Configure System Restore
Most Relevant Content
Create System Restore Point in Windows OS
System Restore utility in windows operating system helps a windows user to take one or more snapshots of his/her windows system when windows operating system is working well. If any system crash occurs in future due to virus attack or critical system update or any unwanted program, the system can be reverted to its previous snapshot when windows OS was working well. So, System Restore utility in windows operating system is a very helpful service for windows users to protect his/her system from fully dead. But you have to configure system restore in windows operating system before getting this advantage. So, if you are a windows user and you do not configure system restore in your operating system yet, keep reading the rest of this article where I will show you how to configure and create system restore point in windows 7, windows 8 and windows 10 properly. How to Configure System Restore Point in Windows OS By default System Restore is not configured in windows operating system at first installation. But intelligently windows can configure and start system restore in C drive or system drive later if you not configure it manually. So, it is better to configure and [...]
- »
System Restore in Windows 10 | August 30, 2015
Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]
- »
How to Recover MikroTik User Password | August 9, 2018
MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]
- »
Red Hat/CentOS Network Configuration | August 4, 2017
Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]
- »
MikroTik Load Balancing over Multiple Gateways (2 WAN) | October 13, 2016
Load Balancing is a technique used to send network traffic over multiple gateways. If you have multiple ISP connections in your network, you can send your network traffic through those ISP connections and can make a load balancing network. Accidently you may ask me, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? I will say, ask yourself deeply then you will find the reasons why multiple ISP connections is [...]
- »
How to Install MikroTik CHR on VMware Workstation | September 9, 2019
MikroTik is found both RouterBoard where RouterOS and License are prebuilt and RouterOS Application that can be installed on a Physical Machine or Virtual Machine. RouterOS installation on Physical or Virtual Machine has license limitations. Full RouterOS packages cannot be used more than 24 hours without license. So, RouterOS application is not suitable for the Trainee or not suitable to RND purpose. From RouterOS v6.34, MikroTik introduces Cloud Hosted Router (CHR, a new RouterOS version) which has different licensing scheme. [...]
- »
MikroTik Site to Site GRE Tunnel Configuration with IPsec | March 26, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides GRE (Generic Routing Encapsulation) tunnel that is used to create a site to site VPN tunnel. GRE tunneling protocol which can encapsulate a wide variety of protocols creating a virtual point-to-point link was [...]
- »
MikroTik Load Balancing and Link Redundancy with PBR | March 31, 2019
In computer networking, the Load Balancing technique is used to send network traffic over multiple gateways. If you have multiple ISP connections available, you can use load balancing technique to establish a stable network. You may now ask, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? For your satisfaction, the following points are some reasons to use load balancing technique in your network. No ISP can give you 100% [...]
- »
MikroTik Block Website (Facebook, YouTube and Other Sites) | October 12, 2017
MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how [...]
- »
MikroTik VLAN and Bridge Configuration | September 19, 2017
VLAN and Bridge are two useful features in MikroTik Router. These two features are frequently used in any MikroTik network configuration. VLAN divides a physical interface into multiple logical interfaces. So, you can isolate your network into multiple logical networks on a physical interface. On other hand, MikroTik Bridge integrates multiple physical interfaces in a logical interface. So, you can extend your broadcast domain on multiple physical interfaces and can extend your popular services such as PPPoE or DHCP on [...]
More Similar Content
You May Also Like