Tag: Security

Enhance the security of your server by reading through our easy to follow tutorials. From installing firewalls to auto-renewing SSLs, our expansive library is sure to be your bookmark favorite.

Reading Time: 7 minutes

UFW is the acronym for the Uncomplicated Firewall application used to administer your firewall rules on Ubuntu, Debian, and Arch Linux. As you proactively manage your firewall to avoid cyberattacks, blocking internet protocol (IP) addresses or whitelisting only those IPs allowed are two different firewall management approaches that can assist you. Regardless of the approach, all system administrators want to manage the incoming network traffic and firewall security to stop bad actors with harmful intentions.

Continue reading →
Reading Time: 8 minutes

In today's ever-changing cybersecurity landscape, protecting your server from potential attackers is critical. AlmaLinux, a stable and community-supported Linux distribution, serves as a solid base for hosting services. However, proactive measures must be made to harden the server's defenses, and Fail2Ban is one such vital tool for this purpose.

Continue reading →
Reading Time: 7 minutes

In this article we will examine how to integrate a Bitwarden instance with the Cloudflare Access product from Cloudflare, Inc. Adding an additional degree of security and control is typically required for this integration to communicate with the Bitwarden service for password management.

Continue reading →
Reading Time: 7 minutes

Kali Linux is an open-source Debian-derived Linux distribution maintained by Offensive Security. Devon Kearns and Mati Aharoni developed it. It was created explicitly for network analysts, penetration testers, or anyone in the cybersecurity field with a requirement for a very detailed scope of effort — including forensics analysis.

Continue reading →
Reading Time: 3 minutes

Liquid Web’s Cloud has a robust Application Programming Interface (API) that allows for accessing your account from outside the my.liquidweb.com interface. For example, the API can be used to manage and integrate many things directly into your cloud infrastructure. Ranging from the Liquid Web Command Line Interface (LW CLI) utility, our Terraform infrastructure-as-code (IaC) provider, to the Web Host Manager Complete Solution (WHMCS), — the list is endless. 

Continue reading →
Reading Time: 11 minutes

Many options are available when considering which operating system (OS) to use for web hosting. In that context, a popular Linux distribution is often brought up. So, what is CentOS exactly in the world of Linux OSs? The Community Enterprise Operating System (CentOS) is an open-source operating system centered around Red Hat Enterprise Linux (RHEL) source code.

Continue reading →
Reading Time: 8 minutes

If you're a web developer, you've most likely heard about Git, GitHub, DevOps, and GitOps. While DevOps and GitOps are similar approaches to improving the software development process, GitOps is the more modern pathway used today. As companies grow and their software teams expand, they must control their software development while improving efficiency and workflow. But, getting down to brass tacks, what is GitOps really? Let's uncover all that is involved with it.

Continue reading →
Reading Time: 5 minutes

MariaDB is a well-known, open-source relational database. The same developers involved with MySQL created MariaDB and promised to keep it open source. It is included in most cloud services and is the default in most Linux variants. It is built on performance, stability, and openness principles,. Furthermore, the MariaDB Foundation guarantees that contributions will be accepted based on technical merit. Your consistent upgrading of MariaDB versions to stay current will ensure you are using the best features in the database platform.

Continue reading →
Reading Time: 5 minutes

Since it was created, WordPress has always had a way to communicate with your website remotely — including different blogging platforms and desktop clients — in order to interact with it. As one of the early software platforms involved, the XML-RPC API system is comprised of the Remote Procedure Call (RPC) protocol and the Extensible Markup Language (XML) for encoding its calls with the Hypertext Transfer Protocol (HTTP) used as the transport protocol.

Continue reading →
Reading Time: 9 minutes

Remote Desktop Protocol (RDP) is the easiest and most common method for managing a Windows server remotely. RDP is a type of service that enables users to remotely access and configure a Windows server or a computer from anywhere in the world. It provides a convenient way to work on a remote system as if you were physically present at the machine. RDP is commonly used by businesses and individuals for remote administration, technical support, and telecommuting.

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434