What is a DDoS attack?

Viewer Rating A distributed denial of service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Historically, DoS (Denial of Service) attacks were a primary method for disrupting computer systems on a network. … Read more

MySQL Database Connection from Host to Guest Virtual Machine

MySQL Database

Viewer Rating MySQL is a relational database management system which is popularly used in web applications and other light-weight software systems. In this article, we shall walk through the process of connecting to a MySQL database server running on a guest operating system inside a virtual machine. Install MySQL Workbench on the host machine (Ubuntu … Read more

LEMP Stack Setup Guide with Firewall and FTP Configuration

Viewer Rating The Complete LEMP Stack Setup Guide For Beginners (Download PDF) LEMP Stack Setup L – Linux (Ubuntu 18.0.4 LTS) E – NGINX (NGINX 1.14.0) M – MySQL (MySQL 14.14 Distribution 5.7.29) P – PHP (PHP7.2) Pre-requisites 1 VPS Server: 4 GB RAM, 2 vCPU (AWS), 100 GB Hard Disk OR 1 Virtual Box … Read more

Different Types of Blockchain

Viewer Rating In the previous article we learned briefly about Blockchain, how it works and some of its applications. If you haven’t read it yet, read it here: Blockchain – A Brief Introduction Lets dive into three major types of Blockchain. Historically, Blockchain started as a public permission-less technology when it was used for powering … Read more

What is CI/CD? Continuous Integration, Delivery, and Deployment

Viewer Rating Introduction Developing and releasing software can be a complicated process, especially as applications, teams, and deployment infrastructure grow in complexity themselves. Often, challenges become more pronounced as projects grow. To develop, test, and release software in a quick and consistent way, developers and organizations have created three related but distinct strategies to manage … Read more

Top 10 ways to secure your website from hackers and spammers

Viewer Rating In today’s world, a website is an essential and, sometimes, the most important component of any business, organization, community or group. Websites range from small sites owned by individuals to large enterprise domains and e-commerce platforms dealing with sensitive customer and commercial data. Whatever be the size of a website, security is at … Read more

Firewall Security

Viewer Rating A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls … Read more

How to drive traffic to a website, blog or online store?

Viewer Rating A website, blog or online store (e-commerce) is a great way to establish online presence for a company, organization, community or individual. In today’s ever changing business scenario, a website or blog serves as an online identity and promotes brand awareness and visibility. It also serves as a means to drive sales of … Read more

Internet Protocol (IP) Address

Viewer Rating An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit … Read more

Blockchain – A Brief Introduction

Viewer Rating What is Blockchain? In simple terms, a Blockchain can be described as an append-only transaction ledger. What that means is that the ledger can be written onto with new information, but the previous information, stored in blocks, cannot be edited, adjusted or changed. This is accomplished by using cryptography to link the contents … Read more