Skip to main content

Microsoft Server Articles:

Windows Servers
The new Hyper-V virtualization features offered by Windows Server 2016 are planning to make major changes in the virtualization market. From Nested...
Windows Servers
Windows 2003 Group Policies allow the administrators to manage a group of people accessing a resource efficiently. The group policies can be used t...
Windows Servers
FREE Hyper-V & VMware Backup:  FREE for Firewall.cx readers for a Limited Time!  Download Now! Virtualization is an abstraction lay...
Windows Servers
This article serves as an Active Directory tutorial covering installation and setup of a Windows 2012 Domain Controller using Windows Server Manage...

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to a...
Virtualization & VM Backup
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...
Virtualization & VM Backup
Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...
Virtualization & VM Backup
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the G...
Windows Workstations (XP, 7, 8, 10, 11)
This article explains how the Windows operating system makes use of the popular Host file, where it is located for various operating systems, how i...
Windows Workstations (XP, 7, 8, 10, 11)
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would rec...
Windows Workstations (XP, 7, 8, 10, 11)
Windows 8 & 8.1 hides two types of files so that normally, you do not see them while exploring your computer. The first type is the files or fo...

Linux-Unix Articles:

Linux - Unix
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This a...
Linux - Unix
Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the o...
Linux - Unix
In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all th...
Linux - Unix
Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows...

Your IP address:

34.231.180.210

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...
Linux - Unix
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, ne...
Linux - Unix
Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For example, ...
Linux - Unix
Since this document merely scratches the surface when it comes to Linux, you will probably find you have lots of questions and possibly problems. Whethe...

Popular Articles:

SASE & SD-WAN Networks
By: Shlomo Kramer, Check Point Software & Cato Networks Co-Founder As one of the founders of Check Point Software and more recently Cato Networks, ...
OpManager - Network Monitoring & Management
Accurately monitoring your organization’s business application performance, service provider SLA breaches, network infrastructure traffic, bandwidth ava...
SASE & SD-WAN Networks
With so much enterprise network traffic now destined for the cloud, backhauling traffic across an expensive MPLS connection to a data center to apply se...
OpManager - Network Monitoring & Management
Network alerts are vital for maintaining your network's health, efficiency, and security, ensuring seamless daily operations. They act as an early warni...
Palo Alto Networks
Keeping your Palo Alto Firewall up to date with the latest PAN-OS software updates is an important step to ensure your organization is protected against...
Virtualization & VM Backup
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to ke...
Palo Alto Networks
What makes Palo Alto Networks Next-Generation Firewall (NGFW) so different from its competitors is its Platform, Process and Architecture. Palo Alto Net...
SASE & SD-WAN Networks
Secure Access Service Edge (SASE) is an architecture widely regarded as the future of enterprise networking and security. In previous articles we talked...