Posted in Linux Network Admin Tips, Tech How To on Apr 22, 2024
This blog article will explain how to protect your subdomain using Cloudflare WAF (Web Application Firewall). Many companies have an intranet which is only accessible from their office network or from protected IP's. Another example could be for some other subdomain such as an Extranet. Examples would be intranet.yourcompany.com or extranet.yourcompany.com. In either case you would want to block access to these resources using mor than a simple username and password. This article will explain how using an intranet.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 22, 2024
I have a script that is available on my github site that allows you to update your servers UFW firewall as your IP changes at home.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Aug 30, 2022
Choosing between SQL and NoSQL databases is often a decision developers have to make when building software or applications. Although they are decades old, they are still widely used today. The SQL database was first developed in the 1970s by IBM researchers, according to Business News Daily’s SQL database breakdown. Meanwhile, the NoSQL database emerged in the 2000s when developers wanted to work with a more flexible model. Having been around for years, these databases have served many different purposes. Here, we are going to break down their key differences.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Apr 05, 2022
Having fast Authoritative DNS servers is very important today. Not only do they help the loading of web pages and make browsing websites faster. But, in addition, every email that gets sent by your domain has to be resolved quickly. In the early days of the internet all a mail server had to do is look for MX records and send the mail. Now a Sending Mail Server has to resolve DKIM, SPF, DMARC and maybe even BIMI records, not to mention checking blacklists. Not only that but EVERY "receiving" email server of your email has to resolve the same info. they check to see if the DKIM keys correct, was the Sender Authorized to send (SPF) and Do we need to report anything (DMARC). In order to eliminate errors in the DNS for your Domain, you need to host your DNS on a fast Anycast DNS platform.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 29, 2022
Most organizations today have more than one Domain registered. They may have a yourcompany.com domain, but then have similar domains registered such as a .net or .org domain name as well. Today, these other domains need to be protected from Spoofing as well. Domains that do not send emails can still be used in email spoofing or phishing attacks. You can protect your domain by adding SPF, DKIM and DMARC records that specifically tell other mail servers to reject mail from the domain trying to be spoofed. This will significantly make it more difficult for attackers to exploit these parked domains your organization may have.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 28, 2022
Online DIG Tools are a great way to do a quick check of DNS records to see if you have any errors in your configuration. If you are a Linux guy you can simply open up a terminal window and run a DIG command. However there are some really good tools online that can even make it easier. If you do a search for "online DIG tools", you will find that the most popular are Google Toolbox, digwebinterface.com and diggui.com. If you notice in each of these tools there is no option to check DMARC. The following video will show you how to check any dmarc record really easy using these tools.
Posted in Linux Network Admin Tips, Marketing, Network Security Tips, Tech How To on Mar 09, 2022
The postmaster@ and abuse@ email accounts for your domain are very important. If you send out any amount of email you probably would like to monitor and see that your email is flowing properly. To monitor abuse and postmaster messages, add the people who should receive reports as group members, and set their subscription options. For example, you might want to add your legal or marketing team to the abuse@
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Feb 22, 2022
Recently the asustor NAS devices have been hit by an ugly ransomware attack called Deadbolt. How can you protect yourself for attachs such as the Deadbolt Ransomware attack? Asus is not the first to get hit with these types of attacks. WD MyBookLive, QNAP have also been hit recently and Synology is also susceptible to these types of attacks.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Feb 02, 2022
The proper implementation of DMARC is a very important as it can be used to make your email flow better, give you the reports you require, and to provide you with better security. It is a necessity today for a number of reasons. If you have not implemented it yet, you should.
Posted in Announcements, Linux Network Admin Tips, Tech How To on Jan 21, 2022
After nearly 20 years, Google is ending support for the G Suite legacy free edition. ... The G Suite legacy free edition will no longer be available starting May 1, 2022. Starting May 1, Google will transition you to Google Workspace, which you can use at no cost until July 1, 2022. After July 1 you will have to pay as noted in the following article. This is big news as a huge number of Tech Support persons have taken advantage of this service for hosting their own domain email with Google.