How to do disk partition in windows
Most Relevant Content
Hard Disk Partitioning in Windows 7, 8 & 10
Windows is the most popular operating system in the world. Any computer user cannot go a single day without windows operating system. Even, I am writing this article on a windows operating system and you are also reading this article on any windows operating system, I think. Windows provides a lot of features or utilities for its user so that they can maintain their operating system so easily. Disk Management is such a built-in powerful utility in windows operating system which helps to manage your hard disk drive dynamically. You can shrink a volume, format a volume, extend a volume, delete a volume or change a drive letter and paths of your disk drive with this Disk Management utility. So, if you are not familiar with this windows utility, keep reading the rest of this article where I will show you how to manage your hard disk drive dynamically with this Disk Management Utility. Disk Partitioning in Windows OS with Disk Management Utility Generally, you make your hard disk partition at the time of windows installation. But sometimes you may need to make an extra disk partition while you are using windows operating system. In this situation, you can use Disk [...]
- »
CentOS 7 Partition Management with fdisk Utility | February 11, 2019
CentOS or Red Hat Linux is a popular server operating system to the system administrators. Almost all the system admins or IT guys who play with mail server, file server, proxy server and so on are so known with CentOS or Red Hat Linux and cannot go a single day without this operating system. The guys who are also wish to be a system admin should be familiar with CentOS or Red Hat operating system. In my previous article, I [...]
- »
CentOS 8 Installation with Screenshots (Server with GUI) | November 21, 2020
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally compatible with [...]
- »
How to Mount USB Device in CentOS 7 (NTFS and Linux FS) | February 18, 2019
USB Hard Disk Drive or USB Flash Drive (Pen drive) is a popular external device that can be used to backup data or transfer data from one device to other device. In GUI (Graphical User Interface) Operating System such as Window or GNOME Desktop in Linux can automatically mount USB device and can show data in it if the File System of that device is supported. But all users do not like or always do not have GUI mode of [...]
- »
MikroTik IPIP Tunnel with IPsec (Site to Site VPN) | March 18, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides IPIP tunnel that is used to create a site to site VPN. IPIP tunnel is a simple protocol that encapsulates IP packets in IP to make a tunnel between two routers. To encapsulate [...]
- »
How to Properly Downgrade MikroTik RouterOS and Firmware | October 2, 2019
MikroTik RouterOS is in constant development and new features or bug fixes are frequently available, sometimes even monthly. So, it is always recommend upgrading MikroTik RouterOS to a latest and stable version before beginning any configuration. But sometimes you may face that the upgraded version is not working properly according to your demand or you may upgrade to a new version that you don’t want. In this case, you should come back to your workable RouterOS version and firmware. Upgrading RouterOS [...]
- »
How to Block a Phone from WiFi Router | May 8, 2024
We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]
- »
MikroTik Router Static DHCP Server Configuration | October 25, 2015
DHCP Server assigns IP address and other related IP information (Subnet mask, Gateway and DNS) automatically to network devices. But automatic DHCP Server has some disadvantages too. If any IP device connects to any automatic DHCP network, the device will get an IP address and related IP information automatically by the DHCP Server and the device will start to use resources of this network. In this situation, the network administrator cannot know who is being connected to the network and [...]
- »
How to Recover MikroTik User Password | August 9, 2018
MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]
- »
How to Block Free Proxy Access with MikroTik Router | May 21, 2019
Proxy Server is an alternative to VPN that breaks blocking firewall of a network. If any user uses free web proxy server with web browser, the web request is processed by the proxy server. So, blocking firewall rule is not applied on the proxy enabled PC. For this, system administrators should be careful enough to block free proxy servers along with blocking VPN access. In my previous article, I discussed how to block VPN access with MikroTik Firewall. In this [...]
More Similar Content
You May Also Like