Guide to disk partition in windows
Most Relevant Content
Hard Disk Partitioning in Windows 7, 8 & 10
Windows is the most popular operating system in the world. Any computer user cannot go a single day without windows operating system. Even, I am writing this article on a windows operating system and you are also reading this article on any windows operating system, I think. Windows provides a lot of features or utilities for its user so that they can maintain their operating system so easily. Disk Management is such a built-in powerful utility in windows operating system which helps to manage your hard disk drive dynamically. You can shrink a volume, format a volume, extend a volume, delete a volume or change a drive letter and paths of your disk drive with this Disk Management utility. So, if you are not familiar with this windows utility, keep reading the rest of this article where I will show you how to manage your hard disk drive dynamically with this Disk Management Utility. Disk Partitioning in Windows OS with Disk Management Utility Generally, you make your hard disk partition at the time of windows installation. But sometimes you may need to make an extra disk partition while you are using windows operating system. In this situation, you can use Disk [...]
- »
CentOS 8 Installation with Screenshots (Server with GUI) | November 21, 2020
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally compatible with [...]
- »
MikroTik VPN Configuration with PPTP (Connecting Remote Client) | August 17, 2016
VPN (Virtual Private Network) is a technology that extends private network across a public network. It enables private network users to send and receive data across public network as if their network devices were directly connected to the private network. There are many VPN services in MikroTik RouterOS 7. Among them, MikroTik PPTP is a mostly used VPN service. It is a client-server VPN technology. So, a user can access server, printer, IP phone and any other network devices of [...]
- »
MikroTik OpenVPN Configuration on TCP Port 443 with Windows OS | April 6, 2020
MikroTik OpenVPN is an amazing VPN solution. IT provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which are poorly designed and can easily be blocked, OpenVPN can highly be customized and even can be run on so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN is a site to site [...]
- »
MikroTik RouterOS 7 Quick Setup using Winbox 4 | October 6, 2024
MikroTik RouterBoard and MikroTik Wireless Router are popularly used now a days. MikroTik RouterBoard is used in ISP Network and MikroTik Wireless Router is specially used for home users. MikroTik RouterBoard requires custom configuration because it is used for large network. On the other hand, MikroTik Wireless Router is used in home for a small network. MikroTik Wireless Router requires quick setup because home users are so hurry and not so technical. So, MikroTik RouterOS 7 provides a quick setup [...]
- »
MikroTik Backup and Restore Configuration using Winbox | July 31, 2018
Backup and Restore feature in MikroTik Router helps to recover router configuration when running router fails to operation due to hardware failure. If you have a backup copy of your failed router and purchase a new MikroTik Router and then upload and restore that backup file, you will get your running network without any hassle. MikroTik Backup file is also useful when you unfortunately forget your admin privilege user password. You can easily recover your forgotten password with backup file [...]
- »
MikroTik PPPoE Server with Radius User Authentication | December 17, 2017
MikroTik PPPoE Server is popularly used in ISP Companies. Almost all Local ISP Companies use PPPoE service to manage their client’s connection. So, PPPoE Server Configuration places an important role in MikroTik RouterOS. MikroTik PPPoE Server configuration with local user database has been discussed in my previous article that is enough to manage PPPoE users for a single RouterOS. But if you have more than one RouterOS in your network or you need to manage your users remotely and more [...]
- »
MikroTik Router Web Proxy Configuration | August 28, 2016
A Proxy Server is usually placed between users and the internet so that the proxy server can track the activities of any user. Formerly, a proxy server was mainly used for caching the static content of any web server because the internet speed was too slow. So, users would get high speed for browsing as if they were browsing a local server. But nowadays the internet bandwidth has increased. So, the proxy server is usually not used for web caching [...]
- »
Computer Network Topology Outline | September 12, 2017
The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types [...]
- »
Guest WiFi – How to Setup on MikroTik AP | April 30, 2024
Guest WiFi helps to keep your network safe and secure. Any sensitive wireless network should have a guest network. So, Guest WiFi is so essential for an office network. In a corporate office, guests or visitors frequently come and get connected to get internet for a few times. It is so much security issue to keep guest or visitor in the core network because among them someone can damage important network resources. So, to keep them isolated from the core [...]
More Similar Content
You May Also Like