Terminal Server has exceeded max number of connections

When a user establishes a Remote Desktop connection to the server this connection will remain active until the user selects “Log Off” from the Start Menu. As such, if a user simply closes the remote desktop window when they’re finished with the server, that username will remain logged on. The software running […]

kb-terminal-max-connections - Copy (2)

Printscreen-2015-12-07A-Attix5_Winbox

Realtime mikrotik Traffic Monitor By IP

Requirements: Download last version of Attix5 Traffic Monitor Service(server) Download last version of Attix5 Traffic Monitor Viewer Mikrotik configuration: Create a group names sniffer with ‘SSH,read’ policy          Command:          /user                                   […]


Access Lists

Access control lists (ACLs) provide a means to filter packets by allowing a user to permit or deny IP packets from crossing specified interfaces. Just imagine you come to a fair and see the guardian checking tickets. He only allows people with suitable tickets to enter. Access lists filter network […]

Standard_ACL_Example1

How to edit access list lines ?

Most CCNA books say modifying existing ACL or inserting lines into existing ACL can’t be done….well that shows you shouldn’t believe everything you read If the IOS image running on the router supports ACL line number, then following is the procedure you can follow. First do a show access-list at the exec […]


NAT Overload (PAT)

If you have few global IP address and hundreds of inside local address to translate. In such situation you need to use NAT Overload, also known as PAT. In this example our internal network is using 192.168.0.0 network and we are using only one global IP address 200.2.2.1 configure Router […]

2n

Configuring MS SQL Server for Remote Access

Open cliconfg from a RUN prompt and make sure TCP/IP is an enabled protocol.For SQL 2005/2008/2008 R2: Check the Services tool, Start > Administrative Tools > Services, to see that the service named SQL Server (MSSQLSERVER) is started.For MS SQL 2012: Use the Windows key or hover over the left […]

sql

Untitled

Unable to setup Default Printer, error message: 0X00000709

    a) Click on Start. b) Type regedit in the start search and click Enter. c) Move to the location mentioned below. HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows d) In the right column, you will find key Device, change the value to your Printer name. e) It is of the format for example: […]


Penetration Test (pentest)

  A penetration test, or sometimes pentest, is a software attack on a computer system that looks for security weaknesses, potentially gaining access to the computer’s features and data The process typically identifies the target systems and a particular goal—then reviews available information and undertakes various means to attain the […]

1ac95bf

gns3

GNS3

The software that empowers network professionals. Whether you are studying for your first networking exam or building out a state-wide telecommunications network, GNS3 offers an easy way to design and build networks of any size… without the need for hardware. Plus,  growing community of over 2 million network pros who […]