Our blog

Articles and reviews related to our business and IT in general, as well as manuals and other stuff useful for our customers and IT-specialists of different levels.

13 December 2018

System Dynamics Going Cloud With Veesp

by Ivan Perl comments

Nowadays our world is becoming more and more complicated. Science and technics are actively moving forward in evolving technologies and increasing our knowledge in many existing areas, giving them a deeper understanding, and also opening new areas and spreading our horizons. Complexity and diversity of our world required highly efficient research tools to continue pushing our limits. One of the key approaches in a baseline of almost any modern achievement is modeling.

Read more
3 November 2017

Linux System Monitoring Basics

by Veesp comments

Computer system plays a vital role in the operations of any sized companies. From its WiFi routers, printers, laptops, up to the file servers, network equipment, servers, etc. installed either in-house or in a data center. More often than not, people don't usually realize that a business's main functionality is housed in this behind-the-scenes equipment. So, in order for a company to be in continuous operation, it relies heavily on the stability of its own IT network and infrastructure. And that’s where system and network administration come in. 

Read more
12 July 2017

Automatic key-based SSH authentication

by Veesp comments

Data transfer security is a priority task when using services with remote data access. Authentication on a server with a private key, creation of which does not take much time, provides a user with ultimate privacy. In the following article, we look at the process of key creation and connection to a remote server in Windows and Ubuntu Linux.

Read more
2 May 2017

How to Create a Wordpress Website on a Virtual Server

by Veesp comments

Not so long ago, to create a personal or a corporate website, you had to hire a whole team of professionals including web-designers, developers, and system administrators, because there were no ready-to-use solutions. Today the process of website creation is almost fully automated, and current content management systems (CMS) allow creating websites in a few simple steps. In this article, we explain, how to create a personal blog or a small company’s website based on the Wordpress – one of the most popular CMS in the world.

Read more
12 April 2017

Encryption: how to protect your data from third party access

by Veesp comments

Lately the cases of server hacking and unauthorized access by attackers to organizations’ confidential information as well as theft of users’ personal data have increased. In case of corporate data theft, we have to deal with considerable companies’ financial and reputational losses. The use of Linux OS, however, is not a panacea and it will not always protect you from theft of your information or unauthorized access to it.

Read more
29 September 2016

User Authentication on Squid Proxy Server

by Veesp comments

Resources of Squid allow differentiating users only by IPs or other parameters depending on the connecting machine. This system has some flaws – users are linked to particular machines and there is no way to protect access channel with password. Therefore, the more traditional authentication process, when users have individual logins and access passwords, seems to be more convinient.

Read more
29 September 2016

Pros and Cons of Non-Relational Databases

by Veesp comments

The definitions of NoSQL database given in the majority of sources usually appear to be quite vague and might create false and incomplete idea of the phenomenon. The reason of such ambiguity is simple – just like the concept of “inanimate object” includes stone, lightbulb and car, the concept of NoSQL may imply software solutions that have absolutely different inner logic.

Read more
29 August 2016

Squid Proxy Server Installation and Configuration on Ubuntu

by Veesp comments

The most frequently used network setting layout for office or company is the one requiring a common Internet-access gateway for all computers within the net. Proxy server is a convenient way to create such gateway. Squid software package functions as a proxy server for HTTP, FTP and even HTTPS protocols, in case competent and specialized configuration is provided.

Read more
4 August 2016

Nginx (LNMP) Installation on Ubuntu

by Veesp comments

In 2002, the Russian programmer Igor Sysoev began the development of HTTP-server Nginx because of a need in a new software for high-loaded web-sites. At present, besides a usual web-server, Nginx is used as a reverse or mail proxy server as well as TCP/UDP proxy server for solving common tasks. Nginx is set up and works effectively on all the basic Unix-like OS including Linux.

Read more
22 June 2016

DDoS-Attack Protection Services And Technologies

by Veesp comments

The Internet provides not only great opportunities for companies to attract a new audience and expand the existing client base, but also great risks that should not be ignored. According to the statistics one out of two companies has faced so far a DDoS attack or is expected to.

Read more
Visa
Mastercard
Paypal
Bitcoin
American Express
JCB
Diners Club