Tag: Security
Enhance the security of your server by reading through our easy to follow tutorials. From installing firewalls to auto-renewing SSLs, our expansive library is sure to be your bookmark favorite.
Creating a Liquid Web Cloud API Token in the my.liquidweb.com Interface
Liquid Web’s Cloud has a robust Application Programming Interface (API) that allows for accessing your account from outside the my.liquidweb.com interface. For example, the API can be used to manage and integrate many things directly into your cloud infrastructure. Ranging from the Liquid Web Command Line Interface (LW CLI) utility, our Terraform infrastructure-as-code (IaC) provider, to the Web Host Manager Complete Solution (WHMCS), — the list is endless.
What is CentOS? Everything You Need to Know
Many options are available when considering which operating system (OS) to use for web hosting. In that context, a popular Linux distribution is often brought up. So, what is CentOS exactly in the world of Linux OSs? The Community Enterprise Operating System (CentOS) is an open-source operating system centered around Red Hat Enterprise Linux (RHEL) source code.
What is GitOps?
If you're a web developer, you've most likely heard about Git, GitHub, DevOps, and GitOps. While DevOps and GitOps are similar approaches to improving the software development process, GitOps is the more modern pathway used today. As companies grow and their software teams expand, they must control their software development while improving efficiency and workflow. But, getting down to brass tacks, what is GitOps really? Let's uncover all that is involved with it.
How to Upgrade MariaDB on Linux (AlmaLinux)
MariaDB is a well-known, open-source relational database. The same developers involved with MySQL created MariaDB and promised to keep it open source. It is included in most cloud services and is the default in most Linux variants. It is built on performance, stability, and openness principles,. Furthermore, the MariaDB Foundation guarantees that contributions will be accepted based on technical merit. Your consistent upgrading of MariaDB versions to stay current will ensure you are using the best features in the database platform.
What is xmlrpc.php and Why Disable It?
Since it was created, WordPress has always had a way to communicate with your website remotely — including different blogging platforms and desktop clients — in order to interact with it. As one of the early software platforms involved, the XML-RPC API system is comprised of the Remote Procedure Call (RPC) protocol and the Extensible Markup Language (XML) for encoding its calls with the Hypertext Transfer Protocol (HTTP) used as the transport protocol.
Securing RDP by Changing Default RDP Port Numbers & More Tips
Remote Desktop Protocol (RDP) is the easiest and most common method for managing a Windows server remotely. RDP is a type of service that enables users to remotely access and configure a Windows server or a computer from anywhere in the world. It provides a convenient way to work on a remote system as if you were physically present at the machine. RDP is commonly used by businesses and individuals for remote administration, technical support, and telecommuting.
The open-source FTP server called ProFTPD has a name that is short for Pro FTP daemon.
Are you curious to read about and find the Server Name Indication (SNI) supporting details for you web hosting solution? SNI allows a web server to determine the domain name for which a particular secure incoming connection is intended outside of the page request itself. While that may not sound like much, its impact is quite significant.
How to Force HTTPS For Your Domain
When browsing the internet, users must be aware of the evolving technologies they use to browse webpages. Whether browsing the web for personal or business use, security becomes a concern when new technologies create unforeseen issues.
Best Practices for Firewall Rules
Basic Firewall Rules
In a firewall rule, the action component decides if it will permit or block traffic. It has an action-on-match feature. For example, if the traffic matches the components of a rule, then it will be permitted to connect to the network. It is essential to consider the potential security risks when modifying a firewall rule to avoid future issues. Following firewall rules best practices can help you maximize the effectiveness of your solution.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.