What is a DDoS attack?

Viewer Rating [Total: 3   Average: 4.7/5]You must sign in to voteA distributed denial of service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Historically, DoS (Denial of Service) attacks were a primary method for … Read more

MySQL Database Connection from Host to Guest Virtual Machine

MySQL Database

Viewer Rating [Total: 3   Average: 5/5]You must sign in to voteMySQL is a relational database management system which is popularly used in web applications and other light-weight software systems. In this article, we shall walk through the process of connecting to a MySQL database server running on a guest operating system inside a virtual machine. Install MySQL … Read more

LEMP Stack Setup Guide with Firewall and FTP Configuration

Viewer Rating [Total: 2   Average: 5/5]You must sign in to voteThe Complete LEMP Stack Setup Guide For Beginners (Download PDF) LEMP Stack Setup L – Linux (Ubuntu 18.0.4 LTS) E – NGINX (NGINX 1.14.0) M – MySQL (MySQL 14.14 Distribution 5.7.29) P – PHP (PHP7.2) Pre-requisites 1 VPS Server: 4 GB RAM, 2 vCPU (AWS), 100 GB … Read more

Different Types of Blockchain

Viewer Rating [Total: 5   Average: 5/5]You must sign in to voteIn the previous article we learned briefly about Blockchain, how it works and some of its applications. If you haven’t read it yet, read it here: Blockchain – A Brief Introduction Lets dive into three major types of Blockchain. Historically, Blockchain started as a public permission-less technology … Read more

What is CI/CD? Continuous Integration, Delivery, and Deployment

Viewer Rating [Total: 2   Average: 5/5]You must sign in to voteIntroduction Developing and releasing software can be a complicated process, especially as applications, teams, and deployment infrastructure grow in complexity themselves. Often, challenges become more pronounced as projects grow. To develop, test, and release software in a quick and consistent way, developers and organizations have created three … Read more

Top 10 ways to secure your website from hackers and spammers

Viewer Rating [Total: 4   Average: 5/5]You must sign in to voteIn today’s world, a website is an essential and, sometimes, the most important component of any business, organization, community or group. Websites range from small sites owned by individuals to large enterprise domains and e-commerce platforms dealing with sensitive customer and commercial data. Whatever be the size … Read more

Firewall Security

Viewer Rating [Total: 4   Average: 4.5/5]You must sign in to voteA firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. Firewalls are often categorized as either network … Read more

How to drive traffic to a website, blog or online store?

Viewer Rating [Total: 4   Average: 5/5]You must sign in to voteA website, blog or online store (e-commerce) is a great way to establish online presence for a company, organization, community or individual. In today’s ever changing business scenario, a website or blog serves as an online identity and promotes brand awareness and visibility. It also serves as … Read more

Internet Protocol (IP) Address

Viewer Rating [Total: 5   Average: 4.4/5]You must sign in to voteAn Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines … Read more

Blockchain – A Brief Introduction

Viewer Rating [Total: 6   Average: 4.7/5]You must sign in to voteWhat is Blockchain? In simple terms, a Blockchain can be described as an append-only transaction ledger. What that means is that the ledger can be written onto with new information, but the previous information, stored in blocks, cannot be edited, adjusted or changed. This is accomplished by … Read more