The Little Book of Cyber Scams – The UK Metropolitan Police

The UK Metropolitan Police have published the first Cyber Scams Book/eBook. The book has been elaborate to help UK businesses to act the necessary measures to protect the companies/personal information and customers against cyber criminals and Protect the data information from the hacker to reduce the risk being a victim. Read more

The best way to setup Postfix/DKIM/SPF/DMARC on Ubuntu – Plesk onyx

Installation Guide:

  1. How to Setup Postfix/DKIM/SPF on Ubuntu with or without Plesk Onyx
  2. How to setup DKIM/SPF/DMARC in Ubuntu with Plesk Onyx
  3. How to setup SPF (Sender Policy Framework)
  4. How to setup DMARC and Benefits
  5. Generate a public and private key from OpenSSL (if require)
  6. How to install/setup dkim in cPanel
  7. Server Speedtest from command
  8. User unknown in virtual alias table

Important Tools

For DKIM Checker: Read more

,

Cloud Access Security – A Quick Guide to the Most Important Insights in Security

For 10 years, Microsoft has been studying and analysing the threat landscape of exploits, vulnerabilities and malware. We’ve used data gathered from more than 600 million computers worldwide to develop one of the most complete security data sets in the world.

Our year-round research is then collected and published in The Microsoft Security Intelligence Report, a globally accredited, 160-page report that comprehensively addresses the security landscape. This year, in an effort to drive awareness of key insights and trends, we’ve also developed A Quick Guide to the Most Important Insights in Security, an abridged, to-the-point resource that readers can use to learn the important factors in the complex matrix of Cybersecurity. Read more

How to remove Wannacry Ransomware fixes from Microsoft

As you are all aware of the new ransomware has been used in the massive hacking attack, affecting tens of thousands of computers worldwide.

If any of the staff/User receive any suspicious emails and if you are not sure, please do not open any attachment files. Just forward it to your Admin for further investigation.

How to identify suspicious email:

Read more

How to install Let’s Encrypt on QNAP/NAS

Install Instructions

Method 1- QNAP/NAS Setup

  1. Login to your QNAP/NAS and make sure the following Apps are installed:
  2. Make sure your QNAP/NAS is reachable on the internet under the domain you want to get a certificate for on port 80 or 443.
  3. Create a folder to store qnap-letsencrypt in under /share/YOUR_DRIVE/.

Read more