How VHDs are created/merged when creating/removing VM checkpoints in Hyper-V
Article illustrates how VHDs are created when VM checkpoints are created and how VHDs are merged when checkpoints are removed.
Article illustrates how VHDs are created when VM checkpoints are created and how VHDs are merged when checkpoints are removed.
Lansweeper reports containing general computer hardware info (CPU, RAM, disks, system model), information about disks, memory, monitors.
Lansweeper report with printer name, IP and MAC addresses, manufacturer and model.
Internet-facing RDP server has a number of failed logon attempts in its event log. If it is not possible to restrict access to this server from the outside world, we can at least block access to it from the IP addresses from which failed logon attempts have already been made.
Creating a function that converts a string with an IPv4 address to its integer representation. For example, the function converts value "192.168.10.2" of type String to 1100 0000 1010 1000 0000 1010 0000 0010 of type Int32. After the conversion is done, various operations can be done with the address, for example, we can check whether the IP address belongs to the specified network.
Script that reads a picture from a file on a disk, scales it to fit the page printable area and sends it to a printer.
Get info about failed logon attempts from events 4624 and 4625 and lay it out into a table.