Encryption: how to protect your data from third party access

April 12, 2017

Lately the cases of server hacking and unauthorized access by attackers to organizations’ confidential information as well as theft of users’ personal data have increased. In case of corporate data theft, we have to deal with considerable companies’ financial and reputational losses. The use of Linux OS, however, is not a panacea and it will not always protect you from theft of your information or unauthorized access to it.


User Authentication on Squid Proxy Server

October 25, 2016

Resources of Squid allow differentiating users only by IPs or other parameters depending on the connecting machine. This system has some flaws – users are linked to particular machines and there is no way to protect access channel with password. Therefore, the more traditional authentication process, when users have individual logins and access passwords, seems to be more convinient.


Pros and Cons of Non-Relational Databases

September 29, 2016

The definitions of NoSQL database given in the majority of sources usually appear to be quite vague and might create false and incomplete idea of the phenomenon. The reason of such ambiguity is simple – just like the concept of “inanimate object” includes stone, lightbulb and car, the concept of NoSQL may imply software solutions that have absolutely different inner logic.


Squid Proxy Server Installation and Configuration on Ubuntu

August 29, 2016

The most frequently used network setting layout for office or company is the one requiring a common Internet-access gateway for all computers within the net. Proxy server is a convenient way to create such gateway. Squid software package functions as a proxy server for HTTP, FTP and even HTTPS protocols, in case competent and specialized configuration is provided.


Nginx (LNMP) Installation on Ubuntu

August 04, 2016

In 2002, the Russian programmer Igor Sysoev began the development of HTTP-server Nginx because of a need in a new software for high-loaded web-sites. At present, besides a usual web-server, Nginx is used as a reverse or mail proxy server as well as TCP/UDP proxy server for solving common tasks. Nginx is set up and works effectively on all the basic Unix-like OS including Linux.


DDoS-Attack Protection Services And Technologies

June 22, 2016

The Internet provides not only great opportunities for companies to attract new audience and expand the existing client base, but also great risks that should not be ignored. According to the statistics one out of two companies has faced so far a DDoS attack or is expected to.


Virtualization Technologies Comparison

June 22, 2016

Nowadays as one has to choose a hosting for a web project or create a server for the favorite game, the question always arises: why do prices so differ on the market? One company offers VPS for $5 monthly, while the other’s cheapest plan is not less than $15. So is there any real difference that you should pay for? And what are the peculiarities of virtualization technology?


Hosting Panels Overview

June 22, 2016

It is highly inconvenient and onerous to administer a web server via command line. Some have troubles with commands, others find it difficult to configure a software correctly. Needles to mention the beginners accustomed to Windows. However, with a hosting panel there is no more problem left. Hosting panel is a set of software, combined into some kind of interface, comfortable for a user.


Linux Desktop Environment Overview and Remote Desktop Configuration

June 22, 2016

In the last twenty years the development of desktop environments for Linux family systems has been making a remarkable progress and as a result now we have the product that simplifies user-computer interaction gradually. A dreary bleak command line has been lived up by nice icons and clickable buttons.


How To Deploy OpenVPN Server

June 22, 2016

Do you wish to keep all the confidential information secure, working in open Wi-Fi networks? Do you want to stay anonymous, when you go to internet resources, enter prohibited sites and use social networks at working place? The best solution for you would be deployment of your own OpenVPN server.