Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

MS Server Articles:

Windows Servers

Windows Server Group Policy Link Enforcement, I...

Our previous article explained what Group Policy Objects (GPO) are and showed how group policies can be configured to help control computers and us...
Windows Servers

How to Install and Configure Windows 2012 DNS S...

Our previous article covered introduction to the Domain Name System (DNS) and explained the importance of the DNS Server role within the network in...
Windows Servers

Renaming Windows 2000 Domain Name

Sometimes renaming a domain is an essential business requirement. There are many situations, such as mergers, change of company name or migration f...
Windows Servers

How to Install/Enable Telnet Client for Windows...

IT professionals frequently need connectivity and management tools. The Telnet Client is one of the most basic tools for such activities. Using thi...

Featured Subcategories:

Virtualization & VM Backup Articles:

How to Enable or Disable SSH on VMware ESXi via...

SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administ...

5 Most Critical Microsoft M365 Vulnerabilities ...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...

World Backup Day with Free Amazon Voucher and P...

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...

FREE Webinar - Fast Track your IT Career with V...

Everyone who attends the webinar has a chance of winning a VMware VCP course (VMware Install, Config, Manage) worth $4,500! Climbing the career la...

Your IP address:

3.141.41.187

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Linux BIND DNS - Part 1: Introduction To The DNS Dat...

BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This articl...
Linux - Unix

Installing Software On Linux

Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows you ...
Linux - Unix

Advanced Linux Commands

Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other ...
Linux - Unix

Linux CentOS - Redhat EL Installation on HP Smart Ar...

This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, ne...

Popular Topics

Network Protocol Analyzers

How to Detect P2P (peer-to-peer) File Sharing, Torre...

Peer-to-Peer file sharing traffic has become a very large problem for many organizations as users engage in illegal (most times) file sharing processes ...
Cisco Routers

Cisco Router Password Recovery

Password recovery is a fairly frequently used procedure for administrators and engineers. Even though we usually stack our passwords in some word, excel...
Cisco Routers

Cisco Type 7 Password Decrypt / Decoder / Crack Tool

The Firewall.cx Cisco Password Decoder Tool (see below) provides readers with the ability to decrypt 'Type 7' cisco passwords. For security reasons, we...
Cisco Data Center (Nexus/UCS)

NEXUS NX-OS: Useful Commands, CLI Scripting, Hints &...

Whether you’re new to Cisco Nexus switches or have been working with them for years this article will show how to get around the Nexus NX-OS using ...