Monthly Archives: February 2018

28 02, 2018

What Are The Differences Between A Software Raid And A Hardware Raid?

By |February 28th, 2018|Articles, Hardware RAID, Server Management, Software RAID, Technology|0 Comments

RAID (Redundant Array of Independent Disks) is one of the popular data storage virtualization technology. It combines multiple inexpensive, small disk drives into an array of disks in order to provide redundancy, lower latency maximizing the chance to recover data from the hard when crashed. RAID can be implemented on servers by two methods. Hardware [...]

27 02, 2018

How To Set CustomPHP Values In CloudLinux

By |February 27th, 2018|Articles, linux, php, Server Management, Server Support|0 Comments

We often need to set custom php.ini values for some domains. We know that we can change that values using PHP selector option in cPanel for Cloudlinux servers. However, certain PHP options are not available in cPanel and we can include the options in cPanel for all PHP versions or for certain PHP versions. To [...]

26 02, 2018

How To Harden A cPanel Installed Apache Web Server

By |February 26th, 2018|Apache, Articles, Cpanel, webserver|0 Comments

Server security and hardening are the important aspects of any server. In this article let’s explore how to harden a webserver with Cpanel installed and Apache running on it. A web server is a well-versed computer and users save their website files and its databases on it. The server is always connected to high-speed internet [...]

22 02, 2018

How To Prevent Cyber Hacking Of Private Email Server And Company Server

By |February 22nd, 2018|Articles, Hack Recovery, Security, Technical Tips|0 Comments

Cyber-attacks have been increased over the years targeting especially the individuals, and businesses. In the recent years, more than two-thirds of small and large business organizations have become the victim of cyber-attacks. EMAIL HACKING Email is a widely used communication system that can be categorized as open and closed. Open web-based services offer email accounts [...]

20 02, 2018

How To Tune Linux Permission For Maximum Security?

By |February 20th, 2018|Articles, linux, Server Management, Technology|0 Comments

Linux file system is a simple and effective tree-like structure. This structure is very effective in controlling the access of each user. File permission has a major role when we deal with server security. The permission of a file gives privilege for each user to read, write or execute a file. File Permission   In [...]

Load More Posts