AGIX Discussion

Get help with Linux, Automation, Cybersecurity and more. AGIX staff have the know-how and experience to help your organisation with best-practices, current technology in various Cloud environments including Amazon AWS. Our technicians support Ubuntu, Redhat, Databases, Firewalls, Ansible and Terraform, Storage and more. This page shows examples of our work that AGIX shares freely with you. For a fully supported compute environment, contact our team to find out how we can help your organization move forward in the right way.

See Our Blogs on AGIX Discussion

Installing Confluence & Migrating the Database to MySQL or PostgreSQL

This article explains the process of installing Confluence on your own server and then later migrating your content and settings from the “evaluation” database to something more professional such as MySQL or PostgreSQL. This article is basically an example with sensible assumptions. We’re using CentOS 7. When you first get

Amazon’s AWS Pricing Scenario

Suppose you’re investigating moving some computing resources to Amazon’s AWS cloud. You will have several questions such as a) how much will it cost?, b) how do Windows licenses work?, and c) how can staff access those servers? I answers these in a simple way in the example scenario below.

Why Amazon Wants In To Your House

In the past we would hate the idea of anyone listening in on your personal conversations. In fact, i bet it scares you know. So why are we inviting Amazon, Google, Apple, Samsung and others into our homes to listen and watch our lives? These companies are “marketing” their way

US Voting Systems & Vulnerabilities

An excellent video on the current state of US voting systems and how threats are being discovered and discussed among experts.

Private Browsing Online – How to keep your browsing habits safe

This article shows how you can surf the web while keeping your information as private as possible or as private as convenient. The more private you want to be online, the more inconvenient things get. On the other hand, ignoring privacy all-together makes life easy but there is a cost.

The Solution to Australia’s Cyber Security Threats

The cyber security threats are increasing and the solution either isn’t known or very poorly communicated to those who can actually make a difference. The later is my assumption and the topic of this article. No matter how many resources the authorities have, no matter how technologically advanced they are,

A brief history of IT security

It’s an hour (give or take) but an excellent watch. The sound isn’t great so lift the volume or use headphones. https://www.youtube.com/watch?v=LWwaVe1RF0c&t=2s

Weakening Cybersecurity to Help Catch Criminals – Hurts the Rest of Us!

There is talk of weakening Cybersecurity in an attempt to make it easier for authorities to listen in on criminal communications. The two obvious arguments against this are a) weakening security hurts everyone, and b) criminals will simply shift to other methods of communication. I will discuss both of those

Australia to Introduce Laws to Weaken Cybersecurity

https://www.schneier.com/blog/archives/2017/07/australia_consi.html#comments I’ll be writing more on this in the coming days. I honestly hope this is not how it plays out.

The Case For Regulating Information Technology Services and Products in Australia

In this article, I am arguing that a regulated Information Technology industry will result in higher quality systems and software and a new focus on security. Australia is about to create a new cyber warfare division within the Australian Defence Force. Whilst the details are still secret, the objectives will

Need Help?

"*" indicates required fields

Our Team Is Made Up Of Australian Specialists

Need Help?

Click Here
Call Now Button