Contact Firewall.cx
Articles That Might Interest:
Network Fundamentals
Power over Ethernet - Understanding PoE Technol...
Power over Ethernet (PoE) was invented by PowerDsine back in 1997 and the first power injector (Midspan) was installed in 1998! Many manufacturespartnered with PowerDsine to make useof this innovat...
Windows Workstations (XP, 7, 8, 10, 11)
Microsoft Windows XP - End of Life / End of Sup...
A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead
With Windows XP End of Life & End of Support just around the corner (8th of Apri...
Web Application Vulnerability Scanners
Everything You Need to Know About SQL Injection...
SQL Injection Attacks are one of the most popular attacks against web servers, websites and web applications. A fairly popular website can expect to receive anywhere between 80 and 250 SQL injectio...
Windows Workstations (XP, 7, 8, 10, 11)
How to Start Windows 8 and 8.1 in Safe Mode – E...
This article will show you how to start Windows 8 and Windows 8.1 in Safe Mode and how to enable F8 Safe Mode. Previous Windows O/S users would recall that by pressing and holding the F8 key while ...
The OSI Model
The OSI Model: Layer 6 - Presentation Layer
The Presentation Layer gets its name from its purpose: It presents data to the Application layer. It's basically a translator and provides coding and conversion functions. A successful data transfe...
Network Address Translation - NAT
Network Address Translation (NAT) Overload - Pa...
In our previous article, Network Address Translation (NAT) Overload - Part 1, we explained what NAT Overload is and how it works. This page deals with the analysis of the packets that traverse a NA...
SASE & SD-WAN Networks
SASE and VPNs: Reconsidering your Mobile Remote...
The Virtual Private Network (VPN) has become the go to security solution for keeping communications between networks and endpoints secure. After all, VPNs offer a straightforward, secure method for...
Network Protocol Analyzers
How to Use Multi-Segment Analysis to Troublesho...
Troubleshooting network problems can be a very intensive and challenging process. Intermittent network problems are even more difficult to troubleshoot as the problem occurs at random times with a ...
Windows Servers
How to Install Windows 2012 Hyper-V via Server ...
Our previous article covered the basic concepts of Virtualization and Windows Server 2012 Hyper-V. This article takes a closer look at Microsoft’s Hyper-V Virtualization platform and continue...
Linux - Unix
How To Secure Your Linux Server or Workstation ...
Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation.
Boot Disk
One of the foremost requisites of a secure Linux server is the boot dis...
Ethernet Protocol, CSMA/CD, Collisions
802.3 Fast Ethernet (100 Mbit/Sec) Model
Here we see a logical drawing of the Fast Ethernet Data Link Layer sublayers. Data is passed down from the upper layers (such as TCP/IP or Novell Netware) to the LLC sublayer. From there it is pass...
Ethernet Protocol, CSMA/CD, Collisions
Late Ethernet Collisions
Late collisions, on the other hand, are not normal and are usually the result of out of spec. cabling or a malfunctioning adapter. A late collision is defined as any collision that occurs after 512...
Your IP address:
18.188.127.79
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!