Articles
To read the articles in this section, simply click on the article title or read button on the far right (if visible).
Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.
| Articles | |
|---|---|
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
MS Server Articles:
Windows Servers
Windows Server Group Policy Link Enforcement, Inh…
Our previous article explained what Group Policy Objects (GPO) are and showed how group policies can be configured to help control computers and user…
Windows Servers
Windows 2003 DHCP Server Installation & Configura…
DHCP (Dynamic Host Configuration Protocol) is a protocol that allows clients on a network to request network configuration settings from a server run…
Windows Servers
Free Webinar & eBook on Microsoft Licensing for V…
Microsoft Licensing for Virtual environments can become a very complicated topic, especially with all the misconceptions and false information out th…
Windows Servers
Windows 2012 Server Foundation, Essential, Standa…
FREE Hyper-V & VMware Virtualization Backup: FREE for Firewall.cx readers for a Limited Time! Download Now!
Windows Server 2012 Edi…
Featured Subcategories:
Virtualization & VM Backup Articles:
6 Key Areas to Consider When Selecting a VM Backu…
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud.
Your busine…
Ultimate Guide: Install Windows 11 on VMware ESXi…
In this article, we’ll show you how to setup or install Microsoft Windows 11 on VMware’s ESXi servers and bypass the Trusted Platform Module version…
5 Most Critical Microsoft M365 Vulnerabilities Re…
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data…
How to Enable or Disable SSH on VMware ESXi via W…
SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administra…
Wi-Fi Key Generator
Follow Firewall.cx
Recommended Downloads
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Linux BIND DNS - Part 5: Configure Secondary (Slave) D…
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creatin…
Linux - Unix
Why Use Linux?
The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communiti…
Linux - Unix
Linux BIND DNS - Part 1: Introduction To The DNS Datab…
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This article…
Linux - Unix
Linux BIND DNS - Part 3: Configuring The db.192.168.0…
The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, this…
Popular Topics
Cisco Routers
Cisco Router Password Recovery
Password recovery is a fairly frequently used procedure for administrators and engineers. Even though we usually stack our passwords in some word, excel o…
Cisco Routers
Disabling Cisco Router Password Recovery Service
Most Cisco engineers are aware of the classic Password-Recovery service Cisco equipment have. If the device's credentials are lost, then performing the Pa…
Windows Workstations (XP, 7, 8, 10, 11)
How to Join a Windows 8, 8.1 Client to Windows Domain…
In this article, we will show how to add a Windows 8 or Windows 8.1 client to a Windows Domain / Active Directory. The article can be considered an extent…
Network Protocol Analyzers
Detect Brute-Force Attacks with nChronos Network Secur…
Brute-force attacks are commonly known attack methods by which hackers try to get access to restricted accounts and data using an exhaustive list/database…





