Contact Firewall.cx
Articles That Might Interest:
Linux - Unix
Configuring Linux Samba (SMB) - How to Setup Samb…
Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or SMB. For working with such shared resources over a…
Ethernet Protocol, CSMA/CD, Collisions
Ethernet Troubleshooting - Physical Frame Corrupt…
When troubleshooting your Ethernet network, the first thing to look for is physical frame corruption. In this essay, we will discuss the different causes of physical frame corruption and the characte…
Network Fundamentals
Securing Your Home Network
In today's world, securing your home network is more important than ever. With the increasing number of cyberattacks, data breaches, and online frauds, protecting your home network from potential thr…
Network Cabling
10Base-T/2/5/F/35 - Ethernet
The 10Base-T UTP Ethernet and 10Base-2 Coax Ethernet were very popular in the early to mid 1990's when 100 Mbps network cards and hubs/switches were very expensive. Today's prices have dropped so muc…
Cisco Routers
Configuring Site to Site IPSec VPN Tunnel Between…
Site-to-Site IPSec VPN Tunnels are used to allow the secure transmission of data, voice and video between two sites (e.g offices or branches). The VPN tunnel is created over the Internet public netwo…
Network Cabling
Fibre Optic Cables - Single-Mode Multi-Mode - Adv…
In this article, we'll talk about Fiber optic cables and how it has changed the design and implementation of network infrastructures, providing high Gigabit speeds, increased security, flexibility an…
VLAN Networks
VLANs - Access & Trunk Links
If you've read our previous article The VLAN Concept - Introduction to VLANs then you should feel comfortable with terms such as 'VLAN', 'Static & Dynamic VLANs', however this is just…
SASE & SD-WAN Networks
SASE and VPNs: Reconsidering your Mobile Remote A…
The Virtual Private Network (VPN) has become the go to security solution for keeping communications between networks and endpoints secure. After all, VPNs offer a straightforward, secure method for c…
IP Protocol
IP Protocol - Part 1: Binary & The Internet Proto…
To understand the Internet Protocol, we need to learn and understand Binary. It is very important to know and understand Binary because part of the IP protocol is also the "Subnetting" section which…
OpManager - Network Monitoring & Management
Free Webinar: Learn How Zero-Trust & Cloud Techno…
Work transformation is not 'one and done,'" says IDC's vice president, Holly Muscolino. Most enterprises understand that a hybrid workforce is the future, but they are finding the transformatio…
Palo Alto Networks
Palo Alto Networks Firewall - Web & CLI Initial C…
This article is the second-part of our Palo Alto Networks Firewall technical articles. Our previous article was introduction to Palo Alto Networks Firewall appliances and technical specifications, wh…
VPN Services & Guides
VPN Hotspot - How to Stay Safe on Public & Guest…
Is Guest WiFi Safe?
It’s hard to go to a pub, café, or hotel these days without running into public or guest WiFi. In many cases, an internet connection can feel like a necessity – keeping up with w…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







