Skip to main content

Microsoft Server Articles:

Windows Servers

Windows Server 2012 File Server Resources Manag...

The Windows Server 2008 first carried FSRM or Fie Server Resources Manager, which allowed administrators to define the file types that users could ...
Windows Servers

How to Install and Configure Windows 2012 DNS S...

Our previous article covered introduction to the Domain Name System (DNS) and explained the importance of the DNS Server role within the network in...
Windows Servers

Windows 2012 Server NIC Teaming – Load Balancin...

NIC Teaming, also known as Windows Load Balancing or Failover (LBFO), is an extremely useful feature supported by Windows Server 2012 that allows t...
Windows Servers

Free Webinar: Troubleshooting & Fixing Microsof...

Users working with Hyper-V Virtualization would be interested to know that Altaro is hosting a free webinar on the 25th of February 2016 at 4pm CET...

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup

World Backup Day with Free Amazon Voucher and P...

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...
Virtualization & VM Backup

How to Enable SNMP on VMware ESXi Host & Config...

In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to a...
Virtualization & VM Backup

The Backup Bible. A Free Complete Guide to Disa...

The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...
Virtualization & VM Backup

5 Most Critical Microsoft M365 Vulnerabilities ...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)

How to View Hidden Files & Folders in Windows 7

This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see t...
Windows Workstations (XP, 7, 8, 10, 11)

How to Start Windows 8 and 8.1 in Safe Mode – E...

This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would rec...
Windows Workstations (XP, 7, 8, 10, 11)

How to Add and Remove Applications from Windows...

In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or ...
Windows Workstations (XP, 7, 8, 10, 11)

Microsoft Windows XP - End of Life / End of Sup...

A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead With Windows XP End of Life & ...

Linux-Unix Articles:

Linux - Unix

Why Use Linux?

The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux co...
Linux - Unix

Configuring Linux to Act as a Firewall - Linux ...

What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer wo...
Linux - Unix

The Linux Command Line

You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is t...
Linux - Unix

Linux System Resource & Performance Monitoring

You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may ...

Your IP address:

3.140.242.165

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Linux BIND DNS - Part 5: Configure Secondary (Slave)...

Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...
Linux - Unix

Linux BIND DNS - Part 4: Common BIND Files - Named.l...

So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168.0, ...
Linux - Unix

Linux File & Folder Permissions

File & folder security is a big part of any operating system and Linux is no exception! These permissions allow you to choose exactly who can acces...
Linux - Unix

Configuring Linux to Act as a Firewall - Linux IPTab...

What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer world t...

Popular Articles:

Palo Alto Networks

Palo Alto Firewalls Security Zones – Tap Zone, Virtu...

Palo Alto Networks Next-Generation Firewalls rely on the concept of security zones in order to apply security policies. This means that access lists (fi...
SASE & SD-WAN Networks

Understanding Secure Access Service Edge (SASE) and ...

Software Defined Wide Area Networking (SD-WAN) is changing the way that businesses connect to the cloud. With SD-WAN, organizations can move away from c...
OpManager - Network Monitoring & Management

Special Free Podcast Series: IT Operations Managemen...

Learn how IT Experts and Managers take on their organization’s challenges while working remotely. How do you continue your IT Operation Management Strat...
OpManager - Network Monitoring & Management

Free Webinar: Clients' network configuration and com...

Defending your client's network from faulty configuration changes, poor compliance, and bringing the network back quickly from downtime can be challengi...
Palo Alto Networks

Complete Guide to Upgrading Palo Alto Firewall PAN-O...

Upgrading your Palo Alto Firewall or Panorama Management System to the preferred PAN-OS release is always recommended as it ensures it remains stable, s...
Palo Alto Networks

Configuring QoS on Palo Alto Firewalls: Class-based ...

This article’s purpose is to help you quickly master Palo Alto QoS concepts and learn to configure QoS on Palo Alto Firewalls in a simple and efficient ...
SASE & SD-WAN Networks

MPLS vs. SD-WAN vs. Internet vs. Cloud Network. Conn...

The Wide Area Network (WAN) is the backbone of the business. It ties together the remote locations, headquarters and data centers into an integrated net...
Security Service Edge (SSE)

Security Service Edge (SSE) Limitations & Disadvanta...

This article explores the Security Service Edge (SSE) portion of Secure Access Service Edge (SASE) and the need for holistic cybersecurity protections. ...