Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

MS Server Articles:

Windows Servers

The Importance of a Hyper-V & VMware Server Bac...

Using Hyper-V Server virtualization technology, you can virtualize your physical environment to reduce the cost of physical hardware. As part of IT...
Windows Servers

Free Webinar: Scripting & Automation in Hyper-V...

System Center Virtual Machine Manager (SCVMM) provides some great automation benefits for those organizations that can afford the hefty price tag. ...
Windows Servers

Deploying Active Directory & DNS Services on Wi...

This article provides a comprehensive guide to deploying Active Directory and DNS Services on Windows Server 2022, encompassing the Essential, Stan...
Windows Servers

Introduction To Windows Server 2012 R2 Virtuali...

FREE Hyper-V & VMware Backup:  FREE for Firewall.cx readers for a Limited Time!  Download Now! Virtualization is an abstraction laye...

Featured Subcategories:

Virtualization & VM Backup Articles:

How to Enable or Disable SSH on VMware ESXi via...

SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administ...

8 Critical Features to Have in a VM Backup Solu...

Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...

6 Key Areas to Consider When Selecting a VM Bac...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busi...

Differences Between VMware vSphere, vCenter, ES...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere ed...

Your IP address:

18.224.44.108

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Linux BIND DNS - Part 2: Configuring db.domain Zone...

It's time to start creating our zone files. We'll follow the standard format, which is given in the DNS RFCs, in order to keep everything neat and less ...
Linux - Unix

Advanced Linux Commands

Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other ...
Linux - Unix

Linux File & Folder Permissions

File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can acces...
Linux - Unix

Linux BIND DNS - Part 1: Introduction To The DNS Dat...

BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This articl...

Popular Topics

Cisco Routers

Introduction To Routers

Welcome to the Routers section. Here we will analyse routers quite some depth; what they do and how they work. We must point out that knowlege on the OS...
Cisco Routers

Configuring Policy-Based Routing (PBR) with IP SLA T...

What is Policy-Based Routing? Policy-Based Routing (PBR) is a very popular feature in Cisco routers, it allows the creation of policies that can select...
VLAN Networks

InterVLAN Routing - Routing between VLAN Networks

This article deals with the popular topic of InterVLAN routing, which is used to allow routing & communication between VLAN networks. Our article an...
Cisco Switches

Complete Guide to DHCP Snooping, How it Works, Conce...

This article covers popular Layer 2 & Layer 3 network attacks with a focus on DHCP Starvation Attacks, Man-in-the-Middle attacks, unintentional rogu...