Tag: Technical

How to Dual Boot and Virtualize the Same Partition on Your Computer
November 27, 2019

How to Dual Boot and Virtualize the Same Partition on Your Computer

Tobias Geisler Mesevage

You don’t have to pick between dual booting or virtualization. Follow these steps to get the best of both worlds.

Read Now
Is NTFS Journaled?
November 22, 2019

Is NTFS Journaled?

Tobias Geisler Mesevage

The NTFS change journal creates a log of any added, deleted or modified files before any changes are made to the disk

Read Now
A Look at Datto’s Advanced Backup Verification
October 17, 2019

A Look at Datto’s Advanced Backup Verification

Henry Washburn

Regardless of what type of restore you are running, it’s imperative to ensure that it works, no matter what. Some vendors do a checksum check while others do boot-ability checks.

Read Now
What Is a Diskless NAS?
October 15, 2019

What Is a Diskless NAS?

Tobias Geisler Mesevage

NAS systems are hard disk storage devices that connect to your network, allowing for multiple computers to share the same storage space.

Read Now
What Are Standard RAID Configurations
September 03, 2019

What Are Standard RAID Configurations

Tobias Geisler Mesevage

RAID distributes data across different disk drives, preventing data loss by increasing performance and reliability of data storage

Read Now
What Is a DDoS Attack?
August 06, 2019

What Is a DDoS Attack?

George Rouse

A DDoS or distributed denial of service attack is a type of cyberattack in which the attackers use a large number of internet-connected devices to target a server or system. Learn how DDoS attacks are performed.

Read Now
What Is Hyper-V Nested Virtualization?
July 31, 2019

What Is Hyper-V Nested Virtualization?

Tobias Geisler Mesevage

With nested virtualization, you can deploy VMs within VMs, and build labs containing virtualized infrastructures within a single computer.

Read Now
What Is an Intrusion Detection System?
July 25, 2019

What Is an Intrusion Detection System?

Tobias Geisler Mesevage

An intrusion detection system is a vital part of any MSP’s IT security plan. Learn what an intrusion is and how you can ensure it doesn’t happen.

Read Now
What Is a Configuration Vulnerability?
June 20, 2019

What Is a Configuration Vulnerability?

Tobias Geisler Mesevage

Understand what a security configuration vulnerability is and how to avoid vulnerabilities to prevent cyber threats.

Read Now