Easy Incremental Backups With Tar on CentOS & Redhat

Disk space may be cheep but off-site backups are often slow so daily full-backups aren't always the best option. Tar ...
Read More

ClamAV – Find & Move Viruses, Exclude Directories & Notify of Infections

This article demonstrates how to find viruses on your Linux workstation or server, move the virus to a special directory ...
Read More

Restrict SSH Access By User or Group on CentOS and Redhat Enteprise Linux 7

This article demonstrates how to restrict SSH access to only specified users and/or groups. You can do the reverse by ...
Read More

Mounting An NFS Share On MACOS

This is a quick one-liner to remind you how to mount an NFS share on a MACOS client. sudo mount ...
Read More

Gluster: What happens if …?

This article lists some situations you might find yourself in with Gluster and what you can expect. Basically I've tried ...
Read More

Linux for Windows Gurus

If you're a Windows system administrator with a need to log into a Linux server and troubleshoot it, this article ...
Read More

Enable CORS With NginX

Like happens so often, the notes and comments you found in forums don't quiet work how you expected. In this ...
Read More

Manage Everything With Ansible

Ansible is a buzz word at the moment. Ever since Redhat purchased Ansible back in 2016, it has been rare ...
Read More

Creating & Restoring From Snapshots in AWS

Just like with VMWare or Hyper-V, Amazon's AWS supports snapshots and they make it easy to create them and restore ...
Read More

How to Test Zabbix Events & Alerts

Zabbix is a great monitoring system but only when you actually get alerted to issues. There is no "Test" button ...
Read More

Australian “My Health Records” Simply Can’t Be Trusted

The Australian government is continuing its push for the public to start using the centralized health record system. The idea ...
Read More

Nginx & Varnish 4 With HTTPS://

This article explains and gives examples of how to use Varnish 4 to cache in a fully HTTPS environment. This ...
Read More

How To Purge Old MySQL Data And Recover Disk Sapce

This article demonstrates how to delete old data from a MySQL table and recover the disk space from the removed ...
Read More

How To SSH Tunnel – Access Resources Behind a Firewall

Scenario: You're at home and want to log into the office Intranet to finish up some work. But wait, the ...
Read More

We’re Loosing the Information Security Battle – So What Needs To Change?

Report after report shows that the problem of information security is getting worse at a faster rate than we are ...
Read More

How To Start a Staff Induction System

All businesses need a way to induct their new staff into the business. So far it's either paper based, computer ...
Read More

Australian Institute of Company Directors | Taking IT Security Seriously

Recently I received an email forwarded-on by a company director who asked the question "How are we treating IT security ...
Read More

Exam Kabam – Free Signup This Week Only

We're excited to share our IT Security Exam preparation tool with our fellow IT professionals at no cost for the ...
Read More
Loading...