PostgreSQL allows for a kind of snapshot to be taken before changes are made. Once the changes have been made, the administrator has the option to accept the changes or roll back to the previous state. Test before use. Note that any changes made between the “BEGIN” and the “ROLLBACK”
Read moreConfigure Windows 11 For Family Safety – A Guide
If you’ve using the Microsoft “Family Safety” app to put restrictions on kids while they use their Android phones, you may also want to include their computer in the restrictions. If so, you’re in the right place. We’re using a Lenovo Windows 11 computer purchased in 2024. While the computer
Read moreNighthawk M6 5G Router – Review
While not typical of this tech blog, having just tested 5G for a small business Internet connection, I’m including the experience here to save you the trouble. In this case, we’re reviewing the “Nighthawk M6” 5G Router. There is a “Pro” version but we opted for the standard model. This
Read moreDisable Weak TLS Versions on Windows Server 2019
This article explains how to manually disable weak TLS versions on Windows systems. Make sure you have a backup or recovery option as we’re making changes to the Windows Registry. Open the Registry and head to: Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols Right click on “Protocols” in the left column, and select “New” -> “Key”.
Read moreDisable Weak Cipher Suites on Windows Server 2019
This article explains how to remove a weak Cipher Suite on a Windows Server 2019 system. There’s other ways such as Power Shell. This is just one way. Make a backup or snapshot first as mistakes could cause issues reconnecting. I organise a maintenance window, take a VM snapshot first,
Read moreProtected: CISM – My Study Notes
There is no excerpt because this is a protected post.
Read moreA Quick Understanding of Cipher Suites
This article explains the structure of a cipher suite. A cipher suite is a description of a combination of cryptographic algorithms that a system supports, expects or proposes. The description includes a means to create and exchange asymmetric keys, the type of symmetric keys to use, and the hashing algorithm
Read moreWindows Built-In VPN to pfSense
This article demonstrates the settings required on Windows and pfSense to get a Windows Built-In VPN to work between the two. It’s actually pretty easy. This article is more a confirmation of settings than a guide. Make sure you have the firewall rules configured on the pfSense WAN interface. We’re
Read moreBackups Are 1% Of The Solution
The title is a little provocative, but hear me out. My argument is that in most situations, resorting to restoring data from backups means the project or business is already in an untenable position. Suppose Kym from the Accounts department overwrites a document and asks for the file to be
Read moreExpand a LUKS Encrypted Volume
This article demonstrates how to extent a LUKS encrypted volume. We’re using Ubuntu 22.04 and the volume is non-root. Although you could probably do the same on the root volume (partition). This is risky and you should not do this without a backup and understanding the likelihood of failure. This
Read more