Contact Firewall.cx
Articles That Might Interest:
Routing
Hybrid Routing Protocols - Advantages and Disadva…
Hybrid routing protocols are a combination of distance-vector and link-state routing protocols, and are used to provide a more efficient and scalable routing solution in larger networks. These…
Windows Servers
Windows 2003 DHCP Server Installation & Configura…
DHCP (Dynamic Host Configuration Protocol) is a protocol that allows clients on a network to request network configuration settings from a server running the DHCP server service which, in our case, w…
Cisco Routers
Cisco GRE and IPSec - GRE over IPSec - Selecting…
GRE Tunnels are very common amongst VPN implementations thanks to their simplicity and ease of configuration. With broadcasting and multicasting support, as opposed to pure IPSec VPNs, they tend to b…
Windows Workstations (XP, 7, 8, 10, 11)
How to Enable & Use Windows 8 Startup Settings Bo…
The Windows 8 Start Settings Boot Menu allows users to change the way Windows 8 starts up. This provides users with the ability to enable Safe Mode with or without Command Prompt, Enable Boot Logging…
Web Application Vulnerability Scanners
Creating a Cross-site Scripting (XSS) Attack. Und…
Part two of our Cross-site scripting (XSS) series shows how easy it is to create & execute a XSS attack, helping readers & network security engineers understand how XSS attacks work and how t…
Cisco Routers
Resolving Cisco Router/Switch Tftp Problems: Sour…
When working with Cisco equipment that has multiple ip interfaces, a common problem engineers are faced with is trying to successfully tftp to or from the Cisco device. This issue is usually encounte…
Subnetting
IP Subnetting - Part 3: Subnet Mask Bits & Analys…
So we have covered to some depth the subnetting topic, but there is still much to learn ! We are going to explain here the available subnet masks and analyse a Class C network, using a specific subne…
The OSI Model
The OSI Model: Layer 6 - Presentation Layer
The Presentation Layer gets its name from its purpose: It presents data to the Application layer. It's basically a translator and provides coding and conversion functions. A successful data transfer…
Network Fundamentals
Hubs & Repeaters
Network hubs were once the primary method of interconnecting network devices to create a local area network (LAN). Hubs were inexpensive, easy to install, and provided a simple means of connecting mu…
Windows Workstations (XP, 7, 8, 10, 11)
The Importance of Windows Hosts File - How to Use…
This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how it can be used to manipulate DNS lookups and redirect…
Web Application Vulnerability Scanners
Acunetix Enterprise: Find Website - Web Applicati…
Security researchers disagree about the percentage of vulnerable websites, but most concur that it’s way too high. Despite their long history, attackers continue to use cross-site scripting (XSS), SQ…
Network Fundamentals
Securing Your Home Network
In today's world, securing your home network is more important than ever. With the increasing number of cyberattacks, data breaches, and online frauds, protecting your home network from potential thr…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







