This article demonstrates how to extent a LUKS encrypted volume. We’re using Ubuntu 22.04 and the volume is non-root. Although you could probably do the same on the root volume (partition). This is risky and you should not do this without a backup and understanding the likelihood of failure. ThisRead more
Linux Administrators From AGIX
Linux system administrators have complete control over your servers and information. We fully understand that trust is key. Our all-Australian team have proved over years that we can be trusted with security clearances, regular police checks, and we’re often called to work in high-security environments such as Defence and Finance.
Get Support From Experienced Professionals
AGIX technicians are more than Linux System Administrators. We have experience in a wide range of peripheral technologies including database management, cybersecurity, hardware and software firewalls, proxies and load balancers, Terraform and Ansible automation, networking, storage, CRMs and more.
Being a South Australia-based company, AGIX often works in the Defence industry. This requires significant trust and responsibility. When required, AGIX staff have received security clearances to ensure our eligibility to work around sensitive and secret projects. We’ve assisted with secret air-gapped network creation and often perform maintenance on such environments. We have recently completed a project to ensure secret systems are kept up to date, even in an air-gapped environment. This requires careful planning, extensive testing, and serious oversight at every stage of the process. Keeping systems up to date, even in air-gapped environments, is critical and often mandated by upstream authorities.
Contact our friendly team to get started.
This article discussed the differences between a single volume (/boot + /) and a multi-volume (/boot + / + /var + …). Or to put it another way, one volume with everything on it versus several volumes for different directories. There’s plenty of arguments for both sides. We’re basing ourRead more
There are times when you want to clear out the Bash history and make a clean start. Or perhaps you want to remove a single or select item/s from the Bash history. Both of these scenarios are accomplished as described below – although we’ll focus on clearing out the entireRead more
This article explains how to mount a Luks volume (encrypted) on boot. You’ll be asked for a password. There’s plenty of articles explaining how to do this with a crypt-key available, so I need not repeat their work. Here’s our scenario. Remember, this process is destructive. Follow this only inRead more
This article demonstrates how to join/bind a Redhat/CentOS or Ubuntu Linux system to an Active Directory domain, and auto creating user’s home directories as they login for the first time. Prepare and Join Linux to a Windows Domain Set the Hostname Check the hostname. This is the name that willRead more
NX is an alternative to VNC allowing management of a remote system. NX is opensource (there’s a commercial version), supports encryption, and can be installed on Linux, Windows, and MacOS. This tutorial shows how to install NX on a Ubuntu server, and NX on a Windows 11 client. We’ll thenRead more
If you’re a Windows system administrator with a need to log into a Linux server and troubleshoot it, this article is for you. Log into Linux Logging into a Linux server can be done via any of the following: Login with to a remote Linux server using SSH. Login atRead more