A repository of information technology questions and answers

Latest posts

SSH configuration and security best practices

Here is a list of processes and configurations that you can use to tighten and enhance SSH security with regard to remote host access

World Backup Day 2014

Until you need them, backups are a boring irritating waste of time. But when you need them, they can be an absolute life saver.

Using the Hyper-V Best Practices Analyzer

The Best Practice Analyzer for Hyper-V has 74 scans to identify which settings are not configured, based on the Microsoft documentation and practices.