Contact Firewall.cx
Articles That Might Interest:
Virtualization & VM Backup
8 Critical Features to Have in a VM Backup Soluti…
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtual machines stems from the benefits of virtualizati…
Web Application Vulnerability Scanners
Top 3 Most Popular Web Application Vulnerabilitie…
Since 2011 Web Application Vulnerability scanners scanned 396 open source web applications. The scanners identified 269 vulnerabilities and a popular web vulnerability scanner published 114 advisorie…
Cisco Data Center (Nexus/UCS)
The Complete Cisco Nexus vPC Guide. Features & Ad…
Cisco virtual Port Channel (vPC) is a virtualization technology, launched in 2009, which allows links that are physically connected to two different Cisco Nexus Series devices to appear as a single p…
Cisco CallManager-CCME
Cisco CallManager Express Basic Concepts - Part 1
This article introduces basic CallManager Express (CCME) concepts by covering how a CCME router operates, how calls are setup between Cisco IP phones but also the role of a CCME router in this proces…
Cisco Switches
Basic & Advanced Catalyst Layer 3 Switch Configur…
This article covers basic and advanced configuration of Cisco Catalyst Layer-3 switches such as the Cisco Catalyst 3560G, 3560E, 3560-X, 3750, 3750E, 3750-X, 3850, 4500, 6500 , 9300, 9400 series, and…
Linux - Unix
Linux BIND DNS - Part 3: Configuring The db.192.1…
The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, this file's purpose is to provide the IP Address…
Network Fundamentals
Network Broadcast
The term "Broadcast" is used very frequently in the networking world . You will see it in most networking books and articles, or see it happening on your hub/switch when all the LED's start flashing…
ICMP Protocol
ICMP Protocol - Part 6: Redirect Messages
The ICMP - Redirect Message is always sent from a gateway to the host and the example below will illustrate when this is used.
Putting it simply (before we have a look at the example) the ICMP - Red…
Web Application Vulnerability Scanners
What is OWASP? Open Web Application Security Pro…
With nearly every business sector relying on the internet and digital tools to function, it is no surprise that cybersecurity is the second-fastest growing industry. Hackers don’t care how large or s…
Linux - Unix
Installing & Configuring Linux Webmin - Linux Web…
For many engineers and administrators, maintaining a Linux system can be a daunting task, especially if there’s limited time or experience. Working in shell mode, editing files, restartin…
Web Application Vulnerability Scanners
Automate Web Application Security - Why, How & Th…
In this article, we’re going to talk about automating your web security in the safest and most effective way. We’ll also touch on a few Web Application Security automation tools worth considering…
VLAN Networks
VTP Protocol - In-Depth Analysis
The previous article introduced the VTP protocol, we examined how it can be used within a network, to help manage VLANs and ease the administrative overhead, providing a stress-free VLAN environment…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







