Blogs, Videos and Articles

TrueNAS Core Active Directory Integration in 10 Minutes

How to setup TrueNAS CORE with Windows Active Directory integration; TrueNAS CORE makes it really easy to setup Windows Active [...]

HAFNIUM targeting Exchange Servers with 0-day exploits

Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and [...]

SuperVPN and GeckoVPN Security Breach

The user records of popular VPN services have reportedly been compromised, and millions of user data are now offered for sale [...]

How to network boot computers over ethernet with TFTP

An introduction video explaining how to boot computers and laptops etc over ethernet. The ability to boot devices over a network is [...]

How to setup Microsoft 365 spam filter policies

Microsoft (Office) 365 has many settings available to setup anti-spam policies which are probably overlooked and left unconfigured. In [...]

An introduction to Casilium, an open source ticket system

Sheridan Computers are an IT Support Company based in Manchester. As an IT Support company, or a Managed Service Provider (MSP), [...]

Untangle z4 Security Gateway Appliance overview

Unboxing of the Untangle z4 security appliance (official hardware), including basic installation and setup / overview of the prodct.

How to get started with multi-factor authentication

Multi-factor authentication (MFA) is an increasingly popular way to add an extra layer of security to your online accounts. With MFA, [...]

How to install Arch Linux with full disk encryption

I have recently installed Arch Linux on a few machines to replace Microsoft Windows. I am installing it one more time with the goal of [...]