Contact Firewall.cx
Articles That Might Interest:
Cisco Routers
Cisco Type 7 Password Decrypt / Decoder / Crack T…
The Firewall.cx Cisco Password Decoder Tool (see below) provides readers with the ability to decrypt 'Type 7' cisco passwords.
For security reasons, we do not keep any history of decoded passwords…
Network Protocol Analyzers
How to Detect Routing Loops and Physical Loops wi…
When working with medium to large scale networks, IT departments are often faced dealing with network loops and broadcast storms that are caused by user error, faulty network devices or incorrect con…
Windows Servers
Configuring Local Group Policy for Windows 2003
Windows 2003 Group Policies allow the administrators to efficiently manage a group of people accessing a resource. Group policies can be used to control both the users and the computers.
They give b…
Cisco Routers
How To Fix Cisco Configuration Professional (CCP)…
Cisco Configuration Professional (CCP) is Cisco’s latest GUI administration tool used to administer Cisco routers. CCP is basically the next step up from the popular Security Device Manager or SDM. U…
Security Service Edge (SSE)
Security Service Edge (SSE) Limitations & Disadva…
This article explores the Security Service Edge (SSE) portion of Secure Access Service Edge (SASE) and the need for holistic cybersecurity protections.
We lightly touch upon the drivers for tighter…
IP Protocol
IP Protocol - Part 2: The Internet Protocol (IP)…
This article examines the Internet Protocol (IP) and its position within the OSI Model. We take a look at the IP Header and all fields contained within an Ethernet frame. Further examination of the I…
Network Fundamentals
Media Access Control - MAC Addresses
A MAC address, or Media Access Control address, is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. It i…
The OSI Model
The OSI Model: Layer 4 - Transport Layer
The Transport layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, data transfer and tear down of virtual circuits. It also hides details of…
SASE & SD-WAN Networks
Complete Guide to SD-WAN. Technology Benefits, SD…
SD-WAN is the answer for enterprises and organizations seeking to consolidate network functions and services while at the same time simplify their WAN infrastructure and its management.
SD-WANs are…
OpManager - Network Monitoring & Management
Free Webinar: Clients' network configuration and…
Defending your client's network from faulty configuration changes, poor compliance, and bringing the network back quickly from downtime can be challenging. It requires a lot of effort and time, a fai…
VLAN Networks
VLAN Security - Making the Most of VLANs
It's easy to see why virtual LANs have become extremely popular on networks of all sizes. In practical terms, multiple VLANs are pretty much the same as having multiple separate physical networks wit…
Web Application Vulnerability Scanners
Web Application Security Best Practices that Help…
Successful web application attacks and the data breaches that are resulting from these attacks, have now become everyday news, with large corporations being hit constantly.
Our article covering majo…
Your IP address:
216.73.216.45
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!