Choosing the Right Server Type image

Choosing the right type of hosting is a huge decision. Unfortunately, it can be a very difficult one. Hosting is generally divided into four major categories:

Shared Hosting Virtual Private Server Hosting Dedicated Server Hosting Cloud Hosting

The right hosting makes a huge difference in your… Read More

VENOM vulnerability image

There’s a new vulnerability creating a buzz in the IT industry – particularly with respect to virtual servers. It’s called the Virtualized Environment Neglected Operations Manipulation, but you probably know it as VENOM. This vulnerability is exposing sensitive data and compromising shared computing resources by exploiting the weaknesses in the… Read More

Developer's Guide to Server Response Codes image

 

When working online, you deal with servers. A lot. And sometimes it gets confusing – especially when server response codes come in to the picture. That’s why we’ve created this handy cheat sheet to help you keep them straight. As a developer, these… Read More

What is Colocation image

 

Colocation, or “colo” for short, is the act of placing servers in professional datacenters and letting them operate from within these DCs. These servers may be owned by the colo customer or leased from the datacenter. Because today’s DCs have such extensive and advanced resources, this… Read More

Importance of Server Location image

 

Datacenters exist the entire world over. Finding someone to host your website, email, application or anything else should never be a problem. Choosing the right partner, though, can be tricky. When it comes to finding the right server, there’s a lot on the line. Every… Read More

What is GIT image

 

Git is a wildly popular free distributed revision control system that enables developers to manage larger projects with greater efficiency – specifically projects that require multiple developers. Git was originally developed to run in the Linux Kernel development environment in 2005 with an emphasis on supporting… Read More

What is DNS image

 

Domain Name Servers, commonly called “DNS” for short, keep IP addresses organized and documented. IP addresses, comprised solely of numeral characters, are incredibly difficult for human users to remember, but they’re also necessary for the internet to locate and transfer data. To enable these users to… Read More

OSSEC Protection image

 

OSSEC is a popular host-based intrusion detection system (HIDS). One of the factors driving OSSEC’s popularity is that it is an open-source project, meaning that it’s available at no cost. Able to run on Windows, Linux, MacOS, Solaris, HP-UX and AIX, OSSEC is a HIDS that nearly… Read More

What is DDoS?

 

We’ve all been there – that moment when your server’s traffic figures begin to spike. The steady rise in volume for what can feel like days with no sign of slowing down. Phone calls start coming in – customers having problems with your website. The server’s load… Read More