• Sections
    • Microsoft Exchange Server
      • Compliance, Policies & Archiving
      • Deployment & Migration
      • High Availability & Recovery
      • Management & Administration
      • Mobility & Client Access
      • Monitoring & Operations
      • Planning & Architecture
      • Security & Message Hygiene
      • Tools
    • Cloud Computing
      • Amazon Web Services
      • Office 365
      • Microsoft Azure
      • Google Cloud
      • Hybrid Cloud
    • Virtualization
      • Containerization
      • Microsoft Hyper-V
      • Citrix
      • VMware
      • VirtualBox
      • Terminal Services
    • Servers
      • Windows Server
      • ISA Server
    • Networking
      • Windows Networking
      • Wireless Networking
      • Network Troubleshooting
    • Data Center
    • Security
      • Access Control
      • Application Security
      • Hacking & Cyberattacks
      • Malware
      • Mobile & Wireless Security
      • Privacy
      • Ransomware
      • Social Engineering
      • Vulnerabilities
      • Windows Client Security
      • Windows Server Security
    • Mobile Technology
      • App
      • Smartphone
    • Big Data & Machine Learning
    • Internet of Things
    • Managed Service Providers
    • Windows 10
  • Tech News
  • Tutorials
  • Reviews
  • Newsletters
  • Videos
  • About
    • About Us
    • Contact Us
    • Our Team
    • Advertising
    • Legal
      • Privacy Policy
      • Terms & Conditions
  • Search

    • Sections
      • Microsoft Exchange Server
        • Compliance, Policies & Archiving
        • Deployment & Migration
        • High Availability & Recovery
        • Management & Administration
        • Mobility & Client Access
        • Monitoring & Operations
        • Planning & Architecture
        • Security & Message Hygiene
        • Tools
      • Cloud Computing
        • Amazon Web Services
        • Office 365
        • Microsoft Azure
        • Google Cloud
        • Hybrid Cloud
      • Virtualization
        • Containerization
        • Microsoft Hyper-V
        • Citrix
        • VMware
        • VirtualBox
        • Terminal Services
      • Servers
        • Windows Server
        • ISA Server
      • Networking
        • Windows Networking
        • Wireless Networking
        • Network Troubleshooting
      • Data Center
      • Security
        • Access Control
        • Application Security
        • Hacking & Cyberattacks
        • Malware
        • Mobile & Wireless Security
        • Privacy
        • Ransomware
        • Social Engineering
        • Vulnerabilities
        • Windows Client Security
        • Windows Server Security
      • Mobile Technology
        • App
        • Smartphone
      • Big Data & Machine Learning
      • Internet of Things
      • Managed Service Providers
      • Windows 10
    • Tech News
    • Tutorials
    • Reviews
    • Newsletters
    • Videos
    • About
      • About Us
      • Contact Us
      • Our Team
      • Advertising
      • Legal
        • Privacy Policy
        • Terms & Conditions
    Author

    Brian Carey

    Brian Carey is an all-around good geek. When he's not developing software applications, you can find him fishing off the coast of North Carolina.




    Network Troubleshooting / Tutorials
    How to reset MySQL root password (even if you've forgotten it)

    You've forgotten your MySQL root password? Whether you're on EC2 or on a Ubuntu, Fedora, or other server, we've got you covered.

    Brian Carey Posted On June 30, 2016 0

    Amazon Web Services / Tutorials
    How to point your Namecheap domain name to your AWS EC2 Linux instance

    Got AWS EC2 and a Namecheap domain? This helpful tutorial will give you some insights into how to associate your Namecheap domain with your AWS Elastic IP.

    Brian Carey Posted On June 17, 2016 0

    1

    • TECHGENIX

      techgenix logo

      TechGenix reaches millions of IT Professionals every month, and has set the standard for providing free technical content through its growing family of websites, empowering them with the answers and tools that are needed to set up, configure, maintain and enhance their networks.

    • Recent Posts

      • Worried about email security? Here’s what you can do
      • It’s high time to plan your corporate approach to the legalization of marijuana
      • A second pair of eyes: Tips for monitoring your organization’s infrastructure

    Copyright © 2018 TechGenix Ltd. | Privacy Policy | Terms & Conditions | Advertise
    Press enter/return to begin your search