What is a DDoS attack?

Viewer RatingA distributed denial of service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Historically, DoS (Denial of Service) attacks were a primary method for disrupting computer systems on a network. DoS … Read more

MySQL Database Connection from Host to Guest Virtual Machine

MySQL Database

Viewer RatingMySQL is a relational database management system which is popularly used in web applications and other light-weight software systems. In this article, we shall walk through the process of connecting to a MySQL database server running on a guest operating system inside a virtual machine. Install MySQL Workbench on the host machine (Ubuntu 18.04 … Read more

LEMP Stack Setup Guide with Firewall and FTP Configuration

Viewer RatingThe Complete LEMP Stack Setup Guide For Beginners (Download PDF) LEMP Stack Setup L – Linux (Ubuntu 18.0.4 LTS) E – NGINX (NGINX 1.14.0) M – MySQL (MySQL 14.14 Distribution 5.7.29) P – PHP (PHP7.2) Pre-requisites 1 VPS Server: 4 GB RAM, 2 vCPU (AWS), 100 GB Hard Disk OR 1 Virtual Box machine: … Read more

Different Types of Blockchain

Viewer RatingIn the previous article we learned briefly about Blockchain, how it works and some of its applications. If you haven’t read it yet, read it here: Blockchain – A Brief Introduction Lets dive into three major types of Blockchain. Historically, Blockchain started as a public permission-less technology when it was used for powering Bitcoin. … Read more

What is CI/CD? Continuous Integration, Delivery, and Deployment

Viewer RatingIntroduction Developing and releasing software can be a complicated process, especially as applications, teams, and deployment infrastructure grow in complexity themselves. Often, challenges become more pronounced as projects grow. To develop, test, and release software in a quick and consistent way, developers and organizations have created three related but distinct strategies to manage and … Read more

Top 10 ways to secure your website from hackers and spammers

Viewer RatingIn today’s world, a website is an essential and, sometimes, the most important component of any business, organization, community or group. Websites range from small sites owned by individuals to large enterprise domains and e-commerce platforms dealing with sensitive customer and commercial data. Whatever be the size of a website, security is at the … Read more

Firewall Security

Viewer RatingA firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls filter … Read more

How to drive traffic to a website, blog or online store?

Viewer RatingA website, blog or online store (e-commerce) is a great way to establish online presence for a company, organization, community or individual. In today’s ever changing business scenario, a website or blog serves as an online identity and promotes brand awareness and visibility. It also serves as a means to drive sales of products … Read more

Internet Protocol (IP) Address

Viewer RatingAn Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. … Read more

Blockchain – A Brief Introduction

Viewer RatingWhat is Blockchain? In simple terms, a Blockchain can be described as an append-only transaction ledger. What that means is that the ledger can be written onto with new information, but the previous information, stored in blocks, cannot be edited, adjusted or changed. This is accomplished by using cryptography to link the contents of … Read more