firewall featured image blog post

Configuring a Firewall with UFW on Ubuntu 18.04

A firewall is one of the core components of securing a system. It’s responsible for managing the incoming and outgoing connections over the network. It’s the primary line of defense for your servers and data. This is why it’s paramount to have a well-configured firewall. In this guide, we will walk you through the steps of setting up a firewall …

Ruby PaaS featured image

Exploring CloudSigma PaaS: How to Utilize Ruby PaaS Hosting Services?

What is Ruby? Ruby is an open-source programming language that is well known for having one of the most natural and easy-to-read syntaxes. This object-oriented programming language combines the best features of other languages to make a simple yet rewarding approach a possibility. In addition to its object-oriented nature, Ruby also offers features such as operator overloading, iterators and closures, …

SSH overview

SSH Overview – SSH Servers, Clients, and Keys

When it comes to remote computing, SSH is one of the most popular and secure protocols. SSH is a cryptographic network protocol that establishes a secure connection with remote devices. Upon connecting to a remote device, a user can run commands on the remote shell. SSH is most common among network and system administrators. This cheat sheet-style guide demonstrates an …

Wordpress Cloud Hosting featured image

Why Should You Turn to WordPress Cloud Hosting for Your Website?

Gone are the days when cloud computing used to be nothing more than just a buzzword. In fact, it has become a necessity if a company wants to keep up with its competitors and focus on developing its business. If you are currently paying a third-party provider for web hosting services, it is high time for you to seriously consider …

CentOS server configuration featured image

Performing Server Setup Using CentOS 8

Introduction In this guide, we are going to explore how exactly you can go about setting up your server when using CentOS 8. There is a configuration process that you have to follow. We will divide the configuration up into five individual steps. You will be able to perform server setup easily following these simple steps. Doing so will strengthen …

SSL Certificate featured image

Installing an SSL Certificate From a Commercial Certificate Authority: A Comprehensive Guide

Introduction SSL certificates are tools that enable you to make your server more secure. These data files make the connections between a server and a browser safer. They are the difference between an HTTP and an HTTPS website. The way an SSL certificate works is that it encrypts your data stream, vets out the traffic, and verifies user identities. It …

Share Data Between Docker Container and Host featured image

How To Share Data Between a Docker Container and a Host

Introduction Generally, Docker containers only run for a certain period of time – the time it takes to run the command. The data that is available inside the container can only be accessed from within the container during the runtime. Docker volumes can be used for accessing the files easily and storing them for a longer period. For example, if …

How-To-Setup-a-Firewall-with-UFW-on-an-Ubuntu-and-Debian-Cloud-Server-01

Setting up a UFW on Ubuntu and Debian Cloud Server

Introduction We all know that computer security is essential for protecting your data. If a hacker was to find their way into your server, they can cause some serious damage. To make sure this doesn’t happen, you need to employ the appropriate security measures. The first line of defense that any incoming threat would encounter in a safeguarded system would …

Iptables Firewall featured image

Configuring an Iptables Firewall: Basic Rules and Commands

Introduction Iptables​ is a command-line ​firewall ​utility. This means that it is software that allows you to configure a firewall on your system. It is typically available by default on ​Linux​ systems. In this guide, we will ​discuss some of the common rules and commands that go with the iptables​ firewall. Whenever a connection tries to establish itself with your …

Netcat utility featured image

Netcat Utility on Linux: Testing TCP/UDP Connections on a VPS with Netcat

Introduction One of the biggest advantages of using Linux is the plethora of helpful utilities it provides. The in-program features are usually sufficient for most programmers to do their work. This means that most of the time, you will not need to download external programs and software. The built-in tools will provide you enough utility. Among these helpful features is …

manage multiple accounts

Find your favorite cloud hosting platform now on Mist

Cloudsigma has partnered with the open-source multi-cloud management platform Mist to provide users with the ease to manage multiple accounts across regions from a single window. Further, existing Mist users can diversify their multi-cloud and hybrid setups to include the reliability and ease of CloudSigma’s infrastructure. We are currently supporting the following operations with Mist: Get the list of the …

Relational Database Management Systems Compared featured image

SQLite vs MySQL vs. PostgreSQL: Relational Database Management Systems Compared

Introduction Database management tools are mostly used by the relational data model. This model organizes data into tables consisting of columns and rows. While this model remains dominant in terms of storing and managing worldwide data, there are other data models such as NoSQL and NewSQL out there. In this tutorial we will delve into three of the most widely …