There are times when we need to send read/write queries to one server, and reads to another server (or multiple servers). If we control the application (the client), we can easily do this by coding such that different queries go to different database servers. However, what if we don’t control
Read moreBrowse through our full list of articles. Everything from Linux & Cybersecurity to automation and Windows topics.
A Single Volume Versus Multi-Volume Disk Layout On Linux
This article discussed the differences between a single volume (/boot + /) and a multi-volume (/boot + / + /var + …). Or to put it another way, one volume with everything on it versus several volumes for different directories. There’s plenty of arguments for both sides. We’re basing our
Read moreDeleting the Bash History
There are times when you want to clear out the Bash history and make a clean start. Or perhaps you want to remove a single or select item/s from the Bash history. Both of these scenarios are accomplished as described below – although we’ll focus on clearing out the entire
Read moreUpgrading the Netgate Firewall to 23.01 Error – Unable to check for updates
I discovered this issue today while upgrading a Netgate 7100 from 22.05 to 23.01. The Reddit page “https://www.reddit.com/r/PFSENSE/comments/mdqyhg/unable_to_check_for_updates_getting_this_error/” discussed this topic too. This is somewhere between a hack and a correction, so make sure to have a backup and a plan for recovery if this all goes bad. The file
Read moreDocker Quick Start (5 minutes to a running web site)
This article demonstrates how to get a web site running using Docker. We’re starting with a Linux server (doesn’t matter which distribution). We’re going to pull down an Docker image from the public repository, modify it’s “index” file, and expose it – making it publicly accessible. I’ve added a little
Read moreUpgrading the Netgate 3100 to Version 23.01-RELEASE
This article shows the process and experience to upgrade the Netgate 3100 to version 23.01. The process started smoothly but I was forced to do a manual power off/on having waited an hour and a half for it to return on its own after the upgrade process was started. OpenVPN
Read moreCreating and Mounting Luks on boot
This article explains how to mount a Luks volume (encrypted) on boot. You’ll be asked for a password. There’s plenty of articles explaining how to do this with a crypt-key available, so I need not repeat their work. Here’s our scenario. Remember, this process is destructive. Follow this only in
Read moreEncryption at Rest – What Qualifies?
To put it simply, if a hacker gains access to your system and can access the data as normal, then the data is not encrypted at rest. See the table below: There’s two types of so-called “encryption at rest” and each protects against the same thing with one exception, hackers.
Read moreWindows 10/11 Minimum Security Settings to Check
This article is a check list of the critical items to check to ensure your computers are baseline secure. Of course, baseline is something you should determine, not me. Here;s a quick list. You may be able to use InTune to manage these items and more. Windows Updates Make sure
Read moreCreating New Users & Placing SSH Keys on Ubuntu and CentOS/Redhat
This is a simple reminder to those creating user accounts on Linux systems with the expectation that the intended user will be able to log in using their SSH keys. There’s also instructions on adding them to the “sudoers” groups. Ubuntu & CentOS/Redhat Create the user and place their SSH
Read more