Tag: Firewall

Reading Time: 10 minutes
neo4j

In this tutorial, we will examine and discuss what the Neo4j graph database is, what it is used for, and how it is implemented. In the sections that follow, we will install Neo4j on an Ubuntu 20.04 server, and then we configure the database software appropriately. However, let's first review some important database concepts that apply to Neo4j.

Continue reading →
Reading Time: 9 minutes

Remote Desktop Protocol (RDP) is the easiest and most common method for managing a Windows server remotely. RDP is a type of service that enables users to remotely access and configure a Windows server or a computer from anywhere in the world. It provides a convenient way to work on a remote system as if you were physically present at the machine. RDP is commonly used by businesses and individuals for remote administration, technical support, and telecommuting.

Continue reading →
Reading Time: 5 minutes

Basic Firewall Rules

In a firewall rule, the action component decides if it will permit or block traffic. It has an action-on-match feature. For example, if the traffic matches the components of a rule, then it will be permitted to connect to the network. It is essential to consider the potential security risks when modifying a firewall rule to avoid future issues. Following firewall rules best practices can help you maximize the effectiveness of your solution.

Continue reading →
Reading Time: 4 minutes

VMware’s security solutions have significantly transformed the IT industry. VMware’s NSX-T data center provides users with a distributed firewall feature that allows micro-segmentation, which separates all components in the network at each virtual machine (VM) in the hypervisor. The distributed firewall feature in NSX-T Data Center is a crucial component of a secure network.

Continue reading →
Reading Time: 11 minutes

How Can You Ensure Security on a Server?

It is important to secure your server to prevent data loss or security compromises. Because security is such a challenging subject for many, it often goes unheeded. Many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.

Continue reading →

How to Open a Port in Windows Firewall

Posted on by Matthew Hurst | Updated:
Reading Time: 6 minutes

Managing your network traffic is essential in securing any device that handles your workloads. One of the primary tools in doing so is a firewall. The Windows operating system (OS) comes prepackaged with the Windows Defender Firewall to assist with this task.

Continue reading →
Reading Time: 3 minutes

Many companies have replaced their live office meetings with video conferencing. It is the easiest way to get all employees together, present the latest news and updates, and effectively gather employee feedback. Whether it is for your office or your home network, properly configuring a firewall benefits video conferencing.

Continue reading →
Reading Time: 4 minutes

osTicket is a free, open-sourced, and web-based customer support platform. In this article, we will show you how to install and configure the support ticket system osTicket on CentOS 7. While this guide will cover installation for unmanaged servers, Liquid Web’s fully managed servers with cPanel, Plesk, or InterWorx control panels allow for a one-click installation of osTicket.

Continue reading →
Reading Time: 6 minutes

What is Grafana?

Grafana is a data visualization and monitoring tool written in Typescript (frontend) and Go (backend) that allows users to create and edit both log and data graphs and create metrics. Used in conjunction with time series databases such as InfluxDB, Prometheus, Elasticsearch, Grafana can use plugins as templates and ready-made graphs and metrics.

Continue reading →
Reading Time: 4 minutes

The security of your network is of the highest priority, and an attack on your network could cost your business thousands, or even millions, of dollars. An intrusion detection system is one such system that can be used to monitor your network and receive alerts when suspicious activity is detected. In this article, we will explain what an intrusion detection system is and how it works.

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434