Articles
To read the articles in this section, simply click on the article title or read button on the far right (if visible).
Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.
Articles | |
---|---|
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
MS Server Articles:
Windows Servers
Renaming Windows 2000 Domain Name
Sometimes renaming a domain is an essential business requirement. There are many situations, such as mergers, change of company name or migration f...
Windows Servers
Windows Server 2016 VM Backup with Altaro's New...
Altaro has released Altaro VM Backup, a faster and lighter upgrade to its flagship Hyper-V and VMware backup solution, which now supports all Windo...
Windows Servers
New Features in Windows Server 2012 - Why Upgr...
There is no doubt that Cloud Computing is hot topic these days. Innovations in cloud computing models have made every industry and company IT depar...
Windows Servers
Windows 2012 Server NIC Teaming – Load Balancin...
NIC Teaming, also known as Windows Load Balancing or Failover (LBFO), is an extremely useful feature supported by Windows Server 2012 that allows t...
Featured Subcategories:
Virtualization & VM Backup Articles:
The Backup Bible. A Free Complete Guide to Disa...
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...
5 Most Critical Microsoft M365 Vulnerabilities ...
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...
6 Key Areas to Consider When Selecting a VM Bac...
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud.
Your busi...
Ultimate Guide: Install Windows 11 on VMware ES...
In this article, we’ll show you how to setup or install Microsoft Windows 11 on VMware’s ESXi servers and bypass the Trusted Platform Module versio...
Your IP address:
18.97.9.168
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Linux System Resource & Performance Monitoring
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be ma...
Linux - Unix
Linux BIND DNS - Part 4: Common BIND Files - Named.l...
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168.0, ...
Linux - Unix
Working with Linux TCP/IP Network Configuration Files
This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address, De...
Linux - Unix
Advanced Linux Commands
Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other ...
Popular Topics
Network Protocol Analyzers
How to Reconstruct HTTP Packets/Data & Monitor HTTP ...
HTTP reconstruction is an advanced network security feature offered by nChronos version 4.3.0 and later. nChronos is a Network Forensic Analysis applica...
Cisco Routers
How To Configure Dynamic DNS Server On A Cisco Router
Hosting your own webserver or email server would normaly require a static IP address from your ISP. This ensures that your services are always reachable...
Cisco Routers
Cisco Type 7 Password Decrypt / Decoder / Crack Tool
The Firewall.cx Cisco Password Decoder Tool (see below) provides readers with the ability to decrypt 'Type 7' cisco passwords.
For security reasons, we...
Windows Workstations (XP, 7, 8, 10, 11)
Configure Windows 8 & 8.1 To Provide Secure Wireless...
Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure wirele...