Microsoft Server Articles:
Windows Servers
Windows Server 2016 – Hyper-V Virtualization Up...
The new Hyper-V virtualization features offered by Windows Server 2016 are planning to make major changes in the virtualization market. From Nested...
Windows Servers
Configuring Domain Group Policy for Windows 2003
Windows 2003 Group Policies allow the administrators to manage a group of people accessing a resource efficiently. The group policies can be used t...
Windows Servers
Introduction To Windows Server 2012 R2 Virtuali...
FREE Hyper-V & VMware Backup: FREE for Firewall.cx readers for a Limited Time! Download Now!
Virtualization is an abstraction lay...
Windows Servers
Installing Windows Server 2012 Active Directory...
This article serves as an Active Directory tutorial covering installation and setup of a Windows 2012 Domain Controller using Windows Server Manage...
Featured Subcategories:
Virtualization Articles:
Virtualization & VM Backup
How to Enable SNMP on VMware ESXi Host & Config...
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to a...
Virtualization & VM Backup
Understanding Deduplication. Complete Guide to ...
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...
Virtualization & VM Backup
World Backup Day with Free Amazon Voucher and P...
Celebrate World Backup Day and WIN with Altaro!
We all remember how grateful we were to have backup software when facing so many data loss mishap...
Virtualization & VM Backup
8 Critical Features to Have in a VM Backup Solu...
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...
Windows Workstation Articles:
Windows Workstations (XP, 7, 8, 10, 11)
Revealing & Backing Up Your Windows 8 – Windows...
Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the G...
Windows Workstations (XP, 7, 8, 10, 11)
The Importance of Windows Hosts File - How to U...
This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how i...
Windows Workstations (XP, 7, 8, 10, 11)
How to Start Windows 8 and 8.1 in Safe Mode – E...
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would rec...
Windows Workstations (XP, 7, 8, 10, 11)
How to View Hidden Files and Folders In Windows...
Windows 8 & 8.1 hides two types of files so that normally, you do not see them while exploring your computer. The first type is the files or fo...
Linux-Unix Articles:
Linux - Unix
Linux BIND DNS - Part 1: Introduction To The DN...
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This a...
Linux - Unix
Advanced Linux Commands
Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the o...
Linux - Unix
Linux BIND DNS - Part 6: Linux BIND - DNS Caching
In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all th...
Linux - Unix
Installing Software On Linux
Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows...
Your IP address:
34.231.180.210
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Linux BIND DNS - Part 5: Configure Secondary (Slave)...
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...
Linux - Unix
Linux CentOS - Redhat EL Installation on HP Smart Ar...
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, ne...
Linux - Unix
Understanding The Linux Init Process & Different Run...
Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For example, ...
Linux - Unix
Finding More Information On The Linux Operating System
Since this document merely scratches the surface when it comes to Linux, you will probably find you have lots of questions and possibly problems. Whethe...
Popular Articles:
SASE & SD-WAN Networks
Check Point Software and Cato Networks Co-Founder Sh...
By: Shlomo Kramer, Check Point Software & Cato Networks Co-Founder
As one of the founders of Check Point Software and more recently Cato Networks, ...
OpManager - Network Monitoring & Management
Network Management Systems Help Businesses Accuratel...
Accurately monitoring your organization’s business application performance, service provider SLA breaches, network infrastructure traffic, bandwidth ava...
SASE & SD-WAN Networks
How To Secure Your SD-WAN. Comparing DIY, Managed SD...
With so much enterprise network traffic now destined for the cloud, backhauling traffic across an expensive MPLS connection to a data center to apply se...
OpManager - Network Monitoring & Management
Boost Network Security and Efficiency with Intellige...
Network alerts are vital for maintaining your network's health, efficiency, and security, ensuring seamless daily operations. They act as an early warni...
Palo Alto Networks
How to Fix Palo Alto Firewall “Error: Image File Aut...
Keeping your Palo Alto Firewall up to date with the latest PAN-OS software updates is an important step to ensure your organization is protected against...
Virtualization & VM Backup
SysAdmin Day 2020 - Get your Free Amazon Voucher & G...
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to ke...
Palo Alto Networks
The Benefits of Palo Alto Networks Firewall Single P...
What makes Palo Alto Networks Next-Generation Firewall (NGFW) so different from its competitors is its Platform, Process and Architecture. Palo Alto Net...
SASE & SD-WAN Networks
Key Features of a True Cloud-Native SASE Service. Se...
Secure Access Service Edge (SASE) is an architecture widely regarded as the future of enterprise networking and security. In previous articles we talked...