Automatic key-based SSH authentication
July 12, 2017
Data transfer security is a priority task when using services with remote data access. Authentication on a server with a private key, creation of which does not take much time, provides a user with an ultimate privacy. In the following article, we look at the process of key creation and connection to a remote server in Windows and Ubuntu Linux.
How to Create a Wordpress Website on a Virtual Server
May 02, 2017
Not so long ago, to create a personal or a corporate website, you had to hire a whole team of professionals including web-designers, developers, and system administrators, because there were no ready-to-use solutions. Today the process of website creation is almost fully automated, and current content management systems (CMS) allow creating websites in a few simple steps. In this article, we explain, how to create a personal blog or a small company’s website based on the Wordpress – one of the most popular CMS in the world.
Encryption: how to protect your data from third party access
April 12, 2017
Lately the cases of server hacking and unauthorized access by attackers to organizations’ confidential information as well as theft of users’ personal data have increased. In case of corporate data theft, we have to deal with considerable companies’ financial and reputational losses. The use of Linux OS, however, is not a panacea and it will not always protect you from theft of your information or unauthorized access to it.