Skip to main content

MS Server Articles:

Windows Servers
This article explains what Group Policies are and shows how to configure Windows Server 2012 Active Directory Group Policies. Our next article will c…
Windows Servers
Hyper-V has proven to be a very cost effective solution for server consolidation. Evidence of this is also the fact that companies are beginning to m…
Windows Servers
Part 1 of our Windows 2003 DHCP Server Advanced Configuration article explained the creation and configuration of DHCP Scope options and how to confi…
Windows Servers
Microsoft Licensing for Virtual environments can become a very complicated topic, especially with all the misconceptions and false information out th…

Featured Subcategories:

Virtualization & VM Backup Articles:

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data…
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busine…
SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administra…
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtua…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address, Defa…
Linux - Unix
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, need…
Linux - Unix
File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can access…
Linux - Unix
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168.0, de…

Popular Topics

Network Protocol Analyzers
Brute-force attacks are commonly known attack methods by which hackers try to get access to restricted accounts and data using an exhaustive list/database…
ManageEngine Firewall Analyzer
Firewall security management is a combination of monitoring, configuring, and managing your firewall to make sure it runs at its best to effectively ward…
Cisco Switches
Driven by our thirst for technical material and experience, we thought it would be a great idea to start presenting various installations of Cisco equipme…
OpManager - Network Monitoring & Management
Work transformation is not 'one and done,'" says  IDC's vice president, Holly Muscolino. Most enterprises understand that a hybrid workforce is the f…