Contact Firewall.cx
Articles That Might Interest:
Palo Alto Networks
Configuring QoS on Palo Alto Firewalls: Class-bas…
This article’s purpose is to help you quickly master Palo Alto QoS concepts and learn to configure QoS on Palo Alto Firewalls in a simple and efficient way. QoS is considered a complicated topic howe…
Linux - Unix
Installing & Configuring Linux Webmin - Linux Web…
For many engineers and administrators, maintaining a Linux system can be a daunting task, especially if there’s limited time or experience. Working in shell mode, editing files, restartin…
Ethernet Protocol, CSMA/CD, Collisions
Early Ethernet Collisions
In this example, we will refer to an imaginary Ethernet network consisting of Stations A and B and any number of other stations. The status of the network is such that the wire is idle (nobody is tal…
Network Protocol Analyzers
How to Reconstruct HTTP Packets/Data & Monitor HT…
HTTP reconstruction is an advanced network security feature offered by nChronos version 4.3.0 and later. nChronos is a Network Forensic Analysis application that captures packets/data around the cloc…
Cisco Routers
Cisco Type 7 Password Decrypt / Decoder / Crack T…
The Firewall.cx Cisco Password Decoder Tool (see below) provides readers with the ability to decrypt 'Type 7' cisco passwords.
For security reasons, we do not keep any history of decoded passwords…
Linux - Unix
Understanding, Administering Linux Groups and Use…
In a multi-user environment like Linux, every file is owned by a user and a group. There can be others as well who may be allowed to work with the file. What this means is, as a user, you have all th…
Network Cabling
10Base-T/2/5/F/35 - Ethernet
The 10Base-T UTP Ethernet and 10Base-2 Coax Ethernet were very popular in the early to mid 1990's when 100 Mbps network cards and hubs/switches were very expensive. Today's prices have dropped so muc…
Windows Servers
Understanding, Creating, Configuring & Applying W…
This article explains what Group Policies are and shows how to configure Windows Server 2012 Active Directory Group Policies. Our next article will cover how to properly enforce Group Policies (Group…
Network Protocols
IPv6 Subnetting - How and Why to Subnet IPv6
In the previous tutorials, I went through the need for IPv6, and followed it up by drawing out the salient features which overcomes issues with IPv4. We took the journey of looking inside the headers…
Windows Servers
Windows 2016 Server Licensing Explained – Free We…
With Windows 2016 Server already making its way into data centers Windows 2016 Server Licensing is becoming a very hot topic. Windows 2016 Server is jam-packed with a number of advanced features incl…
Cisco Routers
Configuring Static Route Tracking using IP SLA (…
In today's network environment, redundancy is one of the most important aspects, whether its on the LAN side or on the WAN side. In this topic we will be covering WAN redundancy with multiple WAN lin…
Cisco CallManager-CCME
Cisco CallManager Express CME v8.8 & v9.0 GUI Web…
Cisco's CallManager Express GUI interface is an important part of the CallManager Express product as it provides the ability to administer CME via a web browser. Generally, the CME GUI interface is e…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







