Skip to main content

MS Server Articles:

Windows Servers
Altaro has released Altaro VM Backup, a faster and lighter upgrade to its flagship Hyper-V and VMware backup solution, which now supports all Windows…
Windows Servers
In this article, we will cover more advanced DHCP features and topics such as server options, superscopes, multicast scopes, dynamic DNS, DHCP databa…
Windows Servers
When you shadow copy a disk volume, you are actually generating a snapshot of the changes made to the folders and files within the disk volume at a c…
Windows Servers
There is no doubt that Cloud Computing is hot topic these days. Innovations in cloud computing models have made every industry and company IT departm…

Featured Subcategories:

Virtualization & VM Backup Articles:

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishaps…
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busine…
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtua…
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladd…

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168.0, de…
Linux - Unix
Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows you to…
Linux - Unix
Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For example, th…
Linux - Unix
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be main…

Popular Topics

ManageEngine Firewall Analyzer
The utilization of log analyzers, such as Firewall Analyzer, in network infrastructure plays a pivotal role in enhancing cybersecurity and fortifying the…
ManageEngine Firewall Analyzer
A firewall appliance is a fundamental pillar of network security, acting as the first line of defense against cyber threats. However, its strength is on…
Windows Workstations (XP, 7, 8, 10, 11)
Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the Genuine…
VLAN Networks
VTP (VLAN Trunking Protocol) pruning is a feature that is used in Cisco switches to reduce unnecessary traffic in VLAN (Virtual Local Area Network) trunks…