Skip to main content

Microsoft Server Articles:

Windows Servers

Installing Active Directory Services & Domain C...

This article serves as an Active Directory tutorial covering installation and setup of Windows 2012 Active Directory Services Role & Domain Con...
Windows Servers

Active Directory Tombstone Lifetime Modification

Tombstone is a container object that contains the deleted objects from Active Directory. Actually when an object is deleted from Active Directory, ...
Windows Servers

Configuring Local Group Policy for Windows 2003

Windows 2003 Group Policies allow the administrators to efficiently manage a group of people accessing a resource. Group policies can be used to co...
Windows Servers

Windows Server 2016 – Hyper-V Virtualization Up...

The new Hyper-V virtualization features offered by Windows Server 2016 are planning to make major changes in the virtualization market. From Nested...

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup

How to Enable SNMP on VMware ESXi Host & Config...

In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to a...
Virtualization & VM Backup

Understanding Deduplication. Complete Guide to ...

When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...
Virtualization & VM Backup

Differences Between VMware vSphere, vCenter, ES...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere ed...
Virtualization & VM Backup

FREE Webinar - Fast Track your IT Career with V...

Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career la...

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)

How to View Hidden Files & Folders in Windows 7

This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see t...
Windows Workstations (XP, 7, 8, 10, 11)

Configuring Windows 7 To Provide Secure Wireles...

Not many people are aware that Windows 7 has built-in capabilities that allow it to be transformed into a perfectly working access point so that wi...
Windows Workstations (XP, 7, 8, 10, 11)

How to View Hidden Files and Folders In Windows...

Windows 8 & 8.1 hides two types of files so that normally, you do not see them while exploring your computer. The first type is the files or fo...
Windows Workstations (XP, 7, 8, 10, 11)

How to Enable Master Control Panel or Enable Go...

Around 2007, an undocumented feature of Windows, called the God Mode, was published outside of documentation provided by Microsoft. This is the Win...

Linux-Unix Articles:

Linux - Unix

Advanced Linux Commands

Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the o...
Linux - Unix

Linux VIM / Vi Editor - Tutorial - Basic & Adva...

When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operatio...
Linux - Unix

Linux BIND DNS - Part 4: Common BIND Files - Na...

So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.16...
Linux - Unix

Linux File & Folder Permissions

File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can ...

Your IP address:

18.223.106.232

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Configuring Linux Samba (SMB) - How to Setup Samba (...

Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or SMB....
Linux - Unix

Why Use Linux?

The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communi...
Linux - Unix

The Linux Command Line

You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is the he...
Linux - Unix

Linux System Resource & Performance Monitoring

You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be ma...

Popular Articles:

Security Service Edge (SSE)

Security Service Edge (SSE) Limitations & Disadvanta...

This article explores the Security Service Edge (SSE) portion of Secure Access Service Edge (SASE) and the need for holistic cybersecurity protections. ...
Virtualization & VM Backup

5 Most Critical Microsoft M365 Vulnerabilities Revea...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data. The...
SASE & SD-WAN Networks

Understanding Secure Access Service Edge (SASE) and ...

Software Defined Wide Area Networking (SD-WAN) is changing the way that businesses connect to the cloud. With SD-WAN, organizations can move away from c...
Palo Alto Networks

Complete Guide: Configuring IPSec VPN between Palo A...

This article will show you how to configure an IPSec VPN tunnel between a Palo Alto firewall (all PANOS versions) and Meraki MX security appliance. Our ...
SASE & SD-WAN Networks

MPLS vs. SD-WAN vs. Internet vs. Cloud Network. Conn...

The Wide Area Network (WAN) is the backbone of the business. It ties together the remote locations, headquarters and data centers into an integrated net...
Virtualization & VM Backup

FREE Webinar - Fast Track your IT Career with VMware...

Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladder ...
OpManager - Network Monitoring & Management

Free Webinar: Clients' network configuration and com...

Defending your client's network from faulty configuration changes, poor compliance, and bringing the network back quickly from downtime can be challengi...
SASE & SD-WAN Networks

How To Secure Your SD-WAN. Comparing DIY, Managed SD...

With so much enterprise network traffic now destined for the cloud, backhauling traffic across an expensive MPLS connection to a data center to apply se...