Contact Firewall.cx
Articles That Might Interest:
Cisco Services & Technologies
Install & Fix Cisco VPN Client on Windows 10 (32…
This article shows to how correctly install Cisco VPN Client (32 & 64 bit) on Windows 10 (32 & 64 bit) using simple steps, overcome the ‘This app can’t run on this PC’ installation error, plu…
Cisco Routers
How To Fix Cisco Configuration Professional (CCP)…
Our previous article covered how to fix the Cisco Configuration Professional display/window problem where the CCP application is displayed in about one third of the browser’s window. Users looking fo…
Cisco CallManager-CCME
Risk Management for Cisco Unified Communication S…
As technology has advanced, things have become simpler yet more complex. One prime example is that of today’s communication networks. With the evolution of VoIP, the most obvious convergence is that…
Cisco CallManager-CCME
Cisco Unity Express Installation & Setup - ISM-SR…
Unity Express is a popular add-on for Cisco Unified Communication Manager Express (CallManager Express) and Cisco Unified Communication Manager (CUCM), adding advanced auto attendant functionality wi…
Palo Alto Networks
Configuring QoS on Palo Alto Firewalls: Class-bas…
This article’s purpose is to help you quickly master Palo Alto QoS concepts and learn to configure QoS on Palo Alto Firewalls in a simple and efficient way. QoS is considered a complicated topic howe…
Cisco Switches
Resolving Cisco Switch & Router ‘DHCP Server Pool…
In previous articles, we showed how it is possible to configure a Cisco router or Catalyst switch to provide DHCP server services to network clients. Everything usually works without a problem, howev…
Windows Servers
The Importance of a Comprehensive Backup Strategy…
People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong method of backing up data however in order to backu…
Windows Workstations (XP, 7, 8, 10, 11)
Revealing & Backing Up Your Windows 8 – Windows 8…
Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the Genuine Microsoft Label or Certificate Of Authenticit…
Web Application Vulnerability Scanners
Acunetix v12: More Comprehensive, More Accurate a…
22nd May 2018: Acunetix, the pioneer in automated web application security software, has announced the release of version 12. This new version provides support for JavaScript ES7 to better analyse si…
Web Application Vulnerability Scanners
Protecting Your Cookies from Cross Site Scripting…
Understanding XSS Vulnerability Attacks
This article aims to help you understand how Cross Site Scripting (XSS) attacks work. Cross Site Scripting or XSS can happen in many ways. For example, a…
VPN Services & Guides
The Ultimate TOR vs VPN Guide – How TOR/VPN Works…
Back then, the Internet was so very young. Those were the times of Windows Maze Screensaver, of the classy Minesweeper, of grey-white MS Paint, and of silvery floppy disks. Gone are those days. Now…
Domain Name System (DNS)
The DNS Protocol - Part 1: Introduction
If you ever wondered where DNS came from, this is your chance to find out ! The quick summary on DNS's history will also help you understand why DNS servers are run mostly on Linux and Unix-type syst…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!







