<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT-Tutorial</title>
	<atom:link href="https://it-tutorial.info/feed/" rel="self" type="application/rss+xml" />
	<link>https://it-tutorial.info/</link>
	<description>For educational purpose only</description>
	<lastBuildDate>Tue, 07 May 2024 08:39:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">172715145</site>	<item>
		<title>6 Tools to start reverse engineering malware?</title>
		<link>https://it-tutorial.info/6-tools-to-start-reverse-engineering-malware/</link>
					<comments>https://it-tutorial.info/6-tools-to-start-reverse-engineering-malware/#respond</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Mon, 22 May 2023 07:36:06 +0000</pubDate>
				<category><![CDATA[Knowledgebase]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<guid isPermaLink="false">https://epic-thompson.185-48-117-223.plesk.page/?p=642</guid>

					<description><![CDATA[<p>If you&#8217;re interested in delving into the world of reverse engineering malware, having the right tools at your disposal is crucial. These tools not only facilitate the process but also provide valuable insights into the inner workings of malicious software. In this article, we will explore six tools that can help you get started on [&#8230;]</p>
<p>The post <a href="https://it-tutorial.info/6-tools-to-start-reverse-engineering-malware/">6 Tools to start reverse engineering malware?</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>If you&#8217;re interested in delving into the world of reverse engineering malware, having the right tools at your disposal is crucial. These tools not only facilitate the process but also provide valuable insights into the inner workings of malicious software. In this article, we will explore six tools that can help you get started on your journey of reverse engineering malware. By utilizing these tools effectively, you can gain a deeper understanding of malware behavior, identify vulnerabilities, and develop effective countermeasures to combat malicious threats. So, let&#8217;s dive into the fascinating realm of malware reverse engineering and discover the tools that can pave the way for your exploration and analysis.</p>



<h2 class="wp-block-heading">How to obtain malware for analyzing </h2>



<p>For malware analyzing you need to obtain some malware that is around in the field right now. Their are severable ways of obtaining malware for analyzing. But before you go and check out the following steps i recoment you use  virtual machine. </p>



<p>Easy ways of obtaining malware is  by joinging sketchy forums, sign up for spam mails or try and download some <strong>free </strong>generators/cheats for games.</p>



<p>Check out &#8216;<a href="https://malshare.com" target="_blank" rel="noreferrer noopener">Malshare.com</a>,&#8217; it is a website where you can actively download malware shared by others. It provides an opportunity to explore and access various types of malware.</p>



<h2 class="wp-block-heading">Tool 1: Virtual machines </h2>


<div class="wp-block-image">
<figure class="alignright size-full is-resized"><img data-recalc-dims="1" fetchpriority="high" decoding="async" width="640" height="222" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2023/06/image.jpg?resize=640%2C222&#038;ssl=1" alt="" class="wp-image-652" style="width:587px;height:203px" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image.jpg?w=809&amp;ssl=1 809w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image.jpg?resize=300%2C104&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image.jpg?resize=768%2C266&amp;ssl=1 768w" sizes="(max-width: 640px) 100vw, 640px" /></figure>
</div>


<p>When it comes to dealing with malware, one essential tool to have is a virtual machine. The primary purpose of using virtual machines is to ensure the safety of your own system and prevent accidental loss of files. Thankfully, there are various options available for creating virtual machines, both free and paid. Prominent examples include &#8220;VirtualBox&#8221; and &#8220;VMware.&#8221;</p>



<p>Once you have set up a virtual machine, you can choose to install either Windows or Linux. A Linux distribution called Remnux stands out as it offers a comprehensive set of tools specifically designed for reverse engineering malware. By using a virtual machine, you can execute viruses and observe their behavior. While easily restoring the system to its previous working state with the help of a snapshot.</p>



<p><strong>IMPORTANT: ENSURE THAT YOUR ENVIRONMENT REMAINS COMPLETELY ISOLATED TO PREVENT ANY POSSIBILITY OF A BREAKOUT.</strong></p>



<h2 class="wp-block-heading">Tool 2: Wireshark</h2>


<div class="wp-block-image">
<figure class="alignright size-full is-resized"><img data-recalc-dims="1" decoding="async" width="622" height="425" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2023/06/image-1.jpg?resize=622%2C425&#038;ssl=1" alt="" class="wp-image-654" style="width:277px;height:188px" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-1.jpg?w=622&amp;ssl=1 622w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-1.jpg?resize=300%2C205&amp;ssl=1 300w" sizes="(max-width: 622px) 100vw, 622px" /></figure>
</div>


<p>Wireshark is a crucial tool for analyzing malware and understanding its behavior. It captures and analyzes network traffic, allowing you to identify communication patterns and command and control servers used by the malware. It helps detect malicious traffic, reconstruct malware activities, and is best used in combination with a virtual machine for a safe analysis environment. </p>



<p>While there are other network capturing software options available, Wireshark is the preferred choice for most analysts due to its free availability and extensive community support. It has a large user base and a wealth of resources, including courses that teach you the intricacies of this powerful software.</p>



<h2 class="wp-block-heading">Tool 3: Any.run </h2>


<div class="wp-block-image">
<figure class="alignright size-large is-resized"><img data-recalc-dims="1" decoding="async" width="640" height="424" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2023/06/image-2-1024x678.jpg?resize=640%2C424&#038;ssl=1" alt="" class="wp-image-655" style="width:400px;height:265px" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-2.jpg?resize=1024%2C678&amp;ssl=1 1024w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-2.jpg?resize=300%2C199&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-2.jpg?resize=768%2C509&amp;ssl=1 768w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-2.jpg?w=1107&amp;ssl=1 1107w" sizes="(max-width: 640px) 100vw, 640px" /></figure>
</div>


<p>Any.Run is a platform designed for malware reverse engineering. It offers a virtualized environment, similar to a virtual machine with Wireshark installed. Enabling analysts to safely dissect and analyze malicious code. Let&#8217;s explore why Any.Run is a standout tool for reverse engineering malware.</p>



<ol class="wp-block-list">
<li>Safe Virtual Environment: Any.Run provides a secure sandboxed environment, protecting the host system while allowing analysts to dissect malware.</li>



<li>Streamlined Workflow: The platform offers an intuitive interface for effortless upload, execution, and real-time monitoring of malware samples.</li>



<li>Comprehensive Behavior Analysis: Any.Run captures and analyzes dynamic malware behavior, enabling researchers to gain valuable insights into malicious tactics.</li>



<li>Network Traffic Visibility: With integrated Wireshark, Any.Run allows detailed examination of malware&#8217;s network traffic, revealing command-and-control infrastructure and data exfiltration techniques.</li>



<li>Collaborative Approach: Any.Run encourages collaboration among researchers, facilitating knowledge sharing and collective defense against evolving cyber threats.</li>



<li>Informative Reports: The platform generates detailed reports and captures forensic artifacts, providing vital information for incident response and further investigations.</li>
</ol>



<p>Whether you&#8217;re a beginner or an experienced analyst, Any.Run is a valuable tool for diving into the world of malware analysis. It provides a supercharged magnifying glass for dissecting malicious software and understanding its inner workings. While the paid version unlocks additional features, the free version still offers a robust set of tools to kickstart your journey into malware reverse engineering.</p>



