Skip to main content

Microsoft Server Articles:

Windows Servers

Free Webinar: Scripting & Automation in Hyper-V...

System Center Virtual Machine Manager (SCVMM) provides some great automation benefits for those organizations that can afford the hefty price tag. ...
Windows Servers

Guide to Windows Server 2016 Hyper-V Hypervisor...

One of Windows Server 2016 highlights is the newer Hyper-V server that not only extends the hypervisor’s features and capabilities but also introdu...
Windows Servers

Installing Windows Server 2012 Active Directory...

This article serves as an Active Directory tutorial covering installation and setup of a Windows 2012 Domain Controller using Windows Server Manage...
Windows Servers

Configuring Local Group Policy for Windows 2003

Windows 2003 Group Policies allow the administrators to efficiently manage a group of people accessing a resource. Group policies can be used to co...

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup

5 Most Critical Microsoft M365 Vulnerabilities ...

Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...
Virtualization & VM Backup

Understanding Deduplication. Complete Guide to ...

When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...
Virtualization & VM Backup

How to Enable or Disable SSH on VMware ESXi via...

SSH access to VMware’s ESXi server is by disabled by default however there are many reasons where SSH might be required. VMware and System administ...
Virtualization & VM Backup

How to Fix VMware ESXi Virtual Machine 'Invalid...

In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a ...

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)

How to Enable Master Control Panel or Enable Go...

Around 2007, an undocumented feature of Windows, called the God Mode, was published outside of documentation provided by Microsoft. This is the Win...
Windows Workstations (XP, 7, 8, 10, 11)

Configure Windows 8 & 8.1 To Provide Secure Wir...

Windows 8 and Windows 8.1 (including Professional edition) operating systems provide the ability to turn your workstation or laptop into a secure w...
Windows Workstations (XP, 7, 8, 10, 11)

Microsoft Windows XP - End of Life / End of Sup...

A Q&A with Cristian Florian, Product Manager For GFI LanGuard On Security Implications & Planning Ahead With Windows XP End of Life & ...
Windows Workstations (XP, 7, 8, 10, 11)

Configuring Windows 7 To Provide Secure Wireles...

Not many people are aware that Windows 7 has built-in capabilities that allow it to be transformed into a perfectly working access point so that wi...

Linux-Unix Articles:

Linux - Unix

Linux BIND DNS - Part 1: Introduction To The DN...

BIND (Berkely Internet Name Domain) is a popular software for translating domain names into IP addresses and usually found on Linux servers. This a...
Linux - Unix

Why Use Linux?

The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux co...
Linux - Unix

Critical 15 Year-old Linux Security Hole (Ghost...

Security researchers at qualys.com yesterday released information on a critical 15 year-old Linux security hole which affects millions of Linux sys...
Linux - Unix

Understanding The Linux Init Process & Differen...

Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For exam...

Your IP address:

3.145.38.117

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Why Use Linux?

The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communi...
Linux - Unix

Understanding The Linux Init Process & Different Run...

Different Linux systems can be used in many ways. This is the main idea behind operating different services at different operating levels. For example, ...
Linux - Unix

Installing & Configuring VSFTPD FTP Server for Redha...

Vsftpd is a popular FTP server for Unix/Linux systems. For thoes unaware of the vsftpd ftp server, note that this is not just another ftp server, but a ...
Linux - Unix

Linux BIND DNS - Part 5: Configure Secondary (Slave)...

Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...

Popular Articles:

Virtualization & VM Backup

SysAdmin Day 2020 - Get your Free Amazon Voucher & G...

SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to ke...
Palo Alto Networks

Introduction to Palo Alto Next-Generation Network Fi...

During the past decade, we’ve seen the global IT security market flooded with new network security and firewall security appliances. New vendors emergin...
Palo Alto Networks

Palo Alto Firewall Configuration Options. Tap Mode, ...

Our previous article explained how Palo Alto Firewalls make use of Security Zones to process and enforce security policies. This article will explain th...
OpManager - Network Monitoring & Management

Network Management Systems Help Businesses Accuratel...

Accurately monitoring your organization’s business application performance, service provider SLA breaches, network infrastructure traffic, bandwidth ava...
Virtualization & VM Backup

8 Critical Features to Have in a VM Backup Solution

Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virtual m...
SASE & SD-WAN Networks

The Need for a Converged SASE Platform. Converging N...

The digital transformation is pushing applications to the cloud, the 2020-2022 pandemic shifted employees to work from home, and the number of resulting...
SASE & SD-WAN Networks

The Most Common Worst Networking Practices and How T...

In the rush to keep pace with the many challenges facing today’s organizations, all too often networking teams end up adopting practices and processes t...
Palo Alto Networks

Palo Alto Firewall Application-based Policy Enforcem...

Our previous article examined the benefits of Palo Alto Networks Firewall Single Pass Parallel Processing (SP3) architecture and how its combine with th...