Microsoft Server Articles:
Windows Servers
Windows Server 2012 File Server Resources Manag...
The Windows Server 2008 first carried FSRM or Fie Server Resources Manager, which allowed administrators to define the file types that users could ...
Windows Servers
How to Install and Configure Windows 2012 DNS S...
Our previous article covered introduction to the Domain Name System (DNS) and explained the importance of the DNS Server role within the network in...
Windows Servers
Windows 2012 Server NIC Teaming – Load Balancin...
NIC Teaming, also known as Windows Load Balancing or Failover (LBFO), is an extremely useful feature supported by Windows Server 2012 that allows t...
Windows Servers
Free Webinar: Troubleshooting & Fixing Microsof...
Users working with Hyper-V Virtualization would be interested to know that Altaro is hosting a free webinar on the 25th of February 2016 at 4pm CET...
Featured Subcategories:
Virtualization Articles:
Virtualization & VM Backup
World Backup Day with Free Amazon Voucher and P...
Celebrate World Backup Day and WIN with Altaro!
We all remember how grateful we were to have backup software when facing so many data loss mishap...
Virtualization & VM Backup
How to Enable SNMP on VMware ESXi Host & Config...
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to a...
Virtualization & VM Backup
The Backup Bible. A Free Complete Guide to Disa...
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...
Virtualization & VM Backup
5 Most Critical Microsoft M365 Vulnerabilities ...
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...
Windows Workstation Articles:
Windows Workstations (XP, 7, 8, 10, 11)
How to View Hidden Files & Folders in Windows 7
This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see t...
Windows Workstations (XP, 7, 8, 10, 11)
How to Start Windows 8 and 8.1 in Safe Mode – E...
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would rec...
Windows Workstations (XP, 7, 8, 10, 11)
How to Add and Remove Applications from Windows...
In this article, we'll show you how to add (pin) and remove (unpin) any application from the Windows 8 or Windows 8.1 Metro Start Screen. Tiles or ...
Windows Workstations (XP, 7, 8, 10, 11)
Microsoft Windows XP - End of Life / End of Sup...
A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead
With Windows XP End of Life & ...
Linux-Unix Articles:
Linux - Unix
Why Use Linux?
The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux co...
Linux - Unix
Configuring Linux to Act as a Firewall - Linux ...
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer wo...
Linux - Unix
The Linux Command Line
You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is t...
Linux - Unix
Linux System Resource & Performance Monitoring
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may ...
Your IP address:
3.140.242.165
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Linux BIND DNS - Part 5: Configure Secondary (Slave)...
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...
Linux - Unix
Linux BIND DNS - Part 4: Common BIND Files - Named.l...
So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.168.0, ...
Linux - Unix
Linux File & Folder Permissions
File & folder security is a big part of any operating system and Linux is no exception!
These permissions allow you to choose exactly who can acces...
Linux - Unix
Configuring Linux to Act as a Firewall - Linux IPTab...
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer world t...
Popular Articles:
Palo Alto Networks
Palo Alto Firewalls Security Zones – Tap Zone, Virtu...
Palo Alto Networks Next-Generation Firewalls rely on the concept of security zones in order to apply security policies. This means that access lists (fi...
SASE & SD-WAN Networks
Understanding Secure Access Service Edge (SASE) and ...
Software Defined Wide Area Networking (SD-WAN) is changing the way that businesses connect to the cloud. With SD-WAN, organizations can move away from c...
OpManager - Network Monitoring & Management
Special Free Podcast Series: IT Operations Managemen...
Learn how IT Experts and Managers take on their organization’s challenges while working remotely. How do you continue your IT Operation Management Strat...
OpManager - Network Monitoring & Management
Free Webinar: Clients' network configuration and com...
Defending your client's network from faulty configuration changes, poor compliance, and bringing the network back quickly from downtime can be challengi...
Palo Alto Networks
Complete Guide to Upgrading Palo Alto Firewall PAN-O...
Upgrading your Palo Alto Firewall or Panorama Management System to the preferred PAN-OS release is always recommended as it ensures it remains stable, s...
Palo Alto Networks
Configuring QoS on Palo Alto Firewalls: Class-based ...
This article’s purpose is to help you quickly master Palo Alto QoS concepts and learn to configure QoS on Palo Alto Firewalls in a simple and efficient ...
SASE & SD-WAN Networks
MPLS vs. SD-WAN vs. Internet vs. Cloud Network. Conn...
The Wide Area Network (WAN) is the backbone of the business. It ties together the remote locations, headquarters and data centers into an integrated net...
Security Service Edge (SSE)
Security Service Edge (SSE) Limitations & Disadvanta...
This article explores the Security Service Edge (SSE) portion of Secure Access Service Edge (SASE) and the need for holistic cybersecurity protections.
...