Contact Firewall.cx
Articles That Might Interest:
Windows Servers
Windows 2003 DNS Server Installation & Configurat…
DNS is used for translating host names to IP addresses and the reverse, for both private and public networks (i.e.: the Internet). DNS does this by using records stored in its database. On the Intern…
Web Application Vulnerability Scanners
Free Web Application Vulnerability Report (2019)…
Acunetix has just released their annual Web Application Vulnerability report which aims to provide security professionals, web application developers, system administrators, web server administrators…
Network Fundamentals
Controlling Broadcasts and Multicasts
The first step in controlling broadcast and multicast traffic is to identify which devices are involved in a broadcast or multicast storm. The following protocols can send broadcast or multicast pack…
Cisco Services & Technologies
Troubleshooting Cisco VPN Client Windows 7 - How…
This article shows how to fix the Cisco VPN Reason 442: Failed to enable Virtual Adapter error on the Windows 7 (32bit or 64bit) operating system. If you are a Windows 7 user, it's most likely you've…
Ethernet Protocol, CSMA/CD, Collisions
Differences Between Classic Ethernet And Fast Eth…
The two primary areas for concern when upgrading the network from 10Mbps to 100Mbps are cabling and hubs. As discussed on the Fast Ethernet Introduction page, in Fast Ethernet twisted pair cabling ne…
Windows Workstations (XP, 7, 8, 10, 11)
Revealing & Backing Up Your Windows 8 – Windows 8…
Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the Genuine Microsoft Label or Certificate Of Authenticit…
Network Protocols
ISDN Layers, Protocols & Components
Our previous article was an Introduction To The ISDN Protocol. This article dives a bit deeper by examining ISDN Layers, Protocols & Components.
ISDN uses circuit-switching to establish a physic…
Virtualization & VM Backup
SysAdmin Day 2020 - Get your Free Amazon Voucher…
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to keep going, despite all challenges thrown our way…
Windows Servers
Windows Server 2016 Licensing Made Easy – Underst…
This article describes the new Windows Server 2016 Licensing model (per-core licensing) Microsoft has implemented for its new server-based operating system. While the Windows Server 2012 Licensing mo…
Cisco Routers
Configuring Dynamic NAT (NAT Overload) On A Cisco…
NAT (Network Address Translation) is a method that allows the translation (modification) of IP addresses while packets/datagrams are traversing the network. Dynamic NAT enables multiple internal host…
Cisco CallManager-CCME
Introduction to Cisco Unified Communication Manag…
We have been hearing about VoIP for many years now and while some have never worked with it, it has become today's standard in IP Communications and Private Branch Exchange (PBX) or telephony center…
VLAN Networks
Comparing Traditional Flat & VLAN Networks
Designing and building a network is not a simple job. VLANs are no exception to this rule, in fact they require a more sophisticated approach because of the variety of protocols used to maintain and…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







