A web server will typically run as a daemon (system service) under a single application process. That initial process will then spawn child processes that handle virtual servers, individual websites, or even individual requests. As such, a web server could spawn hundreds or even thousands of processes per day, per hour, or even […]
In a previous post, we highlighted some crucial security measures you should adopt to keep your dedicated server safe. What follows are five more tips that are of equal or even greater importance.
1. Restrict root – Root, the administrator or super user has full control of your server. Ideally, only one person should be […]
It is a common error on websites, yet it is one of the most annoying for web developers and system administrators. The dreaded 500 “Internet Server Error” has plagued webmasters for years. Sometimes, it is very easy to fix, but it may be difficult to find out what the problem actually is because it is […]
Web applications, as the name plainly states, are applications that run on the web rather than on a person’s personal computer or laptop. This makes them extremely versatile, since any device capable of connecting to the web can use them. The methods for developing and deploying web apps vary, but the end result is essentially […]
When covering application security, there are three basic application types you should consider:
Standard applications that you install directly on your server’s operating system and run only when you need them
Applications that are run as daemons or services, starting at boot time and continuing to run as long as the server is on
Web applications […]
A new year has arrived, and this is an excellent time to consider applying any upgrades that you were putting off until the end of 2011. In some cases, you may have delayed software upgrades in order to verify compatibility with your web applications, or you may have simply delayed your upgrades to make sure […]
It is generally preferable to run updates on your server as soon as possible after they are made available. This is particularly important if when they are security updates. In most cases, you can just schedule these updates to run during off hours.
In some situations, however, your web applications or other software may depend on […]
Some server system administrators, especially those with little experience, may operate under the mistaken belief that they will find security through obscurity. In their minds, as long as their server is small and not hosting major big-name websites, those with malicious intent will leave them alone.
What these idealists fail to realize is that attackers do […]
When picking web server software, you should use the same considerations you used when choosing an operating system. You will also have to consider compatibility with your operating system and the best overall efficiency for the type of site or sites you want to run.
The following are some of the factors […]
One area on a Linux dedicated server that is particularly vulnerable to attacks is the /tmp directory. It is designed to hold temporary files used by applications, but attackers may use an unprotected /tmp directory to launch scripts or bots. What follows are a few measures you can take to ensure your /tmp […]
One of the benefits of cloud computing is that you do not have to operate and maintain the applications you need on your own dedicated server. As web applications become more robust and complex, this feature of cloud computing is particularly useful to small websites and small businesses.
Hosting your own websites and applications, however, […]
Dynamic web applications have become the norm for most websites. Whether they are using basic content management systems (CMS) or more complex custom social media applications, today’s websites are more fluid and more interactive than ever.
Accompanied with that new interactivity and fluidity are higher server loads and greater bandwidth usage. We previously looked […]
Your server’s security is a top priority. After all, you have undoubtedly spent a good deal of time and money acquiring, configuring, marketing, and optimizing your server. The moment it connects to the Internet, however, it has entered a hostile environment.
The first line of defense on any server is the network firewall. […]
Your server is like your baby, and no one wants to see their baby crash, get kidnapped, freeze up, get attacked, or contract a deadly virus. One way you can lessen the possibility of security compromises on your server is to provide your web hosting clients with script installation services.
A lot of security holes […]
Spend even a small amount of time reading about news and developments in web hosting, and you will undoubtedly come across the term “cloud computing”. The term itself is rather broad and can refer to anything from web-based email to full application servers, to RaaS disaster recovery.
Although in the case of email, […]