<h2 class="wp-block-heading">Tool 4: Virus Total</h2>



<p>VirusTotal is an online service that provides a convenient method to swiftly determine if a file or URL contains any detected viruses. It employs a range of antivirus engines and security tools to enhance the accuracy of malware detection. By leveraging the collective knowledge and expertise of the cybersecurity community, users gain access to a collaborative platform. </p>



<p>VirusTotal incorporates static and dynamic analysis techniques, along with an extensive database of previously scanned files, which aids in malware analysis and research. In summary, VirusTotal serves as a valuable resource for promptly verifying if a file or URL is flagged as malicious, identifying the specific antivirus scanners that detected it, and determining its malware family or type. This capability proves invaluable when you need to quickly assess the detection status and behavior of potential threats.</p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="215" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2023/06/image-1024x344.png?resize=640%2C215&#038;ssl=1" alt="" class="wp-image-656" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image.png?resize=1024%2C344&amp;ssl=1 1024w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image.png?resize=300%2C101&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image.png?resize=768%2C258&amp;ssl=1 768w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image.png?w=1454&amp;ssl=1 1454w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<h2 class="wp-block-heading">Tool 5: DIE Detect it EASY</h2>


<div class="wp-block-image">
<figure class="alignright size-full is-resized"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="411" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2023/06/image-1-1.jpg?resize=640%2C411&#038;ssl=1" alt="" class="wp-image-657" style="width:435px;height:279px" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-1-1.jpg?w=1010&amp;ssl=1 1010w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-1-1.jpg?resize=300%2C193&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-1-1.jpg?resize=768%2C493&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>
</div>


<p>Detect It Easy (DIE) is a versatile file analysis tool that operates across multiple platforms. Its primary function is to determine the types of files by utilizing detection signatures, while also providing the option for customization through scripts. DIE supports various file formats and proves particularly useful for malware analysis.</p>



<p>Key features of DIE for malware analysis include:</p>



<ol class="wp-block-list">
<li>File Identification: DIE excels at accurately identifying file types, aiding analysts in classifying and comprehending malware.</li>



<li>Signature-based Detection: By utilizing pre-established signatures, DIE can effectively detect known malware patterns and characteristics.</li>



<li>Open Signature Architecture: Users have the freedom to customize existing detection algorithms or create new ones using scripts. This flexibility allows for tailored and adaptable malware analysis.</li>



<li>Versatility: DIE is capable of recognizing a broad range of file formats, including executable files that are frequently employed by malware.</li>



<li>Compilers/Obfuscators Detection: DIE possesses the ability to detect the specific compilers or obfuscators employed in the creation of files, and it may even offer the potential for their reversal.</li>
</ol>



<p>By utilizing DIE, analysts can easily identify suspicious files, classify malware samples, and develop customized detection rules, thereby enhancing their malware analysis capabilities.</p>



<h2 class="wp-block-heading">Tool 6: Hexrays/ Ghidra</h2>



<p><strong>Ghidra </strong>stands out for its extensive capabilities, including the ability to disassemble, decompile, and debug various types of executable files. It serves as an indispensable tool for reverse engineering malware, allowing analysts to gain deep insights into its inner workings.</p>


<div class="wp-block-image">
<figure class="alignright size-full is-resized"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="434" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2023/06/image-1.png?resize=640%2C434&#038;ssl=1" alt="" class="wp-image-658" style="width:373px;height:253px" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-1.png?w=678&amp;ssl=1 678w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-1.png?resize=300%2C204&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>
</div>


<p>With Ghidra, analysts can explore the code, data structures, and control flow of malware, providing valuable knowledge for analysis and mitigation. The tool offers a user-friendly interface and a robust scripting environment, enabling users to automate analysis tasks and even create custom analysis tools tailored to their specific requirements.</p>



<p></p>



<p></p>



<p></p>



<p><strong>Hex-Rays </strong>is a commercial software extension widely used for disassembly. It specializes in the decompilation of binary code into a high-level programming language representation, such as C. This process of converting the code into a more human-readable form facilitates a better understanding of the functionality and logic employed by the malware.</p>


<div class="wp-block-image">
<figure class="alignright size-full is-resized"><img data-recalc-dims="1" loading="lazy" decoding="async" width="409" height="308" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2023/06/image-3.png?resize=409%2C308&#038;ssl=1" alt="" class="wp-image-660" style="width:381px;height:259px" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-3.png?w=409&amp;ssl=1 409w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2023/06/image-3.png?resize=300%2C226&amp;ssl=1 300w" sizes="auto, (max-width: 409px) 100vw, 409px" /></figure>
</div>


<p>It is worth noting that both Ghidra and Hex-Rays have a learning curve that may appear daunting at first. However, the investment of time and effort in mastering these tools proves worthwhile for individuals seeking to delve into malware analysis and reverse engineering. The insights gained from utilizing these tools can be invaluable in combating and staying ahead of evolving malicious software threats.</p>



<p></p>
<p>The post <a href="https://it-tutorial.info/6-tools-to-start-reverse-engineering-malware/">6 Tools to start reverse engineering malware?</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/6-tools-to-start-reverse-engineering-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">642</post-id>	</item>
		<item>
		<title>What is typosquatting and how can you prevent it!</title>
		<link>https://it-tutorial.info/what-is-typosquatting-and-how-can-you-prevent-it/</link>
					<comments>https://it-tutorial.info/what-is-typosquatting-and-how-can-you-prevent-it/#respond</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Mon, 12 Dec 2022 14:41:25 +0000</pubDate>
				<category><![CDATA[Knowledgebase]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Typosquatting]]></category>
		<guid isPermaLink="false">https://epic-thompson.185-48-117-223.plesk.page/?p=607</guid>

					<description><![CDATA[<p>Typosquatting, also known as URL hijacking, is a type of cyber attack in which a malicious actor registers a domain name that is similar to a popular website, but with a small typo. For example, the typosquatter might register &#8220;facebok.com&#8221; instead of &#8220;facebook.com&#8221;. The goal of this attack is to trick users into visiting the [&#8230;]</p>
<p>The post <a href="https://it-tutorial.info/what-is-typosquatting-and-how-can-you-prevent-it/">What is typosquatting and how can you prevent it!</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Typosquatting, also known as URL hijacking, is a type of cyber attack in which a malicious actor registers a domain name that is similar to a popular website, but with a small typo. For example, the typosquatter might register &#8220;facebok.com&#8221; instead of &#8220;facebook.com&#8221;. The goal of this attack is to trick users into visiting the malicious website and potentially divulging sensitive information, such as login credentials.</p>



<h2 class="wp-block-heading">What can be their goals?</h2>


<div class="wp-block-image">
<figure class="alignright size-full is-resized"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="360" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2022/12/typosquatting-1.jpg?resize=640%2C360&#038;ssl=1" alt="Typosquatting preview " class="wp-image-619" style="width:412px;height:232px" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2022/12/typosquatting-1.jpg?w=800&amp;ssl=1 800w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2022/12/typosquatting-1.jpg?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2022/12/typosquatting-1.jpg?resize=768%2C432&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>
</div>


