Get help with Cybersecurity matters and training. AGIX staff have the know-how and experience to help your organisation with Cybersecurity Server best-practices, current technology in various Cloud environments including Amazon AWS.

This page shows examples of our work that AGIX shares freely with you. For a fully supported compute environment, contact our team to find out how we can help your organization move forward in the right way.

Contact our friendly team to get started.

All HowTo's Cybersecurity Linux Redhat, Fedora and CentOS Linux Ubuntu, Mint & Debian Linux

Sudo Without a Password & Restricted Commands/Groups – CentOS and Redhat

This article explains how to use SUDO without being prompted for the password. We can restrict which users and/or groups can do this. As root, edit the file “/etc/sudoers”. Add the line: agix ALL=(ALL) NOPASSWD: ALL The above means that the user “agix” can use sudo without being prompted for

Read more