Contact Firewall.cx
Articles That Might Interest:
Subnetting
IP Subnetting - Part 2: Subnet Masks & Their Effe…
There are a few different ways to approach subnetting and it can get confusing because of the complexity of some subnets and the flexibility they offer. For this reason I created this little paragrap…
Windows Servers
How to Install/Enable Telnet Client for Windows S…
IT professionals frequently need connectivity and management tools. The Telnet Client is one of the most basic tools for such activities. Using this tool, you can connect to a remote Telnet server an…
Routing
OSPF - Part 5: Analysis of OSPF Link State Update…
This article explains how OSPF uses Link State Advertisement (LSA) to exchange information about the network topology between routers. When a router receives an LSA, it is stored in the Link-State Da…
OpManager - Network Monitoring & Management
Special Free Podcast Series: IT Operations Manage…
Learn how IT Experts and Managers take on their organization’s challenges while working remotely. How do you continue your IT Operation Management Strategy while at the same time ensuring Network Com…
ManageEngine
Free seminar: Discover how AIOps can alleviate IT…
Accelerating your digital transformation process requires your business to be composable. However, the prevalence of log data across modern dynamic IT infrastructures raises challenges in operat…
Cisco Routers
How and Why You Should Verify IOS Images On Cisco…
Chances are we’ve all needed to upgrade our Cisco’s device IOS software at some point. While upgrading the IOS software on a Cisco device is considered to be a fairly simple process, it can turn out…
Windows Workstations (XP, 7, 8, 10, 11)
Microsoft Windows XP - End of Life / End of Suppo…
A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead
With Windows XP End of Life & End of Support just around the corner (8th of April…
Linux - Unix
Linux BIND DNS - Part 5: Configure Secondary (Sla…
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creating your database zone files and configuring th…
Virtualization & VM Backup
How to Enable or Disable SSH on VMware ESXi via W…
SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administrators often find the need to perform advanced admin…
Web Application Vulnerability Scanners
Understanding, Avoiding & Protecting Against Cros…
This article explains what a web browser cookie is and examines how Cross Site Request Forgery work by allowing hackers to intercept and access web browser cookies from unaware users trying to l…
Windows Servers
Download Altaro Free VM Backup & Win a PlayStatio…
We have some exciting news for you today!
Altaro has launched a great contest in celebration of SysAdmin Day on 27th July!
They will be giving away Amazon eGift Cards to the first 100 eligible entr…
SASE & SD-WAN Networks
Configuring A SASE Unified Network: Data centers…
This article explores the need for Secure Access Service Edge (SASE) in today’s organizations. We show how one of the most advanced SASE platforms available, combines VPN and VPN and SD-WAN capabilit…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







