Contact Firewall.cx
Articles That Might Interest:
Virtualization & VM Backup
The Backup Bible. A Free Complete Guide to Disast…
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divided into 3 core parts, including 11 customizable tem…
Network Fundamentals
LAN Network Topologies
Network topologies can take a bit of time to understand when you're all new to this kind of cool stuff, but it's very important to fully understand them as they are key elements to understanding and…
VPN Services & Guides
VPN For Torrenting, P2P and File Sharing. Test An…
The word torrenting is often viewed as synonymous with pirating. It’s seen as a shady and illegal practice, used to con hard working artists out of their money. As a result, internet service provider…
Cisco Routers
How To Secure Your Cisco Router Using Cisco AutoS…
In today’s complex network environments securing your network routers can be a daunting task, especially when there are so many CLI commands and parameters with different security implications for yo…
Routing
OSPF - Part 3: OSPF Adjacency & Neighbor Forming…
This is the thrid article of our 6-part OSPF series (see below) that describes how OSPF routers perform neighbor relationship and adjacency. We’ll examine how OSPF discovers neighbors by sending Hell…
Network Cabling
LPT Ports & Modes (SPP, EPP, ECP) - Parallel Dire…
The Parallel Direct Connection is the second solution covering the transfer of data from one computer to another. The cable required is slightly more complicated as it has more wires that need to be…
Cisco Routers
Configuring Cisco Site to Site IPSec VPN with Dyn…
This article serves as an extension to our popular Cisco VPN topics covered here on Firewall.cx. While we’ve covered Site to Site IPSec VPN Tunnel Between Cisco Routers (using static public IP addres…
Windows Workstations (XP, 7, 8, 10, 11)
Configure Windows 8 & 8.1 To Provide Secure Wirel…
Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wireless access point, allowing wireless clients (inc…
Windows Servers
Installing Windows Server 2012 Active Directory v…
This article serves as an Active Directory tutorial covering installation and setup of a Windows 2012 Domain Controller using Windows Server Manager (GUI).
Readers interested in performing the insta…
Ethernet Protocol, CSMA/CD, Collisions
IEEE 802.3 Interframe Spacing
The IEEE 802.3 specification states that before a station can attempt to transmit on the wire, it must first wait until it has heard 9.6 microseconds of silence. Many popular myths have arisen surrou…
Cisco CallManager-CCME
Unity Express License Setup & Installation - Soft…
Unity Express provides any organization with a quick and convenient way to manage voicemail, auto attendant and interactive voice response (IVR) services. These services are provided within the…
Linux - Unix
Finding More Information On The Linux Operating S…
Since this document merely scratches the surface when it comes to Linux, you will probably find you have lots of questions and possibly problems. Whether these are problems with the operating system…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







