• Clone / Copy Bootable USB Keys (TrueNAS or XigmaNAS)

    TrueNAS (formerly FreeNAS) and XigmaNAS are great NAS servers for your Home and/or Office environment. One of the problems is that both of these NAS Servers recommend you to use a USB key to boot and then configure your drives as storage only in whatever RAID or Non-RAID configuration you wish. What if the USB boot device fails? It would be nice if you could make a copy of the USB bootable device, and to do so automatically rather than making them manually. You can! Thanks to the script we have developed using the dd command.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Nov 19, 2021

  • LibreOffice - How to get rid of the gray boxes when you copy & paste

    Have you ever had to copy and paste something into LibreOffice but then you are left with a bunch of annoying gray boxes throughout your document. The following article and video will show you what causes them and how to get rid of them.

    Posted in Libreoffice Tips, Linux Desktop Tips, Tech How To on Nov 04, 2021

  • How to Perform a Security Audit of your Website

    Today we see more and more websites being compromised, therefore it is vital that you do some sort of Security Audit to see if your Website or Webserver is vulnerable to hackers. There are two routes you can take depending on your budget. You can pay a professional firm to do the audit or you can do a basic security check yourself using FREE tools that are readily available on the Internet.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 19, 2021

  • How to Implement Security HTTP Headers

    Today more and more websites are getting compromised and vital important data is being exposed to hackers. Most of this is due to misconfiguration or lack of protection from the hosting company or a web designer that just wants to make the site work. If you are a website owner ensure that your webdesigner and server administrator protects your website from Clickjacking, code injection, MIME types, XSS (cross-site scripting), etc.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 08, 2021

  • Allow only Cloudflare IP NetBlock to your Site

    Securing your Website or Webserver is very important. If you are using Cloudflare to speed up and protect your network from Bot's, DDoS attacks, along with protecting certain area's of your site such as an admin or protected area, you may be well aware that Hackers can bypass cloudflare by obtaining the real IP of your server or website. You can essentially block all traffic from the Internet and allow only Cloudflares NetBlock's. This Blog post will show you how to do exactly that.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 08, 2021

  • How to - Edit your Hosts File

    If you are a Web Developer you know that Cloudflare's Cache can be very annoying. Did you know your can modify your hosts file so that you can bypass networks such as Cloudflare, Fastly or Akamai? This is helpful if you wish to bypass some DNS settings such as bypassing Cloudflare to work directly on your webserver or website. Another thing you can do is give static IP's to devices on your network that never change, such as routers, switches, printers and NAS (network attached storage) devices.

    Posted in Linux Desktop Tips, Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 06, 2021

  • Block Admin Area of your Website with Cloudflare

    Today more than ever you need to lock down your Website, including the Admin area. If you were to take a look at the access to your Admin Area you would be astonished at the attempts of hackers trying to access and compromise your website. This blog article and video, will show you how to lock this section and even any section of your website. It's simple and free!

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Sep 28, 2021

  • Zoom 32 Bit / 64 Bit

    I am not sure if you noticed, but there are both 32 bit and 64 bit versions of the Zoom Meetings App. As most know that any 64 bit version of any app will run better and more efficient than a 32 bit version. A 32 bit version of a program can only access 4GB RAM. Therefore if you have a computer with more than 4GB on your system (e.g 8GB, 12GB, 16GB + or more), the 32 bit program will not access it.

    Posted in Network Security Tips, Tech How To, ZOOM Meeting Tips on Sep 06, 2021

  • Checking your Domain Reputation

    At one time most organizations hosted their own mail server and had somewhat control over how they sent email, and usually checked whether they were listed on a RBL (Realtime Blackhole List) or not. Now most organizations have moved their mail servers offsite and now have their email hosted with Google Workspace, Microsoft 365 or some other hosting platform. Your Domain's Reputation is still very important as you are now sending email over an IP shared with other senders. Now that we see greater implementation of IPv6, we are seeing an even greater shift in how email reputation by various mail servers is calculated.

    Posted in Linux Network Admin Tips, Marketing, Network Security Tips, Tech How To on Aug 31, 2021

  • Netgear GS308E Managed Switch Review

    The Netgear GS308E - 8-Port Gigabit Ethernet Smart Managed Plus Switch is a lower end managed switch. It does not compare with fully managed switch link a Cisco Catalyst or some other High End Switch, but for a SOHO or small office environment it may be the thing you are looking for.

    Posted in Linux Network Admin Tips, Network Security Tips, Product Reviews, Tech How To on Aug 25, 2021