<p>One common way that typosquatters achieve their goal is by creating a fake login page that closely resembles the real login page of the popular website. When a user types in the correct website address but makes a typo, they may end up on the fake login page, where they will enter their login information without realizing that they are on a fraudulent website. The typosquatter can then use this information to gain access to the user&#8217;s account on the legitimate website.</p>



<p>Another tactic used by typosquatters is to create websites with content that is similar to the content on the legitimate website. For example, a typosquatter might create a website with fake news stories that closely resemble the stories on a popular news website. When a user mistypes the website address and ends up on the fake website, they may believe that they are reading real news stories and not realize that they are on a fraudulent website.</p>



<h2 class="wp-block-heading">How to detect typosquatting?</h2>



<p>Typosquatting can be difficult to detect and prevent, but there are a few steps that individuals and organizations can take to protect themselves. First, users should always double-check the website address before entering sensitive information to make sure that they are on the correct website. Second, organizations can register common misspellings of their domain name to prevent typosquatters from registering these domain names. Finally, organizations can use a web application firewall to detect and block traffic from known typosquatting websites.</p>



<h2 class="wp-block-heading">conclusion</h2>



<p>In conclusion, typosquatting is a serious threat to individuals and organizations, and it is important to be aware of this type of attack and take steps to protect yourself. By being vigilant and taking the appropriate precautions, you can help to prevent yourself from falling victim to a typosquatter.</p>



<p>If you found this interesting I would greatly appreciate it if you check out one of my other posts.</p>



<ul class="wp-block-list">
<li><a href="https://it-tutorial.info">IT-Tutorial.info</a></li>
</ul>



<p>Or support me using: &#8220;<a href="http://buymeacoffee.com/uppeltje" target="_blank" rel="noreferrer noopener">Buymeacoffee</a>&#8220;</p>
<p>The post <a href="https://it-tutorial.info/what-is-typosquatting-and-how-can-you-prevent-it/">What is typosquatting and how can you prevent it!</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/what-is-typosquatting-and-how-can-you-prevent-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">607</post-id>	</item>
		<item>
		<title>This screen protector is the easiest installation ever</title>
		<link>https://it-tutorial.info/this-screen-protector-is-the-easiest-installation-ever/</link>
					<comments>https://it-tutorial.info/this-screen-protector-is-the-easiest-installation-ever/#respond</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Wed, 24 Feb 2021 21:43:46 +0000</pubDate>
				<category><![CDATA[Phone's]]></category>
		<category><![CDATA[Reviews]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Easy screen protector]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Samsung S10]]></category>
		<category><![CDATA[Screen protector]]></category>
		<guid isPermaLink="false">https://epic-thompson.185-48-117-223.plesk.page/?p=467</guid>

					<description><![CDATA[<p>I have recently gotten a new phone and wanted to apply a screen protector. Since I did not do it with my last phone and it had gotten a lot of scratches. So I started to look around for a screen protector that was not too expensive. I managed to find a screen protector for [&#8230;]</p>
<p>The post <a href="https://it-tutorial.info/this-screen-protector-is-the-easiest-installation-ever/">This screen protector is the easiest installation ever</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I have recently gotten a new phone and wanted to apply a screen protector. Since I did not do it with my last phone and it had gotten a lot of scratches. </p>



<p>So I started to look around for a screen protector that was not too expensive. I managed to find a screen protector for 10 euros, its called <a href="https://amzn.to/37K9adT" target="_blank" rel="noreferrer noopener">LK film screen protector</a>.   </p>



<p>One of the biggest problems you normally have is getting a good installation without any air bubbles. This Screenprotector makes it really easy. </p>



<p>I have made some pictures while installing it on my Samsung Galaxy S10. I would like to show a few. Just know that they also have this screen protector for almost any iPhone and Samsung device. </p>



<p>The following picture is my personal review </p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<div class="wp-block-jetpack-tiled-gallery aligncenter is-style-columns"><div class="tiled-gallery__gallery"><div class="tiled-gallery__row"><div class="tiled-gallery__col" style="flex-basis:25.406990678938012%"><figure class="tiled-gallery__item"><img decoding="async" srcset="https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4015-scaled.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4015-scaled.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4015-scaled.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4015-scaled.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4015-scaled.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4015-scaled.jpg?strip=info&#038;w=2000&#038;ssl=1 2000w" alt="Image currently not loading" data-height="1707" data-id="471" data-link="https://epic-thompson.185-48-117-223.plesk.page/?attachment_id=471" data-url="https://epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2021/02/IMG_4015-scaled.jpg" data-width="2560" src="https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4015-scaled.jpg?ssl=1" layout="responsive"/></figure><figure class="tiled-gallery__item"><img decoding="async" srcset="https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4020-scaled.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4020-scaled.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4020-scaled.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4020-scaled.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4020-scaled.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4020-scaled.jpg?strip=info&#038;w=2000&#038;ssl=1 2000w" alt="Image currently not loading" data-height="1707" data-id="472" data-link="https://epic-thompson.185-48-117-223.plesk.page/?attachment_id=472" data-url="https://epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2021/02/IMG_4020-scaled.jpg" data-width="2560" src="https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4020-scaled.jpg?ssl=1" layout="responsive"/></figure></div><div class="tiled-gallery__col" style="flex-basis:23.109355396243036%"><figure class="tiled-gallery__item"><img decoding="async" srcset="https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4012-scaled.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4012-scaled.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4012-scaled.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4012-scaled.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4012-scaled.jpg?strip=info&#038;w=1707&#038;ssl=1 1707w" alt="Image currently not loading" data-height="2560" data-id="475" data-link="https://epic-thompson.185-48-117-223.plesk.page/img_4012/" data-url="https://epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2021/02/IMG_4012-scaled.jpg" data-width="1707" src="https://i1.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4012-scaled.jpg?ssl=1" layout="responsive"/></figure></div><div class="tiled-gallery__col" style="flex-basis:51.48365392481896%"><figure class="tiled-gallery__item"><img decoding="async" srcset="https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4025-scaled.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4025-scaled.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4025-scaled.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4025-scaled.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4025-scaled.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4025-scaled.jpg?strip=info&#038;w=2000&#038;ssl=1 2000w" alt="" data-height="1707" data-id="476" data-link="https://epic-thompson.185-48-117-223.plesk.page/img_4025/" data-url="https://epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2021/02/IMG_4025-scaled.jpg" data-width="2560" src="https://i2.wp.com/it-tutorial.info/wp-content/uploads/2021/02/IMG_4025-scaled.jpg?ssl=1" layout="responsive"/></figure></div></div></div></div>
</div>
</div>
</div></div>
</div>
</div>



<p>If you found this interesting I would greatly appreciate it if you check out one of my other posts. </p>



<ul class="wp-block-list">
<li><a href="https://it-tutorial.info">IT-Tutorial.info</a></li>



<li><a href="https://amzn.to/37K9adT" target="_blank" rel="noreferrer noopener">Amazon link</a></li>
</ul>



<p></p>
<p>The post <a href="https://it-tutorial.info/this-screen-protector-is-the-easiest-installation-ever/">This screen protector is the easiest installation ever</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/this-screen-protector-is-the-easiest-installation-ever/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">467</post-id>	</item>
		<item>
		<title>Create a simple python password checker.</title>
		<link>https://it-tutorial.info/create-a-simple-python-password-checker/</link>
					<comments>https://it-tutorial.info/create-a-simple-python-password-checker/#comments</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Fri, 19 Feb 2021 22:05:39 +0000</pubDate>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[Easy]]></category>
		<category><![CDATA[PasswordChecker]]></category>
		<category><![CDATA[Python]]></category>
		<category><![CDATA[Python Basics]]></category>
		<category><![CDATA[Quick project]]></category>
		<guid isPermaLink="false">https://epic-thompson.185-48-117-223.plesk.page/?p=460</guid>

					<description><![CDATA[<p>Today you will learn how to make a simple password checker in python. This is a perfect project for any beginner. What are the minimum requirments for a good and secure password? If you liked this post and learned something new I would really appreciate it if you check out some of my other posts.</p>
<p>The post <a href="https://it-tutorial.info/create-a-simple-python-password-checker/">Create a simple python password checker.</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today you will learn how to make a simple password checker in python. This is a perfect project for any beginner. </p>



<p>What are the minimum requirments for a good and secure password?</p>



<ul class="wp-block-list">
<li>Password length (min 8 characters)</li>



<li>Numbers (1234)</li>



<li>Upper cases (ABCD)</li>



<li>Lower case (abcd)</li>



<li>Special symbol (!@#$%)</li>
</ul>



<pre class="wp-block-code"><code>def password_check(passwd): 
      
    SpecialSym =&#91;'!', '@', '#', '$', '%', '^', '&amp;', '*'] 
    val = True
      
    if len(passwd) &lt; 8: 
        print("Lengtt should be atleast 8 characters") 
        val = False
          
    if len(passwd) &gt; 20: 
        print("Password should not exeed 20 characters") 
        val = False
          
    if not any(char.isdigit() for char in passwd): 
        print('Password should contain a digit') 
        val = False
          
    if not any(char.isupper() for char in passwd): 
        print("Password should contain atleast 1 upper case") 
        val = False
          
    if not any(char.islower() for char in passwd): 
        print("Password should contain atleast 1 lower case") 
        val = False
          
    if not any(char in SpecialSym for char in passwd): 
        print("Password should contain 1 or more symbols like: !@$") 
        val = False
    if val: 
        return val 
   
def main(): 
    passwd = input("Enter your password : ")
      
    if (password_check(passwd)): 
        print("Password is valid") 
    else: 
        print("Invalid Password !!") 
                
if __name__ == '__main__': 
    main() 
</code></pre>



<p>If you liked this post and learned something new I would really appreciate it if you check out some of my other <a href="https://it-tutorial.info">posts. </a></p>
<p>The post <a href="https://it-tutorial.info/create-a-simple-python-password-checker/">Create a simple python password checker.</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/create-a-simple-python-password-checker/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">460</post-id>	</item>
		<item>
		<title>Word automatic table of contents (Index)</title>
		<link>https://it-tutorial.info/word-automatic-table-of-contents-index/</link>
					<comments>https://it-tutorial.info/word-automatic-table-of-contents-index/#comments</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Mon, 17 Aug 2020 11:54:16 +0000</pubDate>
				<category><![CDATA[Office]]></category>
		<category><![CDATA[automatic talbe of contents]]></category>
		<category><![CDATA[Automic index]]></category>
		<category><![CDATA[headings]]></category>
		<category><![CDATA[Office 2019]]></category>
		<category><![CDATA[table of content]]></category>
		<category><![CDATA[Word]]></category>
		<guid isPermaLink="false">https://epic-thompson.185-48-117-223.plesk.page/?p=382</guid>

					<description><![CDATA[<p>An automatic Table of Contents uses Styles to keep track of page numbers and section titles for you. Microsoft Word is able to scan your document and find everything in the Heading 1 style and put that on the first level of your table of contents, put any Heading 2’son the second level of your [&#8230;]</p>
<p>The post <a href="https://it-tutorial.info/word-automatic-table-of-contents-index/">Word automatic table of contents (Index)</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>An automatic Table of Contents uses Styles to keep track of page numbers and section titles for you. Microsoft Word is able to scan your document and find everything in the Heading 1 style and put that on the first level of your table of contents, put any Heading 2’son the second level of your table of contents, and so on. this is also known as an automatic index.</p>



<p></p>



<ol class="wp-block-list">
<li>Put your mouse where you want the table of contents to be placed. </li>



<li>Go to <strong>References</strong> > Table of contents and choose an automatic style as shown in the picture. </li>
</ol>



<figure class="wp-block-image size-large is-style-default"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="83" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/08/Screenshot_4-1024x133.png?resize=640%2C83&#038;ssl=1" alt="Image showing button location" class="wp-image-383" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_4.png?resize=1024%2C133&amp;ssl=1 1024w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_4.png?resize=300%2C39&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_4.png?resize=768%2C100&amp;ssl=1 768w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_4.png?w=1426&amp;ssl=1 1426w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_4.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="424" height="813" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/08/Screenshot_5.png?resize=424%2C813&#038;ssl=1" alt="" class="wp-image-384" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_5.png?w=424&amp;ssl=1 424w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_5.png?resize=156%2C300&amp;ssl=1 156w" sizes="auto, (max-width: 424px) 100vw, 424px" /></figure>



<p>3. If you make changes to your document that affect the table of contents, update the table of contents by right-clicking the table of contents and choosing&nbsp;<strong>Update Field</strong>.</p>



<p>4. You have succesfully created an table of contents. if in doubt or have other questions leave a message. </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="408" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/08/Screenshot_6.png?resize=640%2C408&#038;ssl=1" alt="" class="wp-image-385" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_6.png?w=920&amp;ssl=1 920w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_6.png?resize=300%2C191&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/08/Screenshot_6.png?resize=768%2C490&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p>Read one of my other tutorials that might apply to you like, <a href="https://it-tutorial.info/outlook-2016-automatic-signature/" target="_blank" rel="noreferrer noopener">Automatic outlook signature</a>.</p>
<p>The post <a href="https://it-tutorial.info/word-automatic-table-of-contents-index/">Word automatic table of contents (Index)</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/word-automatic-table-of-contents-index/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">382</post-id>	</item>
		<item>
		<title>Hirens BootCD Flash Drive</title>
		<link>https://it-tutorial.info/hirens-bootcd-flash-drive/</link>
					<comments>https://it-tutorial.info/hirens-bootcd-flash-drive/#comments</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Sun, 01 Mar 2020 22:08:22 +0000</pubDate>
				<category><![CDATA[Windows]]></category>
		<category><![CDATA[Hirens BootCD]]></category>
		<category><![CDATA[Hirens FlashDrive]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://epic-thompson.185-48-117-223.plesk.page/?p=298</guid>

					<description><![CDATA[<p>Hiren&#8217;s BootCD PE is a bootable DVD or USB that offers a Windows 10 pre-installed environment environment. And comes with a large number of programs for detecting and remedying hardware and software problems on the computer. Hiren is a notorious name, because the compilation CDs with system programs have existed since 2004. However in the [&#8230;]</p>
<p>The post <a href="https://it-tutorial.info/hirens-bootcd-flash-drive/">Hirens BootCD Flash Drive</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p> Hiren&#8217;s BootCD PE is a bootable DVD or USB that offers a Windows 10 pre-installed environment environment. And comes with a large number of programs for detecting and remedying hardware and software problems on the computer. Hiren is a notorious name, because the compilation CDs with system programs have existed since 2004. However in the past it was full of illegal software, but on Hiren&#8217;s BootCD PE 1.0.0 we only find completely free software.  This new version is therefore not offered by the original group, but is composed by fans of the original series.  </p>



<h2 class="wp-block-heading">Index</h2>



<ul class="wp-block-list">
<li>Download Hirens Iso</li>



<li>Formatting USB Flash Drive</li>



<li>Installation</li>



<li>How to use?</li>
</ul>



<h3 class="wp-block-heading">Step 1: Download</h3>



<p>Visit the site of Hirens BootCD and download the latest version (<a rel="noreferrer noopener" aria-label="link (opens in a new tab)" href="https://www.hirensbootcd.org/download/" target="_blank">link</a>). The download button is all the way down at the bottom of the page. </p>



<h3 class="wp-block-heading">Step 2: Formatting your flash drive</h3>



<p>Format your USB flash drive with windows formating. (right click on your drive and select format).</p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="253" height="460" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/03/Format.png?resize=253%2C460&#038;ssl=1" alt="Formating USB flash drive" class="wp-image-304" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/03/Format.png?w=253&amp;ssl=1 253w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/03/Format.png?resize=165%2C300&amp;ssl=1 165w" sizes="auto, (max-width: 253px) 100vw, 253px" /></figure>



<h3 class="wp-block-heading">Step 3: Installation</h3>



<p>For this installation you can use <a href="https://it-tutorial.info/how-to-create-a-bootable-usb-drive/">Rufus</a> or the downloaded file from above.</p>



<p>Install <a rel="noreferrer noopener" aria-label="Hirens Flash Boot (opens in a new tab)" href="https://www.hirensbootcd.org/files/ISO2USB.exe" target="_blank">Hirens Flash Boot</a> and launch it. </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="78" height="80" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/03/Exe.png?resize=78%2C80&#038;ssl=1" alt="Hirens Installation executable " class="wp-image-305"/></figure>



<p></p>



<p>Select the USB drive you want to use. Then click on the search icon select the hirens iso file.  If you have completed that click on &#8220;Process&#8221;, You will see a process bar at the bottom </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="373" height="307" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/03/process.png?resize=373%2C307&#038;ssl=1" alt="Selecting ISO and clicking process" class="wp-image-306" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/03/process.png?w=373&amp;ssl=1 373w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/03/process.png?resize=300%2C247&amp;ssl=1 300w" sizes="auto, (max-width: 373px) 100vw, 373px" /></figure>



<p>When finished you will see the following message.  </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="272" height="32" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/03/close.png?resize=272%2C32&#038;ssl=1" alt="Succes message" class="wp-image-307"/></figure>



<p>Close the program and eject your hard drive!</p>



<h3 class="wp-block-heading">How to use:</h3>



<p>Short explained: Reboot your laptop/computer/server with the usb flash drive plugged in. Note your boot option should be USB first than your main hard drive.</p>
<p>The post <a href="https://it-tutorial.info/hirens-bootcd-flash-drive/">Hirens BootCD Flash Drive</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/hirens-bootcd-flash-drive/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">298</post-id>	</item>
		<item>
		<title>How to setup Active Directory (AD) In Windows Server 2016</title>
		<link>https://it-tutorial.info/how-to-setup-active-directory-ad-in-windows-server-2016/</link>
					<comments>https://it-tutorial.info/how-to-setup-active-directory-ad-in-windows-server-2016/#respond</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Tue, 18 Feb 2020 09:00:00 +0000</pubDate>
				<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows Server 2016]]></category>
		<category><![CDATA[Active Directory Domain Controller]]></category>
		<guid isPermaLink="false">http://it-tutorial.info/?p=168</guid>

					<description><![CDATA[<p>Windows Server 2016 a server operating system released by Microsoft in October 12th, 2016. In this tutorial I will go through step by step on how to install the Active Directory ( AD ) role on Windows Server 2016. If you are setting up the server for production is recommended to set a static IP address on [&#8230;]</p>
<p>The post <a href="https://it-tutorial.info/how-to-setup-active-directory-ad-in-windows-server-2016/">How to setup Active Directory (AD) In Windows Server 2016</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Windows Server 2016 a server operating system released by Microsoft in October 12th, 2016. In this tutorial I will go through step by step on how to install the Active Directory ( AD ) role on Windows Server 2016. If you are setting up the server for production is recommended to set a <a href="https://it-tutorial.info/set-windows-server-2016-with-a-static-ip-address/">static IP address</a> on the server before you start the AD installation. Also before you start the AD installation, rename the server now if you need to, once you have installed the AD role on the server, it is not easy to change the name without breaking a lots of things.</p>



<h4 class="wp-block-heading">Table of Contents</h4>



<ul class="wp-block-list">
<li> <a href="#Install-Active-Directory">Install Active Directory </a></li>



<li><a href="#Setup-Domain-Controller">Setup Domain Controller</a></li>



<li><a href="#Conclusion">Conclusion</a></li>
</ul>



<p> <strong>Note:</strong>&nbsp;You need to have administrator privileges on the server to install AD </p>



<h3 class="wp-block-heading" id="Install-Active-Directory">Install Active Directory</h3>



<p>Login to the server, and click on the&nbsp;<strong>Start&nbsp;</strong>button, and then click on&nbsp;<strong>Server Manager:</strong></p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="636" height="685" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/open-server-manager.png?resize=636%2C685&#038;ssl=1" alt="" class="wp-image-250" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/open-server-manager.png?w=636&amp;ssl=1 636w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/open-server-manager.png?resize=279%2C300&amp;ssl=1 279w" sizes="auto, (max-width: 636px) 100vw, 636px" /></figure>



<p> On the Server Manager Dashboard, click on&nbsp;<strong>Add roles and features:</strong> </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="357" height="215" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/Screenshot_1-1.png?resize=357%2C215&#038;ssl=1" alt="" class="wp-image-251" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/Screenshot_1-1.png?w=357&amp;ssl=1 357w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/Screenshot_1-1.png?resize=300%2C181&amp;ssl=1 300w" sizes="auto, (max-width: 357px) 100vw, 357px" /></figure>



<p> The Add role and features wizard will come up: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="457" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-1.png?resize=640%2C457&#038;ssl=1" alt="" class="wp-image-252" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-1.png?w=787&amp;ssl=1 787w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-1.png?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-1.png?resize=768%2C548&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> Click on&nbsp;<strong>Next.&nbsp;</strong>On the following Installation type screen, choose the first option “<strong>Role-based or feature-based installation</strong>: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="456" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-2.png?resize=640%2C456&#038;ssl=1" alt="" class="wp-image-253" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-2.png?w=786&amp;ssl=1 786w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-2.png?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-2.png?resize=768%2C547&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> Click on&nbsp;<strong>Next.&nbsp;</strong>On the following screen select a server from the server pool. your local server should be listed: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="457" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-3.png?resize=640%2C457&#038;ssl=1" alt="" class="wp-image-254" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-3.png?w=785&amp;ssl=1 785w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-3.png?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-3.png?resize=768%2C548&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> On the following screen click on&nbsp;<strong>Active Directory Domain Services&nbsp;</strong>and the&nbsp;<strong>Add features&nbsp;</strong>window will pop-up: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="368" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-4.png?resize=640%2C368&#038;ssl=1" alt="" class="wp-image-255" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-4.png?w=977&amp;ssl=1 977w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-4.png?resize=300%2C173&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-4.png?resize=768%2C442&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> Click on&nbsp;<strong>Add Features&nbsp;</strong>and then click on&nbsp;<strong>Next.&nbsp;</strong>Make sure&nbsp;<strong>.NET 4.6 Features&nbsp;</strong>are checked on the following screen: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="460" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-5.png?resize=640%2C460&#038;ssl=1" alt="" class="wp-image-256" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-5.png?w=783&amp;ssl=1 783w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-5.png?resize=300%2C216&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-5.png?resize=768%2C552&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> Then click on&nbsp;<strong>Next.&nbsp;</strong>On the following screen you will get a short overview of what a domain controller does, and the services that get installed. if this is your first domain controller you will be prompted to install the&nbsp;DNS&nbsp;service which is required on a domain controller: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="461" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-6.png?resize=640%2C461&#038;ssl=1" alt="" class="wp-image-257" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-6.png?w=790&amp;ssl=1 790w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-6.png?resize=300%2C216&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-6.png?resize=768%2C553&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> Click on&nbsp;<strong>Next.&nbsp;</strong>click on&nbsp;<strong>Install&nbsp;</strong>on the confirmation window: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="455" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-7.png?resize=640%2C455&#038;ssl=1" alt="" class="wp-image-258" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-7.png?w=790&amp;ssl=1 790w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-7.png?resize=300%2C213&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-7.png?resize=768%2C546&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> The Installation will begin: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="462" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-8.png?resize=640%2C462&#038;ssl=1" alt="" class="wp-image-259" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-8.png?w=789&amp;ssl=1 789w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-8.png?resize=300%2C216&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-8.png?resize=768%2C554&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<h3 class="wp-block-heading" id="Setup-Domain-Controller">Setup Domain Controller</h3>



<p>Once the AD role has been installed. click on&nbsp;<strong>Promote this server to a domain controller</strong>:</p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="457" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-9.png?resize=640%2C457&#038;ssl=1" alt="" class="wp-image-260" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-9.png?w=790&amp;ssl=1 790w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-9.png?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-9.png?resize=768%2C548&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> And the deployment configuration wizard will come up. Select&nbsp;<strong>Add new forest&nbsp;</strong>and choose your&nbsp;<strong>Root domain name:</strong> </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="468" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-10.png?resize=640%2C468&#038;ssl=1" alt="" class="wp-image-261" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-10.png?w=771&amp;ssl=1 771w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-10.png?resize=300%2C219&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-10.png?resize=768%2C562&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> click on&nbsp;<strong>Next.&nbsp;</strong>on the next screen choose your&nbsp;<strong>Forest functional level&nbsp;</strong>and enter the&nbsp;<strong>Directory Service Restore Mode&nbsp;</strong>password: If this is your first domain controller choose “<strong>Windows Server 2016”&nbsp;</strong>as the Forest and Domain functional level. make sure the&nbsp;<strong>DNS&nbsp;</strong>option is checked, and because this is my first server, the&nbsp;<strong>Global Catalog</strong>&nbsp;( GC) is already checked. click on&nbsp;<strong>Next</strong>: Skip the DNS options</p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="471" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-11.png?resize=640%2C471&#038;ssl=1" alt="" class="wp-image-262" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-11.png?w=762&amp;ssl=1 762w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-11.png?resize=300%2C221&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> Choose the&nbsp;<strong>NetBIOS domain name</strong>&nbsp;(already selected ) and click&nbsp;<strong>Next&nbsp;</strong>choose the paths for the the AD database, normally the defaults are OK </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="472" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-13.png?resize=640%2C472&#038;ssl=1" alt="" class="wp-image-264" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-13.png?w=760&amp;ssl=1 760w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-13.png?resize=300%2C221&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> Review Options: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="471" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-15.png?resize=640%2C471&#038;ssl=1" alt="" class="wp-image-266" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-15.png?w=759&amp;ssl=1 759w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-15.png?resize=300%2C221&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> Click on&nbsp;<strong>Next.</strong> </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="474" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-16.png?resize=640%2C474&#038;ssl=1" alt="" class="wp-image-267" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-16.png?w=765&amp;ssl=1 765w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-16.png?resize=300%2C222&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> Do the Prerequisites check. if all the prerequisites check successfully. click on&nbsp;<strong>Install</strong> </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="467" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-17.png?resize=640%2C467&#038;ssl=1" alt="" class="wp-image-268" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-17.png?w=764&amp;ssl=1 764w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-17.png?resize=300%2C219&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> The Installation should begin. the server will reboot automatically when the installation finishes: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="472" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-18.png?resize=640%2C472&#038;ssl=1" alt="" class="wp-image-269" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-18.png?w=767&amp;ssl=1 767w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-18.png?resize=300%2C221&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> This message will pop-up on your screen when Windows Server 2016 is about reboot:</p>



<figure class="wp-block-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/ittutorials.net/wp-content/uploads/image_thumb-364.png?w=640&#038;ssl=1" alt="image"/></figure>



<p> After your server reboots, you will have the option to login to your newly created network: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="347" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-19-1024x555.png?resize=640%2C347&#038;ssl=1" alt="" class="wp-image-270" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-19.png?resize=1024%2C555&amp;ssl=1 1024w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-19.png?resize=300%2C163&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-19.png?resize=768%2C416&amp;ssl=1 768w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-19.png?resize=1536%2C832&amp;ssl=1 1536w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-19.png?w=1713&amp;ssl=1 1713w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-19.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p> after you’re logged using your domain credentials, go to&nbsp;<strong>Administrative tools&nbsp;</strong>and open&nbsp;<strong>Active Directory Users and Computers&nbsp;</strong>to make sure your AD is working: </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="448" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/step-20.png?resize=640%2C448&#038;ssl=1" alt="" class="wp-image-271" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-20.png?w=754&amp;ssl=1 754w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/step-20.png?resize=300%2C210&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<h3 class="wp-block-heading" id="Conclusion">Conclusion</h3>



<p>As you can see, installing Active Directory (AD) in Windows server 2016 is not much different than Installing AD in previous Windows server releases. I hope you found this guide useful. If you have any question please use the comments section below</p>



<p></p>
<p>The post <a href="https://it-tutorial.info/how-to-setup-active-directory-ad-in-windows-server-2016/">How to setup Active Directory (AD) In Windows Server 2016</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/how-to-setup-active-directory-ad-in-windows-server-2016/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">168</post-id>	</item>
		<item>
		<title>How to find anonymous email sender</title>
		<link>https://it-tutorial.info/how-to-find-anonymous-email-sender/</link>
					<comments>https://it-tutorial.info/how-to-find-anonymous-email-sender/#respond</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Sat, 15 Feb 2020 23:00:00 +0000</pubDate>
				<category><![CDATA[Office]]></category>
		<category><![CDATA[anonymous email]]></category>
		<category><![CDATA[anonymous gmail]]></category>
		<category><![CDATA[anonymous outlook mail]]></category>
		<category><![CDATA[anonymous yahoo mail]]></category>
		<category><![CDATA[how to trace anonymous email]]></category>
		<category><![CDATA[how to trace email]]></category>
		<category><![CDATA[how to track email]]></category>
		<category><![CDATA[trace anonymous emails]]></category>
		<category><![CDATA[Track anonymous emails]]></category>
		<guid isPermaLink="false">https://epic-thompson.185-48-117-223.plesk.page/?p=221</guid>

					<description><![CDATA[<p>It&#8217;s remarkably easy to send emails anonymously, hiding one&#8217;s own address and sometimes even making it look as if the email originated from another person&#8217;s address. While anonymous emails can be innocent &#8212; sending a compliment or playing a harmless prank for example. They can also be threatening or abusive, they might try to get [&#8230;]</p>
<p>The post <a href="https://it-tutorial.info/how-to-find-anonymous-email-sender/">How to find anonymous email sender</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>It&#8217;s remarkably easy to send emails anonymously, hiding one&#8217;s own address and sometimes even making it look as if the email originated from another person&#8217;s address. While anonymous emails can be innocent &#8212; sending a compliment or playing a harmless prank for example. They can also be threatening or abusive, they might try to get your bank information. Finding out where anonymous emails come from can be an important step in putting a stop to the harassment. </p>



<h2 class="wp-block-heading">Index</h2>



<ul class="wp-block-list">
<li>Outlook</li>



<li>Gmail</li>



<li>Yahoo Mail</li>
</ul>



<p>&#8220;insert image here&#8221;</p>



<h3 class="wp-block-heading" id="Outlook">Outlook</h3>



<p>How to track anonymous email using outlook.</p>



<h4 class="wp-block-heading">Step 1</h4>



<p>Start your Outlook application. Double click on the anonymous message in your inbox to open it in a new window. </p>



<h4 class="wp-block-heading">Step 2</h4>



<p>Click &#8220;File&#8221; at the top left of the screen to open the File Menu. Select &#8220;Properties&#8221;. Select the &#8220;Details tab&#8221;. Click on &#8220;Message source&#8221;. This will open the full headers for the email, including the IP address (Link <a href="https://en.wikipedia.org/wiki/IP_address">IP address</a> explained) of the sender.</p>



<h4 class="wp-block-heading">Step 3</h4>



<p>Navigate to an IP tracking site such as <a href="http://www.ipchecking.com/">IPchecking.com</a>, <a href="https://www.iptrackeronline.com/">IPtrackeronline.com</a> or <a href="https://www.iplocation.net/">iplocation.net</a>. Copy and paste the IP address from the anonymous email you found into the appropriate field. </p>



<p><strong>These trackers may give you the following information. Name, Address of the sender, if not it may give you a location or other useful data that will help you track down the sender. </strong></p>



<figure class="wp-block-image size-medium is-resized"><img data-recalc-dims="1" loading="lazy" decoding="async" width="300" height="150" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/Static-ip-1-300x150.png?resize=300%2C150&#038;ssl=1" alt="" class="wp-image-240" style="width:334px;height:167px" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/Static-ip-1.png?resize=300%2C150&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/Static-ip-1.png?w=500&amp;ssl=1 500w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption class="wp-element-caption">Gmail</figcaption></figure>



<h3 class="wp-block-heading">Gmail </h3>



<p>How to track anonymous email using gmail. </p>



<h4 class="wp-block-heading">Step 1</h4>



<p>Launch gmail and open the anonymous email you would like to trace. </p>



<h4 class="wp-block-heading">Step 2</h4>



<p>Click on the tree dots (located next to the &#8220;Reply button&#8221;). Choose &#8220;Show original&#8221;, This will open a new window with the full email header.  in here you will find the sender&#8217;s <a href="https://en.wikipedia.org/wiki/IP_address">IP address</a>. </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="141" height="54" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/Screenshot_1.png?resize=141%2C54&#038;ssl=1" alt="" class="wp-image-238"/></figure>



<h4 class="wp-block-heading">Step 3</h4>



<p> Navigate to an IP tracking site such as <a href="http://www.ipchecking.com/">IPchecking.com</a>, <a href="https://www.iptrackeronline.com/">IPtrackeronline.com</a> or <a href="https://www.iplocation.net/">iplocation.net</a>. copy and paste the ip address here.   The tracking site might give you some useful information. </p>



<h3 class="wp-block-heading">Yahoo mail</h3>



<h4 class="wp-block-heading">Step 1</h4>



<p>Launch yahoo mail. Open the email you want to trace</p>



<h4 class="wp-block-heading">Step 2</h4>



<p>Click on the cogwheel icon with the downwards pointing arrow to open the more actions menu. Click &#8220;view full headers&#8221;.</p>



<h4 class="wp-block-heading">Step 3</h4>



<p>Launch an IP tracking site or an email address tracking site. Copy and paste the originating IP or the full email header as appropriate. Record any information that the IP or email tracking site returns.</p>



<h3 class="wp-block-heading">Tips</h3>



<ul class="wp-block-list">
<li>Save anonymous or harassing emails and keep a detailed record of everything you find out. This may be useful if your planning on taking actions later. </li>



<li>If the emails are abusive or threatening, contact your local authorities. You could also contact the sender&#8217;s parents, educational establishment or an employer. </li>
</ul>



<h3 class="wp-block-heading">Warning</h3>



<ul class="wp-block-list">
<li>Always stay calm and respond appropriately to anonymous emails. They can be annoying and even distressing, but responding in kind or becoming abusive can escalate conflicts and may even get you some legal trouble. </li>



<li>What you do with the information of the sender is your own responsibility use it carefully. </li>
</ul>



<p>If you found this article helpfull and fun check out my other <a href="https://it-tutorial.info">articles</a>.</p>
<p>The post <a href="https://it-tutorial.info/how-to-find-anonymous-email-sender/">How to find anonymous email sender</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/how-to-find-anonymous-email-sender/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">221</post-id>	</item>
		<item>
		<title>How to create a bootable USB drive</title>
		<link>https://it-tutorial.info/how-to-create-a-bootable-usb-drive/</link>
					<comments>https://it-tutorial.info/how-to-create-a-bootable-usb-drive/#comments</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Tue, 11 Feb 2020 09:06:37 +0000</pubDate>
				<category><![CDATA[Windows]]></category>
		<category><![CDATA[Bootable USB drive RUFUS]]></category>
		<category><![CDATA[How to make a bootable USB drive]]></category>
		<guid isPermaLink="false">http://it-tutorial.info/?p=189</guid>

					<description><![CDATA[<p>This is a quick tutorial about how to make a bootable usb drive for any iso file. using software called Rufus Download and install Rufus Visit the rufus site and download 3.8 Insert USB and start Rufus Insert a usb drive in to your computer and remove all data from it. Then start the Rufus [&#8230;]</p>
<p>The post <a href="https://it-tutorial.info/how-to-create-a-bootable-usb-drive/">How to create a bootable USB drive</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="596" height="218" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/image.png?resize=596%2C218&#038;ssl=1" alt="" class="wp-image-190" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/image.png?w=596&amp;ssl=1 596w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/image.png?resize=300%2C110&amp;ssl=1 300w" sizes="auto, (max-width: 596px) 100vw, 596px" /></figure>



<p>This is a quick tutorial about how to make a bootable usb drive for any iso file. using software called Rufus</p>



<h3 class="wp-block-heading">Download and install Rufus</h3>



<p>Visit the<a href="https://rufus.ie/"> rufus site</a> and download 3.8 </p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="181" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/image-1.png?resize=640%2C181&#038;ssl=1" alt="" class="wp-image-192" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/image-1.png?w=819&amp;ssl=1 819w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/image-1.png?resize=300%2C85&amp;ssl=1 300w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/image-1.png?resize=768%2C218&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<h2 class="wp-block-heading">Insert USB and start Rufus</h2>



<p>Insert a usb drive in to your computer and remove all data from it. Then start the Rufus application you downloaded in the step above. </p>



<figure class="wp-block-image size-large is-resized"><img data-recalc-dims="1" loading="lazy" decoding="async" width="284" height="56" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/image-2.png?resize=284%2C56&#038;ssl=1" alt="" class="wp-image-195" style="width:310px;height:61px"/></figure>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" loading="lazy" decoding="async" width="423" height="545" src="https://i0.wp.com/epic-thompson.185-48-117-223.plesk.page/wp-content/uploads/2020/02/image-4.png?resize=423%2C545&#038;ssl=1" alt="" class="wp-image-197" srcset="https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/image-4.png?w=423&amp;ssl=1 423w, https://i0.wp.com/it-tutorial.info/wp-content/uploads/2020/02/image-4.png?resize=233%2C300&amp;ssl=1 233w" sizes="auto, (max-width: 423px) 100vw, 423px" /></figure>



<p>Select your device (USB drive name)</p>



<h2 class="wp-block-heading">Select your ISO File</h2>



<p>Click on select and choose the location where iso file is saved. then click on start.</p>



<p>When finished close Rufus and remove the USB drive. if you have finished all the steps the USB drive will be bootable. </p>



<p>Be sure to check out my other posts on this <a href="https://it-tutorial.info">website. </a></p>
<p>The post <a href="https://it-tutorial.info/how-to-create-a-bootable-usb-drive/">How to create a bootable USB drive</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/how-to-create-a-bootable-usb-drive/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">189</post-id>	</item>
		<item>
		<title>Set Windows Server 2016 with a static IP address</title>
		<link>https://it-tutorial.info/set-windows-server-2016-with-a-static-ip-address/</link>
					<comments>https://it-tutorial.info/set-windows-server-2016-with-a-static-ip-address/#comments</comments>
		
		<dc:creator><![CDATA[Ryan123]]></dc:creator>
		<pubDate>Sun, 09 Feb 2020 21:39:00 +0000</pubDate>
				<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows Server 2016]]></category>
		<category><![CDATA[Domain Controller]]></category>
		<category><![CDATA[IPV4]]></category>
		<category><![CDATA[Static IP]]></category>
		<guid isPermaLink="false">http://it-tutorial.info/?p=180</guid>

					<description><![CDATA[<p>In this post I am going to show you how to set a Static IPV4 addres in Windows Server 2016 If you are setting up Windows Server 2016 as a domain controller or as any other production server function in your network it is recommended that you set it up with a static IP address. [&#8230;]</p>
<p>The post <a href="https://it-tutorial.info/set-windows-server-2016-with-a-static-ip-address/">Set Windows Server 2016 with a static IP address</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In this post I am going to show you how to set a Static IPV4 addres in Windows Server 2016</p>



<p>If you are setting up Windows Server 2016 as a domain controller or as any other production server function in your network it is recommended that you set it up with a static IP address. This is a quick how to guide on how to do that.</p>



<p><strong>Note</strong>:&nbsp;<em>you need an administrator account on the server to set your Windows 2016 server with a static IP address</em>&nbsp;</p>



<p>Login to your Windows 2016 server, and click on the&nbsp;<strong>Start&nbsp;</strong>button, and then click on the&nbsp;<strong>Control Panel:</strong></p>



<figure class="wp-block-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/ittutorials.net/wp-content/uploads/2016/02/image_thumb-128.png?w=640&#038;ssl=1" alt="image"/></figure>



<p> Then click on&nbsp;<strong>View network status and tasks&nbsp;</strong>under the Network and Internet applet: </p>



<figure class="wp-block-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/ittutorials.net/wp-content/uploads/2016/02/image_thumb-129.png?w=640&#038;ssl=1" alt="image"/></figure>



<p> Then click on&nbsp;<strong>Change adapter settings&nbsp;</strong>on the left menu: </p>



<figure class="wp-block-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/ittutorials.net/wp-content/uploads/2016/02/image_thumb-130.png?w=640&#038;ssl=1" alt="image"/></figure>



<p> then&nbsp;<strong>right-click&nbsp;</strong>on your network connection, and select&nbsp;<strong>Properties:</strong> </p>



<figure class="wp-block-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/ittutorials.net/wp-content/uploads/2016/02/image_thumb-131.png?w=640&#038;ssl=1" alt="image"/></figure>



<p> Select&nbsp;<strong>Internet Protocol Version 4 (TCP/IPv4)&nbsp;</strong>and then click on&nbsp;<strong>Properties</strong>: </p>



<figure class="wp-block-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/ittutorials.net/wp-content/uploads/2016/02/image_thumb-132.png?w=640&#038;ssl=1" alt="image"/></figure>



<p> Enter the IP address you want to assigned to this server, the Network Mask, Default Gateway, and the&nbsp;DNS&nbsp;IP address: </p>



<figure class="wp-block-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/ittutorials.net/wp-content/uploads/2016/02/image_thumb-133.png?w=640&#038;ssl=1" alt="image"/></figure>



<p> Click&nbsp;&nbsp;<strong>OK&nbsp;</strong>and then reboot the server. </p>



<p></p>
<p>The post <a href="https://it-tutorial.info/set-windows-server-2016-with-a-static-ip-address/">Set Windows Server 2016 with a static IP address</a> appeared first on <a href="https://it-tutorial.info">IT-Tutorial</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://it-tutorial.info/set-windows-server-2016-with-a-static-ip-address/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">180</post-id>	</item>
	</channel>
</rss>
