Articles
To read the articles in this section, simply click on the article title or read button on the far right (if visible).
Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.
| Articles | |
|---|---|
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
| Read | |
MS Server Articles:
Windows Servers
How to Install Windows 2012 Hyper-V via Server Ma…
Our previous article covered the basic concepts of Virtualization and Windows Server 2012 Hyper-V. This article takes a closer look at Microsof…
Windows Servers
Windows 2003 DNS Server Installation & Configurat…
DNS is used for translating host names to IP addresses and the reverse, for both private and public networks (i.e.: the Internet). DNS does this by u…
Windows Servers
Creating Windows Users and Groups with Windows 20…
In a Windows server environment, it is very important that only authenticated users are allowed to log in for security reasons. To fulfill this requi…
Windows Servers
Installing Windows Server 2012 Active Directory v…
This article serves as an Active Directory tutorial covering installation and setup of a Windows 2012 Domain Controller using Windows Server Manager…
Featured Subcategories:
Virtualization & VM Backup Articles:
5 Most Critical Microsoft M365 Vulnerabilities Re…
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data…
How to Enable SNMP on VMware ESXi Host & Configur…
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to all…
Ultimate Guide: Install Windows 11 on VMware ESXi…
In this article, we’ll show you how to setup or install Microsoft Windows 11 on VMware’s ESXi servers and bypass the Trusted Platform Module version…
The Backup Bible. A Free Complete Guide to Disast…
The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divide…
Wi-Fi Key Generator
Follow Firewall.cx
Recommended Downloads
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Configuring Linux to Act as a Firewall - Linux IPTable…
What exactly is a firewall? As in the non-computer world, a firewall acts as a physical barrier to prevent fires from spreading. In the computer world too…
Linux - Unix
How To Secure Your Linux Server or Workstation - Linux…
Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation.
Boot Disk
One of the foremost requisit…
Linux - Unix
Configuring Linux Samba (SMB) - How to Setup Samba (Li…
Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or SMB. F…
Linux - Unix
Linux File & Folder Permissions
File & folder security is a big part of any operating system and Linux is no exception!
These permissions allow you to choose exactly who can access…
Popular Topics
Cisco Routers
How To Fix Cisco Configuration Professional (CCP) 'Jav…
Our previous article covered how to fix the Cisco Configuration Professional display/window problem where the CCP application is displayed in about one th…
Cisco Routers
Cisco Router 'User Exec' Mode
Introduction
Let's see what it looks like to be in User-Exec mode on a Cisco router. Below, we have telneted into our lab router and are in User Exec Mod…
ManageEngine Firewall Analyzer
Challenges & Solutions to Managing Firewall Rules in C…
In today's interconnected digital landscape, where businesses rely heavily on networked systems and the internet for their operations, the importance of c…
Cisco Switches
Cisco 4507R+E Layer 3 Installation: Redundant WS-X45-S…
It's no news that we here at Firewall.cx enjoy writing about our installations of Cisco equipment and especially devices that we don’t get to see and play…





