Bash Shell Script to Backup Webroot on Webserver Performs a full backup of the website document root and creates a tar file for each site. Be sure to edit the configuration options at the beginning of the script to match your environment prior to executing.
The following video will compare a wired vs a wireless connection while using zoom or some other video conference software.
Domain Hijacking - Someone gets access to your Domain Registrar Credentials DNS Hijacking - Someone gains access to your DNS Hosting (or records)
2FA is almost a necessity today. We see more and more services in the cloud more and more are getting compromised every day. Therefore, it is necessary to use some sort of 2FA (Two Factor Authentication) on at least the more important accounts you have, especially Bank Accounts, online Payment services such as Paypal and other more important accounts you may have.
Posted in Network Security Tips on Aug 18, 2020
In Canada the CRA has recently had a breach that puts everyones account into jeopardy. Everyone in Canada has a CRA account, as this is the Canadian Goverments website that you pay your taxes to. Recently the goverment has been handing out benefits due to the Covid-19 pandemic and hackers would of course like to get their piece of the pie.
Clustered Network has released a Unix / Linux shell script that will autmatically create UFW firewall rules allowing traffic to your webserver ONLY from Cloudflare. This forces all fo the http/https traffic through Clodflare's Network. The script can be found on github at https://github.com/clusterednetworks/ufw-block-http-except-clouldflare.
Linux has really evolved over the years. We have been using Linux on the Desktop for well over 15 years now, and for the few times I have to use Microsoft (due to customers request) I must say that Windows is very frustrating. These are 10 reasons I suggest switching to Linux on the Desktop.
Bogon networks are invalid on the internet, as they are networks that have been reserved for special use, or have not yet been allocated to a customer. These networks should not be seen on the internet.
Have you ever wondered what type of CMS (Content Management System) is used on a website. Are they using CFML, PHP, Python or some other type of technology? Or perhaps you may have wondered... Where to they host their site, or what type of Server is it on? These are some of the links we use and would like to share them with you.
As more and more websites become compromised, it is ever more important to use a differerent password for every site. Our new Strong Password Generator will assist you in creating different passwords with options such as length, type of characters and symbols.