• Clone / Copy Bootable USB Keys (TrueNAS or XigmaNAS)

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Nov 19, 2021

    TrueNAS (formerly FreeNAS) and XigmaNAS are great NAS servers for your Home and/or Office environment. One of the problems is that both of these NAS Servers recommend you to use a USB key to boot and then configure your drives as storage only in whatever RAID or Non-RAID configuration you wish. What if the USB boot device fails? It would be nice if you could make a copy of the USB bootable device, and to do so automatically rather than making them manually. You can! Thanks to the script we have developed using the dd command.

  • How to Perform a Security Audit of your Website

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 19, 2021

    Today we see more and more websites being compromised, therefore it is vital that you do some sort of Security Audit to see if your Website or Webserver is vulnerable to hackers. There are two routes you can take depending on your budget. You can pay a professional firm to do the audit or you can do a basic security check yourself using FREE tools that are readily available on the Internet.

  • How to Implement Security HTTP Headers

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 08, 2021

    Today more and more websites are getting compromised and vital important data is being exposed to hackers. Most of this is due to misconfiguration or lack of protection from the hosting company or a web designer that just wants to make the site work. If you are a website owner ensure that your webdesigner and server administrator protects your website from Clickjacking, code injection, MIME types, XSS (cross-site scripting), etc.

  • Allow only Cloudflare IP NetBlock to your Site

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 08, 2021

    Securing your Website or Webserver is very important. If you are using Cloudflare to speed up and protect your network from Bot's, DDoS attacks, along with protecting certain area's of your site such as an admin or protected area, you may be well aware that Hackers can bypass cloudflare by obtaining the real IP of your server or website. You can essentially block all traffic from the Internet and allow only Cloudflares NetBlock's. This Blog post will show you how to do exactly that.

  • How to - Edit your Hosts File

    Posted in Linux Desktop Tips, Linux Network Admin Tips, Network Security Tips, Tech How To on Oct 06, 2021

    If you are a Web Developer you know that Cloudflare's Cache can be very annoying. Did you know your can modify your hosts file so that you can bypass networks such as Cloudflare, Fastly or Akamai? This is helpful if you wish to bypass some DNS settings such as bypassing Cloudflare to work directly on your webserver or website. Another thing you can do is give static IP's to devices on your network that never change, such as routers, switches, printers and NAS (network attached storage) devices.

  • Block Admin Area of your Website with Cloudflare

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To on Sep 28, 2021

    Today more than ever you need to lock down your Website, including the Admin area. If you were to take a look at the access to your Admin Area you would be astonished at the attempts of hackers trying to access and compromise your website. This blog article and video, will show you how to lock this section and even any section of your website. It's simple and free!

  • Zoom 32 Bit / 64 Bit

    Posted in Network Security Tips, Tech How To, ZOOM Meeting Tips on Sep 06, 2021

    I am not sure if you noticed, but there are both 32 bit and 64 bit versions of the Zoom Meetings App. As most know that any 64 bit version of any app will run better and more efficient than a 32 bit version. A 32 bit version of a program can only access 4GB RAM. Therefore if you have a computer with more than 4GB on your system (e.g 8GB, 12GB, 16GB + or more), the 32 bit program will not access it.

  • Checking your Domain Reputation

    Posted in Linux Network Admin Tips, Marketing, Network Security Tips, Tech How To on Aug 31, 2021

    At one time most organizations hosted their own mail server and had somewhat control over how they sent email, and usually checked whether they were listed on a RBL (Realtime Blackhole List) or not. Now most organizations have moved their mail servers offsite and now have their email hosted with Google Workspace, Microsoft 365 or some other hosting platform. Your Domain's Reputation is still very important as you are now sending email over an IP shared with other senders. Now that we see greater implementation of IPv6, we are seeing an even greater shift in how email reputation by various mail servers is calculated.

  • Netgear GS308E Managed Switch Review

    Posted in Linux Network Admin Tips, Network Security Tips, Product Reviews, Tech How To on Aug 25, 2021

    The Netgear GS308E - 8-Port Gigabit Ethernet Smart Managed Plus Switch is a lower end managed switch. It does not compare with fully managed switch link a Cisco Catalyst or some other High End Switch, but for a SOHO or small office environment it may be the thing you are looking for.

  • Full Duplex vs Half Duplex and Video Conferences

    Posted in Linux Network Admin Tips, Network Security Tips, Tech How To, ZOOM Meeting Tips on Aug 20, 2021

    We have all seen the choppy and laggy video and audio in our Zoom and Video conferences. Even which watching a TV program or News Report you will see an interview where someone obviously has connection issues. I can honestly say that almost all of them are not because of having a poor internet connection, but rather from using WIFI to connect to thier router vs using an Ethernet Connection, that is causing the issues.