Skip to main content

Microsoft Server Articles:

Windows Servers
If your organization is planning to migration from a Hyper-V virtualization environment to VMware then this FREE webinar is just for you. Aimed towa…
Windows Servers
Part 1 of our Windows 2003 DHCP Server Advanced Configuration article explained the creation and configuration of DHCP Scope options and how to confi…
Windows Servers
Windows roaming profiles allow the mobile users of a company to always work with their personal settings from any network computer in a domain. Roami…
Windows Servers
Our previous article explained what Group Policy Objects (GPO) are and showed how group policies can be configured to help control computers and user…

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a co…
Virtualization & VM Backup
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective but…
Virtualization & VM Backup
Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishaps…
Virtualization & VM Backup
In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edit…

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would recal…
Windows Workstations (XP, 7, 8, 10, 11)
In this article, we will show how to add a Windows 8 or Windows 8.1 client to a Windows Domain / Active Directory. The article can be considered an e…
Windows Workstations (XP, 7, 8, 10, 11)
Not many users are aware that Windows 7 provides more than one way to configure a workstation’s network adaptor IP address or force it to obtain an I…
Windows Workstations (XP, 7, 8, 10, 11)
This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see the…

Linux-Unix Articles:

Linux - Unix
Since this document merely scratches the surface when it comes to Linux, you will probably find you have lots of questions and possibly problems. Whe…
Linux - Unix
File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can ac…
Linux - Unix
When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operations…
Linux - Unix
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This art…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
For a cable modem or a DSL connection, the service provider dynamically assigns the IP address to your PC. When you install a DSL or a home cable router b…
Linux - Unix
Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other wa…
Linux - Unix
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168.0, de…
Linux - Unix
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, need…

Popular Articles:

Virtualization & VM Backup
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to allow or…
Palo Alto Networks
Discover the ins and outs of using Palo Alto Networks’ Software NGFW (Flex) credits to seamlessly renew your cloud-based or virtualized software NGFW devi…
Virtualization & VM Backup
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data. The g…
Palo Alto Networks
Keeping your Palo Alto Firewall up to date with the latest PAN-OS software updates is an important step to ensure your organization is protected against t…
Palo Alto Networks
During the past decade, we’ve seen the global IT security market flooded with new network security and firewall security appliances. New vendors emerging…
OpManager - Network Monitoring & Management
In the rapidly evolving landscape of cyber threats, network security has never been more crucial. With the frequency and sophistication of cyberattacks es…
Virtualization & VM Backup
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divided int…
Virtualization & VM Backup
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a common…