Articles
To read the articles in this section, simply click on the article title or read button on the far right (if visible).
Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.
Articles | |
---|---|
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Articles:
Linux File & Folder Permissions
| Read |
Articles:
Advanced Linux Commands
| Read |
Articles:
Installing Software On Linux
| Read |
Articles:
The Linux Command Line
| Read |
Articles:
The Linux File System
| Read |
Articles:
Why Use Linux?
| Read |
MS Server Articles:
Windows Servers
How to Install Windows Server 2012 from USB Fla...
Most would remember the days we had to have a CDROM or DVDROM in order to proceed with the installation of an operating system. Today, it is very c...
Windows Servers
Installing Windows Server 2012 Active Directory...
This article serves as an Active Directory tutorial covering installation and setup of a Windows 2012 Domain Controller using Windows Server Manage...
Windows Servers
Windows 2003 DHCP Server Installation & Configu...
DHCP (Dynamic Host Configuration Protocol) is a protocol that allows clients on a network to request network configuration settings from a server r...
Windows Servers
Configuring Local Group Policy for Windows 2003
Windows 2003 Group Policies allow the administrators to efficiently manage a group of people accessing a resource. Group policies can be used to co...
Featured Subcategories:
Virtualization & VM Backup Articles:
How to Enable SNMP on VMware ESXi Host & Config...
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to a...
How to Enable or Disable SSH on VMware ESXi via...
SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administ...
6 Key Areas to Consider When Selecting a VM Bac...
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud.
Your busi...

8 Critical Features to Have in a VM Backup Solu...
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...
Your IP address:
3.133.113.101
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Implementing Virtual Servers and Load Balancing Clus...
What is Server Virtualization?
Server virtualization is the process of apportioning a physical server into several smaller virtual servers. During ...
Linux - Unix
Linux CentOS - Redhat EL Installation on HP Smart Ar...
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, ne...
Linux - Unix
Linux BIND DNS - Part 4: Common BIND Files - Named.l...
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168.0, ...
Linux - Unix
Why Use Linux?
The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communi...
Popular Topics

VLAN Networks
VLAN InterSwitch Link (ISL) Protocol Analysis
Deciding whether to use ISL or IEEE 802.1q to power your trunk links can be quite confusing if you cannot identify the advantages and disadvantages of e...

VLAN Networks
VLAN Tagging - Understanding VLANs Ethernet Frames
We mentioned that Trunk Links are designed to pass frames (packets) from all VLANs, allowing us to connect multiple switches together and independently ...
Cisco Routers
Configuring Dynamic NAT (NAT Overload) On A Cisco Ro...
NAT (Network Address Translation) is a method that allows the translation (modification) of IP addresses while packets/datagrams are traversing the netw...

ManageEngine Firewall Analyzer
Challenges & Solutions to Managing Firewall Rules in...
In today's interconnected digital landscape, where businesses rely heavily on networked systems and the internet for their operations, the importance of...