Archive for February, 2013


3 More Ways to Save with Virtualization

In a previous post, we looked at some of the ways that virtualization can help you save money. It can help you maximize space usage, reduce power consumption, and reduce the amount of time you spend on provisioning and deployment. The following are three more ways virtualization help:

Application consolidation – In the […]

3 Levels of Linux Virtualization

When physical space is an issue but you have virtual space to spare, virtualization is a great way to consolidate multiple server instances into one machine. Linux is very flexible when it comes to virtualization and even has virtualization capabilities built into the kernel.
There are three levels of Linux virtualization that determine how the virtual […]

3 Types of Server Hardware

In some situations, the type of server hardware you use is the least of your concerns, but if you are setting up your own data center, you will need to decide which type of server you prefer. The three main types of servers are: towers, racks, and blades.
Towers – You probably recognize towers, as they […]

Government Compliance Abroad: Is Your Server Ready?

Once you have a web presence, just about anyone in any country can access your website. That means your dedicated server will be subjected to the laws and regulations of just about every country where you do business. You can, of course, limit the number of countries that have access, but if your goal is […]

How Important is the Green Data Center?

You have likely heard a lot of discussion and even commercial promotion about green data centers. These are data centers that have taken steps to make their facilities more environmentally friendly, reduce carbon emissions, and find better ways to run and cool their servers. How important is the concept of the green data center? Should […]

How to Free Up Space by Removing Unwanted Packages

On Debian-based systems, the APT package management system stores downloaded packages even after you have installed them and keeps the handy in case you want to reinstall without having to re-download. After a certain amount of time, you might decide you no longer need to keep these packages around, especially if they are taking up […]

What is a Child Process?

Although it may sound like something out of a parenting handbook or a psychological journal, the term child process actually has nothing to do with human development. If you run a Unix or Linux dedicated server, you have likely encountered child processes without even knowing it. Therefore, it is good to know what child processes […]

How to Remove MySQL Databases and Users

You may spend a good portion of any given day adding users and databases to your MySQL server, but you might not spend much time removing them, even after you or your users no longer need them. Nevertheless, it is very important to not leave unattended databases and users lying around for would-be attackers […]

Eradicate Malware with LMD

Worried about malware? No? You should be. Cyber criminals are always looking for new and creative ways to attack your server or user your dedicated server to attack others. There are plenty of prevention methods you can have in place, but you should also have a system for detecting malware that may have already made […]

Is it a Good Idea to Hack Your Server?

The word “hack” often brings up grim images of a shady individual sitting in a dark basement pounding away on a keyboard as he siphons money out of people’s bank accounts and funnels the funds to terrorist organizations. In reality, “hack” simply means a “solution to a problem” that is not necessarily uniform, standard, or […]

What is Ncurses?

Ncurses a program for POSIX-compliant operating systems (Linux, Unix, BSD, etc) that is designed to provide a text-based visual interface for a variety of tools. Essentially, programs that rely on ncurses can display GUI-like interfaces within a terminal emulator that support keyboard and even mouse navigation just as a true GUI program would.
Some of the […]

How to Monitor Your Server’s Memory Usage

One system resource that can quickly get away from you is memory. Every program needs memory, and some may take more than their fair share. Therefore, it is important to monitor memory usage to make sure your applications are behaving and also help you decide when it might be time to reallocate resources or even […]

Protect Your Server with Fail2ban

Monitoring your server is a great way to prevent cyber attacks and stop those that might be in progress. Unfortunately, you cannot always be present to monitor your server. Unless you are an android, you likely still require sleep. For those times when you cannot be be present, Fail2ban is an excellent friend to have.

An Introduction to Cloud Infrastructure: Part 1

Traditional data center infrastructure has always been expensive and costly to maintain. It required you to own or lease the facilities, purchase hardware, license software, and hire an IT staff to manage all of it. Some companies relied on IT outsourcing to handle some of the responsibilities, but ultimately, the capital cost and maintenance costs […]