Viewer Rating [Total: 2 Average: 5/5]A distributed denial of service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Historically, DoS (Denial of Service) attacks were a primary method for disrupting computer systems on a … Read more What is a DDoS attack?
Viewer Rating [Total: 3 Average: 5/5]MySQL is a relational database management system which is popularly used in web applications and other light-weight software systems. In this article, we shall walk through the process of connecting to a MySQL database server running on a guest operating system inside a virtual machine. Install MySQL Workbench on the host machine … Read more MySQL Database Connection from Host to Guest Virtual Machine
Viewer Rating [Total: 2 Average: 5/5]The Complete LEMP Stack Setup Guide For Beginners (Download PDF) LEMP Stack Setup L – Linux (Ubuntu 18.0.4 LTS) E – NGINX (NGINX 1.14.0) M – MySQL (MySQL 14.14 Distribution 5.7.29) P – PHP (PHP7.2) Pre-requisites 1 VPS Server: 4 GB RAM, 2 vCPU (AWS), 100 GB Hard Disk OR 1 Virtual … Read more LEMP Stack Setup Guide with Firewall and FTP Configuration
Viewer Rating [Total: 5 Average: 5/5]In the previous article we learned briefly about Blockchain, how it works and some of its applications. If you haven’t read it yet, read it here: Blockchain – A Brief Introduction Lets dive into three major types of Blockchain. Historically, Blockchain started as a public permission-less technology when it was used for … Read more Different Types of Blockchain
Viewer Rating [Total: 2 Average: 5/5]Introduction Developing and releasing software can be a complicated process, especially as applications, teams, and deployment infrastructure grow in complexity themselves. Often, challenges become more pronounced as projects grow. To develop, test, and release software in a quick and consistent way, developers and organizations have created three related but distinct strategies to … Read more What is CI/CD? Continuous Integration, Delivery, and Deployment
Viewer Rating [Total: 4 Average: 5/5]In today’s world, a website is an essential and, sometimes, the most important component of any business, organization, community or group. Websites range from small sites owned by individuals to large enterprise domains and e-commerce platforms dealing with sensitive customer and commercial data. Whatever be the size of a website, security is … Read more Top 10 ways to secure your website from hackers and spammers
Viewer Rating [Total: 4 Average: 4.5/5]A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. Firewalls are often categorized as either network firewalls or host-based firewalls. Network … Read more Firewall Security
Viewer Rating [Total: 4 Average: 5/5]A website, blog or online store (e-commerce) is a great way to establish online presence for a company, organization, community or individual. In today’s ever changing business scenario, a website or blog serves as an online identity and promotes brand awareness and visibility. It also serves as a means to drive sales … Read more How to drive traffic to a website, blog or online store?
Viewer Rating [Total: 5 Average: 4.4/5]An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a … Read more Internet Protocol (IP) Address
Viewer Rating [Total: 6 Average: 4.7/5]What is Blockchain? In simple terms, a Blockchain can be described as an append-only transaction ledger. What that means is that the ledger can be written onto with new information, but the previous information, stored in blocks, cannot be edited, adjusted or changed. This is accomplished by using cryptography to link the … Read more Blockchain – A Brief Introduction