Skip to main content

Contact Firewall.cx

Articles That Might Interest:

Subnetting
There are a few different ways to approach subnetting and it can get confusing because of the complexity of some subnets and the flexibility they offer. For this reason I created this little paragrap…
Windows Servers
IT professionals frequently need connectivity and management tools. The Telnet Client is one of the most basic tools for such activities. Using this tool, you can connect to a remote Telnet server an…
Routing
This article explains how OSPF uses Link State Advertisement (LSA) to exchange information about the network topology between routers. When a router receives an LSA, it is stored in the Link-State Da…
OpManager - Network Monitoring & Management
Learn how IT Experts and Managers take on their organization’s challenges while working remotely. How do you continue your IT Operation Management Strategy while at the same time ensuring Network Com…
ManageEngine
Accelerating your digital transformation process requires your business to be composable. However, the prevalence of log data across modern dynamic IT infrastructures raises challenges in operat…
Cisco Routers
Chances are we’ve all needed to upgrade our Cisco’s device IOS software at some point. While upgrading the IOS software on a Cisco device is considered to be a fairly simple process, it can turn out…
Windows Workstations (XP, 7, 8, 10, 11)
A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead With Windows XP End of Life & End of Support just around the corner (8th of April…
Linux - Unix
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creating your database zone files and configuring th…
Virtualization & VM Backup
SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administrators often find the need to perform advanced admin…
Web Application Vulnerability Scanners
This article explains what a web browser cookie is and examines how Cross Site Request Forgery work by allowing hackers to intercept and access web browser cookies from unaware users trying to l…
Windows Servers
We have some exciting news for you today! Altaro has launched a great contest in celebration of SysAdmin Day on 27th July! They will be giving away Amazon eGift Cards to the first 100 eligible entr…
SASE & SD-WAN Networks
This article explores the need for Secure Access Service Edge (SASE) in today’s organizations. We show how one of the most advanced SASE platforms available, combines VPN and VPN and SD-WAN capabilit…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer