Dec 18, 2015

This tutorial will show you how to set up a TLS/SSL certificate from Let’s Encrypt on an Ubuntu 14.04 server running Apache as a web server. We will also cover how to automate the certificate renewal process using a cron job.

How To Secure Apache with Let's Encrypt on Ubuntu 14.04

Dec 10, 2015


This video will help you to bypass iCloud activation on your Apple devices like iPhone, iPAD, iPod touch.




Watch this video as well

iCloud Bypass (Unlock iPhone 4, 4s, 5, 5s, 5c, 6)


This video will help you to bypass iCloud activation on your Apple devices like iPhone, iPAD, iPod touch.

iCloud Bypass (Unlock iPhone 4, 4s, 5, 5s, 5c, 6)

Dec 4, 2015

Go is a modern programming language developed by Google that uses high-level syntax similar to scripting languages. It is popular for many applications and at many companies, and has a robust set of tools and over 90,000 repos. This tutorial will walk you through downloading and installing Go 1.5.1, as well as building a simple Hello World application.

How To Install Go 1.5.1 on Ubuntu 14.04

Dec 3, 2015


Finally wait is over and here we have  brought everyone's favorite latest doulci software available for download. You can download latest doulci software from the link below and follow the bellow instruction to run doulci software and to bypass iCloud activation from iPhone and iPAD.














Download Doulci 2.0 2015

Doulci Software 2.0 Available For Download - Bypass iCloud Activation

Doulci Software 2.0 Available For Download - Bypass iCloud Activation

Nov 25, 2015

This article describes the installation of Oracle Database 12c Release 2 (12.1 64-bit) RAC on Oracle Linux 7.1 64-bit using NFS to provide the shared storage.

Oracle Database 12c Release 1 (12.1.) RAC on Oracle Linux 7 Using NFS

Nov 9, 2015


It has been more than a month since Google started rolling out the Android 6.0 Marshmallow OTA update for the Nexus 5, Nexus 6, Nexus 7, and the Nexus 9. Since it even released the factory images for these devices on the same day, many enthusiasts and advanced users were able to get Android 6.0 up and running on their Nexus device within a few hours.

How to root Nexus 5, Nexus 6, Nexus 7, and Nexus 9 running Android 6.0 Marshmallow

Oct 18, 2015

Image result for Team Foundation Server
You can use a basic installation of TFS to share your code and improve collaboration with customers and team members. If you don’t already have TFS, you can set it up on your own server by following the steps in this topic: Install TFS, Install the build service, and Install Team Explorer. 

Team Foundation Server 2013 (TFS) Step by Step Installation Guide

Oct 15, 2015


This article will guide you through the steps to install and configure DHCP Server in failover environment on Windows Server 2012 R2.

How to Set Up DHCP Failover on Windows Server 2012 R2

Sep 21, 2015


High availability is an important topic nowadays because service outages can be very costly. It's prudent to take measures which will keep your your website or web application running in case of an outage. With the Pacemaker stack, you can configure a high availability cluster.

How To Set Up an Apache Active-Passive Cluster Using Pacemaker on CentOS 7

Sep 16, 2015


Choosing a network adapter depends on the VMware ESXi version number and the guest operating system running on the virtual machine. This guide describes the different network adapter options available for VMware ESXi virtual machines.

Which Network Adapter is Appropriate for Your Virtual Machine

Jun 23, 2015

Firewalld is a complete firewall solution available by default on CentOS 7 servers. In this guide, we will cover how to set up a firewall for your server and show you the basics of managing the firewall with the firewall-cmd administrative tool.

How To Configure FirewallD to Protect Your CentOS 7 Server

Jun 18, 2015

Bacula is an open source network backup solution that allows you create backups and perform data recovery of your computer systems. It is very flexible and robust, which makes it, while slightly cumbersome to configure, suitable for backups in many situations. A backup system is an important component in most server infrastructures, as recovering from data loss is often a critical part of disaster recovery plans.

