Skip to main content

Microsoft Server Articles:

Windows Servers
A Windows Active Directory Certification Authority server (AD CA), also known as a Certificate Authority, is an essential service to every organizati…
Windows Servers
Our previous articles covered basic concepts of Virtualization along with the installation and monitoring of Windows 2012 Hyper-V. This article takes…
Windows Servers
People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong m…
Windows Servers
Our previous article covered introduction to the Domain Name System (DNS) and explained the importance of the DNS Server role within the network infr…

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective but…
Virtualization & VM Backup
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to all…
Virtualization & VM Backup
In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edit…
Virtualization & VM Backup
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladd…

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
Windows 8 & 8.1 hides two types of files so that normally, you do not see them while exploring your computer. The first type is the files or fold…
Windows Workstations (XP, 7, 8, 10, 11)
Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wir…
Windows Workstations (XP, 7, 8, 10, 11)
In this article, we will show how to add a Windows 8 or Windows 8.1 client to a Windows Domain / Active Directory. The article can be considered an e…
Windows Workstations (XP, 7, 8, 10, 11)
In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or th…

Linux-Unix Articles:

Linux - Unix
This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address…
Linux - Unix
The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux comm…
Linux - Unix
File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can ac…
Linux - Unix
Vsftpd is a popular FTP server for Unix/Linux systems. For thoes unaware of the vsftpd ftp server, note that this is not just another ftp server, but…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer world too…
Linux - Unix
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creatin…
Linux - Unix
The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, this…
Linux - Unix
In a multi-user environment like Linux, every file is owned by a user and a group. There can be others as well who may be allowed to work with the file. W…

Popular Articles:

SASE & SD-WAN Networks
This article explores the need for Secure Access Service Edge (SASE) in today’s organizations. We show how one of the most advanced SASE platforms availab…
OpManager - Network Monitoring & Management
Learn how IT Experts and Managers take on their organization’s challenges while working remotely. How do you continue your IT Operation Management Strateg…
SASE & SD-WAN Networks
The Virtual Private Network (VPN) has become the go to security solution for keeping communications between networks and endpoints secure. After all, VPNs…
Virtualization & VM Backup
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladder in…
OpManager - Network Monitoring & Management
With a lot of enterprises switching to a work-from-home model, it is critical for admins to have a strategy in place to avoid poor performance and ensure…
Virtualization & VM Backup
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a common…
OpManager - Network Monitoring & Management
Effective monitoring and management of Cisco routers and network devices are essential for ensuring a robust and efficient network infrastructure. In this…
Palo Alto Networks
During the past decade, we’ve seen the global IT security market flooded with new network security and firewall security appliances. New vendors emerging…