Currently Viewing: How to Guide

When you are running a dedicated server or VPS, it is unlikely that you are going to be the only user that needs to log into it. The chances are that there will be a team of users. While it’s easy to simply share the root password with all the users and have them all log in as the root user for access, this poses a number of potential security issues. Sharing passwords can allow an inexperienced user the ability to run dangerous commands on a system. Meaning that a mistake could become a time consuming problem, rather than a user’s annoyance. In this post we will look at ways  to manage Linux users.

Today we’re exploring LAMP. Nope, not the thing in the corner of your room providing decorative illumination, but the software stack comprising of Linux, Apache, MySQL (or increasingly MariaDB) and PHP (or Perl, or Python, etc). It’s tried and tested and used on a large quantity of web servers on the internet. 

Back in November, we showed you how to go about configuring a Minecraft server on a dedicated server or cloud VPS. For those who missed it, you can find it here and get your own Minecraft server experience started. This time, we’ll look at more details of how it’s running and offer a few advanced tips and tricks on configuring and managing the server.

In the previous part of our introduction to iptables, we looked over the functionality of iptables and how they worked. In this part we’ll take a look at the command structure and how to go about adding and removing rules from your firewall.

All Linux distributions ship with the iptables software firewall included as standard. This tool is a very capable and powerful firewall. As a consequence  in a number of instances people have taken to using it on separate servers in lieu of a hardware firewall for additional protection on their networks. Due to its prevalence, there are a number of tools available to both aid and ease configuring the iptables firewall. These range from alternate command line interfaces, to web based graphical user interfaces for remote configuration. In this article, we’ll be looking over the standard iptables commands and how you would use them.

A data center usually consists of many server racks; networking infrastructure to connect to the internet; electrical supply and generation systems to power it all and a cooling system to keep everything running at the right temperature.

At 100TB our team are specialists. We have significant server management experience and expertise to manage our data centers efficiently. How does that affect you? Well, we bring you and your business, enterprises or organization the very best hosting environment to help grow your business and satisfy your customers.

Previously we’ve looked at firewalls, what they are and why you should be using one.  There are multiple ways to implement firewalling on your server. Probably the most often used is the software firewall. This is an application that runs on a computer and inspects all the network traffic coming to and leaving the computer. The other option is to use a dedicated hardware or network firewall, this is a separate device that sits on the network in front of a server or group of servers and performs much the same task.

One of the recommended security tools that you use on your personal computer is a firewall. This is equally true for a dedicated server or virtual private server. A firewall is used to prevent unauthorized connections to or from your server. It does this by matching connections against a list of rules for what the firewall should allow or block.