Skip to main content

MS Server Articles:

Windows Servers

Simple Guide on Installing & Configuring a Wind...

A Windows Active Directory Certification Authority server (AD CA), also known as a Certificate Authority, is an essential service to every organiza...
Windows Servers

Windows Server 2012 File Server Resources Manag...

The Windows Server 2008 first carried FSRM or Fie Server Resources Manager, which allowed administrators to define the file types that users could ...
Windows Servers

Hyper-V Best Practices - Replica, Cluster, Back...

Hyper-V has proven to be a very cost effective solution for server consolidation. Evidence of this is also the fact that companies are beginning to...
Windows Servers

Introduction To Windows Server 2012 R2 Virtuali...

FREE Hyper-V & VMware Backup:  FREE for Firewall.cx readers for a Limited Time!  Download Now! Virtualization is an abstraction laye...

Featured Subcategories:

Virtualization & VM Backup Articles:

6 Key Areas to Consider When Selecting a VM Bac...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busi...

How to Fix VMware ESXi Virtual Machine 'Invalid...

In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a ...

The Backup Bible. A Free Complete Guide to Disa...

The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...

8 Critical Features to Have in a VM Backup Solu...

Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...

Your IP address:

44.222.189.51

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Linux VIM / Vi Editor - Tutorial - Basic & Advanced ...

When you are using Vim, you want to know three things - getting in, moving about and getting out. Of course, while doing these three basic operations, y...
Linux - Unix

Installing & Configuring Linux Webmin - Linux Web-Ba...

For many engineers and administrators,  maintaining a Linux system can be a daunting task, especially if there’s limited time or experience.  ...
Linux - Unix

Understanding The Linux Init Process & Different Run...

Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For example, ...
Linux - Unix

How To Secure Your Linux Server or Workstation - Lin...

Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation. Boot Disk One of the foremost requis...

Popular Topics

Cisco Routers

Enabling & Configuring SSH on Cisco Routers. Restric...

This article shows how to configure and setup SSH for remote management of Cisco IOS Routers. We’ll show you how to check if SSH is supported by your IO...
Cisco Routers

Introduction To Routers

Welcome to the Routers section. Here we will analyse routers quite some depth; what they do and how they work. We must point out that knowlege on the OS...
Cisco Routers

How to Restrict Cisco IOS Router VPN Client to Layer...

In our article Cisco VPN Client Configuration - Setup for IOS Router  we explained how to setup up a Cisco IOS router to support Cisco IPSec VPN cl...
Cisco Switches

Configuring SPAN On Cisco Catalyst Switches - Monito...

Being able to monitor your network traffic is essential when it comes to troubleshooting problems, performing a security audit or even casually checking...