Archives

The best alternatives for PuTTy in Windows 10

Because it is very small and easy to install and use, PuTTY has been the most popular Windows SSH client for many years. It is extremely lightweight and can handle many other networking remote access protocols, such as SCP, SFTP, Telnet or serial, which makes it ideal for system administrators and network engineers. However, PuTTY …

Read More

How and why to whitelist IPs in your server

Modern servers are constantly under attack from hackers or automated scripts that search for any vulnerability as soon as it is revealed. These attacks typically come from a wide range of IP addresses from all over the world, making it practically impossible to block all of them separately. No server can ever be completely safe …

Read More

The advantages of choosing a KVM VPS

Virtualization technologies have revolutionized the world of hosting and servers in general, by providing a very simple and effective way to provision or discard servers of almost any size, with unmatched scalability. Cloud servers are extremely flexible and can accommodate almost any type of operating system, regardless of the one installed on the host. There …

Read More

IBM buys RedHat – Possible implications for users

IBM’s acquisition of RedHat was initially announced in October 2018 and sent shockwaves through the open-source community. In May, the deal was approved by the US Department of Justice, which allowed IBM to close it earlier this month. The value of the deal was $34 million, or $190 per share. Considering that RedHat shares were …

Read More

The new cPanel pricing model and its implications

The news that cPanel has decided to move to a new pricing model, resulting in significant price hikes for most customers, has shocked the hosting world. Most of the important hosting companies depend heavily on WHM/cPanel, especially for shared packages. The platform has become so popular that it is now considered a standard, and most …

Read More

New Exim vulnerability affecting millions – how to protect yourself

Vulnerabilities are discovered very often in various computer programs, and most of them are quickly patched by developers. Typical vulnerabilities disappear almost un-noticed, since they are fixed by routine update schedules. In fact, most vulnerabilities are never exploited, since they are discovered by security professionals rather than hackers, or are very difficult to execute. However, …

Read More