Skip to main content

MS Server Articles:

Windows Servers

How to Enable & Configure Shadow Copy for Share...

When you shadow copy a disk volume, you are actually generating a snapshot of the changes made to the folders and files within the disk volume at a...
Windows Servers

Configuring Domain Group Policy for Windows 2003

Windows 2003 Group Policies allow the administrators to manage a group of people accessing a resource efficiently. The group policies can be used t...
Windows Servers

Free Webinar & eBook on Microsoft Licensing for...

Microsoft Licensing for Virtual environments can become a very complicated topic, especially with all the misconceptions and false information out ...
Windows Servers

Understanding, Creating, Configuring & Applying...

This article explains what Group Policies are and shows how to configure Windows Server 2012 Active Directory Group Policies. Our next article will...

Featured Subcategories:

Virtualization & VM Backup Articles:

Differences Between VMware vSphere, vCenter, ES...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere ed...

Understanding Deduplication. Complete Guide to ...

When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...

5 Most Critical Microsoft M365 Vulnerabilities ...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...

6 Key Areas to Consider When Selecting a VM Bac...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busi...

Your IP address:

3.137.221.163

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Understanding The Linux Init Process & Different Run...

Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For example, ...
Linux - Unix

Installing Software On Linux

Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows you ...
Linux - Unix

Critical 15 Year-old Linux Security Hole (Ghost) Rev...

Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux systems ...
Linux - Unix

Linux BIND DNS - Part 3: Configuring The db.192.168....

The db.192.168.0 zone data file is the second file we need to create and configure for our BIND DNS server. As outlined in the DNS-BIND Introduction, th...

Popular Topics

Cisco Routers

Configuring Cisco SSL VPN AnyConnect (WebVPN) on Cis...

Our Web SSL VPN article written back in 2011 introduced this new wave of VPN services.  This article extends the topic by covering the installation...
Cisco Routers

Cisco Router Modes

One of the greatest perhaps features of Cisco routers is that most commands used in the IOS software they run on, are identical across multiple platform...
Cisco Routers

How To Configure Windows VPDN (PPTP) Dialup Connection

Setting up a Windows VPDN connection is a required task in order to connect to a remote network. In previous articles we covered the set up of a VPDN - ...
Network Protocol Analyzers

How To Detect ARP Attacks & ARP Flooding With Colaso...

ARP attacks and ARP flooding are common problems small and large networks are faced with. ARP attacks target specific hosts by using their MAC address a...