Articles
To read the articles in this section, simply click on the article title or read button on the far right (if visible).
Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.
Articles | |
---|---|
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Read | |
Articles:
Linux File & Folder Permissions
| Read |
Articles:
Advanced Linux Commands
| Read |
Articles:
Installing Software On Linux
| Read |
Articles:
The Linux Command Line
| Read |
Articles:
The Linux File System
| Read |
Articles:
Why Use Linux?
| Read |
MS Server Articles:
Windows Servers
Windows 2003 DHCP Server Advanced Configuration...
In this article, we will cover more advanced DHCP features and topics such as server options, superscopes, multicast scopes, dynamic DNS, DHCP data...
Windows Servers
How to Recover & Create "Show Desktop" Icon Fun...
The Show Desktop feature, included with almost all versions of Windows up to Windows 7, allows a user to minimize or restore all open programs and...
Windows Servers
Configuring Windows Server Roaming Profiles
Windows roaming profiles allow the mobile users of a company to always work with their personal settings from any network computer in a domain. Roa...
Windows Servers
How to Install Desktop Icons (Computer, User’s ...
One of the first things IT Administrators and IT Managers notice after a fresh installation of Windows 2012 Server is that there are no Desktop Ico...
Featured Subcategories:
Virtualization & VM Backup Articles:
Understanding Deduplication. Complete Guide to ...
When considering your VM backup solution, key features such as deduplication are incredibly important. This is not simply from a cost perspective b...

8 Critical Features to Have in a VM Backup Solu...
Businesses that rely on virtual machines for their day-to-day operations should think twice about securing their infrastructure. Modern use of virt...
5 Most Critical Microsoft M365 Vulnerabilities ...
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data...
How to Enable SNMP on VMware ESXi Host & Config...
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to a...
Your IP address:
3.147.126.230
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Linux File & Folder Permissions
File & folder security is a big part of any operating system and Linux is no exception!
These permissions allow you to choose exactly who can acces...
Linux - Unix
Linux BIND DNS - Part 6: Linux BIND - DNS Caching
In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all the inf...
Linux - Unix
Linux CentOS - Redhat EL Installation on HP Smart Ar...
This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, ne...
Linux - Unix
Implementing Virtual Servers and Load Balancing Clus...
What is Server Virtualization?
Server virtualization is the process of apportioning a physical server into several smaller virtual servers. During ...
Popular Topics
Cisco Routers
MPLS Case Study: Why Route Summarization is not Reco...
MPLS generates Implicit Null label (The Implicit NULL label is the label that has a value of 3) for directly connected interfaces and for the summary ro...
Cisco Switches
Cisco 4507R+E Layer 3 Installation: Redundant WS-X45...
It's no news that we here at Firewall.cx enjoy writing about our installations of Cisco equipment and especially devices that we don’t get to see and pl...
Cisco Routers
Disabling Cisco Router Password Recovery Service
Most Cisco engineers are aware of the classic Password-Recovery service Cisco equipment have. If the device's credentials are lost, then performing the ...
Cisco Routers
Configuring Cisco Dynamic Multipoint VPN (DMVPN) - H...
Our DMVPN Introduction article covered the DMVPN concept and deployment designs. We explained how DMVPN combines a number of technologies that give it i...