Tag: VPN

Reading Time: 4 minutes

As administrators for many of our VPS servers and Dedicated servers, we may find ourselves needing to do certain things while on the go. We may also not have a laptop or PC within reach. But one thing most of us have at all times is a cell phone. Whether we have an Android or an iPhone, most of us do possess a smartphone. One thing great about these smartphones is their constant connection to the Internet. Having that constant connection makes it simple to use various apps that assist with admin tasks through our smartphones. Here is a list of five applications available both on iPhone and Android. If you are interested in checking them out, click on your phone’s type next to the application name. You can also search for these applications by name in your smartphone’s app store.

Continue reading →
Reading Time: 5 minutes
HIPAA Compliance

In this guide, we outline the essential requirements for HIPAA compliant servers and how Liquid Web helps fulfill these necessities.

Continue reading →

How to Use IPMI

Posted on by Noti Peppas | Updated:
Reading Time: 4 minutes

IPMI (Intelligent Platform Management Interface) is a great way to manage your server remotely. Having IPMI combined with a Liquid Web VPN is similar to having a remote Kernel-based Virtual Machine (KVM) attached to your server.You’ll be able to perform actions remotely which traditionally accomplished when physically present at the machine. This process includes viewing the startup process, changing BIOS settings, installing the OS, and even power cycling your server. This guide is intended to walk you through the IPMI web interface, and explain the various pages. If you need help accessing IPMI, try this Knowledge Base article instead!

Continue reading →
Reading Time: 5 minutes

HIPAA-Compliant Hosting provides a foundation for healthcare providers to build applications and services that comply with the Health Insurance Portability and Accountability Act (HIPAA) of 1996, which safeguards themselves and their client’s Personal Health Information (or PHI). Anyone who has access to PHI is required by law to follow these rules and regulations to protect the healthcare data's privacy in their charge. 

Continue reading →

What is a VPN Tunnel?

Posted on by Jerry Vasquez | Updated:
Reading Time: 2 minutes

VPN Tunnel Meaning

The terms VPN or VPN Tunnel are tossed around all over the internet these days, but what are they really?
Encryption?
Connectivity?
A method to hide online activity?
In this article, we review what a VPN tunnel is, and discuss some specifics of this familiar but often misunderstood technology.

Continue reading →

IPMI Dedicated VPN

Posted on by Helpful Humans of Liquid Web | Updated:
Category: Technical Support | Tags: IPMI, VPN
Reading Time: < 1 minute

IPMI stands for Intelligent Platform Management Interface. It is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities on the host systems CPU, firmware, and operating system. It defines a set of interfaces used by system administrators for out-of-band management of computer systems.

Continue reading →

What is IPMI?

Posted on by Helpful Humans of Liquid Web | Updated:
Category: Technical Support | Tags: IPMI, VPN
Reading Time: 3 minutes

Customer Access with IPMI

Remote Desktop Protocol or SSH shell are great for managing your server remotely. But what if you need to do something outside the operating system, like changing network settings or adjusting the BIOS? Those tools cannot help you because they depend on the server’s operating system to function. Wouldn’t it be great to have KVM-like console access to your remote server? With IPMI, you can get browser based access independent of the operating system.

Continue reading →

Log In to Storm VPN using ShrewVPN on Windows 8, 8.1 & 10

Posted on by David Singer | Updated:
Reading Time: 3 minutes

shrew.article.header
Using a VPN connection to manage your server can have a handful of benefits. Generally the most important benefit to using a VPN is security. When you connect to the Storm VPN your internet traffic to the Liquid Web network will be encrypted.

Continue reading →
Reading Time: 3 minutes

Liquid Web offers a free Virtual Private Network (VPN) user with every account. A VPN uses encryption to secure your computer’s connection to the Internet and guarantees that all of the data you’re sending and receiving to the Liquid Web network is secured from any potential prying third parties.

Continue reading →

How To: Log In To a Cisco VPN on Windows

Posted on by Patrick Hawkins | Updated:
Reading Time: < 1 minute

A Virtual Private Network (VPN) can be extremely useful when administering your servers, which is why Liquid Web offers a Cisco VPN with our firewalls. Logging in to the device can vary among operating systems. Here are some instructions for logging into a VPN from Windows systems:

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434