Microsoft Server Articles:
Windows Servers
How to Install and Configure SNMP for Windows Ser…
Simple Network Management Protocol (SNMP) is a UDP protocol that uses port 161 to monitor and collect detailed information on any network device supp…
Windows Servers
Windows 2012 Server NIC Teaming – Load Balancing/…
NIC Teaming, also known as Windows Load Balancing or Failover (LBFO), is an extremely useful feature supported by Windows Server 2012 that allows the…
Windows Servers
How to Install Windows Server 2012 from USB Flash…
Most would remember the days we had to have a CDROM or DVDROM in order to proceed with the installation of an operating system. Today, it is very com…
Windows Servers
Understanding, Creating, Configuring & Applying W…
This article explains what Group Policies are and shows how to configure Windows Server 2012 Active Directory Group Policies. Our next article will c…
Featured Subcategories:
Virtualization Articles:
Virtualization & VM Backup
World Backup Day with Free Amazon Voucher and Pri…
Celebrate World Backup Day and WIN with Altaro!
We all remember how grateful we were to have backup software when facing so many data loss mishaps…
Virtualization & VM Backup
Understanding Deduplication. Complete Guide to De…
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective but…
Virtualization & VM Backup
FREE Webinar - Fast Track your IT Career with VMw…
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500!
Climbing the career ladd…
Virtualization & VM Backup
8 Critical Features to Have in a VM Backup Soluti…
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtua…
Windows Workstation Articles:
Windows Workstations (XP, 7, 8, 10, 11)
The Importance of Windows Hosts File - How to Use…
This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how it…
Windows Workstations (XP, 7, 8, 10, 11)
How to Start Windows 8 and 8.1 in Safe Mode – Ena…
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would recal…
Windows Workstations (XP, 7, 8, 10, 11)
Installing The ‘Unsupported’ Profilic USB-to-Seri…
Thanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers as…
Windows Workstations (XP, 7, 8, 10, 11)
Configure Windows 8 & 8.1 To Provide Secure Wirel…
Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wir…
Linux-Unix Articles:
Linux - Unix
Understanding The Linux Init Process & Different…
Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For exampl…
Linux - Unix
Linux BIND DNS - Part 4: Common BIND Files - Name…
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168…
Linux - Unix
Linux File & Folder Permissions
File & folder security is a big part of any operating system and Linux is no exception!
These permissions allow you to choose exactly who can ac…
Linux - Unix
Critical 15 Year-old Linux Security Hole (Ghost)…
Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux syste…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Why Use Linux?
The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communiti…
Linux - Unix
How To Secure Your Linux Server or Workstation - Linux…
Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation.
Boot Disk
One of the foremost requisit…
Linux - Unix
Linux VIM / Vi Editor - Tutorial - Basic & Advanced Fe…
When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operations, you…
Linux - Unix
Implementing Virtual Servers and Load Balancing Cluste…
What is Server Virtualization?
Server virtualization is the process of apportioning a physical server into several smaller virtual servers. During se…
Popular Articles:
SASE & SD-WAN Networks
The Need for a Converged SASE Platform. Converging Net…
The digital transformation is pushing applications to the cloud, the 2020-2022 pandemic shifted employees to work from home, and the number of resulting n…
Security Service Edge (SSE)
Security Service Edge (SSE) Limitations & Disadvantage…
This article explores the Security Service Edge (SSE) portion of Secure Access Service Edge (SASE) and the need for holistic cybersecurity protections.
W…
Palo Alto Networks
Palo Alto Networks Firewall - Web & CLI Initial Config…
This article is the second-part of our Palo Alto Networks Firewall technical articles. Our previous article was introduction to Palo Alto Networks Firewal…
Palo Alto Networks
Complete Guide to Upgrading Palo Alto Firewall PAN-OS…
Upgrading your Palo Alto Firewall or Panorama Management System to the preferred PAN-OS release is always recommended as it ensures it remains stable, saf…
SASE & SD-WAN Networks
How To Secure Your SD-WAN. Comparing DIY, Managed SD-W…
With so much enterprise network traffic now destined for the cloud, backhauling traffic across an expensive MPLS connection to a data center to apply secu…
Palo Alto Networks
How to Register a Palo Alto Firewall and Activate Supp…
This article explains how to register and activate your Palo Alto Firewall Appliance to obtain technical support, RMA hardware replacement, product update…
OpManager - Network Monitoring & Management
Free Webinar: Enterprise-Grade Security and Management…
The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring security…
OpManager - Network Monitoring & Management
Maximizing Network Security: A Deep Dive into OpManage…
In the rapidly evolving landscape of cyber threats, network security has never been more crucial. With the frequency and sophistication of cyberattacks es…







