Author Archives - SXI ADMIN

How to Upgrade Windows Server 2019/2016 Evaluation to Full Version?

If you have installed Windows Server 2019 / Windows Server 2016 StandardEvaluation or DatacenterEvaluation edition to try the new features of the Microsoft server platform (you can download Windows Server 2019 Free Trial or Windows Server 2016 Evaluation here after registering), you have 180 days to test it. During this period, all features of Windows Server 2019/2016 are available to you….

Ethereum Classic Latest Updates

Ethereum Classic has come out with several exciting updates this April. In a recent Medium blog post, it announced a successful update of its TestNets. It also declared its readiness for MainNet. Testnet now ready for MainNet Ethereum Classic (ETC) announced that it had successfully concluded updating the testnet and was on schedule for the…

Remote Desktop Manager 2020 Full key

Microsoft Remote Desktop VNC LogMeIn Team Viewer FTP SSH Telnet Dameware X Window VMware Virtual PC PC Anywhere Hyper-V Citrix Radmin Microsoft Remote Assistance Oracle Virtual Box Terminal Download Remote Desktop Manager Download Full Name Email Serial AppNee Freeware Group. [email protected] 31J86B851WNW9OXFIN8K52G45 41NRGEY8NS3UHKI5XFOF1M0Q7 11D5RTK07R3YMJ74XXAQWYOX9 21GK964KFEWOJOLWRIVECVUW8 019D1W9W71QILSPOLM3DO6Q39  Add to file hosts On  C:\Windows\System32\drivers\etc 127.0.0.1 crm.devolutions.net

8 Ways to Get AWS Credits

AWS credits are a way to save on your Amazon Web Services (AWS) bill. Credits are applied to AWS cloud bills to help cover costs that are associated with eligible services, and are applied until they are exhausted or they expire. Essentially, credits are a coupon-code like mechanism used by Amazon on your bill. If…

Download Windows Templates for Virtualizor KVM

Download any of client OS template to the location in Node ( /var/virtualizor/Xen or KVM according to the virtualization). http://mirror.softaculous.com/virtualizor/templates/windows-2003-x86.img.gz http://mirror.softaculous.com/virtualizor/templates/windows_2003R264.img.gz http://mirror.softaculous.com/virtualizor/templates/windows-2008r2.img.gz http://mirror.softaculous.com/virtualizor/templates/windows-2012server.img.gz http://mirror.softaculous.com/virtualizor/templates/windows-2003-x86.img.gz http://mirror.softaculous.com/virtualizor/templates/windows_2003R264.img.gz http://mirror.softaculous.com/virtualizor/templates/windows-2008r2.img.gz http://mirror.softaculous.com/virtualizor/templates/windows-2012server.img.gz http://mirror.softaculous.com/virtualizor/templates/windows-2012r2.img.gz http://mirror.softaculous.com/virtualizor/templates/windows-2016.img.gz For example: cd /var/virtualizor/kvm wget http://mirror.softaculous.com/virtualizor/templates/windows-2016.img.gz   Then to extract template run : gunzip TEMPLATE_NAME For example: gunzip windows-2016.img.gz   Then add the template using below…

How to Install RabbitMQ on CentOS 7

RabbitMQ is a widely used open-source message broker written in the Erlang programming language. As a message-oriented middleware, RabbitMQ can be used to implement the Advanced Message Queuing Protocol (AMQP) on all modern operating systems. This article explains how to install RabbitMQ on a Vultr CentOS 7 server instance. Prerequisites Before getting started, you need…

OffChain Storage in Hyperledger Fabric

In this article, I’ll try to explain the significance of OffChain Storage in Hyperledger Fabric and also the offchaindata application that I have built to demonstrate the offchain storage implementation using the Go Programming language for Hyperledger Fabric. OnChain and OffChain Transaction The transaction flow in any blockchain platform is performed in two different layers. The transactions committed to…

What is Network Penetration Testing

This tutorial briefly explains what is network penetration testing, lists some of the main tools used to carry out pen tests and gives some practical examples in real scenarios. What is Network Penetration Testing? Outdated code, the addition of features, wrong configurations, or the development of innovative offensive methods may result in  “weaknesses” exploitable by…