Category Archives: Network Security
Myths Related To Endpoint Security Solutions
The technology’s sorry state related to the security is something repeatedly witnessed and commonly accepted. As the virtual machines have become a furniture-like part of both small and large businesses, safeguarding the data with these machines has start turning out to be a growing concern for most of the business owners. There are certain factors […]
How to configure FC Card (Host Bus Adapter (HBA)) in Server 2008 & 12 (Hyper V)
Software Requirement : – Server 2008 with Administrator Privilege, FC Card Drivers Hardware Requirement : – FC Card, FC Cable & SFP Module Process:- 1. Turn off your server and open the Cabinet Install the FC card in your server PCI Express Card Slot. 2. Connect your Storage cables to your FC Card with Help […]
Installation and Configuration of SNMP on CentOS
This guide describe how to install and do a basic configuration of SNMP on a CentOS. Probably it will work on many other *nix systems. 1. Installation Run command yum install net-snmp-utils [root@dull etc]# yum install net-snmp-utils Loading “fastestmirror” plugin Loading “dellsysidplugin” plugin … … Dependencies Resolved ============================================================================= Package Arch Version Repository Size ============================================================================= Installing: […]
what is the Necessity of Minosha Cloud DR solution?
As we aware that in current competitive world down time to any crucial infra in an organization leads to the loss of large revenue. For overcoming this time loss as well as revenue loss Disaster recovery is the best way to make your server’s and related application’s to be highly available all over the globe […]
How RPASS Backup Works?
RPASS takes an initial full backup image which includes user data and all configuration data. The image is stored locally on an Appliance. After the initial backup, incremental snapshots are taken; all data is securely replicated to cloud storage. Backup images can be: • Restored to original, replacement or temporary hardware • Instantly mounted […]