Skip to main content

MS Server Articles:

Windows Servers

Renaming Windows 2000 Domain Name

Sometimes renaming a domain is an essential business requirement. There are many situations, such as mergers, change of company name or migration f...
Windows Servers

The Importance of a Comprehensive Backup Strate...

People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong...
Windows Servers

Free Webinar: Scripting & Automation in Hyper-V...

System Center Virtual Machine Manager (SCVMM) provides some great automation benefits for those organizations that can afford the hefty price tag. ...
Windows Servers

Understanding, Creating, Configuring & Applying...

This article explains what Group Policies are and shows how to configure Windows Server 2012 Active Directory Group Policies. Our next article will...

Featured Subcategories:

Virtualization & VM Backup Articles:

FREE Webinar - Fast Track your IT Career with V...

Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career la...

Differences Between VMware vSphere, vCenter, ES...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere ed...

World Backup Day with Free Amazon Voucher and P...

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...

Understanding Deduplication. Complete Guide to ...

When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...

Your IP address:

18.221.53.5

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Advanced Linux Commands

Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other ...
Linux - Unix

Linux BIND DNS - Part 1: Introduction To The DNS Dat...

BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This articl...
Linux - Unix

Linux BIND DNS - Part 4: Common BIND Files - Named.l...

So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168.0, ...
Linux - Unix

Understanding The Linux Init Process & Different Run...

Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For example, ...

Popular Topics

Windows Workstations (XP, 7, 8, 10, 11)

How To Change & Configure An IP Address or Set to DH...

Not many users are aware that Windows 7 provides more than one way to configure a workstation’s network adaptor IP address or force it to obtain an IP a...
Network Protocol Analyzers

How to Detect Routing Loops and Physical Loops with ...

When working with medium to large scale networks, IT departments are often faced dealing with network loops and broadcast storms that are caused by user...
ManageEngine Firewall Analyzer

Ensuring Compliance and Business Continuity in a Hyb...

In the wake of digital transformation, the work landscape as we know it has undergone a dynamic shift. People can now work from home, from the office, o...
Cisco Routers

Configuring Cisco SSL VPN AnyConnect (WebVPN) on Cis...

Our Web SSL VPN article written back in 2011 introduced this new wave of VPN services.  This article extends the topic by covering the installation...