Contact Firewall.cx
Articles That Might Interest:
Web Application Vulnerability Scanners
Web Application Vulnerabilities – Benefits of Aut…
This article examines the differences between logical and technical web application vulnerabilities which tends to be a very confusing topic especially for web application developers and security – p…
Network Fundamentals
Network Broadcast
The term "Broadcast" is used very frequently in the networking world . You will see it in most networking books and articles, or see it happening on your hub/switch when all the LED's start flashing…
VLAN Networks
VLANs - Access & Trunk Links
If you've read our previous article The VLAN Concept - Introduction to VLANs then you should feel comfortable with terms such as 'VLAN', 'Static & Dynamic VLANs', however this is just…
Windows Servers
The Importance of a Comprehensive Backup Strategy…
People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong method of backing up data however in order to backu…
Routing
OSPF - Part 4: OSPF Neighbor States – OSPF Neighb…
This is the third article of our OSPF series which analyzes the different OSPF States routers go through during the OSPF discovery and neighbor forming process. We analyze OSPF states (Init state, 2-…
Windows Servers
Windows Server 2012 File Server Resources Manager…
The Windows Server 2008 first carried FSRM or Fie Server Resources Manager, which allowed administrators to define the file types that users could save to file servers. Windows FSRM has been a part o…
Palo Alto Networks
Introduction to Palo Alto Next-Generation Network…
During the past decade, we’ve seen the global IT security market flooded with new network security and firewall security appliances. New vendors emerging into the market while existing well-known ven…
Windows Workstations (XP, 7, 8, 10, 11)
How to View Hidden Files & Folders in Windows 7
This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see them while exploring your computer.
The reason behin…
Linux - Unix
Linux BIND DNS - Part 1: Introduction To The DNS…
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This article will explain the basic concepts of DNS BIND a…
Web Application Vulnerability Scanners
Acunetix v12: More Comprehensive, More Accurate a…
22nd May 2018: Acunetix, the pioneer in automated web application security software, has announced the release of version 12. This new version provides support for JavaScript ES7 to better analyse si…
VPN Services & Guides
Anonymous Browsing – Internet Privacy. Securing Y…
Despite what some think, the internet is not private. Anonymous browsing and Internet Privacy are almost non-existent in today's online world. Websites collect personal information on every visit wit…
Subnetting
IP Subnet Calculator
This free online Subnet Calculator provides a fast and easy way to calculate all aspects of any IP Address and Subnet Mask. Simply enter your desired IP Address and Subnet Mask below and press Calc…
Wi-Fi Key Generator
Follow Firewall.cx
Recommended Downloads
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!




