Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

MS Server Articles:

Windows Servers

How to Install Windows Server 2012 from USB Fla...

Most would remember the days we had to have a CDROM or DVDROM in order to proceed with the installation of an operating system. Today, it is very c...
Windows Servers

Simple Guide on Installing & Configuring a Wind...

A Windows Active Directory Certification Authority server (AD CA), also known as a Certificate Authority, is an essential service to every organiza...
Windows Servers

Hyper-V Best Practices - Replica, Cluster, Back...

Hyper-V has proven to be a very cost effective solution for server consolidation. Evidence of this is also the fact that companies are beginning to...
Windows Servers

Windows 2012 Server Foundation, Essential, Stan...

FREE Hyper-V & VMware Virtualization Backup:  FREE for Firewall.cx readers for a Limited Time!  Download Now! Windows Server 2012 Ed...

Featured Subcategories:

Virtualization & VM Backup Articles:

How to Fix VMware ESXi Virtual Machine 'Invalid...

In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a ...

Understanding Deduplication. Complete Guide to ...

When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...

SysAdmin Day 2020 - Get your Free Amazon Vouche...

SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us ...

5 Most Critical Microsoft M365 Vulnerabilities ...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...

Your IP address:

44.212.99.208

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

EventLog Analyzer

ManageEngine Eventlog Analyzer

Free PatchManager

Free PatchManager

Firewall Analyzer

zoho firewall analyzer


Linux - Unix

Linux BIND DNS - Part 5: Configure Secondary (Slave)...

Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...
Linux - Unix

Implementing Virtual Servers and Load Balancing Clus...

What is Server Virtualization? Server virtualization is the process of apportioning a physical server into several smaller virtual servers. During ...
Linux - Unix

Critical 15 Year-old Linux Security Hole (Ghost) Rev...

Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux systems ...
Linux - Unix

Linux BIND DNS - Part 2: Configuring db.domain Zone...

It's time to start creating our zone files. We'll follow the standard format, which is given in the DNS RFCs, in order to keep everything neat and less ...

Popular Topics

ManageEngine Firewall Analyzer

Challenges & Solutions to Managing Firewall Rules in...

In today's interconnected digital landscape, where businesses rely heavily on networked systems and the internet for their operations, the importance of...
Cisco Switches

Cisco Catalyst 4500 Series Zero-Downtime IOS Upgrade...

The Supervisor Engine is the heart of the Cisco Catalyst 4500 and 6500 series switches. It is the equivalent of an engine in a car. Every packet that en...
Windows Workstations (XP, 7, 8, 10, 11)

Installing The ‘Unsupported’ Profilic USB-to-Serial ...

Thanks to the absence of dedicated serial ports on today’s laptops and ultrabooks, USB-to-Serial adapters are very popular amongst Cisco engineers as th...
Cisco Routers

Cisco Router 'User Exec' Mode

Introduction Let's see what it looks like to be in User-Exec mode on a Cisco router. Below, we have telneted into our lab router and are in User Exec M...