Microsoft Server Articles:
Windows Servers
Windows 2016 Server Licensing Explained – Free We…
With Windows 2016 Server already making its way into data centers Windows 2016 Server Licensing is becoming a very hot topic. Windows 2016 Server is…
Windows Servers
New Upcoming Features in Hyper-V vNext - Free Tr…
With the release of Hyper-V vNext just around the corner, Altaro has organized a Free webinar that will take you right into the new Hyper-V vNext rel…
Windows Servers
Windows 2003 DHCP Server Installation & Configura…
DHCP (Dynamic Host Configuration Protocol) is a protocol that allows clients on a network to request network configuration settings from a server run…
Windows Servers
Installing Active Directory Services & Domain Con…
This article serves as an Active Directory tutorial covering installation and setup of Windows 2012 Active Directory Services Role & Domain Contr…
Featured Subcategories:
Virtualization Articles:
Virtualization & VM Backup
FREE Webinar - Fast Track your IT Career with VMw…
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500!
Climbing the career ladd…
Virtualization & VM Backup
5 Most Critical Microsoft M365 Vulnerabilities Re…
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data…
Virtualization & VM Backup
Ultimate Guide: Install Windows 11 on VMware ESXi…
In this article, we’ll show you how to setup or install Microsoft Windows 11 on VMware’s ESXi servers and bypass the Trusted Platform Module version…
Virtualization & VM Backup
How to Enable SNMP on VMware ESXi Host & Configur…
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to all…
Windows Workstation Articles:
Windows Workstations (XP, 7, 8, 10, 11)
Configuring Windows 7 To Provide Secure Wireless…
Not many people are aware that Windows 7 has built-in capabilities that allow it to be transformed into a perfectly working access point so that wire…
Windows Workstations (XP, 7, 8, 10, 11)
How to Add and Remove Applications from Windows 8…
In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or th…
Windows Workstations (XP, 7, 8, 10, 11)
How to Start Windows 8 and 8.1 in Safe Mode – Ena…
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would recal…
Windows Workstations (XP, 7, 8, 10, 11)
How to Join a Windows 8, 8.1 Client to Windows Do…
In this article, we will show how to add a Windows 8 or Windows 8.1 client to a Windows Domain / Active Directory. The article can be considered an e…
Linux-Unix Articles:
Linux - Unix
Updating Your Linux Server - How to Update Linux…
Like any other software, an operating system needs to be updated. Updates are required not only because of the new hardware coming into the market, b…
Linux - Unix
Linux File & Folder Permissions
File & folder security is a big part of any operating system and Linux is no exception!
These permissions allow you to choose exactly who can ac…
Linux - Unix
Configuring Linux to Act as a Firewall - Linux IP…
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer worl…
Linux - Unix
Linux BIND DNS - Part 5: Configure Secondary (Sla…
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by cr…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Updating Your Linux Server - How to Update Linux Works…
Like any other software, an operating system needs to be updated. Updates are required not only because of the new hardware coming into the market, but al…
Linux - Unix
How To Secure Your Linux Server or Workstation - Linux…
Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation.
Boot Disk
One of the foremost requisit…
Linux - Unix
Linux System Resource & Performance Monitoring
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be main…
Linux - Unix
Linux CentOS - Redhat EL Installation on HP Smart Arra…
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, need…
Popular Articles:
Palo Alto Networks
Palo Alto Networks Firewall - Web & CLI Initial Config…
This article is the second-part of our Palo Alto Networks Firewall technical articles. Our previous article was introduction to Palo Alto Networks Firewal…
SASE & SD-WAN Networks
The Most Common Worst Networking Practices and How To…
In the rush to keep pace with the many challenges facing today’s organizations, all too often networking teams end up adopting practices and processes tha…
SASE & SD-WAN Networks
Converged SASE Backbone – How Leading SASE Provider, C…
Global connectivity is top of mind for many IT teams at organizations of all sizes. We are currently in the middle of a dramatic shift in business and tec…
OpManager - Network Monitoring & Management
Free Webinar: Learn How Zero-Trust & Cloud Technologie…
Work transformation is not 'one and done,'" says IDC's vice president, Holly Muscolino. Most enterprises understand that a hybrid workforce is the f…
Palo Alto Networks
Palo Alto Firewall Configuration Options. Tap Mode, Vi…
Our previous article explained how Palo Alto Firewalls make use of Security Zones to process and enforce security policies. This article will explain the…
Palo Alto Networks
Palo Alto Firewall Application-based Policy Enforcemen…
Our previous article examined the benefits of Palo Alto Networks Firewall Single Pass Parallel Processing (SP3) architecture and how its combine with the…
Palo Alto Networks
Configuring QoS on Palo Alto Firewalls: Class-based Po…
This article’s purpose is to help you quickly master Palo Alto QoS concepts and learn to configure QoS on Palo Alto Firewalls in a simple and efficient wa…
Virtualization & VM Backup
6 Key Areas to Consider When Selecting a VM Backup Sol…
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud.
Your business de…







