LAMP Stack featured image

How To Install Linux, Apache, MySQL, PHP (LAMP) stack on CentOS 7

LAMP is an acronym of a very popular web stack – Linux, Apache, MySQL, PHP. All of the four components of LAMP are open-sourced and are suitable to deploy dynamic websites and web applications. In this tutorial,  we will walk you through setting up a cloud server with the LAMP stack. LAMP Stack: L – Linux L in LAMP stands for …

FirewallD featured image

Setting Up a Firewall with FirewallD on CentOS 7

Introduction Firewalld is a firewall management solution that is available to many Linux distributions. It serves as an interface to the iptables packet filter system provided by the Linux kernel. In this guide, you will learn how to configure a firewall for your server. We will also show you the basics of managing the firewall with the firewall-cmd administration tool. …

Locating files featured image

Locating Files on your Linux VPS System with Whereis, Which, Whatis, Readlink and Find

Introduction The Linux system is filе-bаѕеd. This means that when you work long еnоugh with it, уоu mау find уоurѕеlf not knowing where a сеrtаin filе rеѕidеѕ. Therefore, it will be useful to know how to quickly and efficiently locate the files you need at any given moment. This will increase your performance and save you a lot of time. …

OAuth featued image

OAuth 2: An Introduction and Basic Guidelines

What is OAuth 2? The IETF OAuth 2.0 is an authorization framework that aims to give third-party applications limited access to a given HTTP service. A good place to start when trying to learn about OAuth 2 is to go through its specifications. Thus,  you can maximize the functionality you get out of it. If you need to access certain …

Environmental and Shell Variables

How to Read and Set Environmental and Shell Variables on a Linux VPS

The majority of the tech community enjoys interacting with systems through the command-line interface (CMD) or shell. Generally, it makes their work easier. For instance, you can create a shell command that can execute several tasks automatically as opposed to having to click through several buttons of a GUI. When you launch a shell or CMD program, it compiles several …

SFTP featured image

How to Ensure Security While Transferring Files With The Help Of SFTP

When you need to transfer data and files between two computers, there are two protocols that can finish the job. Тhe typically used method is the FTP or the File Transfer Protocol. However, rising concerns over the security of data moved from one device to another have encouraged the use of SFTP. SFTP stands for Secure File Transfer Protocol. It …

iptables featured image

Listing and Deleting Iptables Firewall Rules

Iptables is the primary firewall that comes with most of the Linux distros by default. It’s responsible for handling network security. It works by comparing the data packets against a set of rules, instructing the system to accept, refuse, or forward a connection according to the rules. In this tutorial, we will show you how to list and delete rules, …

manage permissions in PostgreSQL featured image

How to Use Roles and Manage Permissions in PostgreSQL

PostgreSQL is an open-source DBMS which in turn uses SQL. It’s a very powerful tool that is used to manage applications and host web data on VPS. In this tutorial, you will learn how to manage permissions in PostgreSQL. It will help you to provide your application roles the required permissions. We will perform this tutorial using PostgreSQL on a …

DACH cloud market press release

CloudSigma Strengthens its Position on the German Cloud Market with New Partner EU-HUB Network

Frankfurt, Germany, November 2020 –CloudSigma is excited to announce a new partnership in the DACH region with Frankfurt-based Hightech Distributor EU-HUB Network. EU-HUB Network specializes in reselling innovative software and IT services developed in Europe to customers in the EU and more notably in Germany, Austria, Liechtenstein, and Switzerland.  Why Join Forces Partnering with EU-HUB Network further positions CloudSigma as a …

SSH keys

How To Use SSH to Connect to a Remote Server in Ubuntu

What is SSH? SSH means Secure Shell. With SSH you can access remote machines in a secure way since the connection is encrypted. With the ssh command from the Linux terminal, we can connect to remote Linux servers and work as if it were our computer. At the end of this tutorial, you should have a full understanding of how …

Manage systemd services featured image

Manage Systemd Services and Units with Systemctl

Introduction Sуѕtеmd is an init ѕуѕtеm аnd system mаnаgеr thаt has gained a lot of popularity recently. More than that, it is bесоming thе new ѕtаndаrd for Linux mасhinеѕ. Although thеrе are legitimate dоubtѕ аѕ tо whеthеr systemd iѕ аn imрrоvеmеnt оvеr traditional SуѕV initialization systems, most diѕtributiоnѕ have аlrеаdу switched tо ѕуѕtеmd, оr plan tо do so. In ѕhоrt, …