Skip to main content

Microsoft Server Articles:

Windows Servers
In a Windows server environment, it is very important that only authenticated users are allowed to log in for security reasons. To fulfill this requi…
Windows Servers
Users working with Hyper-V Virtualization would be interested to know that Altaro is hosting a free webinar on the 25th of February 2016 at 4pm CET /…
Windows Servers
In this article, we will cover more advanced DHCP features and topics such as server options, superscopes, multicast scopes, dynamic DNS, DHCP databa…
Windows Servers
Microsoft introduced Fine-Grained Password Policy for the first time in Windows Server 2008 and the policy has been part of every Windows Server sinc…

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busine…
Virtualization & VM Backup
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to…
Virtualization & VM Backup
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective but…
Virtualization & VM Backup
In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edit…

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)
Around 2007, an undocumented feature of Windows, called the God Mode, was published outside of documentation provided by Microsoft. This is the Windo…
Windows Workstations (XP, 7, 8, 10, 11)
Thanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers as…
Windows Workstations (XP, 7, 8, 10, 11)
A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead With Windows XP End of Life & En…
Windows Workstations (XP, 7, 8, 10, 11)
Not many people are aware that Windows 7 has built-in capabilities that allow it to be transformed into a perfectly working access point so that wire…

Linux-Unix Articles:

Linux - Unix
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168…
Linux - Unix
When you are running your own web hosting, it is important to monitor how much space is being used by each user. This is not a simple task to be done…
Linux - Unix
Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows y…
Linux - Unix
For a cable modem or a DSL connection, the service provider dynamically assigns the IP address to your PC. When you install a DSL or a home cable rou…

Your IP address:

18.97.14.90

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation. Boot Disk One of the foremost requisit…
Linux - Unix
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer world too…
Linux - Unix
What is Server Virtualization? Server virtualization is the process of apportioning a physical server into several smaller virtual servers. During se…
Linux - Unix
Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other wa…

Popular Articles:

Palo Alto Networks
This article provides comprehensive guidance on the manual processes involved in downloading, uploading, and installing (import) any PAN-OS version on a P…
SASE & SD-WAN Networks
The digital transformation is pushing applications to the cloud, the 2020-2022 pandemic shifted employees to work from home, and the number of resulting n…
SASE & SD-WAN Networks
The Wide Area Network (WAN) is the backbone of the business. It ties together the remote locations, headquarters and data centers into an integrated netwo…
Virtualization & VM Backup
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladder in…
OpManager - Network Monitoring & Management
The hybrid work culture has resulted in workforces increasingly using their mobile devices for work, further adding to the complexity of ensuring security…
OpManager - Network Monitoring & Management
Effective monitoring and management of Cisco routers and network devices are essential for ensuring a robust and efficient network infrastructure. In this…
SASE & SD-WAN Networks
This article explores the need for Secure Access Service Edge (SASE) in today’s organizations. We show how one of the most advanced SASE platforms availab…
OpManager - Network Monitoring & Management
Times have changed now and HOME is the new office. Now, everyone works at their comfort and in fact online all throught the day and night. This mandates t…