Skip to main content

Microsoft Server Articles:

Windows Servers

Creating Windows Users and Groups with Windows ...

In a Windows server environment, it is very important that only authenticated users are allowed to log in for security reasons. To fulfill this req...
Windows Servers

The Importance of a Comprehensive Backup Strate...

People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong...
Windows Servers

Configuring Windows Server Roaming Profiles

Windows roaming profiles allow the mobile users of a company to always work with their personal settings from any network computer in a domain. Roa...
Windows Servers

Understanding, Creating, Configuring & Applying...

This article explains what Group Policies are and shows how to configure Windows Server 2012 Active Directory Group Policies. Our next article will...

Featured Subcategories:

Virtualization Articles:

Virtualization & VM Backup

World Backup Day with Free Amazon Voucher and P...

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...
Virtualization & VM Backup

Differences Between VMware vSphere, vCenter, ES...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere ed...
Virtualization & VM Backup

SysAdmin Day 2020 - Get your Free Amazon Vouche...

SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us ...
Virtualization & VM Backup

The Backup Bible. A Free Complete Guide to Disa...

The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...

Windows Workstation Articles:

Windows Workstations (XP, 7, 8, 10, 11)

How to Join a Windows 8, 8.1 Client to Windows ...

In this article, we will show how to add a Windows 8 or Windows 8.1 client to a Windows Domain / Active Directory. The article can be considered an...
Windows Workstations (XP, 7, 8, 10, 11)

How to View Hidden Files & Folders in Windows 7

This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see t...
Windows Workstations (XP, 7, 8, 10, 11)

How To Change & Configure An IP Address or Set ...

Not many users are aware that Windows 7 provides more than one way to configure a workstation’s network adaptor IP address or force it to obtain an...
Windows Workstations (XP, 7, 8, 10, 11)

How to View Hidden Files and Folders In Windows...

Windows 8 & 8.1 hides two types of files so that normally, you do not see them while exploring your computer. The first type is the files or fo...

Linux-Unix Articles:

Linux - Unix

Understanding, Administering Linux Groups and U...

In a multi-user environment like Linux, every file is owned by a user and a group. There can be others as well who may be allowed to work with the ...
Linux - Unix

Linux BIND DNS - Part 4: Common BIND Files - Na...

So far we have covered in great detail the main files required for the firewall.cx domain. These files, which we named db.firewall.cx and db.192.16...
Linux - Unix

The Linux Command Line

You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is t...
Linux - Unix

Installing Software On Linux

Installing software in Linux is very different from Windows for one very simple reason: most Linux programs come in 'source code' form. This allows...

Your IP address:

52.15.135.63

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

Linux BIND DNS - Part 5: Configure Secondary (Slave)...

Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creat...
Linux - Unix

Linux CentOS - Redhat EL Installation on HP Smart Ar...

This article was written thanks to our recent encounter of a HP DL120 G7 rack mount server equipped with a HP Smart Array B110i SATA Raid controller, ne...
Linux - Unix

Advanced Linux Commands

Now that you're done learning some of the Basic Linux commands and how to use them to install Linux Software, it's time we showed you some of the other ...
Linux - Unix

Linux System Resource & Performance Monitoring

You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be ma...

Popular Articles:

SASE & SD-WAN Networks

The Need for a Converged SASE Platform. Converging N...

The digital transformation is pushing applications to the cloud, the 2020-2022 pandemic shifted employees to work from home, and the number of resulting...
SASE & SD-WAN Networks

WAN Optimization vs SD WAN Networks. Today’s Challen...

Enterprises have been successfully running WAN optimization appliances at their many distributed sites for years. The devices have done a good job of he...
Virtualization & VM Backup

How to Enable SNMP on VMware ESXi Host & Configure E...

In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to allow ...
Palo Alto Networks

Complete Guide to Upgrading Palo Alto Firewall PAN-O...

Upgrading your Palo Alto Firewall or Panorama Management System to the preferred PAN-OS release is always recommended as it ensures it remains stable, s...
SASE & SD-WAN Networks

Converged SASE Backbone – How Leading SASE Provider,...

Global connectivity is top of mind for many IT teams at organizations of all sizes. We are currently in the middle of a dramatic shift in business and t...
Virtualization & VM Backup

Differences Between VMware vSphere, vCenter, ESXi Fr...

In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edition...
OpManager - Network Monitoring & Management

Preparing and Managing your Network for the Remote V...

Times have changed now and HOME is the new office. Now, everyone works at their comfort and in fact online all throught the day and night. This mandates...
Palo Alto Networks

Configuring QoS on Palo Alto Firewalls: Class-based ...

This article’s purpose is to help you quickly master Palo Alto QoS concepts and learn to configure QoS on Palo Alto Firewalls in a simple and efficient ...