mailbox Database in Exchange 2016
There are different ways to recover mailbox database. You can recover the volume where databases are stored or you can recover single database instead of recovering all available database. Similarly,...
View ArticleHow to Deploy Application with EMCO Remote Installer
EMCO Remote Installer is an easy-to-use application deployment tool for small- and mid-sized organizations that you can also use to inventory the applications in your network.Contents:IntroUser...
View ArticleHow to Use Remote Desktop Manager Enterprise 10
Remote Desktop Manager 10 is one of the most feature-rich and the most powerful remote management tools I know. Aside from helping you organize your Remote Desktop connections, it supports a plethora...
View ArticleHow to Monitor and Minimize Your Cellular Data Usage on iPhone
Unlimited cellular data is tough to avail. Keep an eye on how much data you’re using to avoid paying overage fees or having your data speed throttled down to a trickle for the rest of your billing...
View ArticleHow to Customize and Install Office 2016
Before deploying Office 2016 to client systems, most organizations will want to customize their installation to align with their unique business needs and use cases. In this article, I’ll cover how to...
View ArticleHow to Configure Site to Site IPSec VPN Tunnel in Cisco IOS Router
IPSec VPN is a security feature that allow you to create secure communication link (also called VPN Tunnel) between two different networks located at different sites. Cisco IOS routers can be used to...
View ArticleHow to Stop Windows 10 Asking Password When Resuming From Sleep
In this Windows 10 guide, we'll walk you through the steps to stop your computer from asking you to enter a password after resuming from sleep using the Settings app, Group Policy Editor, and Command...
View ArticleHow to Install Oracle Enterprise Manager Cloud Control 13c Release 2...
The purpose of this article is to perform installation of Oracle Enterprise Manager Cloud Control 13c Release 2 (13.2.0.0) on Oracle Linux 6 and 7. (x86_64).Contents:SoftwareOS InstallationDatabase...
View ArticleHow to Connect Oracle Enterprise Manager 13cR2 with the Oracle Database...
In Oracle Enterprise Manager 13cR1, it was the first time when the Oracle Database Backup Service was integrated . In Release 2 the configuration menu was extended, a storage container can be defined...
View ArticleData Guard “CORRUPTION DETECTED: in redo blocks starting at block” issues...
One of my customers Cloud hosted environments (IaaS) has an Oracle 11.2.0.4 Data Guard (physical standby) setup on Windows. Recently, the standby database started logging the following errors in it’s...
View ArticleHow to Upgrade Oracle Enterprise Manager Cloud Control 13c Release 1 (13cR1)...
This article will show you a simple upgrade of Enterprise Manager Cloud Control 13c Release 1 (13cR1) to 13c Release 2 (13cR2). Each upgrade potentially requires additional steps, so this article is...
View ArticleHow to Apply Patch 23094292: WLS Patch Set Update 12.1.3.0.160719 -...
The purpose of this article is to apply Weblogic patch set update in an Enterprise Manager 13cR2 environment running on a Oracle Linux server. Our latest enterprise manager 13cR2 installation showed me...
View ArticleHow to Configure IPSec VPN With Dynamic IP in Cisco IOS Router
Cisco IOS routers can be used to setup IPSec VPN tunnel between two sites. In this article, I will show you the steps to Configure IPSec VPN With Dynamic IP in Cisco IOS Router. This VPN configuration...
View ArticleCreate a Composite PowerShell DSC Resource
The composite resource allows you to create a single PowerShell DSC configuration with references to several "non-composite" resources and share it across multiple machines.Desired State Configuration...
View ArticleHow to Encrypt RMAN Backups for the Oracle Cloud with a Keystore
The Oracle RMAN backup encryption is necessary if you want to backup your database into the Oracle cloud. In Oracle 12c, you have three methods available to encrypt an Oracle RMAN backup:with a...
View ArticleHow to Configure Dynamic "Remote Access" VPN in Juniper SRX
Dynamic VPN or Remote Access VPN is a feature available in branch series SRX. By default, branch series SRX gateways come pre-installed with two dynamic VPN licenses. So by default, only two remote...
View ArticleHow to Update Multiple SQL Server Systems at Once with PowerShell Script
In this article, I'll show you the steps to create a script in PowerShell that will allow you to update multiple SQL servers at once with a single command.Patches (service packs and cumulative updates)...
View ArticleHow to Uninstall Tamper-Protected Sophos Antivirus with PowerShell
The Sophos Antivirus Endpoint tamper protection feature prevents even administrators from uninstalling the product. In this article, I will show you how to uninstall Sophos Antivirus with...
View ArticleImprovements in Active Directory Federation Services Windows Server 2016
Active Directory Federation Services (AD FS) is an ID technology, and as identity is now such a crucial piece of the security puzzle in this cloudy world, AD FS has numerous improvements to offer in...
View Article