Automated internet programs, or bots, were created for various purposes. Some good, and many not so good. The robots.txt file in the root of your site is basically telling the good bots what they should and should not look for on your website.
It is known that nearly all hacking attempts on your website or web server is from foreign sources. With the recent attacks on networks such as Colonial Pipeline, Major Meat Packing Plants and numerous Government Agencies and Municpalities, we need to make sure our networks are locked down tightly including our websites and web servers.
Most of us today love using some sort of Cloud Storage. Should you take a chance at putting your data in the Cloud? or do you feel a bit more secure hosting on your own server? There are lot's of open source options today that make it really easy to host your own dropbox like server and to be able to host it on your own premises.
The Linux terminal is very powerful tool and should not be overlooked. Basic Linux commands help users execute tasks easily and effectively. With a little practice you will see just how powerful the terminal or command line can be. These are a list of the most common and popular useful linux commands.
Cyber Security and Ransomware Attacks continue to be a big problem for a lot of organizations around the globe and in particular right here in Canada and the USA. These are a few tips we suggest all organizations implement as soon as possible.
Checking your email flow periodically is very important. You can test your SPF / DKIM and your DMARC settings but the best way is to using the most popular opensouce spam filtering software. Spam Assassin is by far the most popular tool to use to check your spam score. The following video will show you just how easy it is to get your spam score for your domain email or organization email.
In deploying DMARC, your ultimate goal will be to start with a "none" (p=none) policy that only monitors email flow, and then eventually change to a policy to quarantine (p=quarantine) and then reject (p=reject) that will handle all unauthenticated messages properly.
We at Clustered Networks have just developed and launched a new NMAP Cheatsheet with Examples PWA (Progressive Web App) and we feel it is by far the best NMAP Cheatsheet on the Web today. IT not only describes the various switches that can be used in NMAP, but also give real life examples of how you can use NMAP.
Common Certbot Commands - This is a list of common certbot commands that we use regularily
Posted in Network Security Tips on Mar 05, 2021
Everyone likes to use a VPN to make sure they are secure and to avoid being tracked. You should check to see if your IPv6 is enabled and how much information you are giving to them. You may be surprised to see that your IPv4 address is hidden by your VPN, but that your IPv6 is passing right on through and you are in fact not being hidden at all!