Skip to main content

MS Server Articles:

Windows Servers
In a Windows server environment, it is very important that only authenticated users are allowed to log in for security reasons. To fulfill this requi…
Windows Servers
This article describes the new Windows Server 2016 Licensing model (per-core licensing) Microsoft has implemented for its new server-based operating…
Windows Servers
Microsoft introduced Fine-Grained Password Policy for the first time in Windows Server 2008 and the policy has been part of every Windows Server sinc…
Windows Servers
Simple Network Management Protocol (SNMP) is a UDP protocol that uses port 161 to monitor and collect detailed information on any network device supp…

Featured Subcategories:

Virtualization & VM Backup Articles:

Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtua…
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busine…
Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career ladd…
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divide…

Enterprise-Class Cloud & Network Monitoring

Enterprise Class Cloud & Network Monitoring - Free Download

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Free PatchManager

Free PatchManager

Firewall Analyzer

zoho firewall analyzer


Linux - Unix
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creatin…
Linux - Unix
File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can access…
Linux - Unix
A file system is nothing more than the way the computer stores and retrieves all your files. These files include your documents, programs, help files, gam…
Linux - Unix
For many engineers and administrators,  maintaining a Linux system can be a daunting task, especially if there’s limited time or experience.  Wo…

Popular Topics

VLAN Networks
Deciding whether to use ISL or IEEE 802.1q to power your trunk links can be quite confusing if you cannot identify the advantages and disadvantages of eac…
OpManager - Network Monitoring & Management
With a lot of enterprises switching to a work-from-home model, it is critical for admins to have a strategy in place to avoid poor performance and ensure…
Cisco Routers
The Firewall.cx Cisco Password Decoder Tool (see below) provides readers with the ability to decrypt 'Type 7' cisco passwords. For security reasons, we d…
Network Protocol Analyzers
Firewall.cx has covered Colasoft Capsa several times in the past, but its constant improvements make it well worth revisiting. Since the last review, the…