Skip to main content

Microsoft Server Articles:

Windows Servers

Creating a Virtual Machine in Windows Hyper-V. ...

Our previous articles covered basic concepts of Virtualization along with the installation and monitoring of Windows 2012 Hyper-V. This article tak...
Windows Servers

Introduction To Windows Server 2012 R2 Virtuali...

FREE Hyper-V & VMware Backup:  FREE for Firewall.cx readers for a Limited Time!  Download Now! Virtualization is an abstraction laye...
Windows Servers

Configuring Domain Group Policy for Windows 2003

Windows 2003 Group Policies allow the administrators to manage a group of people accessing a resource efficiently. The group policies can be used t...
Windows Servers

Windows Server 2016 VM Backup with Altaro's New...

Altaro has released Altaro VM Backup, a faster and lighter upgrade to its flagship Hyper-V and VMware backup solution, which now supports all Windo...

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup

How to Enable SNMP on VMware ESXi Host & Config...

In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to a...
Virtualization & VM Backup

6 Key Areas to Consider When Selecting a VM Bac...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busi...
Virtualization & VM Backup

World Backup Day with Free Amazon Voucher and P...

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...
Virtualization & VM Backup

8 Critical Features to Have in a VM Backup Solu...

Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)

Installing The ‘Unsupported’ Profilic USB-to-Se...

Thanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers ...
Windows Workstations (XP, 7, 8, 10, 11)

The Importance of Windows Hosts File - How to U...

This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how i...
Windows Workstations (XP, 7, 8, 10, 11)

How to Enable & Use Windows 8 Startup Settings ...

The Windows 8 Start Settings Boot Menu allows users to change the way Windows 8 starts up. This provides users with the ability to enable Safe Mode...
Windows Workstations (XP, 7, 8, 10, 11)

How to Join a Windows 8, 8.1 Client to Windows ...

In this article, we will show how to add a Windows 8 or Windows 8.1 client to a Windows Domain / Active Directory. The article can be considered an...

Linux-Unix Articles:

Linux - Unix

Updating Your Linux Server - How to Update Linu...

Like any other software, an operating system needs to be updated. Updates are required not only because of the new hardware coming into the market,...
Linux - Unix

How To Secure Your Linux Server or Workstation ...

Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation. Boot Disk One of the foremost r...
Linux - Unix

Installing & Configuring VSFTPD FTP Server for ...

Vsftpd is a popular FTP server for Unix/Linux systems. For thoes unaware of the vsftpd ftp server, note that this is not just another ftp server, b...
Linux - Unix

Installing Software On Linux

Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows...

Your IP address:

13.58.247.31

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Linux BIND DNS - Part 1: Introduction To The DNS Dat...

BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This articl...
Linux - Unix

Why Use Linux?

The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communi...
Linux - Unix

Finding More Information On The Linux Operating System

Since this document merely scratches the surface when it comes to Linux, you will probably find you have lots of questions and possibly problems. Whethe...
Linux - Unix

Configuring Linux Samba (SMB) - How to Setup Samba (...

Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or SMB....

Popular Articles:

SASE & SD-WAN Networks

WAN Optimization vs SD WAN Networks. Today’s Challen...

Enterprises have been successfully running WAN optimization appliances at their many distributed sites for years. The devices have done a good job of he...
SASE & SD-WAN Networks

MPLS vs. SD-WAN vs. Internet vs. Cloud Network. Conn...

The Wide Area Network (WAN) is the backbone of the business. It ties together the remote locations, headquarters and data centers into an integrated net...
SASE & SD-WAN Networks

Check Point Software and Cato Networks Co-Founder Sh...

By: Shlomo Kramer, Check Point Software & Cato Networks Co-Founder As one of the founders of Check Point Software and more recently Cato Networks, ...
OpManager - Network Monitoring & Management

Free Webinar: Learn How Zero-Trust & Cloud Technolog...

Work transformation is not 'one and done,'" says  IDC's vice president, Holly Muscolino. Most enterprises understand that a hybrid workforce is the...
Palo Alto Networks

Introduction to Palo Alto Next-Generation Network Fi...

During the past decade, we’ve seen the global IT security market flooded with new network security and firewall security appliances. New vendors emergin...
OpManager - Network Monitoring & Management

Live discussion: Learn to assess and accelerate your...

ManageEngine has joint hands with IDC's Stephen Elliot, a group vice president, to discuss the truth behind organization's digitally transforming IT, th...
OpManager - Network Monitoring & Management

Special Free Podcast Series: IT Operations Managemen...

Learn how IT Experts and Managers take on their organization’s challenges while working remotely. How do you continue your IT Operation Management Strat...
Palo Alto Networks

How to Register a Palo Alto Firewall and Activate Su...

This article explains how to register and activate your Palo Alto Firewall Appliance to obtain technical support, RMA hardware replacement, product upda...