Skip to main content

Contact Firewall.cx

Articles That Might Interest:

Network Fundamentals
Power over Ethernet (PoE) was invented by PowerDsine back in 1997 and the first power injector (Midspan) was installed in 1998! Many manufacturespartnered with PowerDsine to make useof this innovat...
Windows Workstations (XP, 7, 8, 10, 11)
A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead With Windows XP End of Life & End of Support just around the corner (8th of Apri...
Web Application Vulnerability Scanners
SQL Injection Attacks are one of the most popular attacks against web servers, websites and web applications. A fairly popular website can expect to receive anywhere between 80 and 250 SQL injectio...
Windows Workstations (XP, 7, 8, 10, 11)
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would recall that by pressing and holding the F8 key while ...
The OSI Model
The Presentation Layer gets its name from its purpose: It presents data to the Application layer. It's basically a translator and provides coding and conversion functions. A successful data transfe...
Network Address Translation - NAT
In our previous article, Network Address Translation (NAT) Overload - Part 1, we explained what NAT Overload is and how it works. This page deals with the analysis of the packets that traverse a NA...
SASE & SD-WAN Networks
The Virtual Private Network (VPN) has become the go to security solution for keeping communications between networks and endpoints secure. After all, VPNs offer a straightforward, secure method for...
Network Protocol Analyzers
Troubleshooting network problems can be a very intensive and challenging process. Intermittent network problems are even more difficult to troubleshoot as the problem occurs at random times with a ...
Windows Servers
Our previous article covered the basic concepts of Virtualization and Windows Server 2012 Hyper-V.  This article takes a closer look at Microsoft’s Hyper-V Virtualization platform and continue...
Linux - Unix
Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation. Boot Disk One of the foremost requisites of a secure Linux server is the boot dis...
Ethernet Protocol, CSMA/CD, Collisions
Here we see a logical drawing of the Fast Ethernet Data Link Layer sublayers. Data is passed down from the upper layers (such as TCP/IP or Novell Netware) to the LLC sublayer. From there it is pass...
Ethernet Protocol, CSMA/CD, Collisions
Late collisions, on the other hand, are not normal and are usually the result of out of spec. cabling or a malfunctioning adapter. A late collision is defined as any collision that occurs after 512...

Your IP address:

18.188.127.79

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Zoho Netflow Analyzer Free Download

Free PatchManager

Free PatchManager

Security Podcast

Hornet-Security-The-Swarm-Podcast

Firewall Analyzer

zoho firewall analyzer