Category: Tutorials

The Liquid Web knowledgebase provides information on thousands of topics surrounding every aspect of hosting, Linux, Windows, and countless other article types that help boost your Liquid Web experience!

Reading Time: 7 minutes

Minecraft is a sandbox/adventure game that challenges you to survive and explore an infinite world that you can modify at will. Just a few years after launching in 2009, Minecraft exploded in popularity, eventually becoming the highest-selling game of all time at 200 million copies.

Continue reading →
Reading Time: 3 minutes

A symbolic link, also known as a soft link or symlink, is a special file pointing to another file or directory using an absolute or relative path. Symbolic links are similar to shortcuts in Windows and are useful when you need quick access to files or folders with long paths.

Continue reading →
Reading Time: 3 minutes

Introduction

This tutorial describes how to mount a disk image or ISO file using Supermicro’s SMCIPMITool, a command-line utility that interfaces with IPMI enabled systems. This utility does not require any third-party software to operate.

Continue reading →
Reading Time: 2 minutes
what-is-a-daemon1

While many know daemons from Greek mythology, we will learn what a daemon is in the world of software. If you ever manually installed software or a service on your server, a daemon runs in the background. This article will discuss what daemons are, the difference between a daemon and a process, the most common daemons, and how to use daemons on CentOS 6 and CentOS 7.

Continue reading →
Reading Time: 5 minutes

The Internet of Things (IoT) is a network of everyday objects or things embedded with electronics, sensors, and software, allowing for the collection and transfer of data. Connectivity enables such devices to communicate real-time data with other connected devices and act on the acquired data without human intervention. This concept, known as machine learning, allows us to exert significantly less effort to collect data and appropriately act on it. Instead, we can direct our energy towards analyzing the collected data for something of use to make a process or activity more efficient.

Continue reading →

How to Convert OST to PST

Posted on by Marho Atumu | Updated:
Reading Time: 5 minutes

A key email client feature is accessing your emails when you do not have an active Internet connection. Microsoft’s Outlook email client downloads and saves information from your online email account locally on your computer. These email files are saved primarily in two file formats, but what are they? Let’s find out!

Continue reading →
Reading Time: 6 minutes

What is Grafana?

Grafana is a data visualization and monitoring tool written in Typescript (frontend) and Go (backend) that allows users to create and edit both log and data graphs and create metrics. Used in conjunction with time series databases such as InfluxDB, Prometheus, Elasticsearch, Grafana can use plugins as templates and ready-made graphs and metrics.

Continue reading →
Reading Time: 5 minutes

Introduction

In 2006, several Google engineers started to work on a Linux kernel feature called Cgroups (Control Groups) to limit and isolate hardware resource usage (e.g., RAM, CPU, disk I/O, network, etc.). Eventually, this functionality was merged with the Linux Mainline Kernel in 2008, and that paved the way for all containerization technologies that we use today, like Docker, Cloudfoundry, LXC, etc. 

Continue reading →
Reading Time: 5 minutes
1-gogs

Gogs is one of the most famous and widely used Git applications. It offers a low consumption alternative to other services like Gitlab or Gitea. Gogs is an open-source self-hosted Git service that provides all the essential features and benefits to set up a private and secure versioning control system.

Continue reading →
Reading Time: 4 minutes

The security of your network is of the highest priority, and an attack on your network could cost your business thousands, or even millions, of dollars. An intrusion detection system is one such system that can be used to monitor your network and receive alerts when suspicious activity is detected. In this article, we will explain what an intrusion detection system is and how it works.

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434