Category: Tutorials
The Liquid Web knowledgebase provides information on thousands of topics surrounding every aspect of hosting, Linux, Windows, and countless other article types that help boost your Liquid Web experience!
Although Linux is considered a robust operating system with very few issues with applications, programs sometimes become unresponsive. When this happens, they can consume plenty of system resources or take down the entire system. Usually, these applications cannot be restarted automatically.
In this article, we will be discussing what it means to employ a “Managed Server” versus an “Unmanaged Server” and what the primary differences are. This article is written in response to ongoing questions we have received from clients regarding the types of resources, services, and capabilities that are included when a managed server is selected for use.
In this day and age, changing passwords regularly is essential to your internet security. Frequent updates prevent unwanted access to your accounts and sensitive data and keep you one step ahead of possible cyberattacks. By changing passwords regularly, you can stay one step ahead of potential cyberthreats and enhance your digital safety.
Blocking IP or whitelisting IP addresses with UFW
UFW is the acronym for the Uncomplicated Firewall application used to administer your firewall rules on Ubuntu, Debian, and Arch Linux. As you proactively manage your firewall to avoid cyberattacks, blocking internet protocol (IP) addresses or whitelisting only those IPs allowed are two different firewall management approaches that can assist you. Regardless of the approach, all system administrators want to manage the incoming network traffic and firewall security to stop bad actors with harmful intentions.
Fail2Ban install tutorial for Linux (AlmaLinux)
In today's ever-changing cybersecurity landscape, protecting your server from potential attackers is critical. AlmaLinux, a stable and community-supported Linux distribution, serves as a solid base for hosting services. However, proactive measures must be made to harden the server's defenses, and Fail2Ban is one such vital tool for this purpose.
Like an Apache virtual host, a NGINX virtual host (server block) allows you to host multiple domains or websites on your server. The configuration of NGINX virtual hosts — or server blocks as they are referred to on NGINX — will be covered in this article. The Linux distribution documented in our scenario discussed below will be AlmaLinux.
Integrating Cloudflare Access with a Bitwarden instance
In this article we will examine how to integrate a Bitwarden instance with the Cloudflare Access product from Cloudflare, Inc. Adding an additional degree of security and control is typically required for this integration to communicate with the Bitwarden service for password management.
This article will walk you through the Yarn installation process on AlmaLinux in simple steps. AlmaLinux provides a solid base for a wide range of development projects, and installing Yarn on this platform can help with project dependency management. We will also explore how Liquid Web products can help this installation by offering a reliable hosting environment and competent support.
Using LVM in Linux to manage storage devices
Logical volume management (LVM) is a powerful storage administration framework that abstracts the physical layout of storage devices by introducing logical volumes. Taking advantage of the Linux device mapper kernel driver, LVM offers a software version of a storage area network (SAN), allowing for more efficient and flexible storage utilization and management through dynamic resizing and storage allocation.
An NTP or Network Time Protocol server is a crucial component in networked environments that synchronizes computer and device clocks, ensuring accurate and consistent time for various operations. It obtains precise time information from reliable sources and distributes it to client devices, providing synchronized clocks across the network. This synchronization is vital for log accuracy, security protocols, coordination in distributed systems, and regulatory compliance.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.