Contact Firewall.cx
Articles That Might Interest:
Network Cabling
Serial Direct Cable Connection, DB9, DB25, COM Po…
This article covers the popular serial ports on workstations, servers and laptop computers. We cover serial data transfer, port pinouts, port speeds, serial interface types (DB9 & DB25), null mod…
Windows Servers
How to Enable ‘Web Server’ Certificate Template O…
In this article we will show you how to enable the ‘Web Server’ certificate template option on a Windows Certification Authority (Windows CA) Server. The Web Server option is usually not presen…
Cisco Services & Technologies
Comparing DMVPN Single Tier and Dual Tier Headend…
This article extends our DMVPN article series by answering common questions regarding the differences between Single Tier Headend and Dual Tier Headend architectures.
When hearing the DMVPN terms si…
Network Protocol Analyzers
Improve Network Analysis Efficiency with Colasoft…
Troubleshooting network problems can be a very difficult and challenging task. While most IT engineers use a network analyzer to help solve network problems, when analyzing hundreds or thousands of p…
Windows Workstations (XP, 7, 8, 10, 11)
How To Change & Configure An IP Address or Set to…
Not many users are aware that Windows 7 provides more than one way to configure a workstation’s network adaptor IP address or force it to obtain an IP address from a DHCP server. While the most popul…
SASE & SD-WAN Networks
Key Features of a True Cloud-Native SASE Service…
Secure Access Service Edge (SASE) is an architecture widely regarded as the future of enterprise networking and security. In previous articles we talked about the benefits of a converged, cloud-deliv…
Cisco CallManager-CCME
Configuring CallManager Express (CME) To Support…
Cisco is continuously developing its CallManager Express product, introducing new features and services to help keep up with its customers' and the market’s demands.
With the rapid increase of the m…
Routing
OSPF - Part 2: How OSPF Protocol Works & Basic Co…
This article covers basic OSPF concepts and operation. We explain how OSPF works, how OSPF tables are built on an OSPF-enabled router and their purpose (Neighbour Table, Topology Table, Routing Table…
Linux - Unix
Critical 15 Year-old Linux Security Hole (Ghost)…
Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux systems dated back to the year 2000. The newly pu…
Palo Alto Networks
The Benefits of Palo Alto Networks Firewall Singl…
What makes Palo Alto Networks Next-Generation Firewall (NGFW) so different from its competitors is its Platform, Process and Architecture. Palo Alto Networks delivers all the next generation firewall…
Windows Servers
How to Enable & Configure Shadow Copy for Shared…
When you shadow copy a disk volume, you are actually generating a snapshot of the changes made to the folders and files within the disk volume at a certain point in time. Windows 2012 R2 shadow copy…
Linux - Unix
The Linux Command Line
You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is the heart of Linux. We also advise you to go through…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







