Skip to main content

Contact Firewall.cx

Articles That Might Interest:

Windows Servers

How to Enable ‘Web Server’ Certificate Template...

In this article we will show you how to enable the ‘Web Server’ certificate template option on a Windows Certification Authority (Windows CA) Server.  The Web Server option is usually not pres...
Network Fundamentals

Media Access Control - MAC Addresses

A MAC address, or Media Access Control address, is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. It...
VLAN Networks

VLAN InterSwitch Link (ISL) Protocol Analysis

Deciding whether to use ISL or IEEE 802.1q to power your trunk links can be quite confusing if you cannot identify the advantages and disadvantages of each protocol within your network. This artic...
Web Application Vulnerability Scanners

Differences between Network & Web Application S...

According to Wikipedia, security is defined as the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset which in almost all cases, will include an orga...
Windows Servers

Windows Server 2016 VM Backup with Altaro's New...

Altaro has released Altaro VM Backup, a faster and lighter upgrade to its flagship Hyper-V and VMware backup solution, which now supports all Windows Server editions and includes several highly-req...
Cisco Routers

MPLS Case Study: Why Route Summarization is not...

MPLS generates Implicit Null label (The Implicit NULL label is the label that has a value of 3) for directly connected interfaces and for the summary routes. Label Switch Router (LSR) generates thi...
Windows Workstations (XP, 7, 8, 10, 11)

How to Add and Remove Applications from Windows...

In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or the small squares and rectangles appearing on the ...
Cisco Routers

Cisco 880W (881W, 886W, 887W, 888W) Multiple - ...

This article shows how to configure the embedded or integrated access point in a Cisco 880W series router (e.g Cisco 887W, Cisco 886W, Cisco 881W, Cisco 888W, etc) with multiple encrypted SSIDs (WP...
Network Cabling

Unshielded Twisted Pair (UTP) - CAT 1 to CAT5, ...

Unshielded Twisted Pair (UTP) cable is most certainly by far the most popular cable around the world. UTP cable is used not only for networking but also for the traditional telephone (UTP-Cat 1). T...
Cisco Switches

Resolving Cisco Switch & Router ‘DHCP Server Po...

In previous articles, we showed how it is possible to configure a Cisco router or Catalyst switch to provide DHCP server services to network clients. Everything usually works without a problem, how...
Windows Workstations (XP, 7, 8, 10, 11)

Revealing & Backing Up Your Windows 8 – Windows...

Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the Genuine Microsoft Label or Certificate Of Authentic...
Windows Workstations (XP, 7, 8, 10, 11)

How to Enable Master Control Panel or Enable Go...

Around 2007, an undocumented feature of Windows, called the God Mode, was published outside of documentation provided by Microsoft. This is the Windows Master Control Panel shortcut. Bloggers named...

Your IP address:

3.144.86.134

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast