Skip to main content

MS Server Articles:

Windows Servers

Free Hyper-V eBook - Create, Manage and Trouble...

With the introduction of Hyper-V on the Windows Server platform, virtualization has quickly become the de facto standard for all companies seeking ...
Windows Servers

The Importance of a Comprehensive Backup Strate...

People and companies usually adopt a backup strategy suited to the needs of their working environment. As such, there is no absolute right or wrong...
Windows Servers

Free Webinar: Troubleshooting & Fixing Microsof...

Users working with Hyper-V Virtualization would be interested to know that Altaro is hosting a free webinar on the 25th of February 2016 at 4pm CET...
Windows Servers

Renaming Windows 2000 Domain Name

Sometimes renaming a domain is an essential business requirement. There are many situations, such as mergers, change of company name or migration f...

Featured Subcategories:

Virtualization & VM Backup Articles:

6 Key Areas to Consider When Selecting a VM Bac...

Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud. Your busi...

World Backup Day with Free Amazon Voucher and P...

Celebrate World Backup Day and WIN with Altaro! We all remember how grateful we were to have backup software when facing so many data loss mishap...

The Backup Bible. A Free Complete Guide to Disa...

The Free Backup Bible Complete Edition written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divi...

SysAdmin Day 2020 - Get your Free Amazon Vouche...

SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us ...

Your IP address:

18.223.21.5

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


Linux - Unix

The Linux Command Line

You could actually skip this whole section for those who are already familiar with the topic, but we highly recommend you read it because this is the he...
Linux - Unix

How To Secure Your Linux Server or Workstation - Lin...

Below are some of the most common recommendations and method to effectively secure a Linux Server or Workstation. Boot Disk One of the foremost requis...
Linux - Unix

Why Use Linux?

The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communi...
Linux - Unix

Updating Your Linux Server - How to Update Linux Wor...

Like any other software, an operating system needs to be updated. Updates are required not only because of the new hardware coming into the market, but ...

Popular Topics

Cisco Routers

Cisco Router 'Privileged' Mode

To get into Privileged Mode we enter the "Enable" command from User Exec Mode. If set, the router will prompt you for a password. Once in Privileged Mod...
Cisco Routers

Configuring Site to Site IPSec VPN Tunnel Between Ci...

Site-to-Site IPSec VPN Tunnels are used to allow the secure transmission of data, voice and video between two sites (e.g offices or branches). The VPN t...
Cisco Switches

Password Recovery / Password Reset Procedure for Cat...

This article shows how to reset a password on a Cisco Catalyst 3750-X (stacked or single unit) and Cisco Catalyst 3560-x switch without losing its start...
Cisco Switches

Complete Guide to DHCP Snooping, How it Works, Conce...

This article covers popular Layer 2 & Layer 3 network attacks with a focus on DHCP Starvation Attacks, Man-in-the-Middle attacks, unintentional rogu...