The Benefits of SSH Tunneling

SSH tunneling is a method of connection that, as the name implies, tunnels your information stream through SSH. The result is an encrypted and secure transaction, even if the standard connection method itself is not normally secure. Many system administrators may use SSH tunneling for file transfer, database management and many other tasks.
The benefits […]

Can One Virtual Machine Compromise the Security of Another?

One of the frequently mentioned benefits of VPS hosting is that it is more secure than shared hosting because your account is walled off from other accounts, allowing them to function as separate servers. Virtual private servers and virtualization in general are generally thought to be secure. So, can one virtual machine compromise the security […]

Obsolete Networking Apps You Should Never Use

Server management is a constantly evolving science. What was once perfectly acceptable technology for a dedicated server may now be considered obsolete. Such is the case with four technologies you should probably avoid on a server you intend to use for hosting websites.
FTP – This is one technology that is still widely used but […]

Is Linux the Best for Web Servers?

Linux is a free and open source kernel that powers numerous operating systems (often called “distributions”). Many system administrators have long regarded Linux as the best option for powering web-facing dedicated servers and virtual private servers. There are, however, many other options. So, what makes Linux the best, or is it even truly the best […]

How to Securely Download a File from Your Server

Downloading a file from your server should not be tricky. If it is a web-facing file, you can usually download it with your web browser. If it is not, you could use FTP. The problem with both of these options, FTP and HTTP, is that neither is truly secure. If you need to download a […]

How Colocation Can Save Businesses Money

In these tough economic times, businesses are looking for ways to save money anywhere they can find them. The rising costs of power, infrastructure, and employment makes it difficult for some companies to sustain their own data centers. Because of this, many of them have turned to colocation as a money-saving solution.
Colocation simply means […]

Back to the Basics #4: Web Server Software

As we continue our overview of the very basics of dedicated server hosting, it is appropriate at this time to look at web servers. Dedicated servers have a wide variety of uses, from application hosting to gaming, but web hosting is one of the most prominent. As the entertainment and business worlds become more integrated […]

Is Your Server a Tool for Cyber-Criminals?

Protecting your dedicated server from cyber-attacks is always a critical part of system security. You have, after all, invested time and money into protecting your websites and the websites of any clients you might have. Nevertheless, you should not assume that everything is fine with your server simply because it appears to be functioning. It […]

Server End of Year Tasks 2: Scan for Vulnerabilities

As the end of the year approaches, you have probably fallen behind on some of your routine security checks. The holiday season is a busy time for hackers who try to exploit the increased online user activity, especially the activity of holiday shoppers. Sometimes security can cost you money, so it is a good idea […]

How to Enable SSL in Dovecot Mail Server

Dovecot is a free and open source POP3 and IMAP mail system that gives your server’s users access to their email. Many server installations include it out of the box as the default mail box agent, and most use it in conjunction with another mail delivery system.
Dovecot has some security features that may not be […]

5 Server Terms You Should Know

As you embark on the exciting journey that is your dedicated server, you will encounter numerous slogans, terms, phrases, and acronyms. Some are completely relevant and important for you to know.  Others are just thrown in to confuse you. Here are five you should definitely know.
1. Name server – This is the system that will […]

For Backups Rsync Beats FTP

When you decide to backup your server (hopefully sooner than later), you will need to choose a transfer method.  Unless your backup device is physically attached to your server, that transfer method will involve a network or remote Internet connection.  FTP is a common method of file transfer that many people use for their websites, […]

Backup Important Server Files with Rsync

Backing up your dedicated server may be the single most important thing you ever do. Your clients, customers, users, or whatever you call them depend on you to keep their data safe. There are several free backup tools you may choose and plenty of paid backup service options, but one free tool that is definitely […]

How Important Are Web Standards?

System administrators typically look at web standards as an issue best left to web designers and developers, but it is an issue you should definitely consider, especially if you are running a business.
Web standards, established by the World Wide Web Consortium (W3C), determine the best coding practices for HTML, CSS, and other web technology.  This […]

Advice to New Dedicated Server Admins

It is easy to make the decision to purchase or lease a dedicated server, but that does not mean you will automatically know what should and should not do with it once you have it.
I can remember being a beginner and thinking I knew quite a bit about running servers […]

OpenStack, Open Source Cloud Computing

One of the fears some system administrators have expressed regarding cloud computing is that it can potentially lock your data into proprietary software, and that is compounded by having that software hosted remotely. You are essentially trusting all of your data and applications to a service provider that may or may not be around […]

How to Setup an SSH Key

An SSH key is a highly encrypted code that allows you to connect from one server to another, without having to send the password over the network. Because it is encoded, there is less of a chance that hackers will be able to snatch your password and gain unlawful access to your server.
To begin […]

Using FTP from the Linux Command Line

Normally, FTP involves communication between your home or business computer and your server. Therefore, you probably use a graphical FTP program to handle all file transfers. In some instances, however, you will need to transfer files from your server to another server. For that, you will need to login to the second […]

SSH Security Tips Part 2

To continue our series on SSH security, we should take a look at more options that can be set in ssh_config. Remember, SSH is one of the most secure methods of communicating with your server, but it needs to be configured correctly to provide the best security.
1. Timeout interval – Sometimes, users will log […]

Secure File Transfer with SCP

Under normal circumstances, you would send files to a from your dedicated server using a graphical ftp or sftp program. In some situations, however, you need to use the command line. One particular situation that calls for command-line file transfer is when you are sending data to a another server, such as a […]