Linux System Monitoring Basics

November 03, 2017

Computer system plays a vital role in the operations of any sized companies. From its WiFi routers, printers, laptops, up to the file servers, network equipment, servers, etc. installed either in-house or in a data center. More often than not, people don't usually realize that a business's main functionality is housed in this behind-the-scenes equipment. So, in order for a company to be in continuous operation, it relies heavily on the stability of its own IT network and infrastructure. And that’s where system and network administration come in. 

 

Automatic key-based SSH authentication

July 12, 2017

Data transfer security is a priority task when using services with remote data access. Authentication on a server with a private key, creation of which does not take much time, provides a user with an ultimate privacy. In the following article, we look at the process of key creation and connection to a remote server in Windows and Ubuntu Linux.

 

How to Create a Wordpress Website on a Virtual Server

May 02, 2017

Not so long ago, to create a personal or a corporate website, you had to hire a whole team of professionals including web-designers, developers, and system administrators, because there were no ready-to-use solutions. Today the process of website creation is almost fully automated, and current content management systems (CMS) allow creating websites in a few simple steps. In this article, we explain, how to create a personal blog or a small company’s website based on the Wordpress – one of the most popular CMS in the world.

 

Encryption: how to protect your data from third party access

April 12, 2017

Lately the cases of server hacking and unauthorized access by attackers to organizations’ confidential information as well as theft of users’ personal data have increased. In case of corporate data theft, we have to deal with considerable companies’ financial and reputational losses. The use of Linux OS, however, is not a panacea and it will not always protect you from theft of your information or unauthorized access to it.

 

User Authentication on Squid Proxy Server

October 25, 2016

Resources of Squid allow differentiating users only by IPs or other parameters depending on the connecting machine. This system has some flaws – users are linked to particular machines and there is no way to protect access channel with password. Therefore, the more traditional authentication process, when users have individual logins and access passwords, seems to be more convinient.

 

Pros and Cons of Non-Relational Databases

September 29, 2016

The definitions of NoSQL database given in the majority of sources usually appear to be quite vague and might create false and incomplete idea of the phenomenon. The reason of such ambiguity is simple – just like the concept of “inanimate object” includes stone, lightbulb and car, the concept of NoSQL may imply software solutions that have absolutely different inner logic.

 

Squid Proxy Server Installation and Configuration on Ubuntu

August 29, 2016

The most frequently used network setting layout for office or company is the one requiring a common Internet-access gateway for all computers within the net. Proxy server is a convenient way to create such gateway. Squid software package functions as a proxy server for HTTP, FTP and even HTTPS protocols, in case competent and specialized configuration is provided.

 

Nginx (LNMP) Installation on Ubuntu

August 04, 2016

In 2002, the Russian programmer Igor Sysoev began the development of HTTP-server Nginx because of a need in a new software for high-loaded web-sites. At present, besides a usual web-server, Nginx is used as a reverse or mail proxy server as well as TCP/UDP proxy server for solving common tasks. Nginx is set up and works effectively on all the basic Unix-like OS including Linux.

 

DDoS-Attack Protection Services And Technologies

June 22, 2016

The Internet provides not only great opportunities for companies to attract new audience and expand the existing client base, but also great risks that should not be ignored. According to the statistics one out of two companies has faced so far a DDoS attack or is expected to.

 

Virtualization Technologies Comparison

June 22, 2016

Nowadays as one has to choose a hosting for a web project or create a server for the favorite game, the question always arises: why do prices so differ on the market? One company offers VPS for $5 monthly, while the other’s cheapest plan is not less than $15. So is there any real difference that you should pay for? And what are the peculiarities of virtualization technology?