How to Jailbreak iOS8.0-8.1.2
Jailbreak tutorial for iOS8.0-8.1.2Support device: iPhone 4s- 6Plus; iPad/iPad Air/2; iPad mini/mini2/mini3; iPod touch 5Download Jailbreak tool from here Confirm your iOS device version is...
View ArticleWindows Server 2012 Unattended Installation
One of the common tasks that you may do on a regular basis is installing Windows Server 2012 and you want to automate it as much as possible. Using similar tools to those used with Windows Server 2008...
View ArticleHow to Get Started Creating Oracle Solaris Kernel Zones in Oracle Solaris 11
Oracle Solaris 11 is a complete, integrated, and open platform engineered for large-scale enterprise environments. Its built-in Oracle Solaris Native Zones technology provides application...
View ArticleHow to Install and Configure a Two-Node Cluster for Oracle Solaris Cluster...
This article is intended to help a new or experienced Oracle Solaris user to quickly and easily install and configure Oracle Solaris Cluster software for two nodes, including the creation of Single...
View ArticleHow to Configure a Failover Oracle Solaris Kernel Zone
This article is intended to help a new or experienced Oracle Solaris administrator to quickly and easily configure an Oracle Solaris Kernel Zone in failover mode using the Oracle Solaris Cluster HA for...
View ArticleHow To Create a Calibre Ebook Server on Ubuntu 14.04
Calibre is a free and open source ebook manager.Although Calibre is probably better known for its desktop client, it can also act as a powerful server, allowing you to access your ebooks from anywhere...
View ArticleHow To Install SchoolTool Student Information System on Ubuntu 14.04
SchoolTool is an open-source student management system alternative to Blackboard or Pearson’s PowerSchool. It can be used to manage any of the following records a school might keep:Achievement and goal...
View ArticleHyper-V Virtual CPUs Explained
Did your software vendor indicate that you can Virtualize their application, but only if you dedicate one or more CPU cores to it? Not clear on what happens when you assign CPUs to a virtual machine?...
View ArticleHow to Reset A Forgotten Hyper-V Admin Password with a Windows CD
As an IT Professional, you might find yourself blessed with the unfortunate scenario of working on a Hyper-V server that is not able to authenticate to the domain and the cached domain credentials are...
View ArticleHyper-V and Networking – Part 1: Mapping the OSI Model
After storage, Hyper-V’s next most confusing subject is networking. There are a dizzying array of choices and possibilities. To make matters worse, many administrators don’t actually understand that...
View ArticleHyper-V and Networking – Part 2: VLANs
In the first part of this series, we started with the foundational concepts of networking in the OSI model and took a brief look at where Hyper-V components live in that model. In this part, we’ll...
View ArticleHyper-V and Networking – Part 3: IP Routing
In the previous post, we dug into VLANs, which are a layer 2 concept in the ISO model. In this piece, we’re going to step up into layer 3 and look at IP address and routing and how they work with...
View ArticleHyper-V and Networking – Part 4: Link Aggregation and Teaming
In part 3, I showed you a diagram of a couple of switches that were connected together using a single port. I mentioned then that I would likely use link aggregation to connect those switches in a...
View ArticleHyper-V and Networking – Part 5: DNS
The last couple of posts in this series have dealt with how Ethernet frames and IP packets get to their destination. In this post, we’ll step up a little bit and look at the role DNS plays in getting...
View ArticleHyper-V and Networking – Part 6: Ports, Sockets and Applications
In many ways, this particular post won’t have a great deal to do with Hyper-V itself. It will earn its place in this series by helping to clear up a common confusion point I see being posted on various...
View ArticleHyper-V and Networking – Part 7: Bindings
So far, this series has spent most of its time focused on the methods that systems use to decide where traffic should go and how it should get there. A logical next step is to discuss how bindings...
View ArticleHyper-V and Networking Part 8: Load-Balancing Algorithms
We’ve had a long run of articles in this series that mostly looked at general networking technologies. Now we’re going to look at a technology that gets us closer to Hyper-V. Load-balancing algorithms...
View ArticleGoogle’s Chrome Remote Desktop for iOS now available
Google is not shy when it comes to bringing its apps, those made famous on the Android platform, over to the competition. Today, they do it again with the Chrome Remote Desktop app.On Monday, Google...
View ArticleHow to Install and Configure TCP/IP Routing in a Hyper-V Guest
One of the great things about the Hyper-V virtual switch is that it can be used to very effectively isolate your virtual machines from the physical network. This grants them a layer of protection...
View ArticleRed Hat Enterprise Virtualization 3.0 Step by Step Guide
The Red Hat Enterprise Virtualization platform comprises various components which work seamlessly together, enabling the system administrator to install, configure and manage a virtualized environment....
View Article