Skip to main content

MS Server Articles:

Windows Servers
In a Windows server environment, it is very important that only authenticated users are allowed to log in for security reasons. To fulfill this req...
Windows Servers
The Windows Server 2008 first carried FSRM or Fie Server Resources Manager, which allowed administrators to define the file types that users could ...
Windows Servers
FREE Hyper-V & VMware Backup:  FREE for Firewall.cx readers for a Limited Time!  Download Now! Virtualization is an abstraction lay...
Windows Servers
Our previous article covered introduction to the Domain Name System (DNS) and explained the importance of the DNS Server role within the network in...

Featured Subcategories:

Virtualization & VM Backup Articles:

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...
SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administ...
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career la...

Your IP address:

3.144.119.70

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can acces...
Linux - Unix
Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For example, ...
Linux - Unix
This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address, De...
Linux - Unix
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...

Popular Topics

Cisco Data Center (Nexus/UCS)
This article introduces the Cisco Nexus product family (Nexus 9000, Nexus 7000, Nexus 5000, Nexus 3000, Nexus 2000, Nexus 1000V and MDS 9000). We explai...
OpManager - Network Monitoring & Management
Learn how IT Experts and Managers take on their organization’s challenges while working remotely. How do you continue your IT Operation Management Strat...
Cisco Routers
This article will focus on Cisco's routers which can be found in almost any organization due to their popularity and market penetration. Cisco has a nu...
Cisco Routers
In today’s complex network environments securing your network routers can be a daunting task, especially when there are so many CLI commands and paramet...