How To Install Bacula Server on Ubuntu 14.04

A report alleges a significant risk to Samsung phones, but the threat may be overstated. It is just one of many risks Android device users face. Samsung is facing accusations that it has a vulnerability in its Android phones that could be leaving more than 600 million users at risk. Security firm NowSecure first disclosed the vulnerability, known as CVE-2015-2865.

While the vulnerability poses risks, the simple truth is that it is just one of many that could potentially impact Samsung's Android users.

Are 600 Million Samsung Android Phones Really at Risk?

Jun 10, 2015


The LAMP stack of software, consisting of the Linux operating system, Apache web server, MySQL database, and PHP scripting language, is a great foundation for web or application development. When you installed it together, this software stack enables your server to host dynamic websites and web applications.

Set Up Linux, Apache, MySQL, PHP (LAMP) Stack on Debian 8

May 12, 2015



Using VirtualBox, Mac users can install Windows 10 onto their devices, without the need to use Boot Camp or install the pricey but popular, Parallels. Unlike Parallels, VirtualBox allows Windows 
to run inside of the Mac OS X, versus acting like its own separate operating system. Basically, 
VirtualBox runs Windows like an application, and it can be closed and opened just a you would 
iTunes. This makes it very convenient for casual use.

How to run Windows 10 on Mac for free with VirtualBox

One of the first lines of defense in securing your cloud server is a functioning firewall. In the past, this was often done through complicated and arcane utilities.

There is a lot of functionality built into these utilities, iptables being the most popular nowadays, but they require a decent effort on behalf of the user to learn and understand them. Firewall rules are not something you want yourself second-guessing.

To this end, UFW is a considerably easier-to-use alternative.





How To Setup a Firewall with UFW (Uncomplicated Firewall) on an Ubuntu and Debian Server

In recent years, Linux distributions have increasingly transitioned from other init systems to systemd. Thesystemd suite of tools provides a fast and flexible init model for managing an entire machine from boot onwards.

In this guide, we'll give you a quick run through of the most important commands you'll want to know for managing a systemd enabled server. These should work on any server that implements systemd (any OS version at or above Ubuntu 15.04, Debian 8, CentOS 7, Fedora 15). Let's get started.

Linux Systemd Essentials: Working with Services, Units, and the Journal

May 11, 2015


Ace Translator employs the power of Internet machine language translation engines, and enables you to easily translate Web contents, letters, chat, and emails between major International languages. The new version 14 supports 91 languages, and with text-to-speech (TTS) support for 46 languages, which makes it an ideal language learning app as well.

Ace Translator 14.5 with Text-to-Speech Full Version for Windows

May 6, 2015

The malware, which attempts to steal information about Web sites and users, deletes the master boot record—or all user files—to avoid detection, according to a Cisco analysis.

Attackers are adopting increasingly malicious tactics to evade security researchers’ analysis efforts, with a recently-discovered data-stealing program erasing the master boot record of a system’s hard drive if it detects signs of an analysis environment, according to report published by Cisco on May 4.

Rombertik Malware Corrupts Drives to Prevent Code Analysis

May 5, 2015

Google acquired Timeful, a vendor of an iOS-only time-management application.  Will the app soon be available on Android devices? Google revealed that it acquired Timeful, a vendor of an iOS-only time-management application, for an undisclosed sum.

The purchase gives Google access to technology designed to let people organize and schedule daily activities more efficiently. The software's key feature is its ability to intelligently suggest times during the day or week for users to accomplish tasks on their to-do lists based on their habits and other scheduled events on their calendar.

Google Buys iOS Time-Management App Vendor Timeful


Microsoft Research peels back the curtain on its viral hit, How-Old.net, which uses a machine-learning technology called Project Oxford. HoloLens, Microsoft's buzz-worthy augmented-reality technology, wasn't the only thing that resonated with the IT community following last week's Build developer conference.

