AGIX Linux Cybersecurity

Cybersecurity is a priority for networks and organizations, especially in industries that handle sensitive information. The certified Linux cybersecurity experts at AGIX are trusted professionals when it comes to keeping networks and systems safe from harm. Whether you need to protect sensitive information from outside interference or just keep hackers out of your network, AGIX has the experience that can help.

Security Experts That You Can Trust

AGIX’s professional team has the experience that you can count on when it comes to cybersecurity. Having worked with organizations in high-security industries such as Defence and Finance, we understand the intricacies of keeping information secure from an unexpected attack. With our years of experience, we can be trusted with the most sensitive information in your network.

We Take Cybersecurity Seriously

Our experienced professionals at AGIX are highly equipped to handle every aspect of cybersecurity. Working with sensitive information requires more than just careful planning and serious oversight; we also conduct extensive testing in every step of the way, and ensure that everything is up-to-date by our clients’ exacting standards. Consult with us and see why our clients trust us with even the most complex security concerns.

Contact our friendly team to get started.

All HowTo's Cyber-Security Kubernetes & Docker Linux Redhat, Fedora and CentOS Linux Ubuntu, Mint & Debian Linux

Installing Bitwarden in Docker on Fedora

This article is quick walk-through explaining how to install Bitwarden on Fedora 32 but should work on CentOS 7 and 8 as well as RHEL. Install the docker packages: yum install docker docker-compose systemctl enable docker systemctl restart docker Download the Bitwarden scripts: curl -Lso bitwarden.sh https://go.btwrdn.co/bw-sh chmod +x bitwarden.sh

Read more
All HowTo's Cyber-Security Linux Redhat, Fedora and CentOS Linux Web Servers

Nmap with Vulscan on CentOS 7 or 8 – A short HowTo

This article shows how to install and run Nmap using the Vulscan add-on to do vulnerability assessments. Download Nmap: yum install nmap Install the Vulscan.nse script: /usr/share/nmap git clone https://github.com/scipag/vulscan vulscan Run a scan targeting the machine (in this example) “192.168.4.250”: nmap -sV –script vulscan/vulscan.nse 192.168.4.250 My output looks like

Read more
All HowTo's Cyber-Security Linux Redhat, Fedora and CentOS Linux Web Servers

Nmap with Vulners on CentOS 7 or 8 – A short HowTo

This article shows how to install and run Nmap using the Vulners script to do vulnerability assessments. Download Nmap: yum install nmap Install the Vulners.nse script: /usr/share/nmap wget https://svn.nmap.org/nmap/scripts/vulners.nse Run a scan targetting the machine (in this example) “192.168.4.250”: nmap -sV –script vulners.nse 192.168.4.250 My output looks like this: 22/tcp

Read more