Protect your Lenovo Server
Contact WhatsApp
Search Results – Bison Knowledgebase

🔍 Results for “rule of 144”

Understanding the Rule of 72 & Rule of 144 (Simple Investing Guide)

When people invest money in stocks, mutual funds, or savings plans, one common question is:? “How long will it take for my money to grow?”The Rule of 72 and Rule of 144 are simple …

How to Restrict Email Communication to Approved Domains and Limit Attachment Size in Microsoft 365

Email remains one of the most common channels for data exchange—and also one of the most exploited attack vectors. Organizations handling financial, legal, or confidential informat…

How to Allow Specific Domains and Block All Other Emails in Microsoft 365 Using Mail Flow Rules (Step-by-Step Guide)

his detailed technical guide explains how to allow email communication only with specific domains and block all other domains in Microsoft 365 Business Basic, using Mail Flow (Tran…

How to Enable RDP Port (3389) Access in Sophos Firewall

RDP (Remote Desktop Protocol) allows remote access to Windows systems using port 3389. To enable secure RDP access through Sophos Firewall (SFOS), you must create a firewall rule a…

New PAN Rules 2026 – Revised Transaction Limits & Compliance Guide (India)

The Income-tax Rules 2026, notified by CBDT, introduce major changes in PAN (Permanent Account Number) requirements for financial transactions. These changes aim to: Improve fin…

Restricting Windows Server Access to India IP Addresses Only (Geo-IP Blocking)

Unauthorized access attempts on Windows Servers—especially via Remote Desktop Protocol (RDP)—are a common security risk. Servers exposed to the public internet are continuously sca…

How to Allow Specific Website (like http://xxx.xxxxxxxx.xxx ) in Sophos Firewall

Sophos Firewall provides powerful web filtering and security features, but sometimes it may block legitimate websites due to category filtering or SSL inspection. If you are unable…

Mughal Dynasty: Era, Founder, and List of All Badshah / Shanshah / Rulers

The Mughal Dynasty was one of the most important ruling dynasties in Indian history. This easy Knowledge Base article explains what the Mughal dynasty was, who started it, its era…

Google Workspace Compliance Features: Detailed Technical Overview with Practical Examples

Modern organizations must comply with data protection laws, industry regulations, internal governance policies, and audit requirements. Google Workspace provides a comprehensive se…

Types of Computer Monitor Technologies, Features, and Shortcut Commands for Daily Productivity and Gaming

Computer monitors are the primary visual interface between users and digital systems. Modern monitors incorporate advanced display panel technologies, refresh rates, resolutions, a…

Sikh Dynasty (Sikh Empire): Era, Rulers, and Founder

The Sikh Dynasty, commonly known as the Sikh Empire, was a powerful Sikh-ruled state in North India during the late 18th and early 19th centuries. This simple knowledge-base artic…

Rum (Rûm) Dynasty: Era, Founder, and List of All Sultans

The Rum Dynasty—also called the Sultanate of Rûm—was a Turkic Muslim kingdom that ruled large parts of Anatolia (modern Turkey). This easy knowledge-base article explains what the…

Horoscope Software Systems: Origin, Evolution, Major Platforms, and Technical Overview

Horoscope software systems are specialized applications designed to calculate, analyze, and present astrological charts and predictions based on astronomical data and established a…

Fix: “Tally is not running. Error no: 10061” While Exporting Data from TICK Production ERP to Tally Prime

When exporting accounting or inventory data from TICK Production ERP to Tally Prime, users may encounter the error: “Tally is not running. Error no: 10061” This error typically a…

Blocking Emails Containing PAN or Aadhaar Numbers in Google Workspace (Inbound & Outbound)

Indian organizations handling financial, identity, HR, or compliance-sensitive data must prevent accidental or unauthorized sharing of PAN (Permanent Account Number) and Aadhaar Nu…

Mahatma Gandhi: Life, Philosophy, Achievements, and His Role in India’s Independence

Mahatma Gandhi, born Mohandas Karamchand Gandhi, was one of the most influential leaders in world history. He led India’s struggle for independence from British rule through the ph…