Microsoft Age-Guessing Site Uses Face-Recognition Tech

May 4, 2015

DriverToolkit scans PC devices and detect the best drivers for your PC with our Superlink Driver-Match Technology. You may specify the driver package to download, or download all recommended driver packages with one-click. When download is finished, just click the ‘Install’ button to start driver installation. 




Driver Toolkit 8.4 Full Version With License Key Download

Apr 6, 2015

The Galaxy S6 (and Galaxy S6 edge) have been receiving ravishing reviews from various publications. The latest Galaxies are easily the best smartphones Samsung has ever manufactured.

Samsung has also been highlighting how good the 16MP f/1.9 rear camera on the Galaxy S6 is. But how exactly does it stack up against the excellent 8MP shooter found on the iPhone 6 and iPhone 6 Plus?

Galaxy S6 camera stacks up against iPhone 6 and iPhone 6 Plus, Here's How?

Apr 4, 2015

Excessive use of anything is termed as addiction and it won’t be wrong to say that children today are addicted to internet. With the availability of smartphones, kids are hooked to the cyber world 24/7.

This has opened unauthorized territories to the young impressionable minds. They are exposed to explicit sexual content, strangers who are ready to pounce on any young ones either for money or for fulfillment of any other pleasure and identity theft.

Do you Know What your Children are Doing on the Internet?

Mar 26, 2015

SQL Plan Management was introduced in Oracle 11g to provide a "conservative plan selection strategy" for the optimizer. The basic concepts have not changed in Oracle 12c, but there have been some changes to the process of evolving SQL plan baselines. As with previous releases, auto-capture of SQL plan baselines is disabled by default, but evolution of existing baselines is now automated. In addition, manual evolution of sql plan baselines has been altered to a task-based approach. This article focuses on the changes in 12c.

Adaptive SQL Plan Management (SPM) in Oracle Database 12c Release 1 (12.1)

Mar 24, 2015

Last week, a blogger reported on a $300 device called the IP Box, which was allowing repair shops and hackers to bypass passcodes and gain access to locked iOS devices. But it turns out that expensive hardware isn’t required; TransLock, a new utility for Mac, can do the same job over USB.

MDSec’s video proved that the IP Box was able to bypass an iOS passcode using brute-force and maintain the data on an iPhone, iPad, or iPod touch even when the device is set to erase itself automatically when an incorrect passcode has been entered ten times.

iPhone’s Passcode Bypassed Using Software-Based Bruteforce Tool

Mar 22, 2015

Google seems to be rolling out a new ‘Smart Lock’ feature for Android devices running Lollipop — On-body detection. This new feature will only lock your device when it is sitting on a table or in your pocket.

The feature will make use of the accelerometer on your Android device to detect any movement. In case it does not detect any movement, it will automatically lock your device. But if you are holding the device in your hand and it is already unlocked, On-body will keep it unlocked.



In case you hand over your device to someone while it is unlocked, On-body will keep it unlocked. The feature cannot determine who is holding the device, it only knows that someone is holding it and thus keeps it unlocked.

Google is rolling out the feature only to selected users for now, but it is likely that a wider rollout will start within the next few weeks. For now, the feature has only shown up on Nexus devices, but it is likely that Google will roll it out to other Android devices running Lollipop as well.


Google adds ‘On-body detection’ Smart Lock mode to Android Lollipop devices

Mar 21, 2015

BlackBerry today announced that it is bringing BBM Protected — its enterprise-grade encrypted messaging service — to BBM for iOS.

The keys to encrypt messages in BBM Protected will be generated on the iPhone device itself. This prevents any “‘man in the middle’ hacker attacks, providing greater security than competing encryption schemes, and earning BBM Protected FIPS 140-2 validation by the U.S. Department of Defense.”


The feature can be easily deployed in enterprises that already use BBM for communication, and does not require any additional setup or OS upgrade on their side.

BBM Protected users can start a chat with other BBM Protected users in their organisation as well as outside of it. In case the recipient (or sender) does not use BBM Protected, the other party in the conversation can still initiate an encrypted and trusted chat environment.

