• Telus Router Bridge Mode - Use your Own Router

    This article describes how to put a Telus Router into Bridge Mode enabling you to use your Own Router. What Is Bridge Mode? When you sign up for TELUS internet you will receive a device called a gateway - a two-in-one modem & router combo. Bridge mode is a feature that allows a user to shut off the router side of the gateway (i.e. Wi-Fi), and use a 3rd party router in its place.

    Posted in Network Security Tips, Tech How To on Apr 23, 2024

  • Protect Subdomains (Intranet) with Cloudflare WAF

    This blog article will explain how to protect your subdomain using Cloudflare WAF (Web Application Firewall). Many companies have an intranet which is only accessible from their office network or from protected IP's. Another example could be for some other subdomain such as an Extranet. Examples would be intranet.yourcompany.com or extranet.yourcompany.com. In either case you would want to block access to these resources using mor than a simple username and password. This article will explain how using an intranet.

    Posted in Linux Network Admin Tips, Tech How To on Apr 22, 2024

  • Router Review GLiNet Slate AX (GL-AXT1800)

    The GLiNet Slate AX (GL-AXT1800) is a great router. It's considered a Travel Router, however it is packed full of features. With the GLiNet Slate AX (GL-AXT1800) you have the ability to connect to a VPN service such as PIA Vpn, Nord VPN or even your own home VPN Network via Wireguard or OpenVPN. The GLiNet Slate AX (GL-AXT1800) also supports peer-to-peer VPN's such as Zerotier and Tailscale.

    Posted in Network Security Tips, Product Reviews, Tech How To on Apr 18, 2024

  • Update UFW with your DDNS Address

    I have a script that is available on my github site that allows you to update your servers UFW firewall as your IP changes at home.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 22, 2024

  • What Are the Key Differences Between NoSQL Vs. SQL Databases?

    Choosing between SQL and NoSQL databases is often a decision developers have to make when building software or applications. Although they are decades old, they are still widely used today. The SQL database was first developed in the 1970s by IBM researchers, according to Business News Daily’s SQL database breakdown. Meanwhile, the NoSQL database emerged in the 2000s when developers wanted to work with a more flexible model. Having been around for years, these databases have served many different purposes. Here, we are going to break down their key differences.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Aug 30, 2022

  • How to Test DNS Server Speed Using Online Tools

    Having fast Authoritative DNS servers is very important today. Not only do they help the loading of web pages and make browsing websites faster. But, in addition, every email that gets sent by your domain has to be resolved quickly. In the early days of the internet all a mail server had to do is look for MX records and send the mail. Now a Sending Mail Server has to resolve DKIM, SPF, DMARC and maybe even BIMI records, not to mention checking blacklists. Not only that but EVERY "receiving" email server of your email has to resolve the same info. they check to see if the DKIM keys correct, was the Sender Authorized to send (SPF) and Do we need to report anything (DMARC). In order to eliminate errors in the DNS for your Domain, you need to host your DNS on a fast Anycast DNS platform.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Apr 05, 2022

  • How to protect your parked domains from spoofing

    Most organizations today have more than one Domain registered. They may have a yourcompany.com domain, but then have similar domains registered such as a .net or .org domain name as well. Today, these other domains need to be protected from Spoofing as well. Domains that do not send emails can still be used in email spoofing or phishing attacks. You can protect your domain by adding SPF, DKIM and DMARC records that specifically tell other mail servers to reject mail from the domain trying to be spoofed. This will significantly make it more difficult for attackers to exploit these parked domains your organization may have.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 29, 2022

  • How to Check DMARC Records with Online DIG Tools

    Online DIG Tools are a great way to do a quick check of DNS records to see if you have any errors in your configuration. If you are a Linux guy you can simply open up a terminal window and run a DIG command. However there are some really good tools online that can even make it easier. If you do a search for "online DIG tools", you will find that the most popular are Google Toolbox, digwebinterface.com and diggui.com. If you notice in each of these tools there is no option to check DMARC. The following video will show you how to check any dmarc record really easy using these tools.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 28, 2022

  • Create postmaster@ and abuse@ for your Domain

    The postmaster@ and abuse@ email accounts for your domain are very important. If you send out any amount of email you probably would like to monitor and see that your email is flowing properly. To monitor abuse and postmaster messages, add the people who should receive reports as group members, and set their subscription options. For example, you might want to add your legal or marketing team to the abuse@ group and your IT team to the postmaster@ group. Receiving and acting on these email allows you to control and maintain the reputation and deliverability of your organizations email.

    Posted in Linux Network Admin Tips, Marketing, Network Security Tips, Tech How To on Mar 09, 2022

  • Protect Yourself from the asustor Deadbolt Ransomware attack

    Recently the asustor NAS devices have been hit by an ugly ransomware attack called Deadbolt. How can you protect yourself for attachs such as the Deadbolt Ransomware attack? Asus is not the first to get hit with these types of attacks. WD MyBookLive, QNAP have also been hit recently and Synology is also susceptible to these types of attacks.

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Feb 22, 2022