• RSync vs RClone - What are the Differences?

    Posted in Network Security Tips, Tech How To on Jan 26, 2022

    We have been using Rsync for nearly 20 years here at Clustered Networks. Rsync is an excellent tool to synchronize data between a computer and a server or from server to server. RClone on the other hand has some unique features that make it a very useful utility. At Clustered Networks we use both RSync and RClone in our scripts that we run on a daily basis.

  • Install PHP Server Monitor on Ubuntu Server

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Jan 13, 2022

    PHP Server Monitor is a great litte program that checks whether your websites and servers are up and running. It comes with a web based user interface where you can manage your services and websites, and you can manage users for each server with a mobile number and email address or even have it notify your messaging service such as Pushover. It is similar to uptimerobot, uptime.com or site24x7.com but with more options and best of all OpenSource and Free!

  • How to Turn Off Spam Filtering in Yahoo Email

    Posted in Network Security Tips, Tech How To on Jan 06, 2022

    How to Turn Off Spam Filtering in Yahoo Email - Yahoo is a great email service. One of the problems with Yahoo Mail is that a lot of your incoming messages end up going to your spam folder. I know that Yahoo has very stringent email filters but this can become very annoying. In order to keep your email out of your spam folder all you really have to do is to create a "filter" to route all messages with an "@" symbol (which is all email) to re-route to your inbox.

  • How to use Dig / NSLookup to check for SPF / DKIM and DMARC Records

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Dec 22, 2021

    This blog will show your how to use Dig / NSLookup to check for SPF / DKIM / DMARC and MX Records.

  • How to Check your Server for the Apache Java Log4j Vulnerability

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Dec 13, 2021

    How to Check your Server for the Java Log4j Vulnerability (CVE-2021-44228). The Apache Log4j is a serious vulnerability. If someone sends the library a command in the form of a special string of characters tucked within that data, instead of just logging that information, log4j will execute it as though it is code in a program. This is a serious flaw and you need to check to see if your server(s) are vulnerable.

  • Common DNS DKIM SPF DMARC Errors

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Dec 13, 2021

    Managing your DNS, DKIM, SPF, and DMARC records can be a daunting task, especially if you are looking for an error in your configuration that can effect the flow of Email for your Domain. Today I am going to walk through each of these settings and take a look at some of the common errors, that can be overlooked very easily.

  • Tech Support - Users Cannot Print - Common Printer Problems

    Posted in Libreoffice Tips, Linux Network Admin Tips, Network Security Tips, Tech How To on Nov 30, 2021

    I must have heard this a million times! I cannot print! This video and blog article will show you to to fix a few of the most common solutions to one of the most common tech support questions. Finding the Printer! Two of the most common problems are that, (1) your printer is set for DHCP and uses a dynamic IP address, and (2) your printer is set to use WIFI rather than a hardwire ethernet cable.

  • Clone / Copy Bootable USB Keys (TrueNAS or XigmaNAS)

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Nov 19, 2021

    TrueNAS (formerly FreeNAS) and XigmaNAS are great NAS servers for your Home and/or Office environment. One of the problems is that both of these NAS Servers recommend you to use a USB key to boot and then configure your drives as storage only in whatever RAID or Non-RAID configuration you wish. What if the USB boot device fails? It would be nice if you could make a copy of the USB bootable device, and to do so automatically rather than making them manually. You can! Thanks to the script we have developed using the dd command.

  • How to Perform a Security Audit of your Website

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 19, 2021

    Today we see more and more websites being compromised, therefore it is vital that you do some sort of Security Audit to see if your Website or Webserver is vulnerable to hackers. There are two routes you can take depending on your budget. You can pay a professional firm to do the audit or you can do a basic security check yourself using FREE tools that are readily available on the Internet.

  • How to Implement Security HTTP Headers

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 08, 2021

    Today more and more websites are getting compromised and vital important data is being exposed to hackers. Most of this is due to misconfiguration or lack of protection from the hosting company or a web designer that just wants to make the site work. If you are a website owner ensure that your webdesigner and server administrator protects your website from Clickjacking, code injection, MIME types, XSS (cross-site scripting), etc.