Skip to main content

Contact Firewall.cx

Articles That Might Interest:

Web Application Vulnerability Scanners
This article examines the differences between logical and technical web application vulnerabilities which tends to be a very confusing topic especially for web application developers and security – p…
Network Cabling
This article covers the commonly known Unshielded Twisted Pair (UTP) cable and shows how many pairs the UTP Cat5, Cat5e, Cat6 & Cat7 cables consists of, the colour coding they follow, the differe…
Network Cabling
From the early PC days, Direct Cable Connection (DCC) was the most popular way to transfer data from one PC to another. Of course, it might seem a bit of an "old fashioned" way to transfer data these…
ManageEngine
Accelerating your digital transformation process requires your business to be composable. However, the prevalence of log data across modern dynamic IT infrastructures raises challenges in operat…
Palo Alto Networks
Upgrading your Palo Alto Firewall or Panorama Management System to the preferred PAN-OS release is always recommended as it ensures it remains stable, safe from known vulnerabilities and exploits but…
Windows Servers
NIC Teaming, also known as Windows Load Balancing or Failover (LBFO), is an extremely useful feature supported by Windows Server 2012 that allows the aggregation of multiple network interface cards t…
Windows Servers
Altaro has released Altaro VM Backup, a faster and lighter upgrade to its flagship Hyper-V and VMware backup solution, which now supports all Windows Server editions and includes several highly-reque…
Windows Workstations (XP, 7, 8, 10, 11)
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would recall that by pressing and holding the F8 key while Wi…
Ethernet Protocol, CSMA/CD, Collisions
While the original 802.3 specification worked well, the IEEE realized that some upper layer protocols required an Ethertype to work properly. For example, TCP/IP uses the Ethertype to differentiate b…
Virtualization & VM Backup
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladder in the IT industry is usually dependent on one…
Cisco Routers
This article serves as an extension to our popular Cisco VPN topics covered here on Firewall.cx. While we’ve covered Site to Site IPSec VPN Tunnel Between Cisco Routers (using static public IP addres…
Linux - Unix
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer world too, the firewall acts in a similar manner, only…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer