To put it simply, if a hacker gains access to your system and can access the data as normal, then the data is not encrypted at rest. See the table below: There’s two types of so-called “encryption at rest” and each protects against the same thing with one exception, hackers.Read more
Get help with Linux, Automation, Cybersecurity and more. AGIX staff have the know-how and experience to help your organisation with best-practices, current technology in various Cloud environments including Amazon AWS. Our technicians support Ubuntu, Redhat, Databases, Firewalls, Ansible and Terraform, Storage and more.
This page shows examples of our work that AGIX shares freely with you. For a fully supported compute environment, contact our team to find out how we can help your organization move forward in the right way.
Contact our friendly team to get started.
This article is a check list of the critical items to check to ensure your computers are baseline secure. Of course, baseline is something you should determine, not me. Here;s a quick list. You may be able to use InTune to manage these items and more. Windows Updates Make sureRead more
This is a simple reminder to those creating user accounts on Linux systems with the expectation that the intended user will be able to log in using their SSH keys. There’s also instructions on adding them to the “sudoers” groups. Ubuntu & CentOS/Redhat Create the user and place their SSHRead more
In recent times, we’ve been experimenting with Landscape from Canonical. This article describes our experience. While I don’t claim to be an expert (or even a long time user) of Landscape, I have spent time to test and deploy it. While I hope I have missed a few key points,Read more
This article walks through the process of creating a self-hosted Docker Registry. We’re using Ubuntu but given that Docker is basically cross-platform (in a way), this should work on any Linux distribution. You can host your Docker Registry on any host you like. When I refer to you “Docker RegistryRead more
This article walks us through the process of installing and configuring two Postgres servers for stream replication. “Stream” replication allows us to replicate all databases from the master to the/a slave. There’s another kind of replication called “Logical” replication, that will replicate “individual” databases on the master to the slave.Read more
This article describes the fastest way I know to upgrade a WordPress site. A little background: I recently had a WordPress site that was error’ing when attempting to administer it. There were missing functions, etc. I decided to simply upgrade the WordPress code-base to the latest and solve the problemRead more
In this article, we’re modifying an existing OpenVPN site-to-site (peer to peer) VPN. We’re aware of the change that will come into effect soon that OpenVPN will no longer support shared keys for site-to-site VPNs. We’re going to modify an existing VPN to use SSL rather than the shared keyRead more
This article highlights some important details for those working with Ansible AWX. Specifically, when the target system/s are Windows based. The two options to target a Windows host is WinRM and SSH. SSH is easier. It just requires the OpenSSH Server “feature” to be installed which is a simple process.Read more
This article demonstrates how to join/bind a Redhat/CentOS or Ubuntu Linux system to an Active Directory domain, and auto creating user’s home directories as they login for the first time. Prepare and Join Linux to a Windows Domain Set the Hostname Check the hostname. This is the name that willRead more