There is no excerpt because this is a protected post.
Read moreAGIX Linux Cybersecurity
Cybersecurity is a priority for networks and organizations, especially in industries that handle sensitive information. The certified Linux cybersecurity experts at AGIX are trusted professionals when it comes to keeping networks and systems safe from harm. Whether you need to protect sensitive information from outside interference or just keep hackers out of your network, AGIX has the experience that can help.
Security Experts That You Can Trust
AGIX’s professional team has the experience that you can count on when it comes to cybersecurity. Having worked with organizations in high-security industries such as Defence and Finance, we understand the intricacies of keeping information secure from an unexpected attack. With our years of experience, we can be trusted with the most sensitive information in your network.
We Take Cybersecurity Seriously
Our experienced professionals at AGIX are highly equipped to handle every aspect of cybersecurity. Working with sensitive information requires more than just careful planning and serious oversight; we also conduct extensive testing in every step of the way, and ensure that everything is up-to-date by our clients’ exacting standards. Consult with us and see why our clients trust us with even the most complex security concerns.

Contact our friendly team to get started.
A Quick Understanding of Cipher Suites
This article explains the structure of a cipher suite. A cipher suite is a description of a combination of cryptographic algorithms that a system supports, expects or proposes. The description includes a means to create and exchange asymmetric keys, the type of symmetric keys to use, and the hashing algorithm
Read more
Windows Built-In VPN to pfSense
This article demonstrates the settings required on Windows and pfSense to get a Windows Built-In VPN to work between the two. It’s actually pretty easy. This article is more a confirmation of settings than a guide. Make sure you have the firewall rules configured on the pfSense WAN interface. We’re
Read moreBackups Are 1% Of The Solution
The title is a little provocative, but hear me out. My argument is that in most situations, resorting to restoring data from backups means the project or business is already in an untenable position. Suppose Kym from the Accounts department overwrites a document and asks for the file to be
Read moreExpand a LUKS Encrypted Volume
This article demonstrates how to extent a LUKS encrypted volume. We’re using Ubuntu 22.04 and the volume is non-root. Although you could probably do the same on the root volume (partition). This is risky and you should not do this without a backup and understanding the likelihood of failure. This
Read moreDeleting the Bash History
There are times when you want to clear out the Bash history and make a clean start. Or perhaps you want to remove a single or select item/s from the Bash history. Both of these scenarios are accomplished as described below – although we’ll focus on clearing out the entire
Read moreCreating and Mounting Luks on boot
This article explains how to mount a Luks volume (encrypted) on boot. You’ll be asked for a password. There’s plenty of articles explaining how to do this with a crypt-key available, so I need not repeat their work. Here’s our scenario. Remember, this process is destructive. Follow this only in
Read more
Windows 10/11 Minimum Security Settings to Check
This article is a check list of the critical items to check to ensure your computers are baseline secure. Of course, baseline is something you should determine, not me. Here;s a quick list. You may be able to use InTune to manage these items and more. Windows Updates Make sure
Read moreEnforcing 2FA Defaults on Azure and Enforcing on Office 365
This article demonstrates how to enforce 2FA for users of Azure and Office 365. Depending on your license levels, you may not get all the settings that Microsoft article recommend, so this article covers the bare minimum. Microsoft has an overarching enforcement settings which needs to be set (although it
Read moreCreating New Users & Placing SSH Keys on Ubuntu and CentOS/Redhat
This is a simple reminder to those creating user accounts on Linux systems with the expectation that the intended user will be able to log in using their SSH keys. There’s also instructions on adding them to the “sudoers” groups. Ubuntu & CentOS/Redhat Create the user and place their SSH
Read more