Contact Firewall.cx
Articles That Might Interest:
TCP - UDP Protocol Analysis
UDP Protocol - Header
This article covers the UDP protocol. We examine the structure of the UDP header, the protocols that use UDP as a transport plus a lot more.
Some common protocols which use UDP are: DNS, TFTP, ARP…
Windows Workstations (XP, 7, 8, 10, 11)
Installing The ‘Unsupported’ Profilic USB-to-Seri…
Thanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers as they are used to perform the initial configuratio…
Linux - Unix
Linux BIND DNS - Part 5: Configure Secondary (Sla…
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creating your database zone files and configuring th…
Subnetting
IP Subnetting - Part 5: Subnetting Guidelines
There is always that day when you are called upon to provide a solution to a network problem. The number of problems that can occur in a network are numerous and believe it or not, most of them can b…
Linux - Unix
Linux BIND DNS - Part 6: Linux BIND - DNS Caching
In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all the information about authoritative DNS servers the do…
Network Protocols
Understanding VPN IPSec Tunnel Mode and IPSec Tra…
IPSec’s protocol objective is to provide security services for IP packets such as encrypting sensitive data, authentication, protection against replay and data confidentiality.
As outlined in our IP…
ICMP Protocol
ICMP Protocol - Part 6: Redirect Messages
The ICMP - Redirect Message is always sent from a gateway to the host and the example below will illustrate when this is used.
Putting it simply (before we have a look at the example) the ICMP - Red…
Ethernet Protocol, CSMA/CD, Collisions
Migrating From Ethernet To Fast Ethernet
In this article we will analyze the following aspects of upgrading/migrating from 10Mbit Ethernet to 100Mbit Ethernet.
Cabling
Incompatible Implementations
Repeaters In Fast Ethernet
Replacemen…
Palo Alto Networks
Complete Guide to Upgrading Palo Alto Firewall PA…
Upgrading your Palo Alto Firewall or Panorama Management System to the preferred PAN-OS release is always recommended as it ensures it remains stable, safe from known vulnerabilities and exploits but…
Linux - Unix
Linux VIM / Vi Editor - Tutorial - Basic & Advanc…
When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operations, you would like to do something meaningful as wel…
Windows Servers
The Importance of a Comprehensive Backup Strategy…
People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong method of backing up data however in order to backu…
Linux - Unix
Installation and Configuration of Linux DHCP Serv…
For a cable modem or a DSL connection, the service provider dynamically assigns the IP address to your PC. When you install a DSL or a home cable router between your home network and your modem, your…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







