Technical Support

Our expertise in Linux technology enables us to provide technical support in many computer related problems including desktop support, server support, network support, backups and a lot more. Our goal is to ensure that your computer systems are running at peak performance by correcting issues as quickly and as smoothly as possible.

The following are a list of systems with which we provide excellent service and support for: Linux Servers, CentOS Enterprise Linux, Debian GNU/Linux, Fedora, Red Hat Enterprise Linux, SUSE Linux Enterprise Server, Ubuntu Linux.

Tech Support

Managing Instances In Nagios Log Server

This article covers Instances in Nagios Log Server and how we can manage them. 

Nagios Log Server is a clustered application, it consists of one or more instances of Nagios Log Server. An

instance is an installation of Nagios Log Server, it participates in the cluster and acts as a location for the

received log data to reside. The log data is spread across the instances using the Elasticsearch database, a

special database used by Nagios Log Server.

Install Wazuh Server on CentOS 7 - Step by Step Process ?

This article covers the installation procedure of Wazuh Server on CentOS Linux System. Basically, Wazuh is a free, open-source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. 


You can use Wazuh for the following applications:

  • Security analysis
  • Log analysis
  • Vulnerability detection
  • Container security
  • Cloud security


To Install Java on CentOS 8.

1. Run the command below to install JDK:

$ sudo dnf install java-11-openjdk-devel

2. Confirm that you have it installed

$ java -version

Alerting On Log Events With Nagios Log Server

This article covers Alerting On Log Events With Nagios Log Server. Basically, for alerting on Log Events with Nagios Log Server one needs to be familiar with the options available.

With this guide, you will learn how to create various alerts in Nagios Log Server, such as sending

them to a Nagios XI or Nagios Core monitoring server using Nagios Remote Data Processor

(NRDP), sending an email, sending SNMP traps and executing scripts.

Install Ajenti Control Panel on Debian 10 / Debian 9 - Step by Step Process ?

This article covers how to install Ajenti Control Panel on Debian system. Basically, Ajenti is a simple tool to manage your websites, Firewall, DNS, Cron, Logs, Files, Mail hosting services and so on.

Analyzing Logs With Nagios Log Server

This article covers how to analyze  logs with Nagios Log Server.  Basically, in order to analyze logs with Nagios Log Server one needs to be familiar with the options in the Dashboards menu. This guide is very essential to Nagios Log Server administrators and users looking for information on querying, filtering and drilling down the data in Nagios Log Server.

You can audit your IT infrastructure, maintain historical records of usage of IT infrastructure, create reports, and analyze logs using the Nagios Log Server.

Hardening Windows Using Microsoft Security Baseline

This article covers Hardening Windows Using Microsoft Security Baseline.

Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting its Internet-facing web apps, while a hospital may focus on protecting confidential patient information.

The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.

A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers.


How can you use security baselines?

You can use security baselines to:

1. Ensure that user and device configuration settings are compliant with the baseline.

2. Set configuration settings. For example, you can use Group Policy, Microsoft Endpoint Configuration Manager, or Microsoft Intune to configure a device with the setting values specified in the baseline.