How and why to whitelist IPs in your server

Modern servers are constantly under attack from hackers or automated scripts that search for any vulnerability as soon as it is revealed. These attacks typically come from a wide range of IP addresses from all over the world, making it practically impossible to block all of them separately. No server can ever be completely safe …

The advantages of choosing a KVM VPS

Virtualization technologies have revolutionized the world of hosting and servers in general, by providing a very simple and effective way to provision or discard servers of almost any size, with unmatched scalability. Cloud servers are extremely flexible and can accommodate almost any type of operating system, regardless of the one installed on the host. There …

Common issues when setting up CentOS 7 and how to solve them

CentOS is the most common Linux distribution used for production servers, since it is a very stable operating system, fully compatible with Red Hat Enterprise Linux (RHEL). The disk images required for the installation of CentOS 7 can be downloaded for free from the project’s website, and the installation process is very simple because it …

CentOS 7 Help and Tutorials (updated August 2019)

Especially with the recent retiring of CentOS 5 on March 31, 2017, use of version 7 is on the rise. For new systems being installed now, it makes much more sense to go straight to CentOS 7 unless there is a specific compatibility issue. CentOS 6 will have maintenance updates through 2020. The minimum recommended …

IBM buys RedHat – Possible implications for users

IBM’s acquisition of RedHat was initially announced in October 2018 and sent shockwaves through the open-source community. In May, the deal was approved by the US Department of Justice, which allowed IBM to close it earlier this month. The value of the deal was $34 million, or $190 per share. Considering that RedHat shares were …

The new cPanel pricing model and its implications

The news that cPanel has decided to move to a new pricing model, resulting in significant price hikes for most customers, has shocked the hosting world. Most of the important hosting companies depend heavily on WHM/cPanel, especially for shared packages. The platform has become so popular that it is now considered a standard, and most …

New Exim vulnerability affecting millions – how to protect yourself

Vulnerabilities are discovered very often in various computer programs, and most of them are quickly patched by developers. Typical vulnerabilities disappear almost un-noticed, since they are fixed by routine update schedules. In fact, most vulnerabilities are never exploited, since they are discovered by security professionals rather than hackers, or are very difficult to execute. However, …