Bittorrent Sync

How to securely use BitTorrent Sync for backups

A while back I wrote a guest post on BitTorrent’s blog about how to use BitTorrent Sync as an alternative to cloud storage services, such as Dropbox and Box. As a result, this post is an expansion of that post that provides more clear step-by-step instructions on how to securely deploy BitTorrent Sync. Security notes First, since the focus of …

provisioning with CloudInit-feature img

An introduction to server provisioning with CloudInit

This month we announced a very exciting partnership with Canonical, the makers of Ubuntu. Above all, the main element in this partnership is the introduction of full CloudInit support between the CloudSigma cloud and Ubuntu. An introduction to CloudInit If you’re not familiar with CloudInit, it is the industry standard for bootstrapping cloud servers. To clarify,  if you are using …

Cloud Deployment

Five Tools You Need for Your Cloud Deployment

You have finally managed to get up and running with your application. It runs great. You’re happy and you’re customers are happy. One morning you wake up with an inbox full of angry customer emails and your Twitter feed full of complaints. While you were sleeping, something broke. You just didn’t know about it until this morning when you checked …

PaaS with Dokku

Build your own PaaS (with Dokku)

One of the most popular PaaS providers today is Heroku. Heroku, along with other PaaS providers like Engine Yard is loved by developers because it makes the deployment of a new application extremely fast and simple. It’s not hard that most developers would rather write code than setting up and troubleshoot servers. So it’s not hard to figure out why …

DDoS attacks protection from CloudSigma featured image

NTP Amplification Attacks, the latest DDoS weapon (and how to protect yourself from it)

During the last few months, we’ve seen an increased amount of NTP amplification attacks. It’s an attack technique, similar to the previous wave of DNS amplification attacks, mostly used by script kiddies (but also by black hats) to take sites/servers offline. The technique behind of the attack is pretty simple; using public NTP servers, the attacker sends a request and …

Virtual-machines-and-disk-expansion

Virtual machines and disk expansion

Disclaimer: Before we begin, we need to point out that there is always a risk of data loss when you are doing disk expansion. Hence, you should always back up your data before you begin. We do not assume any responsibility for data loss caused by this guide. It is up to you to take proper backups. One of the …