Contact Firewall.cx
Articles That Might Interest:
Network Cabling
10Base-T/2/5/F/35 - Ethernet
The 10Base-T UTP Ethernet and 10Base-2 Coax Ethernet were very popular in the early to mid 1990's when 100 Mbps network cards and hubs/switches were very expensive. Today's prices have dropped so muc…
VLAN Networks
Static VLANs
VLANs are usually created by the network administrator, assigning each port of every switch to a VLAN. Depending on the network infrastructure and security policies, the assignment of VLANs can be im…
Web Application Vulnerability Scanners
What is Cross-site Scripting (XSS)? Why XSS is a…
Part one of our two-part series on Cross-site scripting (XSS) explains what are XSS attacks. We also take a close look on how XSS exploits work (urls, cookies, web cache etc.) and analyze their impac…
Network Address Translation - NAT
Network Address Translation (NAT) Overload - Part…
NAT Overload is the most common NAT method used throughout all networks that connect to the Internet. This is because of the way it functions and the limitations it can overcome, and we'll explore al…
Cisco Services & Technologies
Fix Cisco VPN Client Break After Windows 10 Anniv…
Windows 10 latest update 1607 code named Anniversary update promises to introduce a number of significant enhancements including breaking your trustworthy Cisco IPSec VPN client. After installing the…
ManageEngine
Free seminar: Discover how AIOps can alleviate IT…
Accelerating your digital transformation process requires your business to be composable. However, the prevalence of log data across modern dynamic IT infrastructures raises challenges in operat…
Network Fundamentals
DoS & DDoS Attacks
A Denial of Service (DoS) attack is a malicious attempt to disrupt the normal functioning of a website, server or network by flooding it with traffic or overloading its resources. The aim of such an…
Cisco CallManager-CCME
CallManager Express & UC500 Series: Changing Back…
Cisco's CallManager Express (Cisco router platform & UC520, UC540 & UC560) offers a number of customisation features aimed to allow the CCME administrator customise the system to suite the cu…
Network Cabling
Unshielded Twisted Pair (UTP) - CAT 1 to CAT5, 5e…
Unshielded Twisted Pair (UTP) cable is most certainly by far the most popular cable around the world. UTP cable is used not only for networking but also for the traditional telephone (UTP-Cat 1). The…
Routing
Enhanced Interior Gateway Routing Protocol - EIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP), similar to IGRP, is a Cisco proprietary routing protocol that is used to exchange routing information between different routers within a network. E…
Windows Workstations (XP, 7, 8, 10, 11)
How to Enable Master Control Panel or Enable God…
Around 2007, an undocumented feature of Windows, called the God Mode, was published outside of documentation provided by Microsoft. This is the Windows Master Control Panel shortcut. Bloggers named i…
Cisco Switches
Complete Guide to DHCP Snooping, How it Works, Co…
This article covers popular Layer 2 & Layer 3 network attacks with a focus on DHCP Starvation Attacks, Man-in-the-Middle attacks, unintentional rogue DHCP servers and explains how security featur…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!