breaking news

Microsoft

How to add check boxes to Word Documents
0

How to add check boxes to Word Documents

November 30th, 2016 | by Shree H. Niraula
When you are creating surveys or forms, with Microsoft Word, it is usually a good idea to add check boxes to make the options easy to read and answer. There are two main methods which you can use. The first method is ideal for...
How to Create Fillable Forms with Microsoft Word
0

How to Create Fillable Forms with Microsoft Word

November 30th, 2016 | by Shree H. Niraula
How to Create Fillable Forms with Microsoft Word Creating forms with Microsoft Word is easy, but the challenge comes in when you decide to create fillable forms with options that you can send to people and have them fill out...
How to verify your Twitter account
0

How to verify your Twitter account

November 25th, 2016 | by Shree H. Niraula
How do I get my Twitter account verified? 1) First you’ll have to personally determine whether your account is “of public interest.”  This may take some soul searching and uncovering of some hard truths, but if you’re...
what is memory overhead
0

what is memory overhead

November 23rd, 2016 | by Shree H. Niraula
Understanding Memory Overhead Virtualization of memory resources has some associated overhead. ESXi virtual machines can incur two kinds of memory overhead. 1. The additional time to access memory within a virtual machine. 2....
sx Object Storage installation and configuration
0

sx Object Storage installation and configuration

June 1st, 2016 | by Shree H. Niraula
INTRODUCTION Skylable SX , a complete private cloud framework. With Skylable SX you can create flexible, reliable and secure storage solutions, which can be accessed from all popular platforms.   IN S TA L L AT I O N...
McAfee Virus Scan  Enterprise for Linux
0

McAfee Virus Scan Enterprise for Linux

May 31st, 2016 | by Shree H. Niraula
Even with all the protections afforded by the network, including firewalls, edge routers, and other protective devices, it is still important that malware protection be implemented at the host level.  Virus scanning software can...
Windows 7: SFC /SCANNOW Command – System File Checker
0

Windows 7: SFC /SCANNOW Command – System File Checker

May 30th, 2016 | by Shree H. Niraula
Windows 7: SFC /SCANNOW Command – System File Checker Information The sfc /scannow command (System File Checker) scans the integrity of all protected Windows 7 system files and replaces incorrect corrupted,...
McAfee SIEM CLI Refrence
0

McAfee SIEM CLI Refrence

May 24th, 2016 | by Shree H. Niraula
 McAfee Enterprise Security Manager: Security information and event management (SIEM) solution brings event, threat, and risk data together to provide strong security intelligence, rapid incident response, seamless log...
How to Install Nagios 4.1on CentOS / RedHat
0

How to Install Nagios 4.1on CentOS / RedHat

April 12th, 2016 | by Shree H. Niraula
  How to Install Nagios 4.1 (Monitoring Server) on CentOS / RedHat Nagios is the most popular, open source, powerful monitoring system. It enables organizations to identify and resolve IT infrastructure problems before...
How to Install VNC Server on Linux
0

How to Install VNC Server on Linux

April 5th, 2016 | by Shree H. Niraula
#To run the VNC Server on CentOS, we have to install these required packages: sudo yum groupinstall Desktop sudo yum install tigervnc-server #To start VNC Server on boot sudo chkconfig vncserver on #To setup users’ VNC...