Check-out our new look and give us some feedback!

Category: Hosting Basics

Discover information regarding the basics of web hosting, including 'What is?' articles and quick guides for server setup and site maintenance. Some articles also contain more in-depth data that is useful to those with more experience.

Reading Time: 5 minutes

Basic Firewall Rules

In a firewall rule, the action component decides if it will permit or block traffic. It has an action-on-match feature. For example, if the traffic matches the components of a rule, then it will be permitted to connect to the network. It is essential to consider the potential security risks when modifying a firewall rule to avoid future issues. Following firewall rules best practices can help you maximize the effectiveness of your solution.

Continue reading →
Reading Time: 4 minutes

VMware’s security solutions have significantly transformed the IT industry. VMware’s NSX-T data center provides users with a distributed firewall feature that allows micro-segmentation, which separates all components in the network at each virtual machine (VM) in the hypervisor. The distributed firewall feature in NSX-T Data Center is a crucial component of a secure network.

Continue reading →
Reading Time: 4 minutes

One of the most common questions a Solution Architect receives that has only increased over the years is, what is Zero Trust security? This article sets out to answer this and another critical question, why is Zero Trust important in today's interconnected world?

Continue reading →
Reading Time: 3 minutes

ClamAV is a free and open-source antivirus software and a cross-platform antivirus toolkit. Its primary purpose is to detect various kinds of malicious software, i.e. viruses, worms, trojans, rootkits, and many other forms of possible threats to your system.

Continue reading →

How to Remove Yourself From Blacklist

Posted on by Zachary Armstrong | Updated:
Reading Time: 8 minutes

Today, nearly everyone has received unwanted emails from bothersome salespeople offering yet another one-of-a-kind deal, creating a complete mess in the mail. 

Continue reading →
Reading Time: 6 minutes

RAID technology uses a combination of one or more physical drives to create data redundancy and improve performance. From RAID 0 to RAID 10, multiple RAID levels provide different trade-offs between performance, data redundancy, and cost-effectiveness. This article explores RAID levels 0, 1, 5, 6, and 10, compares software vs hardware RAID implementations, and discusses RAID level advantages and disadvantages as well as their ideal use cases.

Continue reading →
Reading Time: 5 minutes

When it comes to backing up all data in your hybrid IT environment, you need an up-to-date solution that reliably protects all your data wherever it resides. If you’re looking for a single solution that integrates data protection, including backup and disaster recovery, with cybersecurity and endpoint management, continue reading to learn more about Acronis Cyber Protect. In this article, we’ll discuss the hybrid cloud and how Acronis Hybrid Cloud Architecture works in addition to its advantages and disadvantages.

Continue reading →
Reading Time: 5 minutes

Ever wonder how content is served to your device, and how quickly you can access and view the content? The answer is the content is served from either a CDN or an eCDN. A CDN serves public-facing content while an eCDN serves video and live-streaming events to employees within a corporation’s LAN. This article looks at the differences between these two types of networks, how they work, the benefits of each, and when to use one over the other.

Continue reading →
Reading Time: 5 minutes

What is Secure Shell (SSH)?

Secure Shell (SSH), is a service that is similar to Telnet which enables you to remotely connect over the Internet network to a computer that is located anywhere in the world and is connected to the Internet. Unlike Telnet, SSH service provides a secure connection between the two computers.

Continue reading →
Reading Time: 5 minutes

When browsing websites or your favorite apps, the pages you see on your screen are rendered from a web server. A web server hosts files and assets (think video, graphics, text, and code, specifically HTML) and renders them in your browser as a web page or on your device as an application. Web servers typically run on either Windows or Linux operating systems and are hosted in a data center. However, this article focuses on Internet Information Services (IIS), a web server specific to Windows that runs on the desktop or is hosted on a Windows Server.

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434