Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
update powershell in Windows Upgrade PowerShell Core Windows or Mac and Linux System Windows
create a two-way Active Directory Trust How to create a two-way Active Directory Trust Windows Server
create a new Azure SQL Database How to create a new Azure SQL Database [PaaS] AWS/Azure/OpenShift
Azure backup for MSSQL Restore MSSQL Server on Azure VMs using Azure Backup Network | Monitoring
How to Fix MS SQL Error 832 MSSQL Server Error 833: Synthesis of Real-World Case Studies Oracle/MSSQL/MySQL

How to perform Password Change with OWA

Posted on 14/04/201626/10/2023 Christian By Christian No Comments on How to perform Password Change with OWA
How to perform Password Change with OWA

Experience the convenience of secure Password Change with OWA. In Exchange 2013, activating this default feature lets users modify their AD password right within Outlook Web Access, much like initiating a domain password change from their personal computer. Please see Outlook Web Access: Password Change, Outlook Web Access: Password Change, How to block the Change…

Read More “How to perform Password Change with OWA” »

Network | Monitoring

Command Prompt in Windows: Creating Volumes Guide

Posted on 11/04/201617/08/2023 Christian By Christian No Comments on Command Prompt in Windows: Creating Volumes Guide
Command Prompt in Windows: Creating Volumes Guide

Efficient disk management involves mastering the art of using the Command Prompt in Windows. The Command Prompt empowers users with tools, enabling the seamless creation of volumes—an essential disk administration aspect. This guide explores harnessing Command Prompt’s prowess for precise and easy volume crafting. Whether you’re an experienced tech enthusiast or a digital landscape novice,…

Read More “Command Prompt in Windows: Creating Volumes Guide” »

Windows

Classes of IP Address: Understanding IP Address Classification

Posted on 11/04/201617/08/2023 Christian By Christian No Comments on Classes of IP Address: Understanding IP Address Classification
Classes of IP Address: Understanding IP Address Classification

In the realm of networking, understanding the classes of IP Address is fundamental. The classes of IP Address actively define device assignment and grouping within a network. By exploring the intricacies of classes of IP Address, we uncover the structure and hierarchy supporting Internet communication. Let’s explore the significance and distinctions of classes of IP…

Read More “Classes of IP Address: Understanding IP Address Classification” »

Network | Monitoring

How to install and configure Rancid

Posted on 11/04/201608/11/2024 Christian By Christian No Comments on How to install and configure Rancid
How to install and configure Rancid

In this article, we shall discuss how to install and configure Rancid. When you embark on the journey to Install and Configure Rancid, you’re stepping into a realm where RANCID takes on the vital role of monitoring a router’s. Or more generally, a device configuration. However, this encompasses software and hardware aspects such as cards,…

Read More “How to install and configure Rancid” »

Linux

Fix Outlook Not Responding and Outlook Crashing or freezing

Posted on 11/04/201624/10/2024 Dickson Victor By Dickson Victor No Comments on Fix Outlook Not Responding and Outlook Crashing or freezing
Fix Outlook Not Responding and Outlook Crashing or freezing

With this post, I am going to enlighten you about some common causes and how to Fix Outlook Not Responding and Outlook Crashing or freezing. Microsoft Outlook is Microsoft’s desktop email client app for desktop computers. It is the most ‘in-use’ email client incorporates. Please see How to Fix Microsoft Edge Not Responding, How to…

Read More “Fix Outlook Not Responding and Outlook Crashing or freezing” »

Network | Monitoring

Cluster creation in Proxmox VE

Posted on 11/04/201620/03/2023 Christian By Christian No Comments on Cluster creation in Proxmox VE
Cluster creation in Proxmox VE

The Proxmox VE cluster manager pvecm is a tool to create a group of physical servers. Such a group is called a cluster. We use the Corosync Cluster Engine for reliable group communication, and such clusters can consist of up to 32 physical nodes (probably more, dependent on network latency). Kindly refer to this related guide on how to extend Proxmox Local Container Storage….

Read More “Cluster creation in Proxmox VE” »

Virtualization

Administer LXC Containers: Easy Guide

Posted on 11/04/201617/08/2023 Christian By Christian No Comments on Administer LXC Containers: Easy Guide
Administer LXC Containers: Easy Guide

Learn how to effectively administer LXC Containers, a powerful OS-level virtualization technology. Moreover, Create and manage isolated Linux environments with ease, utilizing Linux’s cgroups functionality for optimal resource allocation. Explore the versatile potential of LXC today! Start containerHowever, There are two possibilities to start a container: either on the GUI or on the command line1)Start…

Read More “Administer LXC Containers: Easy Guide” »

Virtualization

How to Block Change Password for Specific Exchange Users

Posted on 11/04/201626/10/2023 Christian By Christian No Comments on How to Block Change Password for Specific Exchange Users
How to Block Change Password for Specific Exchange Users

in this article, we shall discuss how to Block Change Password for Specific Exchange Users. The above feature is handy and probably used as a security policy in certain companies to prevent AD password resets over the Internet (although SSL certificates encrypt all communication. You might have a case in which you want to block…

Read More “How to Block Change Password for Specific Exchange Users” »

Network | Monitoring

How to block the Change Password Feature for All Users via the Exchange Administrative Center

Posted on 11/04/201606/04/2023 Christian By Christian No Comments on How to block the Change Password Feature for All Users via the Exchange Administrative Center
How to block the Change Password Feature for All Users via the Exchange Administrative Center

Now, imagine you don’t want to give this feature to your end-users, or maybe not to all of them. In this case, you have to modify certain settings on the Exchange server side. To do this, you will have to log on to your company’s Exchange Administrative Center with an Exchange Admin account. Using this…

Read More “How to block the Change Password Feature for All Users via the Exchange Administrative Center” »

Network | Monitoring

How to change your password in Outlook Web Access

Posted on 11/04/201626/10/2023 Christian By Christian No Comments on How to change your password in Outlook Web Access
How to change your password in Outlook Web Access

in this article, we shall discuss how to change your password in Outlook Web Access. In Outlook Web Access, the process of changing your password is seamless and user-friendly. This functionality has been a part of Exchange OWA since version 5.5 and continues to be available even in Exchange 2013, where it’s automatically enabled. This…

Read More “How to change your password in Outlook Web Access” »

Network | Monitoring

Failed Edge Transport: Easy Guide For Removal

Posted on 11/04/201617/08/2023 Christian By Christian No Comments on Failed Edge Transport: Easy Guide For Removal
Failed Edge Transport: Easy Guide For Removal

In the realm of email operations, Failed Edge Transport servers handle vital inbound and outbound Internet mail flow. They serve as relays and smart hosts, bolstering your Exchange setup. Operating as guardians, agents on these servers offer extra shielding against spam and enforce mail flow rules (transport rules) for precise control. Open Command prompt with…

Read More “Failed Edge Transport: Easy Guide For Removal” »

Network | Monitoring

Map a Network Drive: How to mount a Network Drive

Posted on 11/04/201614/10/2024 Christian By Christian No Comments on Map a Network Drive: How to mount a Network Drive
Map a Network Drive: How to mount a Network Drive

In this article, we shall discuss hw to “Map a Network Drive: How to mount a Network Drive”. A mapped drive serves as a shortcut to a distinct drive on another device, granting access to shared resources within a local network. Here are the steps required in creating a network drive via Group policy (GPO)….

Read More “Map a Network Drive: How to mount a Network Drive” »

Windows

How to add or remove email addresses from a mailbox

Posted on 11/04/201617/08/2023 Christian By Christian No Comments on How to add or remove email addresses from a mailbox
How to add or remove email addresses from a mailbox

Easily enhance your mailbox by setting up proxy addresses to add or remove email addresses as needed. Streamline your communication. A proxy address lets a user receive an email sent to a different email address. Email messages sent to the user’s proxy address reach their primary email, SMTP, or default reply address. You can use…

Read More “How to add or remove email addresses from a mailbox” »

Network | Monitoring

Posts pagination

Previous 1 … 162 163 164 165 Next

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Trellix MVISOSN
    How to install Trellix MVISON Endpoint Security | Vulnerability Scans and Assessment
  • Banner
    How to enable or disable Firefox Network Captive Portal Service Network | Monitoring
  • Perform slfservice rBitLocker recovery
    Resolve Invalid Key ID when requesting BitLocker Recovery Key Windows
  • Screenshot 2020 05 14 at 18.00.59
    Linux Error 13: Permission denied, are you root Linux
  • Local System Account
    How to Run a Program in Windows as the Local System Account Windows
  • Retieve BitLocker Recovery Keys from microsoft sql
    Get MBAM BitLocker Recovery Keys from Microsoft SQL Server Windows
  • banner
    Prevent Microsoft Edge from sending your Search data to Microsoft Windows
  • oracle virtualbox
    Fix VirtualBox Virtual Machine Encountered a Non-Fatal problem Virtualization

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,839 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive