Search the tutorials:   

Privacy Policy – GDPR

Privacy Policy – GDPR Regulations Information on the processing of personal data (Article 13 of Legislative Decree no. 196/2003 – Privacy Code – Article 13 of the EU General Regulation on the protection of personal data No. 679/2016) Enter Srl, a limited liability Company that carries out software development and management consulting activities, based in […]

Read more »»

Restore/Repair Windows bootloader with Iperius Recovery Environment

Iperius Recovery Environment is the dedicated restore tool of Iperius Backup, downloadable directly from the software and bootable from USB drives or CD-ROM. In addition to the restore function of Iperius Drive Image backup (described step by step in this tutorial) it’s possible to use this environment for advanced system operations, including the resolution of some […]

Read more »»

Virtual machines and sandboxes. How to use them within VMware Workstation Player

In this article, we will talk about virtual machines and sandboxes. Although these two technologies share some features, they are basically different. What are the differences between virtual machines and sandboxes? Creating a virtual machine means reproducing a complete environment, including the operating system, drivers, file managers, and applications, within a physical host machine. In […]

Read more »»

Can I create a recovery disc with Iperius?

Yes, starting from version 6 Iperius Backup allows you to easily create a recovery disc, or more precisely an USB recovery drive or an .ISO file to be burned. The recovery drive can be created with just a few clicks, as shown in the related tutorial: https://www.iperiusbackup.net/en/create-recovery-drive-usb-recovery-disc-iso-iperius/ The recovery drive will contain Iperius Recovery Environment®, which will […]

Read more »»

Which is the difference between a Docker image and a container? How to create a docker file

In this article, we will go deeper into the difference between a Docker image and a container and create our Dockerfile to understand all the various phases of Docker container virtualization better. We have already talked about this system in a tutorial where we learned how to install Docker. But why talk about images and […]

Read more »»

Iperius Remote is now available also for Android and iOS

Iperius Remote is available as an APP for Android and iOS mobile devices! The Iperius Remote apps are free and allow you with a few clicks to connect in remote desktop to any Windows computer or server, directly from your phone or tablet! Download and try them now: iOS: https://apps.apple.com/us/app/iperius-remote/id1482138449 Android: https://play.google.com/store/apps/details?id=com.iperius.remote&hl=en The possibility of using the […]

Read more »»

How to activate and use Iperius Remote

Iperius Remote is a free software for remote desktop and remote support, available on Windows platforms and also as Android and iOS apps. However, the free version of Iperius Remote has some limitations that can make it less efficient for commercial use. Iperius Remote Free allows you to open only one remote desktop session at […]

Read more »»

Is there an Iperius Remote App available for iOS (iPad, iPhone)?

Yes, the Iperius Remote iOS App was released in October 2019 and is available for free download on the Apple Store (Iperius Remote is also available for Android). Thanks to the iOS app, you can also connect via remote desktop to Windows computers and servers from your iPhone and iPad. You can quickly check the status of remote servers, […]

Read more »»

Is there an Iperius Remote App available for Android?

Yes, the Iperius Remote Android App was released in September 2019 and is available for free download on the Google Play Store (Iperius Remote is also available for iOS). Thanks to the Android App you can connect to computers and servers via remote desktop with a simple touch. You can perform server maintenance operations or simply finish a job […]

Read more »»

Data encryption in backup operations. How to protect your privacy

Data encryption in backup operations is one of the most critical features that dedicated software must take into consideration, not only because it is a necessary measure, but also because there are laws to be respected. Every day, thanks to mobile devices and intensive use of several computer applications, we produce and make use of […]

Read more »»



   |<< Start   ‹‹ Previous   1 2 3 4 5 6 7  ... on 18   Next ››   End >>|