Posted in Network Security Tips, Tech How To on Apr 23, 2024
This article describes how to put a Telus Router into Bridge Mode enabling you to use your Own Router. What Is Bridge Mode? When you sign up for TELUS internet you will receive a device called a gateway - a two-in-one modem & router combo. Bridge mode is a feature that allows a user to shut off the router side of the gateway (i.e. Wi-Fi), and use a 3rd party router in its place.
Posted in Network Security Tips, Product Reviews, Tech How To on Apr 18, 2024
The GLiNet Slate AX (GL-AXT1800) is a great router. It's considered a Travel Router, however it is packed full of features. With the GLiNet Slate AX (GL-AXT1800) you have the ability to connect to a VPN service such as PIA Vpn, Nord VPN or even your own home VPN Network via Wireguard or OpenVPN. The GLiNet Slate AX (GL-AXT1800) also supports peer-to-peer VPN's such as Zerotier and Tailscale.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 22, 2024
I have a script that is available on my github site that allows you to update your servers UFW firewall as your IP changes at home.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Aug 30, 2022
Choosing between SQL and NoSQL databases is often a decision developers have to make when building software or applications. Although they are decades old, they are still widely used today. The SQL database was first developed in the 1970s by IBM researchers, according to Business News Daily’s SQL database breakdown. Meanwhile, the NoSQL database emerged in the 2000s when developers wanted to work with a more flexible model. Having been around for years, these databases have served many different purposes. Here, we are going to break down their key differences.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Apr 05, 2022
Having fast Authoritative DNS servers is very important today. Not only do they help the loading of web pages and make browsing websites faster. But, in addition, every email that gets sent by your domain has to be resolved quickly. In the early days of the internet all a mail server had to do is look for MX records and send the mail. Now a Sending Mail Server has to resolve DKIM, SPF, DMARC and maybe even BIMI records, not to mention checking blacklists. Not only that but EVERY "receiving" email server of your email has to resolve the same info. they check to see if the DKIM keys correct, was the Sender Authorized to send (SPF) and Do we need to report anything (DMARC). In order to eliminate errors in the DNS for your Domain, you need to host your DNS on a fast Anycast DNS platform.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 29, 2022
Most organizations today have more than one Domain registered. They may have a yourcompany.com domain, but then have similar domains registered such as a .net or .org domain name as well. Today, these other domains need to be protected from Spoofing as well. Domains that do not send emails can still be used in email spoofing or phishing attacks. You can protect your domain by adding SPF, DKIM and DMARC records that specifically tell other mail servers to reject mail from the domain trying to be spoofed. This will significantly make it more difficult for attackers to exploit these parked domains your organization may have.
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Mar 28, 2022
Online DIG Tools are a great way to do a quick check of DNS records to see if you have any errors in your configuration. If you are a Linux guy you can simply open up a terminal window and run a DIG command. However there are some really good tools online that can even make it easier. If you do a search for "online DIG tools", you will find that the most popular are Google Toolbox, digwebinterface.com and diggui.com. If you notice in each of these tools there is no option to check DMARC. The following video will show you how to check any dmarc record really easy using these tools.
Posted in Linux Network Admin Tips, Marketing, Network Security Tips, Tech How To on Mar 09, 2022
The postmaster@ and abuse@ email accounts for your domain are very important. If you send out any amount of email you probably would like to monitor and see that your email is flowing properly. To monitor abuse and postmaster messages, add the people who should receive reports as group members, and set their subscription options. For example, you might want to add your legal or marketing team to the abuse@
Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Feb 22, 2022
Recently the asustor NAS devices have been hit by an ugly ransomware attack called Deadbolt. How can you protect yourself for attachs such as the Deadbolt Ransomware attack? Asus is not the first to get hit with these types of attacks. WD MyBookLive, QNAP have also been hit recently and Synology is also susceptible to these types of attacks.
Posted in Network Security Tips, Tech How To on Feb 18, 2022
A lot of small organizations and companies use the free email services of gmail, yahoo or outlook.com. However you should be driving customers to your domain email for a number of reasons. This video and article will show you how to set up domain email forwarding properly, and to still make use of the free email services of your choice.