A firewall is one of the core components of securing a system. It’s responsible for managing the incoming and outgoing connections over the network. It’s the primary line of defense for your servers and data. This is why it’s paramount to have a well-configured firewall. In this guide, we will walk you through the steps of setting up a firewall …
Exploring CloudSigma PaaS: How to Utilize Ruby PaaS Hosting Services?
What is Ruby? Ruby is an open-source programming language that is well known for having one of the most natural and easy-to-read syntaxes. This object-oriented programming language combines the best features of other languages to make a simple yet rewarding approach a possibility. In addition to its object-oriented nature, Ruby also offers features such as operator overloading, iterators and closures, …
SSH Overview – SSH Servers, Clients, and Keys
When it comes to remote computing, SSH is one of the most popular and secure protocols. SSH is a cryptographic network protocol that establishes a secure connection with remote devices. Upon connecting to a remote device, a user can run commands on the remote shell. SSH is most common among network and system administrators. This cheat sheet-style guide demonstrates an …
Why Should You Turn to WordPress Cloud Hosting for Your Website?
Gone are the days when cloud computing used to be nothing more than just a buzzword. In fact, it has become a necessity if a company wants to keep up with its competitors and focus on developing its business. If you are currently paying a third-party provider for web hosting services, it is high time for you to seriously consider …
Performing Server Setup Using CentOS 8
Introduction In this guide, we are going to explore how exactly you can go about setting up your server when using CentOS 8. There is a configuration process that you have to follow. We will divide the configuration up into five individual steps. You will be able to perform server setup easily following these simple steps. Doing so will strengthen …
Installing an SSL Certificate From a Commercial Certificate Authority: A Comprehensive Guide
Introduction SSL certificates are tools that enable you to make your server more secure. These data files make the connections between a server and a browser safer. They are the difference between an HTTP and an HTTPS website. The way an SSL certificate works is that it encrypts your data stream, vets out the traffic, and verifies user identities. It …
How To Share Data Between a Docker Container and a Host
Introduction Generally, Docker containers only run for a certain period of time – the time it takes to run the command. The data that is available inside the container can only be accessed from within the container during the runtime. Docker volumes can be used for accessing the files easily and storing them for a longer period. For example, if …
Setting up a UFW on Ubuntu and Debian Cloud Server
Introduction We all know that computer security is essential for protecting your data. If a hacker was to find their way into your server, they can cause some serious damage. To make sure this doesn’t happen, you need to employ the appropriate security measures. The first line of defense that any incoming threat would encounter in a safeguarded system would …
Configuring an Iptables Firewall: Basic Rules and Commands
Introduction Iptables is a command-line firewall utility. This means that it is software that allows you to configure a firewall on your system. It is typically available by default on Linux systems. In this guide, we will discuss some of the common rules and commands that go with the iptables firewall. Whenever a connection tries to establish itself with your …
Netcat Utility on Linux: Testing TCP/UDP Connections on a VPS with Netcat
Introduction One of the biggest advantages of using Linux is the plethora of helpful utilities it provides. The in-program features are usually sufficient for most programmers to do their work. This means that most of the time, you will not need to download external programs and software. The built-in tools will provide you enough utility. Among these helpful features is …
Find your favorite cloud hosting platform now on Mist
Cloudsigma has partnered with the open-source multi-cloud management platform Mist to provide users with the ease to manage multiple accounts across regions from a single window. Further, existing Mist users can diversify their multi-cloud and hybrid setups to include the reliability and ease of CloudSigma’s infrastructure. We are currently supporting the following operations with Mist: Get the list of the …
SQLite vs MySQL vs. PostgreSQL: Relational Database Management Systems Compared
Introduction Database management tools are mostly used by the relational data model. This model organizes data into tables consisting of columns and rows. While this model remains dominant in terms of storing and managing worldwide data, there are other data models such as NoSQL and NewSQL out there. In this tutorial we will delve into three of the most widely …