Everything you see here is found more formally at “https://mariadb.com/docs/operations/upgrades/upgrade-community-server-cs103-centos7/”. This page is basically just my notes in case I can’t find the other site when I need it in future. We’re using CentOS 7 and upgrading from “MariaDB 5.5” to “MariaDB 10.3”. Backup your DB and config files first.
Read moreGet help with Linux, Automation, Cybersecurity and more. AGIX staff have the know-how and experience to help your organisation with best-practices, current technology in various Cloud environments including Amazon AWS. Our technicians support Ubuntu, Redhat, Databases, Firewalls, Ansible and Terraform, Storage and more.
We support Redhat Enterprise Linux, Ubuntu, Mint, Fedora, Debian, CentOS Linux and more.
AGIX is a Redhat and Canonical (Ubuntu) Partner.
This page shows examples of our work that AGIX shares freely with you. For a fully supported compute environment, contact our team to find out how we can help your organization move forward in the right way.

Contact our friendly team to get started.
Pen Testing Tools – Stuff we all need
This article is mostly a cheat sheet for things pen-testers need. Obviously there’s a little picking and choosing depending on the need. Nmap: Ubuntu: apt install nmap CentOS: yum install nmap Nikto: Ubuntu: apt install nikto CentOS: yum install nikto Mimikatz: https://sourceforge.net/projects/mimikatz.mirror/files/latest/download Hydra: Ubuntu: apt install hydra Cewl: Ubuntu: apt
Read moreConfigure Metasploit with NMap and the Database – Advanced
This article walks you through the process of installing, configuring and running scans using Metasploit and Nmap. Both CentOS 7 and Ubuntu 20.04 are discussed. Our objective is to be able to run nmap scans and have the results go into a database so we can filter the results later
Read more
Create Your Own Public Half-Life 2 DM Server on CentOS 7/8
This article walks you through the process of building your own publicly accessible Half-Life 2 Death Match server on CentOS 7 and should work with 8 too but that’s untested. There’s plenty that can go wrong in this process. See the bottom of this article for common problems and solutions.
Read more
WiFi Penetration Testing with Ubuntu on USB Storage
This article demonstrates how to use Ubuntu booted from a USB disk to do WIFI penetration testing. Why would you want to do this? If you have Windows on your laptop and need to use Aircrack-NG, you’ll need to fight with wireless adapter driver issues. So you’ll try Kali Linux
Read more
Fail2Ban with MySQL Database for IP Blacklisting
This article demonstrates how to configure Fail2Ban to use a MySQL (or MariaDB, etc) as the storage repository for IP blocking records. This allow multiple Fail2Ban services (running on multiple servers) to report and use a central IP blocking repository. A little context. In this article, we’re installing everything on
Read more
GeoBlocking with Apache on CentOS and Ubuntu
This article describes how to protect your Apache web server by restricting which countries can access it. We’re using Apache on CentOS 7 but Ubuntu instructions are included and are very similar. I’ve given two examples; one on whitelisting everything except what we want to block, and blacklisting everything except
Read more
2FA with SSH on Ubuntu | Google Authenticator
This article walks you through the process of enforcing 2FA on Ubuntu using the Google Authenticator. All of these steps are completed on the system that you want 2FA to be enforced on. Important notes: * SSH key-based logins bypass the 2FA component of the login verification process. * Users
Read more
Ansible To Get Linux OS Version Details
This article shows the Ansible playbook used to query target systems to get their version details. Ie, the details obtained from “/etc/*release”. — – hosts: all # remote_user: root # become: yes tasks: – debug: msg: – “ansible_distribution {{ hostvars[inventory_hostname].ansible_distribution }}” – “major version {{ hostvars[inventory_hostname].ansible_distribution_major_version }}” – “version {{
Read more
Kubernetes (MicroK8s) Part 3 – Exposing Applications on Ubuntu 20.04
This article continues from Part 2 – Replica Sets and Scaling. Our objective in this article is to get an application exposed to the wider network on an IP address of the host and a port of our choice. The IP address will be “10.0.0.210” and our port of choice
Read more