Data transfer security is a priority task when using services with remote data access. Authentication on a server with a private key, creation of which does not take much time, provides a user with an ultimate privacy. In the following article, we look at the process of key creation and connection to a remote server in Windows and Ubuntu Linux.
Not so long ago, to create a personal or a corporate website, you had to hire a whole team of professionals including web-designers, developers, and system administrators, because there were no ready-to-use solutions. Today the process of website creation is almost fully automated, and current content management systems (CMS) allow creating websites in a few simple steps. In this article, we explain, how to create a personal blog or a small company’s website based on the Wordpress – one of the most popular CMS in the world.
Lately the cases of server hacking and unauthorized access by attackers to organizations’ confidential information as well as theft of users’ personal data have increased. In case of corporate data theft, we have to deal with considerable companies’ financial and reputational losses. The use of Linux OS, however, is not a panacea and it will not always protect you from theft of your information or unauthorized access to it.
Resources of Squid allow differentiating users only by IPs or other parameters depending on the connecting machine. This system has some flaws – users are linked to particular machines and there is no way to protect access channel with password. Therefore, the more traditional authentication process, when users have individual logins and access passwords, seems to be more convinient.
The definitions of NoSQL database given in the majority of sources usually appear to be quite vague and might create false and incomplete idea of the phenomenon. The reason of such ambiguity is simple – just like the concept of “inanimate object” includes stone, lightbulb and car, the concept of NoSQL may imply software solutions that have absolutely different inner logic.
The most frequently used network setting layout for office or company is the one requiring a common Internet-access gateway for all computers within the net. Proxy server is a convenient way to create such gateway. Squid software package functions as a proxy server for HTTP, FTP and even HTTPS protocols, in case competent and specialized configuration is provided.
In 2002, the Russian programmer Igor Sysoev began the development of HTTP-server Nginx because of a need in a new software for high-loaded web-sites. At present, besides a usual web-server, Nginx is used as a reverse or mail proxy server as well as TCP/UDP proxy server for solving common tasks. Nginx is set up and works effectively on all the basic Unix-like OS including Linux.
The Internet provides not only great opportunities for companies to attract new audience and expand the existing client base, but also great risks that should not be ignored. According to the statistics one out of two companies has faced so far a DDoS attack or is expected to.
Nowadays as one has to choose a hosting for a web project or create a server for the favorite game, the question always arises: why do prices so differ on the market? One company offers VPS for $5 monthly, while the other’s cheapest plan is not less than $15. So is there any real difference that you should pay for? And what are the peculiarities of virtualization technology?
It is highly inconvenient and onerous to administer a web server via command line. Some have troubles with commands, others find it difficult to configure a software correctly. Needles to mention the beginners accustomed to Windows. However, with a hosting panel there is no more problem left. Hosting panel is a set of software, combined into some kind of interface, comfortable for a user.