Welcome to AGIX. I'm the owner of the business. I'm also a member of the Linux System Administrator team responsible for maintaining our client's systems.
RHCE, Sec+, CySA+, CASP+, Linux+
Contact our friendly team to get started.
This article shows the process and experience to upgrade the Netgate 3100 to version 23.01. The process started smoothly but I was forced to do a manual power off/on having waited an hour and a half for it to return on its own after the upgrade process was started. OpenVPN
Read more
This article explains how to mount a Luks volume (encrypted) on boot. You’ll be asked for a password. There’s plenty of articles explaining how to do this with a crypt-key available, so I need not repeat their work. Here’s our scenario. Remember, this process is destructive. Follow this only in
Read more
To put it simply, if a hacker gains access to your system and can access the data as normal, then the data is not encrypted at rest. See the table below: There’s two types of so-called “encryption at rest” and each protects against the same thing with one exception, hackers.
Read more
This article is a check list of the critical items to check to ensure your computers are baseline secure. Of course, baseline is something you should determine, not me. Here;s a quick list. You may be able to use InTune to manage these items and more. Windows Updates Make sure
Read more
This article demonstrates how to enforce 2FA for users of Azure and Office 365. Depending on your license levels, you may not get all the settings that Microsoft article recommend, so this article covers the bare minimum. Microsoft has an overarching enforcement settings which needs to be set (although it
Read more
This is a simple reminder to those creating user accounts on Linux systems with the expectation that the intended user will be able to log in using their SSH keys. There’s also instructions on adding them to the “sudoers” groups. Ubuntu & CentOS/Redhat Create the user and place their SSH
Read more
In recent times, we’ve been experimenting with Landscape from Canonical. This article describes our experience. While I don’t claim to be an expert (or even a long time user) of Landscape, I have spent time to test and deploy it. While I hope I have missed a few key points,
Read more
This article walks through the process of creating a self-hosted Docker Registry. We’re using Ubuntu but given that Docker is basically cross-platform (in a way), this should work on any Linux distribution. You can host your Docker Registry on any host you like. When I refer to you “Docker Registry
Read more
Recently I upgrade the disk of a Netgate 7100 1U firewall appliance. I’ve been looking forward to doing this but was not sure on the success of using a locally purchased (off the shelf) hard disk. The installation process is pretty simple based on the Netgate article here “https://docs.netgate.com/pfsense/en/latest/solutions/xg-7100-1u/m-2-sata-installation.html”. The
Read more
This article walks us through the process of installing and configuring two Postgres servers for stream replication. “Stream” replication allows us to replicate all databases from the master to the/a slave. There’s another kind of replication called “Logical” replication, that will replicate “individual” databases on the master to the slave.
Read more