• What Are the Key Differences Between NoSQL Vs. SQL Databases?

    Choosing between SQL and NoSQL databases is often a decision developers have to make when building software or applications. Although they are decades old, they are still widely used today. The SQL database was first developed in the 1970s by IBM researchers, according to Business News Daily’s SQL database breakdown. Meanwhile, the NoSQL database emerged in the 2000s when developers wanted to work with a more flexible model. Having been around for years, these databases have served many different purposes. Here, we are going to break down their key differences.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Aug 30, 2022

  • How to Test DNS Server Speed Using Online Tools

    Having fast Authoritative DNS servers is very important today. Not only do they help the loading of web pages and make browsing websites faster. But, in addition, every email that gets sent by your domain has to be resolved quickly. In the early days of the internet all a mail server had to do is look for MX records and send the mail. Now a Sending Mail Server has to resolve DKIM, SPF, DMARC and maybe even BIMI records, not to mention checking blacklists. Not only that but EVERY "receiving" email server of your email has to resolve the same info. they check to see if the DKIM keys correct, was the Sender Authorized to send (SPF) and Do we need to report anything (DMARC). In order to eliminate errors in the DNS for your Domain, you need to host your DNS on a fast Anycast DNS platform.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Apr 05, 2022

  • How to protect your parked domains from spoofing

    Most organizations today have more than one Domain registered. They may have a yourcompany.com domain, but then have similar domains registered such as a .net or .org domain name as well. Today, these other domains need to be protected from Spoofing as well. Domains that do not send emails can still be used in email spoofing or phishing attacks. You can protect your domain by adding SPF, DKIM and DMARC records that specifically tell other mail servers to reject mail from the domain trying to be spoofed. This will significantly make it more difficult for attackers to exploit these parked domains your organization may have.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 29, 2022

  • How to Check DMARC Records with Online DIG Tools

    Online DIG Tools are a great way to do a quick check of DNS records to see if you have any errors in your configuration. If you are a Linux guy you can simply open up a terminal window and run a DIG command. However there are some really good tools online that can even make it easier. If you do a search for "online DIG tools", you will find that the most popular are Google Toolbox, digwebinterface.com and diggui.com. If you notice in each of these tools there is no option to check DMARC. The following video will show you how to check any dmarc record really easy using these tools.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 28, 2022

  • Create postmaster@ and abuse@ for your Domain

    The postmaster@ and abuse@ email accounts for your domain are very important. If you send out any amount of email you probably would like to monitor and see that your email is flowing properly. To monitor abuse and postmaster messages, add the people who should receive reports as group members, and set their subscription options. For example, you might want to add your legal or marketing team to the abuse@ group and your IT team to the postmaster@ group. Receiving and acting on these email allows you to control and maintain the reputation and deliverability of your organizations email.

    Posted in Linux Network Admin Tips, Marketing, Network Security Tips, Tech How To on Mar 09, 2022

  • Protect Yourself from the asustor Deadbolt Ransomware attack

    Recently the asustor NAS devices have been hit by an ugly ransomware attack called Deadbolt. How can you protect yourself for attachs such as the Deadbolt Ransomware attack? Asus is not the first to get hit with these types of attacks. WD MyBookLive, QNAP have also been hit recently and Synology is also susceptible to these types of attacks.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Feb 22, 2022

  • How to Setup Domain Email Forwarding Properly

    A lot of small organizations and companies use the free email services of gmail, yahoo or outlook.com. However you should be driving customers to your domain email for a number of reasons. This video and article will show you how to set up domain email forwarding properly, and to still make use of the free email services of your choice.

    Posted in Network Security Tips, Tech How To on Feb 18, 2022

  • Why you should setup DMARC right now!

    The proper implementation of DMARC is a very important as it can be used to make your email flow better, give you the reports you require, and to provide you with better security. It is a necessity today for a number of reasons. If you have not implemented it yet, you should.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Feb 02, 2022

  • Free Office Suite Reviews

    As you may know, we a Clustered Networks are a large promoter of Open Source software, and we too, use in our office a number of free open source office suite products. I am sure most of you are aware that Google Apps such as DOCS / Sheets / Slides and Calendar are free if you have a gmail account. LibreOffice is a great option that we use as well. But, did you know that even MS Office and Apple offer FREE versions of their popular office suite products? Microsoft offers "Office on the Web" and you can create an Apple ID which will give you Apple iWork apps, even if you do not own an apple product.

    Posted in Libreoffice Tips, Linux Desktop Tips, Tech How To on Jan 31, 2022

  • RSync vs RClone - What are the Differences?

    We have been using Rsync for nearly 20 years here at Clustered Networks. Rsync is an excellent tool to synchronize data between a computer and a server or from server to server. RClone on the other hand has some unique features that make it a very useful utility. At Clustered Networks we use both RSync and RClone in our scripts that we run on a daily basis.

    Posted in Network Security Tips, Tech How To on Jan 26, 2022