For both Per Device and Per User CALs issuance to work, the RD Session Host and RD Licensing server in any one of the following three configurations: Both in the same workgroup Both in the sam...
You will require KMS server if remote servers don’t have access to internet for activation Change server activation key to GVLK from MS Link then run slmgr.vbs /ipk XXXXX-XXXXX-XXXXX-XXXXX...
RAID0 RAID 0 is based on data striping RAID1 RAID 1 uses the concept of data mirroring RAID 4 RAID 4 stripes the data across multiple disks just like RAID 0. In addition to that, i...
Layer Name Function Protocols Layer 7 Application To allow access to network resources. SMTP, HTTP, FTP, POP3, SNMP ...
How does Kerberos authentication work? To help understand how Kerberos authentication works, we’ll break it down into its core components. Here are the main components involved in a typical Kerber...
AWS Lamba is a public service which runs within a region. Therefore it can not connect to resources hosted within VPC. In some cases you will need to connect your function to VPC ...
What is Lambda ? AWS Lambda is an event-driven, serverless computing platform. It simply let’s you run your code without deploying resources and apps. How does Lambda work ? Step 1 : Upload AWS ...
What is S3 Access Policy ? Amazon s3 access policy describes who has access to what and what level of permissions. Access policy attached to S3 resource (buckets and objects) which is called ...
Follow these instructions to to enable advanced boot option on Windows VM ruinning on VMWare Get into recovery mode via Automatic repair ( mount installation iso and launch repair ) ...
When creating a new file or directory linux applies default set of permissions. umask commands lets you change default permissions Who does it apply to ? Owner, Group and Others just like permissi...
A new version of content is available.