Configure System Restore
Most Relevant Content
Create System Restore Point in Windows OS
System Restore utility in windows operating system helps a windows user to take one or more snapshots of his/her windows system when windows operating system is working well. If any system crash occurs in future due to virus attack or critical system update or any unwanted program, the system can be reverted to its previous snapshot when windows OS was working well. So, System Restore utility in windows operating system is a very helpful service for windows users to protect his/her system from fully dead. But you have to configure system restore in windows operating system before getting this advantage. So, if you are a windows user and you do not configure system restore in your operating system yet, keep reading the rest of this article where I will show you how to configure and create system restore point in windows 7, windows 8 and windows 10 properly. How to Configure System Restore Point in Windows OS By default System Restore is not configured in windows operating system at first installation. But intelligently windows can configure and start system restore in C drive or system drive later if you not configure it manually. So, it is better to configure and [...]
- »
System Restore in Windows 10 | August 30, 2015
Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]
- »
How to Recover MikroTik User Password | August 9, 2018
MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]
- »
MikroTik RADIUS Server (User Manager) Installation | October 28, 2017
RADIUS Server is a centralized user authentication, authorization and accounting application. RADIUS authentication gives the ISP or network administrator ability to manage PPP users, login users and Hotspot users from one server throughout a large network. MikroTik RouterOS has a RADIUS client that is able to authenticate login users, Hotspot users and PPP users through a RADIUS server. MikroTik team also developed a totally separate RADIUS server package named User Manager that can be used to authenticate MikroTik users smoothly. [...]
- »
Ubuntu RADIUS Server Configuration with freeRADIUS | September 3, 2022
Ubuntu Server is one of most popular open-source Linux Server distribution. It is stable and reliable than other Linux distributions. So, enterprise level application can be hosted on Ubuntu Server. Ubuntu RADIUS Server is popularly used for remote authentication and mostly used with the freeRADIUS open source RAIDUS application. freeRADIUS is one of the most popular and powerful AAA (Authorization, Authentication and Accounting) application. Any enterprise (specially ISP company) can use freeRADIUS for AAA solution and can develop billing system. [...]
- »
How to Clear Google Chrome History | August 20, 2015
Google Chrome is one of the most popular web browsers to online users. It provides a lot of features which help to use this browser smoothly and securely. Google Chrome history is one of the useful features in Google Chrome which helpfully caches or remembers a lot of browsing information specially username and password or login credential of your important web account when you visit various websites in internet. If you are the only user of your desktop or laptop, [...]
- »
MikroTik Hotspot Auto Login by MAC Address | July 1, 2020
Hotspot is an awesome service in MikroTik Router. MikroTik Hotspot is popularly used in ISP, Hotel, Airport, Coffee Shop, Enterprise office and many other organizations. By default MikroTik Hotspot uses HTTP CHAP login method where user must provide username and password to get internet service. Sometimes we may face that some users are not eager to provide username and password to get internet service or we cannot ask some users to put username and password to get internet due to [...]
- »
How to Create Free SSL/TLS Certificate with OpenSSL | July 23, 2021
SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]
- »
Securing MikroTik Router with Port Knocking | March 21, 2021
MikroTik Port Knocking strategy helps to protect MikroTik Router from hackers and unauthorized access as well as enhances MikroTik RouterOS security.
- »
Virtual Web Hosting with Apache on CentOS 7 (Name Based) | July 15, 2019
Virtual Hosting is a method of hosting multiple domains on single server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on a webserver, Virtual Web Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be either Name Based or IP Based. In Name Based Virtual Hosting, multiple domains can be hosted on single IP address. On the other hand, in IP Based [...]
More Similar Content
You May Also Like