Posted in Linux Network Admin Tips, Network Security Tips on Jun 30, 2021
If you own a WD My Book Live NAS you may have received an email from WD asking you to disconnect it from the Internet. By performing these changes to the settings in your WD My Book Live NAS, it will effectively disable internet access and still give your NAS a static IP on your network. This will allow you to access and use the files ONLY from inside your Home or Office Network with no access from outside of your firewall. The only way a hacker could gain access to the NAS would be to gain access to the inside of your network, which you should be protected via your firewall.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Jun 22, 2021
Syncthing is a continuous file synchronization program. It synchronizes files between two or more computers in real time, safely protected from prying eyes. Your data is your data alone, and you deserve to choose where it is stored, whether it is shared with some third party, and how it's transmitted over the internet. Syncthing is great for small businesses and Home office networks.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Jun 18, 2021
This tutorial will show you how to backup multiple OctoberCMS Sites on a server with an automated bash / shell script. October CMS is one of the best CMS's on the market today as it is based on PHP and Laravel. If you are a web designer and host your sites on a VPS server such as AWS, Digital Ocean, Vultr, or Linode this script will make your life much easier.
Posted in Linux Network Admin Tips, Network Security Tips on Jun 15, 2021
Automated internet programs, or bots, were created for various purposes. Some good, and many not so good. The robots.txt file in the root of your site is basically telling the good bots what they should and should not look for on your website.
Posted in Linux Network Admin Tips, Network Security Tips on Jun 10, 2021
It is known that nearly all hacking attempts on your website or web server is from foreign sources. With the recent attacks on networks such as Colonial Pipeline, Major Meat Packing Plants and numerous Government Agencies and Municpalities, we need to make sure our networks are locked down tightly including our websites and web servers.
Posted in Linux Network Admin Tips, Network Security Tips on Jun 03, 2021
Most of us today love using some sort of Cloud Storage. Should you take a chance at putting your data in the Cloud? or do you feel a bit more secure hosting on your own server? There are lot's of open source options today that make it really easy to host your own dropbox like server and to be able to host it on your own premises.
Posted in Linux Desktop Tips, Linux Network Admin Tips, Network Security Tips on May 20, 2021
The Linux terminal is very powerful tool and should not be overlooked. Basic Linux commands help users execute tasks easily and effectively. With a little practice you will see just how powerful the terminal or command line can be. These are a list of the most common and popular useful linux commands.
Posted in Linux Network Admin Tips, Network Security Tips on May 10, 2021
Cyber Security and Ransomware Attacks continue to be a big problem for a lot of organizations around the globe and in particular right here in Canada and the USA. These are a few tips we suggest all organizations implement as soon as possible.
Posted in Linux Network Admin Tips, Marketing, Network Security Tips on Apr 23, 2021
Checking your email flow periodically is very important. You can test your SPF / DKIM and your DMARC settings but the best way is to using the most popular opensouce spam filtering software. Spam Assassin is by far the most popular tool to use to check your spam score. The following video will show you just how easy it is to get your spam score for your domain email or organization email.
Posted in Linux Network Admin Tips, Network Security Tips on Apr 14, 2021
In deploying DMARC, your ultimate goal will be to start with a "none" (p=none) policy that only monitors email flow, and then eventually change to a policy to quarantine (p=quarantine) and then reject (p=reject) that will handle all unauthenticated messages properly.