The following article shows you how to easily remotely upgrade your HP Integrated Lights-Out (iLO) firmware using the HP RESTful Interface Tool from a windows server.

Uninstalling any Anti-Virus product can be a pain for obvious reasons with Symantec Endpoint Protection being no exception, the following PowerShell command is a simple one-liner that can easily and quickly remove it without the need for a reboot.

Distributed Availability Groups were introduced in SQL 2016 and compliment AlwaysOn Availability Groups, their main use cases are for Disaster Recovery, Multi-Site configurations, migrations to the latest Operating Systems and increasing the number of read replicas. When you come to remove a database from a DAG it is not as simple as just deleting a database as you normally do when deleting databases from a normal AG as this removes it from the primary AG but leaves a disjointed copy in the secondary/DR AG.

This guide shows you how to delete a database that is distributed across 4 servers/instances within 2 availability groups.

Firefox have recently launched a feature that allows you to encrypt your DNS traffic, historically DNS uses a combination of UDP and/or TCP on port 53 which has always been available to see in plain text. This controversial feature moves DNS away from the network OS level to the application level.

With this setting enabled the domain name you typed is sent to a DNS-over-HTTPS (DoH) compatible server using an encrypted HTTPS connection instead of a plain text one. This prevents third parties (malicious or not) from observing your DNS traffic.

This article shows you how to enable the setting in Firefox and show the setting in action within Wireshark.

When working with Outlook over recent years one of the most frustrating issues is that reminders for calendar entries are hidden behind other windows if you do not have Outlook as the active window, this can often cause you to miss/turn up late to important meetings/appointments.

This guide shows you how to enable it in the most recent versions in which Microsoft have finally addressed and also how to enable it using a self signed certificate and VBA in older versions.

Traditionally when working with voice and data vlans you normally have to either have DHCP voice options set up in your data scope or you manually untag the voice ports onto the voice vlan both of these come with their own disadvantages, this guide utilises Link Layer Discovery Protocol (LLDP) which is a vendor independent link layer protocol used by network devices for advertising their identity and capabilities to neighbors on a LAN segment. This guide shows you how to configure LLDP on Extreme EXOS switching to detect IP phones when plugged in and move them to the correct VLAN before reaching the initial DHCP stage.

SNMPv3 is the most advanced and secure version of SNMP yet, with features like user authentication and encryption greatly enhancing the protocol.

The following instructions will guide you through configuring SNMP v3 with authentication and privacy on Cisco switching using MD5 and DES;

Firefox Monitor

Firefox have teamed up with "Have I Been Pwned" to offer a service that allows you to check your email address against a database that serves as a library of data breaches. It will let you know if your email address and/or personal info was involved in a publicly known past data breach. Once you know where your email address was compromised you should at the very least change that system password and any other place where you’ve used that password.

This guide shows you how to check if your details have been compromised.

The following instructions will guide you through configuring Ubunutu 18.04 LTS on a Dell XPS 13 (9370) that came pre-installed with Windows 10 to allow you to dual boot your system.

The following instructions will guide you through configuring SFlow on Extreme XOS switching;