Get help with Cybersecurity matters and training. AGIX staff have the know-how and experience to help your organisation with Cybersecurity Server best-practices, current technology in various Cloud environments including Amazon AWS.

This page shows examples of our work that AGIX shares freely with you. For a fully supported compute environment, contact our team to find out how we can help your organization move forward in the right way.

Contact our friendly team to get started.

All HowTo's Cybersecurity Linux Redhat, Fedora and CentOS Linux Ubuntu, Mint & Debian Linux Web Servers

GeoBlocking with Apache on CentOS and Ubuntu

This article describes how to protect your Apache web server by restricting which countries can access it. We’re using Apache on CentOS 7 but Ubuntu instructions are included and are very similar. I’ve given two examples; one on whitelisting everything except what we want to block, and blacklisting everything except

Read more
All HowTo's Cybersecurity pfSense & Netgate

Configure HAProxy on pfSense with LetsEncrypt (SSL/HTTPS Termination)

This article demonstrates how to configure HAProxy to use LetsEncrypt to automatically manage certificates ensuring that those on the Internet accessing servers behind your HAProxy are protected with SSL security. Here’s some important points before we get started: We’re using a Netgate pfSense firewall appliance in this example but pfSense

Read more
All HowTo's Cybersecurity Linux Redhat, Fedora and CentOS Linux

Installing the Tsunami Vulnerability Scanner on Fedora / CentOS 8

This article demonstrates how to install the new Tsunami vulnerability scanner on a Redhat-like machine such as Fedora or CentOS 8 and how to use it including an example script to scan multiple targets or subnets. Install Java: yum install java-*-openjdk-devel Download the Tsunami ZIP from here: https://github.com/google/tsunami-security-scanner/archive/master.zip Extract the

Read more