Microsoft Server Articles:
Windows Servers
How to Install Windows Server 2012 from USB Flash…
Most would remember the days we had to have a CDROM or DVDROM in order to proceed with the installation of an operating system. Today, it is very com…
Windows Servers
Windows 2012 Server Foundation, Essential, Standa…
FREE Hyper-V & VMware Virtualization Backup: FREE for Firewall.cx readers for a Limited Time! Download Now!
Windows Server 2012 Edi…
Windows Servers
Guide to Windows Server 2016 Hyper-V Hypervisor…
One of Windows Server 2016 highlights is the newer Hyper-V server that not only extends the hypervisor’s features and capabilities but also introduce…
Windows Servers
Introduction To Windows Server 2012 R2 Virtualiza…
FREE Hyper-V & VMware Backup: FREE for Firewall.cx readers for a Limited Time! Download Now!
Virtualization is an abstraction layer…
Featured Subcategories:
Virtualization Articles:
Virtualization & VM Backup
SysAdmin Day 2020 - Get your Free Amazon Voucher…
SysAdmin Day has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to…
Virtualization & VM Backup
Differences Between VMware vSphere, vCenter, ESXi…
In this article we will cover the differences between VMware ESXi, vSphere and vCenter while also explain the features supported by each vSphere edit…
Virtualization & VM Backup
How to Fix VMware ESXi Virtual Machine 'Invalid S…
In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a co…
Virtualization & VM Backup
6 Key Areas to Consider When Selecting a VM Backu…
Backup and Disaster recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud.
Your busine…
Windows Workstation Articles:
Windows Workstations (XP, 7, 8, 10, 11)
How To Change & Configure An IP Address or Set to…
Not many users are aware that Windows 7 provides more than one way to configure a workstation’s network adaptor IP address or force it to obtain an I…
Windows Workstations (XP, 7, 8, 10, 11)
How to View Hidden Files and Folders In Windows 8…
Windows 8 & 8.1 hides two types of files so that normally, you do not see them while exploring your computer. The first type is the files or fold…
Windows Workstations (XP, 7, 8, 10, 11)
How to View Hidden Files & Folders in Windows 7
This article shows you how to see hiddeen files and folders in Windows 7. Windows 7 hides important system files so that normally, you do not see the…
Windows Workstations (XP, 7, 8, 10, 11)
Revealing & Backing Up Your Windows 8 – Windows 8…
Backing up your Windows License Product Key is essential for reinstallation of your Windows 8 or Windows 8.1 operating system. In some cases, the Gen…
Linux-Unix Articles:
Linux - Unix
Working with Linux TCP/IP Network Configuration F…
This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address…
Linux - Unix
Linux BIND DNS - Part 6: Linux BIND - DNS Caching
In the previous articles, we spoke about the Internet Domain Hierarchy and explained how the ROOT servers are the DNS servers, which contain all the…
Linux - Unix
Implementing Virtual Servers and Load Balancing C…
What is Server Virtualization?
Server virtualization is the process of apportioning a physical server into several smaller virtual servers. Duri…
Linux - Unix
Installing & Configuring VSFTPD FTP Server for Re…
Vsftpd is a popular FTP server for Unix/Linux systems. For thoes unaware of the vsftpd ftp server, note that this is not just another ftp server, but…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Linux - Unix
Linux System Resource & Performance Monitoring
You may be a user at home, a user in a LAN (local area network), or a system administrator of a large network of computers. Alternatively, you may be main…
Linux - Unix
Working with Linux TCP/IP Network Configuration Files
This article covers the main TCP/IP network configuration files used by Linux to configure various network services of the system such as IP Address, Defa…
Linux - Unix
Linux BIND DNS - Part 5: Configure Secondary (Slave) D…
Setting up a Secondary (or Slave) DNS sever is much easier than you might think. All the hard work is done when you setup the Master DNS server by creatin…
Linux - Unix
Why Use Linux?
The first question is - what are the benefits of using Linux instead of Windows? This is in fact a constant debate between the Windows and Linux communiti…
Popular Articles:
Virtualization & VM Backup
5 Most Critical Microsoft M365 Vulnerabilities Reveale…
Microsoft 365 is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to steal your data. The g…
Palo Alto Networks
Complete Guide: Configuring IPSec VPN between Palo Alt…
This article will show you how to configure an IPSec VPN tunnel between a Palo Alto firewall (all PANOS versions) and Meraki MX security appliance. Our co…
OpManager - Network Monitoring & Management
AIOps for Modern IT Operations: Automating Monitoring…
The days of relying solely on static monitoring dashboards and manual firefighting are long gone. Today’s environments demand automation-first operations…
Virtualization & VM Backup
World Backup Day with Free Amazon Voucher and Prizes f…
Celebrate World Backup Day and WIN with Altaro!
We all remember how grateful we were to have backup software when facing so many data loss mishaps and n…
OpManager - Network Monitoring & Management
Free Webinar: Clients' network configuration and compl…
Defending your client's network from faulty configuration changes, poor compliance, and bringing the network back quickly from downtime can be challenging…
Palo Alto Networks
The Ultimate Guide to Palo Alto Networks Software NGFW…
Discover the ins and outs of using Palo Alto Networks’ Software NGFW (Flex) credits to seamlessly renew your cloud-based or virtualized software NGFW devi…
OpManager - Network Monitoring & Management
Free Webinar: Learn How Zero-Trust & Cloud Technologie…
Work transformation is not 'one and done,'" says IDC's vice president, Holly Muscolino. Most enterprises understand that a hybrid workforce is the f…
Virtualization & VM Backup
How to Enable SNMP on VMware ESXi Host & Configure ESX…
In this article we will show you how to enable SNMP on your VMware ESXi host, configure SNMP Community string and configure your ESXi firewall to allow or…







