Monthly Archive: January 2019

Veeam Availability Suite Update 4 1

Veeam Backup & Replication 9.5 Update 4

Veeam Backup & Replication 9.5 Update 4, part of Veeam Availability Suite, delivers Availability for ALL your virtual, physical and cloud-based workloads. Through a single management console, you can manage fast, flexible and reliable backup, recovery and replication of all your applications and data to eliminate legacy backup solutions forever. The following is a list of the major new features and functionalities added in Update 4.

Veeam Availability Suite Update 4 0

Veeam ONE 9.5 Update 4

Veeam has released update for Veeam ONE 9.5. The new update came with new features and improvements. Veeam ONE 9.5 update 4 is available for download from January 22, 2019 on Veeam website.

win retired 2

Say Goodbye to Windows 7 and Windows Server 2008 (R2)

Windows 2008 was born on February 2018 and Microsoft released Windows 2008 R2 on October 2009. I think, Windows 2008 R2 was one of most popular Windows servers in history.

Now, Windows 7, Windows 2008 and Windows 2008 R2 are old men. We have to say goodbye to these guys in this year and next year.

Virtual Desktop Infrastructure 4

Recommended Settings on Windows 10 for VDI

Windows is still most popular operating system for clients in over the world. Windows is installed on more than 80% of all desktop and laptops. So our users are addicted to Windows. I have real experience about our customers with other operating systems. Actually, most people is born in a home with Windows desktops or Windows laptops. They have grown up with Microsoft Outlook and other Windows application, so they can’t work with other operating systems.

PowerShell 3

NTP Configuration in iLO: Best and Fast Solution by PowerShell

In order to keep synchronize iLO time with NTP server or time server, you have to enable NTP configuration and add proper NTP server address. Configuring NTP on more than one server is a difficult task for any administrator, because you have to do it via iLO command line or web based GUI manually. At this post I want to share an example for NTP configuration as a PowerShell script.

Linux Distribution 1

How to Secure SSH Connection on Linux

Why We Should Mitigate SSH Based Attack SSH (Secure Shell) is a most popular remote protocol. SSH allows remote login and execute commands. That providing secure way to login and run commands on remote systems in unsecured networks. Telnet replace with SSH cause of offering more security. But SSH has some weaknesses, in order to reducing SSH based attack, those weaknesses can be mitigated. There is some hardening tips, the tips turn your SSH server into a rock solid communication daemon. Best SSH Hardening Tips In the next minutes, we’ll review 15 solutions from best SSH hardening tips. Each hardening tip will a shield against SSH based attacks. Most of the tips are SSH configurations, some of those tips are different on Linux distributions, so please check the configurations on your distribution documents as well. Also Windows 10 and Windows 2019 have OpenSSH server by adding Win32-OpenSSH to Windows, so read Microsoft documents as well. You must restart SSH server daemon after applying configurations. 1. Custom SSH Port SSH server listening on port 22 by default, so attackers trying to attack your server on port 22. Changing SSH port to another port is a solution to reduce attacks. In order to change...