Ping Fails After Updating A Record – Technical Diagnosis and Network-Level Analysis

This article provides a technical explanation and troubleshooting framework for scenarios where: DNS A records resolve correctly But ICMP ping fails (e.g., Destination Host…

Rome (Roman) Dynasty: Era, Founder, and Rulers

The Rome Dynasty, more correctly called the Roman Empire, was one of the most powerful civilizations in world history. This simple knowledge-base article explains what the Rome dy…

Hard Disk Data Recovery: History, Processes, Disk Types, Software, Firmware, Encryption, and Recovery Feasibility Over Time

Hard disk data recovery is the discipline of retrieving inaccessible, lost, corrupted, or deleted data from storage devices when normal access methods fail. As hard disk technologi…

Outlook SMTP Error Fixed in Google Workspace: Outbound Restriction + App Password Solution (Real Case Guide)

While configuring a Google Workspace email account in Microsoft Outlook, users may encounter the error: “The outgoing (SMTP) server doesn’t recognize your account. Please check yo…

Google Workspace Data Retention Policies – How to Protect and Preserve Business Data

Data retention policies define how long emails and files should be stored before they are automatically deleted or archived. In Google Workspace, administrators can configure reten…

Microsoft Outlook Features and Shortcut Commands for Everyday Productivity

Microsoft Outlook is a core productivity application used daily for email communication, calendar management, contacts, and task tracking. When used beyond basic email reading—by l…

Dual Monitor Lag in Extended Display: Understanding Refresh Rate Mismatch and Real-Time Performance Optimization

In modern computing environments—especially for professionals using dual displays for multitasking, remote support, or development—smooth cursor movement and real-time window trans…

7 Powerful Types of Google Forms Every SME Business Owner Should Use in 2026

Small and medium enterprises (SMEs) often struggle with manual data collection, customer communication, and process tracking. Many business owners still rely on phone calls, WhatsA…

Inventory Mismatch in Tally Prime – Simple Troubleshooting Guide

Inventory mismatch happens when:✔ Stock shown in Tally Prime ≠ Actual physical stockThis can create:Wrong stock reportsBilling problemsNegative stock issuesAudit confusionThe good …

Understanding PNG, JPG/JPEG, GIF, SVG, and Modern Image Formats – Technical Guide for IT Professionals

This knowledge base article provides a technical overview of common and modern image file formats, focusing on: Historical background Compression mechanisms Technical …

How to Choose the Right Laptop for Your Profession: Technical Guide, Specs, Workloads & Practical Recommendations

Selecting the right laptop is a mission-critical decision that affects productivity, user experience, and long-term satisfaction. Different professions and use cases — such as scho…

How to Download Ledger Statement in Zerodha (Kite & Console)

A ledger statement in Zerodha provides a complete financial record of all debits, credits, charges, and fund movements associated with your trading account. This document is essent…

Justdial: Local Search Platform Overview, Features, Benefits, Pros, and Cons

Justdial is one of India’s most widely used local search and business discovery platforms, designed to connect consumers with nearby businesses and service providers. It enables us…

Types of Laptops, Technologies, Features, Sizes, and Shortcut Commands for Daily Productivity and Gaming

Laptops have evolved from basic portable computers into highly specialized devices designed for office productivity, education, creative work, engineering, and high-performance gam…

Blockchain Technology: A Practical Technical Guide for IT and Enterprise Use

Blockchain technology is a distributed ledger system designed to record transactions in a secure, transparent, and tamper-resistant manner. Originally introduced as the foundation …

Internet of Things (IoT) & Connectivity (5G/6G): A Practical Technical Guide

The Internet of Things (IoT) refers to a network of physical devices embedded with sensors, software, and connectivity that enables them to collect and exchange data. Modern IoT de…

5 Apps to Use VPN on Your Mobile Phone (2026) – A Technical & Security Guide

Virtual Private Networks (VPNs) are a critical security tool for mobile users, especially when accessing the internet over public Wi-Fi or mobile data networks. In 2026, VPN usage …

