Skip to content
TeckLyfe

TeckLyfe

We're your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To's.

  • Home
  • InfoSec
    • Server Hardening
    • Attacks
    • Malware
    • Pentest
    • Phishing
    • Ransomware
    • Virus
    • Zero-Day
  • SysAdmin
    • Cisco
    • Linux
    • Mac
    • Windows
  • Tech
    • Apps
    • Gadgets
    • Gaming
    • Internet
    • Mobile
      • Smartphone
    • OS
    • Tech Tips
  • Follow Us
    • Facebook
    • X aka Twitter
    • LinkedIn
    • YouTube
    • Reddit
    • RSS Feed

Tag: sysadmin

  • Home
  • sysadmin
How To Hide The Teamviewer Dock Icon in MacOS 1
Mac

How To Hide The Teamviewer Dock Icon in MacOS

Until Teamviewer devices to build an option into the app that hides the dock icon, the only way to remove it is through some hacks. Since it is in the

March 28, 2018March 27, 2018
Continue Reading...
How To Fix Failed to open the runspace pool. The Server manager WinRM plug-in might be corrupted or missing 3
Windows System Administration

How To Fix Failed to open the runspace pool. The Server manager WinRM plug-in might be corrupted or missing

I recently ran into the error message “Failed to open the runspace pool. The Server manager WinRM plug-in might be corrupted or missing.” shortly after deploying a new Windows 2012

January 23, 2017April 27, 2017
Continue Reading...
How To Fix MySQL Table mysql.plugin Doesn't Exist 5
System Administration

How To Fix MySQL Table mysql.plugin Doesn’t Exist

I recently had an issue on a MySQL Database Server where running apt-get upgrade to upgrade the MySQL package on the server would result in an error about the table

January 20, 2017
Continue Reading...
How To Harden MongoDB Server 7
Server Hardening Security System Administration

How To Harden MongoDB Server

MongoDB is “a document database that provides high performance, high availability, and easy scalability”. In this chapter of our InfoSec System Hardening series, we’ll walk you through some of the

January 17, 2017January 16, 2017
Continue Reading...
How To Harden An NGINX Web Server 9
Server Hardening Security System Administration

How To Harden An NGINX Web Server

The next segment in our InfoSec System Hardening series is how to harden an NGINX Web Server. NGINX is an alternative to the popular Apache Web Server on Linux. In

January 16, 2017January 16, 2017
Continue Reading...
How To Harden A MySQL Server 12
Server Hardening Security System Administration

How To Harden A MySQL Server

As with any server, whether it be a web server, file server, database server, etc, hardening is an important step in information security and protecting the data on your systems.

January 15, 2017January 16, 2017
Continue Reading...
View All CPU Cores in Task Manager (Windows Server 2012 / Windows 10 ) 14
Windows System Administration

View All CPU Cores in Task Manager (Windows Server 2012 / Windows 10 )

Windows Server 2012 and Windows 10 came with a lot of changes to the task manager and in some cases the default views have been simplified further than power users

October 21, 2016
Continue Reading...
How To Backup, Restore, and Import Group Policy Objects 15
Windows System Administration

How To Backup, Restore, and Import Group Policy Objects

As a Systems Administrator, you’ve probably worked with Group Policy before, especially if you’re in a Microsoft Windows environment. Group Policy allows you to push out settings to multiple computers

October 20, 2016
Continue Reading...
Find Cisco Serial Numbers With The IOS Command Line 16
System Administration Cisco

Find Cisco Serial Numbers With The IOS Command Line

“How do I find a Cisco serial number remotely through the command line?” This is one of those frequently asked questions that I see over and over. So, here’s the

March 10, 2016October 16, 2016
Continue Reading...
How-To Write SQL Server Audit Events To Windows Security Log 17
System Administration Tech Tips Windows

How-To Write SQL Server Audit Events To Windows Security Log

There are a few options you have if you want to enable audit logging on Microsoft SQL Server. You can write the logs to a .sqlaudit file, but you cannot

February 17, 2016October 16, 2016
Continue Reading...

Posts pagination

1 2 Next
  • About Us
  • Privacy Policy
  • Advertise With Us
  • Contact Us
We’re your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To’s.

Founded in 2000, TeckLyfe is based in Chicago, IL. Reproduction without explicit permission is prohibited.

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
© 2000-2025 - TeckLyfe.com - All Rights Reserved. Reproduction without explicit permission is prohibited.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}