Downloads

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Mistakes happen, corruption happens, disasters happen. They’re unpredictable and inevitable. When a disaster like a cyberattack or ransomware strikes your Active Directory and wipes out your DC’s operating system, every second counts. If you don’t have a plan to quickly recover, an AD disaster can stop your business in its tracks.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Create a business account or log in to browse, shop and access benefits

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
SolarWinds® Dameware Remote Everywhere is a lightweight solution designed to offer fast and powerful remote support to help you solve end-user problems from almost anywhere.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

ESET began life as a pioneer of antivirus protection, creating award-winning threat detection software.

Now, ESET's goal is to make sure that everybody can enjoy the breathtaking opportunities that technology offers.

Today, our security solutions allow businesses and consumers in more than 200 countries and territories to make the most of the digital world.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
SolarWinds® Dameware is designed to offer fast and powerful remote support to help you solve end-user problems fast. Discover which remote support solution is best for your organization.

My Tweets

Last Articles

EUC Weekly Digest – May 18, 2019

Interesting EUC items from last week: Citrix Virtual Apps and Desktops How to Build A Virtual...

Photos: Atari, Unix, ENIAC, and more from Vintage Computer Festival East 2019

Unix co-inventor Ken Thompson and Atari hardware engineer Joe Decuir were the keynote speakers at...

Keep Red Hat independent within IBM? Please, no!

IBM paid $34 billion for Red Hat, but it shouldn't be about the tech--it's a culture thing. Here's...

How to configure Linux to use NTLM using CNTLM

Find out how to authenticate your Linux servers and desktops against an MS NTLM proxy server.

South Korean government planning Linux migration as Windows 7 support ends

The Interior Ministry is preparing a test deployment to determine compatibility with existing...

How to create flowcharts and diagrams in G Suite

The following guide can show you how to create diagrams, charts, and flowcharts using Google...

MDS vulnerabilities lead Chrome OS 74 to disable hyper-threading

Hyper-Threading, Intel's implementation of symmetric multithreading (SMT) can be exploited using...

Worried about an AD disaster? Stop worrying & start preparing.

Mistakes happen, corruption happens, disasters happen. They’re unpredictable and inevitable....

10 reasons to consider switching your company's phone service to Google Voice

Google Voice for G Suite is integrated with other G Suite apps. Find out how it might help...

10 reasons to consider switching your company's phone service to Google Voice

Google Voice for G Suite is integrated with other G Suite apps. Find out how it might help...

  • EUC Weekly Digest – May 18, 2019

    Saturday, 18 May 2019 14:30
  • Photos: Atari, Unix, ENIAC, and more from Vintage Computer Festival East 2019

    Saturday, 18 May 2019 01:30
  • Keep Red Hat independent within IBM? Please, no!

    Saturday, 18 May 2019 00:30
  • How to configure Linux to use NTLM using CNTLM

    Friday, 17 May 2019 21:30
  • South Korean government planning Linux migration as Windows 7 support ends

    Friday, 17 May 2019 19:30
  • How to create flowcharts and diagrams in G Suite

    Thursday, 16 May 2019 21:30
  • MDS vulnerabilities lead Chrome OS 74 to disable hyper-threading

    Thursday, 16 May 2019 17:30
  • Worried about an AD disaster? Stop worrying & start preparing.

    Thursday, 16 May 2019 05:30
  • 10 reasons to consider switching your company's phone service to Google Voice

    Wednesday, 15 May 2019 20:30
  • 10 reasons to consider switching your company's phone service to Google Voice

    Wednesday, 15 May 2019 20:30