CorelDRAW: Complete Version History, Ownership Timeline, and Modern Alternatives

CorelDRAW is a powerful vector graphic design software widely used for logo creation, illustrations, brochures, signboards, apparel designs, and more. Since its inception in the la…

Adobe PageMaker: Version History, Features, Origin, and Successor Software

Adobe PageMaker was one of the pioneering desktop publishing (DTP) software tools that revolutionized the print and publishing industry. Used for creating brochures, newsletters, b…

Disable Snipping Tool & Screen Capture Features in Windows (Technical Guide)

This Knowledge Base article provides a technical, administrator-focused guide for disabling the Snipping Tool and Windows screen capture mechanisms across Windows environments.It c…

Rulers of Delhi, India: Eras, Kings, Badshahs, and the Names of Delhi

Delhi is one of the oldest continuously inhabited cities in the world. Over thousands of years, it was ruled by Rajas, Maharajas, Sultans, Badshahs, and Emperors. This Knowledge B…

Why Are Most Country Flags Rectangular? Myths, Facts, and Countries with Different Flag Shapes

When we look at country flags, most of them are rectangular. But you may have noticed a few square flags and even one triangular flag in the world.This article explains, in simple…

Cygnet FACE – GST Compliance, Reconciliation & Automation Platform | Technical Knowledge Base

Cygnet FACE is an enterprise-grade GST compliance and reconciliation platform developed by Cygnet Infotech Private Limited. FACE (Fully Automated Compliance Engine) is designed to …

Real Estate in India (Commercial & Premium): Key Market Players, Registration Norms, Due Diligence, and Tax/Compliance “Claim” Process

Commercial and premium real estate in India typically includes: Commercial: office spaces, IT parks, retail malls, warehouses, industrial units, co-working assets Premium: …

Correct Domain Address Formats in Google Workspace Gmail Compliance & Email Restriction Policies

In Google Workspace (Gmail) Admin settings, address lists are commonly used to control allowlisting, blocklisting, and authentication requirements for inbound and outbound email.A …

How to Secure Office Computers – A Practical IT Security Guide

Office computers store sensitive business data such as customer information, financial records, emails, credentials, and intellectual property. A single compromised system can lead…

CCTV Cameras in India: Types, Brands, Lenses, Vision, Quality Metrics, and How to Choose the Right System

CCTV systems range from simple home Wi-Fi cameras to enterprise-grade IP surveillance with AI analytics, centralized recording, and cybersecurity controls. Choosing the right camer…

Health Effects of Long Hours on Laptops and Computer Screens (10–12 Hours): Risks, Posture Issues, and Practical Remedies

Extended computer use—10 to 12 hours per day on laptops or desktop screens—has become common among IT professionals, accountants, designers, developers, and remote workers. While p…

IT Trending Topics: Strategic Insights for IT Leaders

Staying current with IT trending topics is essential for IT leaders responsible for strategy, resilience, and long-term competitiveness. Rapid advances in cloud platforms, artifici…

Evolution of Indian Currency – Origin, Denominations, and RBI Governance History

Indian currency has a rich historical evolution shaped by ancient trade systems, colonial rule, and modern financial governance. Today, the Indian Rupee (₹) is regulated by the Res…

Ransomware Attacks: Should You Pay the Ransom? Risks, Recovery Strategies, and Best Practices

Ransomware attacks have become one of the most dangerous and financially damaging forms of cybercrime. Attackers encrypt critical data and demand payment (usually in cryptocurrency…

Comprehensive Guide to Ransomware: Types, Damage Impact, and Recovery Techniques

Ransomware is one of the most dangerous forms of malware in modern cybersecurity. It encrypts files or locks systems and demands a ransom payment (usually in cryptocurrency) for re…

Ransomware Attack Analysis: Understanding “systemofadown@cyberfear.com ” Infection Pattern, Data Impact, and Recovery Strategies

Ransomware attacks have become one of the most dangerous cybersecurity threats for businesses and individuals. A typical indicator of such an attack is the modification of file nam…

How to Choose the Right Laptop Based on Job Profile (India – 2026 Guide)

Choosing a laptop for work is very different from buying one for study. Each profession demands specific performance, reliability, and features. A wrong choice can slow productivit…