BBM Protected is a paid service, though BlackBerry is offering a free 30-day trial to enterprises. It is also available for Android and BlackBerry OS 10 running devices.

BlackBerry launches encrypted enterprise messaging service BBM Protected for iOS

Mar 20, 2015


Oracle Database 12c Release 1 (12.1) RAC On Windows 2012 Step By Step Installation

Mar 15, 2015

Get the latest WhatsApp for Android
WhatsApp Calling, the new invitation-only feature of WhatsApp that adds free phone call capabilities to the app that was previously only capable of messaging, has officially been launched.

The feature can be accessed by users running WhatsApp version 2.12.10 or  2.11.528 from the Google Play Store, or version 2.11.531 if downloaded directly from the official website of WhatsApp.

How To Activate WhatsApp Calling For Android

Mar 4, 2015

How to bypass iPhone, iPad, iPod with iCloud Bypass DNS Server

Mar 3, 2015

If you have used Windows for a good amount of time, you may have come across boot record errors that prevent your Windows from booting up properly. The reasons for this error could be due to, but not limited to, corrupted or deleted boot files, removing Linux operating system from a dual-boot computer, mistakenly installing the older version of boot record, etc. 

The boot record errors are purely software errors and can be easily corrected using the Windows built-in tools and the installation media.

How to Quickly Fix Boot Record Errors in Windows

Mar 2, 2015

WatchGuard aims to alleviate the performance and security issues presented by the broad adoption of HTTPS with the M500 Unified Threat Management Appliance.

HTTPS has become the standard bearer for Web traffic, thanks to privacy concerns, highly publicized network breaches and increased public demand for heightened Web security.

WatchGuard M500 Appliance Alleviates HTTPS Performance Woes

Project Spartan on Windows 10 PCs represents a break from Internet Explorer's checkered history, claims the company.

After a series of leaks, Microsoft finally took the lid off its next-generation Web browser, dubbed Project Spartan, when it officially unveiled the Windows 10 operating system to the public on Jan. 21 during a press event.

The Web Will 'Just Work' With Windows 10 Browser

Samsung's next-generation Galaxy S6 smartphones, which include giant leaps in style, design, components and features from earlier models, have finally arrived after months of rumors about how Samsung would fight off Apple's latest iPhone 6 devices.

The new Galaxy models, a standard Galaxy S6 and a much flashier and more sculptured Galaxy S6 Edge that features a bright display which wraps around both sides of the handset, were unveiled at Mobile World Congress 2015 in Barcelona, Spain, on March 1 during a special "Samsung Galaxy Unpacked" event a day before MWC opens officially.

Samsung Unveils Pair of All-New Galaxy S6 Smartphone Models

Mar 1, 2015

How to Root Any Samsung Galaxy S4 in One Click

Feb 25, 2015

If you are more tech savvy, you probably know that most of the websites that you visit store pieces of information right in your browser in the form of cookies. Generally speaking, cookies are a small piece of useful data that are used for tracking users’ activity in the website, to store stateful information like login sessions, shopping cart items, etc., and even to record and transmit the users’ browsing activity.

How to Disable Third-Party Cookies in Chrome and Firefox

Feb 20, 2015

A simple chart in Excel can say more than a sheet full of numbers. As you'll see, creating charts is very easy.

How to Create a Chart in Microsoft Excel

Feb 11, 2015

The Red Hat Enterprise Virtualization platform comprises various components which work seamlessly together, enabling the system administrator to install, configure and manage a virtualized environment. After reading this guide, you will be able to set up Red Hat Enterprise Virtualization as represented in the following diagram:

Red Hat Enterprise Virtualization 3.0 Step by Step Guide

Jan 30, 2015


One of the great things about the Hyper-V virtual switch is that it can be used to very effectively isolate your virtual machines from the physical network. This grants them a layer of protection that’s nearly unparalleled. Like any security measure, this can be a double-edged sword. Oftentimes, these isolated guests still need some measure of access to the outside world, or they at least need to have access to a system that can perform such access on their behalf.

