Categories
- Blog (1)
- Grandstream UCM (1)
- IP Telephony (45)
- KVM (1)
- Linux (54)
- Microsoft (5)
- Mikrotik (14)
- Network (16)
- Paloalto Firewall (1)
- Uncategorized (196)
- Vicidial (4)
- VMware (67)
-
Recent Posts
- How to Retrieve VICIdial Admin Password from MySQL Database
- How to Manage KVM Virtual Machines on Ubuntu Server Using virsh
- Palo Alto UNAT Configuration – Step-by-Step Lab Guide (LAN → DMZ via WAN)
- Point-to-Point Wireless Devices Comparison: Practical Hardware Selection Guide
- Excitel Broadband Router Default Login
Author Archives: Gkhan
Mikrotik hotspot setup
Mikrotik hotspot setup copy and paste line by line /ip address add address=172.16.1.1/24 comment=LAN disabled=no interface=LAN network=172.16.1.0 add address=192.168.137.100/24 comment=WAN disabled=no interface=WAN network=192.168.137.0 ——————————————————————————————— /ip pool add name=hs-pool-1 ranges=172.16.1.10-172.16.1.255 ——————————————————————————————— /ip dns set allow-remote-requests=yes cache-max-ttl=1w cache-size=10000KiB max-udp-packet-size=512 servers=192.168.137.1 ——————————————————————————————— /ip … Continue reading
How to limit upload and download to all users in network using mikrotik RouterOS
How to limit upload and download to all users in network using mikrotik RouterOS There are two ways how to make this: using mangle and queue trees, or, using simple queues. 1. Mark all packets with packet-marks upload/download: (lets constider … Continue reading
VMware ESX Command line
VMware ESX Command line Management This documentation describes the concepts, tasks, and commands that you use to administer your virtual environment through the command line. vSphere provides several command-line interfaces that you can use to automate common tasks that you … Continue reading
Security tools
I am very impressed by the collective smarts of the security community and I highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the … Continue reading
how to know who is accessing your files
how to know who is accessing your files ShareWatch allows you to see who is connected to a computer and what files they are accessing. Have you ever wondered why your hard drive or modem is active, but you aren’t doing anything … Continue reading
Free Personal PC Audit Tool
Free Personal PC Audit Tool The Belarc Advisor builds a detailed profile of your installed software and hardware, network inventory, missing Microsoft hotfixes, anti-virus status, security benchmarks, and displays the results in your Web browser. All of your PC profile … Continue reading
Intel Tools and Utilities
Intel Tools and Utilities +Compatibility Tools Tool Description Internet application Desktop application Intel Product Information Find and compare Intel product specifications. Run n/a Desktop Boards and Processors Intel® Processors and Boards Compatibility Tool Find compatible Intel® Processors and Intel® Desktop … Continue reading
how to edit Alarm in VMware VCenter
how to edit Alarm in VMware VCenter Change Alarm Attributes You can rename alarms and change alarm triggers, reporting, and actions. Required privilege: Alarm.Modify Alarm Procedure 1 Display the object in the inventory on which the alarm is … Continue reading
How to check Cisco Certification
How to check Cisco Certification . The Certification Tracking System is now part of the Cisco network and can be accessed by your Cisco.com login. In order to access the Certification Tracking system you must have a Cisco.com or an … Continue reading
Windows can not access the specified device,path or file. windows 2003
Windows can not access the specified device,path or file. windows 2003 Some time you copied a file on windows 2003 server and want to execute you got an error “Windows cannot access the specified device, path or file. You may not have … Continue reading