Welcome to the spot. You've arrived. The home of Linux and Windows Server Administrators and Sysadmins (System Administrators) out there - in fact for any poor soul who needs helping hand. We cater to techs working with Linux or Windows servers, IT infrastructure or any ol' information technology department. Our aim is to share with you likeminded articles and solutions to tricky problems with your servers which our readers have come to demand.
Contribute! Be heard! We value all contributions and feedback from our fellow Sysadmins here at the Sysadmin Spot blog.
Bang your keyboards on your desk and demand the answers you want! Join in the discussion by leaving a comment. Got an obscure error? Banging your head against the keyboard? Drop us an email, include all your diagnostic results and we'll take a look.
Stay In Touch
- Start your own certificate authority in seconds!
- Import/Export SQL Azure Database in Australia
- Restore broken Windows 2012 R2 Hyper-V directory permissions
- The file is either corrupted or does not have the latest credentials associated with recovery service. (ID: 34513)
- Infrastructure and Network Monitoring
Search Posts by KeywordsApplications ASCII art Azure Backup bash Browser Calendar command line cpanel Desire DNS email Firefox firewall Google HTC IIS install Internet Explorer IP Address key Linux Memory Leak Microsoft MySQL password performance permissions PHP port rant redirect script Security SEO Sidebar Spam SSH vent web server wget white screen of death WiFi Windows Wordpress
Category Archives: Security
Do you fall into any of the following groups? You’re a: Webmaster with a few internal websites that you’d like to protect with SSL but don’t want to pay anything? Sysadmin Read the rest of the entry…
Error Connecting to VPN – Error 850: The Extensible Authentication Protocol type required for authentication…
Are you getting this error message when connecting to a virtual private network? Error connecting to BLAH. Error 850: The Extensible Authentication Protocol type required for authentication of the remote Read the rest of the entry…