How to Install and Configure TCP/IP Routing in a Hyper-V Guest

Jan 13, 2015


Google is not shy when it comes to bringing its apps, those made famous on the Android platform, over to the competition. Today, they do it again with the Chrome Remote Desktop app.

On Monday, Google officially launched the Chrome Remote Desktop app that will, as the name suggests, essentially extends the desktop in a secure fashion over to the iPhone or iPad of your choice. To make the magic happen, a user will have to set up the Chrome Remote Desktop app on their desktop of choice (which is available through the Chrome Web Store as a separate download), and then set up the app on the iOS-based device of their choice as well.

Google’s Chrome Remote Desktop for iOS now available

Jan 12, 2015

We’ve had a long run of articles in this series that mostly looked at general networking technologies. Now we’re going to look at a technology that gets us closer to Hyper-V. Load-balancing algorithms are a feature of the network team, which can be used with any Windows Server installation, but is especially useful for balancing the traffic of several operating systems sharing a single network team.

Hyper-V and Networking Part 8: Load-Balancing Algorithms

So far, this series has spent most of its time focused on the methods that systems use to decide where traffic should go and how it should get there. A logical next step is to discuss how bindings work. What this article will do is bring the concepts of that topic inline with the aims of this series along with an explanation of the machinations of binding.

Hyper-V and Networking – Part 7: Bindings

In many ways, this particular post won’t have a great deal to do with Hyper-V itself. It will earn its place in this series by helping to clear up a common confusion point I see being posted on various Hyper-V help forums. People have problems moving traffic to or from virtual machines, and, unfortunately, spend a lot of time working on the virtual switch and the management operating system.

Hyper-V and Networking – Part 6: Ports, Sockets and Applications

The last couple of posts in this series have dealt with how Ethernet frames and IP packets get to their destination. In this post, we’ll step up a little bit and look at the role DNS plays in getting those packets to the correct IP address. We’ll see how this works in general and the issues specific to a Hyper-V environment.

Hyper-V and Networking – Part 5: DNS

In part 3, I showed you a diagram of a couple of switches that were connected together using a single port. I mentioned then that I would likely use link aggregation to connect those switches in a production environment. Windows Server introduced the ability to team adapters natively starting with the 2012 version. Hyper-V can benefit from this ability.

Hyper-V and Networking – Part 4: Link Aggregation and Teaming

In the previous post, we dug into VLANs, which are a layer 2 concept in the ISO model. In this piece, we’re going to step up into layer 3 and look at IP address and routing and how they work with Hyper-V.

Hyper-V and Networking – Part 3: IP Routing

In the first part of this series, we started with the foundational concepts of networking in the OSI model and took a brief look at where Hyper-V components live in that model. In this part, we’ll build on that knowledge by looking at the operation of VLANs and how they work within the context of a Hyper-V deployment.

Hyper-V and Networking – Part 2: VLANs

After storage, Hyper-V’s next most confusing subject is networking. There are a dizzying array of choices and possibilities. To make matters worse, many administrators don’t actually understand that much about the fundamentals because, up until now, they’ve never really had to.

Hyper-V and Networking – Part 1: Mapping the OSI Model

As an IT Professional, you might find yourself blessed with the unfortunate scenario of working on a Hyper-V server that is not able to authenticate to the domain and the cached domain credentials are no longer working. In addition to this predicament, you learn that there is no documentation for the local administrator password. Either the client who you’re working for doesn’t know the local administrator password or the previous engineer who built the server is no longer working for your company and the standard passwords aren’t working.

How to Reset A Forgotten Hyper-V Admin Password with a Windows CD

Hyper-V

Did your software vendor indicate that you can Virtualize their application, but only if you dedicate one or more CPU cores to it? Not clear on what happens when you assign CPUs to a virtual machine? You are far from alone.

Hyper-V Virtual CPUs Explained

 
TECH SUPPORT © 2012-2017