A Linux and Cybersecurity expert in Australia.
RHCE, Linux+, Sec+, CySA+, CASP+, CISM
This article demonstrates how to install and configure a Squid proxy along with a WPAD to assist with client configuration. Paths to configuration files may vary between system types. Both http and https will work through this proxy. We’re going to install the Squid proxy and Apache web server on
Read more
This article demonstrates how to allow access to specific directories while denying access to all other directories. We’re using Ubuntu 22.04 and Apache 2.4.58. We’ve got two directories that we want to explicitly allow access to: “east” and “west”. All other directories (existing or not) are denied with a “403”
Read more
Windows likes to store documents and other content in OneDrive. But for those using Synology Drive, the idea of replacing the path from OneDrive to Synology Drive is attractive. Note that Synology Drive Client makes a great replacement for OneDrive except where it comes to shared locations. The Synology solution
Read more
PostgreSQL allows for a kind of snapshot to be taken before changes are made. Once the changes have been made, the administrator has the option to accept the changes or roll back to the previous state. Test before use. Note that any changes made between the “BEGIN” and the “ROLLBACK”
Read more
If you’ve using the Microsoft “Family Safety” app to put restrictions on kids while they use their Android phones, you may also want to include their computer in the restrictions. If so, you’re in the right place. We’re using a Lenovo Windows 11 computer purchased in 2024. While the computer
Read more
While not typical of this tech blog, having just tested 5G for a small business Internet connection, I’m including the experience here to save you the trouble. In this case, we’re reviewing the “Nighthawk M6” 5G Router. There is a “Pro” version but we opted for the standard model. This
Read more
This article explains how to manually disable weak TLS versions on Windows systems. Make sure you have a backup or recovery option as we’re making changes to the Windows Registry. Open the Registry and head to: Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols Right click on “Protocols” in the left column, and select “New” -> “Key”.
Read more
This article explains how to remove a weak Cipher Suite on a Windows Server 2019 system. There’s other ways such as Power Shell. This is just one way. Make a backup or snapshot first as mistakes could cause issues reconnecting. I organise a maintenance window, take a VM snapshot first,
Read more
There is no excerpt because this is a protected post.
Read more
This article explains the structure of a cipher suite. A cipher suite is a description of a combination of cryptographic algorithms that a system supports, expects or proposes. The description includes a means to create and exchange asymmetric keys, the type of symmetric keys to use, and the hashing algorithm
Read more