Skip to main content

Contact Firewall.cx

Articles That Might Interest:

Linux - Unix
When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operations, you would like to do something meaningful as wel…
Ethernet Protocol, CSMA/CD, Collisions
While the original 802.3 specification worked well, the IEEE realized that some upper layer protocols required an Ethertype to work properly. For example, TCP/IP uses the Ethertype to differentiate b…
Network Address Translation - NAT
After that simple and informative introduction to the NAT concept, it's time to find out more about how it works and this is where the NAT table comes in. The Network Address Translation (NAT) Table…
Windows Servers
In this article we will show you how to enable the ‘Web Server’ certificate template option on a Windows Certification Authority (Windows CA) Server.  The Web Server option is usually not presen…
Web Application Vulnerability Scanners
Part two of our Cross-site scripting (XSS) series shows how easy it is to create & execute a XSS attack, helping readers & network security engineers understand how XSS attacks work and how t…
Ethernet Protocol, CSMA/CD, Collisions
When troubleshooting your Ethernet network, the first thing to look for is physical frame corruption. In this essay, we will discuss the different causes of physical frame corruption and the characte…
Network Cabling
The Parallel Direct Connection is the second solution covering the transfer of data from one computer to another. The cable required is slightly more complicated as it has more wires that need to be…
OpManager - Network Monitoring & Management
The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring security across all endpoints within organizations…
Cisco Wireless
This article explains how to convert a local or remote Autonomous / Standalone Cisco Aironet Access Point to Lightweight and register it to a Cisco WLC Controller. Included are detailed steps, comman…
Windows Servers
People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong method of backing up data however in order to backu…
Virtualization & VM Backup
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to allow or block access to the SNMP service from specif…
SASE & SD-WAN Networks
In the rush to keep pace with the many challenges facing today’s organizations, all too often networking teams end up adopting practices and processes that are, shall we say, less than perfect. You p…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer