Microsoft Server Articles:
Windows Servers
Free Webinar: Migrating from Hyper-V to VMware
If your organization is planning to migration from a Hyper-V virtualization environment to VMware then this FREE webinar is just for you.
Aimed towa…
Windows Servers
Windows 2003 DHCP Server Advanced Configuration -…
In this article, we will cover more advanced DHCP features and topics such as server options, superscopes, multicast scopes, dynamic DNS, DHCP databa…
Windows Servers
Windows Server 2016 Licensing Made Easy – Underst…
This article describes the new Windows Server 2016 Licensing model (per-core licensing) Microsoft has implemented for its new server-based operating…
Windows Servers
Configuring Windows Server Roaming Profiles
Windows roaming profiles allow the mobile users of a company to always work with their personal settings from any network computer in a domain. Roami…
Featured Subcategories:
Virtualization Articles:
Virtualization & VM Backup
8 Critical Features to Have in a VM Backup Soluti…
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtua…
Virtualization & VM Backup
SysAdmin Day 2020 - Get your Free Amazon Voucher…
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to…
Virtualization & VM Backup
How to Enable or Disable SSH on VMware ESXi via W…
SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administra…
Virtualization & VM Backup
Understanding Deduplication. Complete Guide to De…
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective but…
Windows Workstation Articles:
Windows Workstations (XP, 7, 8, 10, 11)
Configuring Windows 7 To Provide Secure Wireless…
Not many people are aware that Windows 7 has built-in capabilities that allow it to be transformed into a perfectly working access point so that wire…
Windows Workstations (XP, 7, 8, 10, 11)
Microsoft Windows XP - End of Life / End of Suppo…
A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead
With Windows XP End of Life & En…
Windows Workstations (XP, 7, 8, 10, 11)
Installing The ‘Unsupported’ Profilic USB-to-Seri…
Thanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers as…
Windows Workstations (XP, 7, 8, 10, 11)
Configure Windows 8 & 8.1 To Provide Secure Wirel…
Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wir…
Linux-Unix Articles:
Linux - Unix
Linux BIND DNS - Part 6: Linux BIND - DNS Caching
In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all the…
Linux - Unix
Configuring Linux to Act as a Firewall - Linux IP…
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer worl…
Linux - Unix
Linux BIND DNS - Part 1: Introduction To The DNS…
BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This art…
Linux - Unix
Linux BIND DNS - Part 4: Common BIND Files - Name…
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Advanced Linux Commands
Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other wa…
Linux - Unix
Linux VIM / Vi Editor - Tutorial - Basic & Advanced Fe…
When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operations, you…
Linux - Unix
Working with Linux TCP/IP Network Configuration Files
This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address, Defa…
Linux - Unix
Linux BIND DNS - Part 5: Configure Secondary (Slave) D…
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creatin…
Popular Articles:
Palo Alto Networks
Palo Alto Networks Firewall - Web & CLI Initial Config…
This article is the second-part of our Palo Alto Networks Firewall technical articles. Our previous article was introduction to Palo Alto Networks Firewal…
OpManager - Network Monitoring & Management
Optimizing Cisco Router Performance: Best Practices fo…
Effective monitoring and management of Cisco routers and network devices are essential for ensuring a robust and efficient network infrastructure. In this…
Virtualization & VM Backup
5 Most Critical Microsoft M365 Vulnerabilities Reveale…
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data. The g…
Palo Alto Networks
Complete Guide: Configuring IPSec VPN between Palo Alt…
This article will show you how to configure an IPSec VPN tunnel between a Palo Alto firewall (all PANOS versions) and Meraki MX security appliance. Our co…
SASE & SD-WAN Networks
SD-WAN is the Emerging, Evolving Solution for the Bran…
A lot has changed in how people work during the past twenty years. Co-working spaces, mobility, and the cloud now are common. Businesses are spread out an…
Palo Alto Networks
Palo Alto Firewalls Security Zones – Tap Zone, Virtual…
Palo Alto Networks Next-Generation Firewalls rely on the concept of security zones in order to apply security policies. This means that access lists (fire…
SASE & SD-WAN Networks
WAN Optimization vs SD WAN Networks. Today’s Challenge…
Enterprises have been successfully running WAN optimization appliances at their many distributed sites for years. The devices have done a good job of help…
Virtualization & VM Backup
8 Critical Features to Have in a VM Backup Solution
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtual mac…







