LEMP Stack Setup Guide with Firewall and FTP Configuration

Viewer Rating[Total: 0   Average: 0/5]You must sign in to voteThe Complete LEMP Stack Setup Guide For Beginners (Download PDF) LEMP Stack Setup L – Linux (Ubuntu 18.0.4 LTS) E – NGINX (NGINX 1.14.0) M – MySQL (MySQL 14.14 Distribution 5.7.29) P – PHP (PHP7.2) Pre-requisites 1 VPS Server: 4 GB RAM, 2 vCPU (AWS), 100 GB Hard … Read more LEMP Stack Setup Guide with Firewall and FTP Configuration

Different Types of Blockchain

Viewer Rating[Total: 5   Average: 5/5]You must sign in to voteIn the previous article we learned briefly about Blockchain, how it works and some of its applications. If you haven’t read it yet, read it here: Blockchain – A Brief Introduction Lets dive into three major types of Blockchain. Historically, Blockchain started as a public permission-less technology when … Read more Different Types of Blockchain

What is CI/CD? Continuous Integration, Delivery, and Deployment

Viewer Rating[Total: 2   Average: 5/5]You must sign in to voteIntroduction Developing and releasing software can be a complicated process, especially as applications, teams, and deployment infrastructure grow in complexity themselves. Often, challenges become more pronounced as projects grow. To develop, test, and release software in a quick and consistent way, developers and organizations have created three related … Read more What is CI/CD? Continuous Integration, Delivery, and Deployment

Top 10 ways to secure your website from hackers and spammers

Viewer Rating[Total: 4   Average: 5/5]You must sign in to voteIn today’s world, a website is an essential and, sometimes, the most important component of any business, organization, community or group. Websites range from small sites owned by individuals to large enterprise domains and e-commerce platforms dealing with sensitive customer and commercial data. Whatever be the size of … Read more Top 10 ways to secure your website from hackers and spammers

Firewall Security

Viewer Rating[Total: 4   Average: 4.5/5]You must sign in to voteA firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. Firewalls are often categorized as either network firewalls … Read more Firewall Security

How to drive traffic to a website, blog or online store?

Viewer Rating[Total: 4   Average: 5/5]You must sign in to voteA website, blog or online store (e-commerce) is a great way to establish online presence for a company, organization, community or individual. In today’s ever changing business scenario, a website or blog serves as an online identity and promotes brand awareness and visibility. It also serves as a … Read more How to drive traffic to a website, blog or online store?

Internet Protocol (IP) Address

Viewer Rating[Total: 5   Average: 4.4/5]You must sign in to voteAn Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an … Read more Internet Protocol (IP) Address

Blockchain – A Brief Introduction

Viewer Rating[Total: 6   Average: 4.7/5]You must sign in to voteWhat is Blockchain? In simple terms, a Blockchain can be described as an append-only transaction ledger. What that means is that the ledger can be written onto with new information, but the previous information, stored in blocks, cannot be edited, adjusted or changed. This is accomplished by using … Read more Blockchain – A Brief Introduction