How to Install Webmin in Ubuntu

Ubuntu is the most popular desktop Linux solution, and because of this, many system administrators have become comfortable using it even on the server. Ubuntu does offer a server edition, and it is just as powerful and useful as any of the other Linux server distributions. This brief guide will explain how to install Webmin, […]

How to Create an Apache Virtual Host in Webmin

Apache HTTP Server can run in a single instance, one host per server, or as multiple virtual hosts, allowing you to have several websites. Manually setting up virtual hosts can be a bit of a pain, and paying for a commercial control panel may not be in your budget. With the free and open source […]

How to Connect to a Virtualbox VM Via SSH (Part 2)

Continued from Part 1. Next, you need to configure Virtualbox to appear on your network. You can do this by using a second virtual network device. Do the following:

Click File…Preferences
Choose “Network” and add a new device if one is not already present by click the green plus.
You should then have a device called vboxnet0 or […]

How to Use SFTP to Transfer Files

One of the oldest methods for transferring files from your computer to your server is called FTP (file transfer protocol). Unfortunately, this method is not secure, and if you need to transfer sensitive data and also protect your username and password, you should use a method that provides better security. SFTP is one option.
Most modern […]

Back to Basics #13: Basic DNS Zone Editing

DNS is one of the most important features of your server. It is what connects your server’s true identity, its IP address, to its human-readable name, also known as its domain name. In order to add domains, sub-domains, or mail server addresses, you need to edit DNS zone entries for your domains. Using a web-based […]

How Useful Is IP Address Information for Security?

When bad guys start attacking your server, one of the first things you might try to stop it is to block their IP addresses. In some instances, this works perfectly and will remove your problem quite thoroughly; however, it is not always effective. Therefore, it is important to know when it is useful to block […]

Steps to Take When Your Server Is Unresponsive

The day has finally arrived. You feared it would come and tried to prepare for it, but now that it is here, you are frozen, not sure what to do. That moment when you go to your website and realize it is offline or, even worse, get a call from a client complaining about down […]

Dedicated Server Terminology: Part 1

When you are new to working with dedicated servers or simply a business person trying to understand what your technology consultant is always talking about, much of the terminology associated with dedicated servers can be overwhelming. For that reason, we have put together a multi-part series of posts covering numerous server topics, along with […]

Connecting to MySQL from a Remote Location

The most common way to work with and manage MySQL is directly, using the command line or a web-based tool such as phpMyAdmin. ¬†If, however, you have more than one database server or need to do routine complex tasks, the former may be too tedious, and the latter may be too simple. ¬†Another possible reason […]

How Many IP Addresses Do I Need?

As you may have heard, there are a finite number of IP addresses available to Internet Service Providers (ISP). Once they are all used up, the only way to get more is to reassign them. In technical terms, the limited number of IP addresses refers to the IPv4 address space, while there is […]

The Value of SPF Records

SPF stands for Sender Policy Framework, and it is the standard established in RFC 4408. Essentially, SPF validates emails sent to a mail server to determine if a message is spam. One of the biggest problems faced by ISPs trying to fight spam is the spoofing of IP addresses and domains. In […]

A Quick Guide to DNS Lookup

DNS lookup is a good tool for general domain inquiries, server testing, and for following security leads. It is easy to do, and most Linux and Unix dedicated servers come with the commands you need. All you have to do is log on via SSH and get started.
The first command you can use […]

How to Block IP Addresses from Your Server

As we have stressed in earlier posts at Dedicated Server School, regularly checking Linux server log files is a crucial part of server management. Knowing what is going on in your logs is a great way to detect attempts to thwart your security and come up with early prevention methods. The question you […]

What is a Brute Force Attack?

Server security can be complex and time consuming. Therefore, even if you are not responsible for your server’s security, it is a good idea to know security terminology. A brute force attack occurs when a hacker attempts to gain access to a dedicated server or VPS using a standard login (SSH, mail server, […]

Common Extra Dedicated Server Features

When you lease an unmanaged dedicated server, it is almost like purchasing a bare-bones computer. You will get many of the essentials like the necessary hardware, operating system, and even the network connection, but often you will not get much else. Depending on the web host, you will need to install extra software […]

What is

Work with a dedicated server long enough and you are bound to see this rather odd-looking IP address. Do not panic, and do not start worrying that someone has hacked your brand new server. Most importantly of all, do not, under any circumstances, attempt to block this address.
For all intents and purposes, […]

DNS Records and Their Meanings

DNS or Domain Name System gives the Internet its identity. Every website URL and email address is linked to an IP address, and DNS is the system that translates the IP into a domain.
When you setup DNS zone records on your server, there are various types you will encounter:
A – An A record is […]