 / photo ABUS Security Tech Germany CC
 / photo ABUS Security Tech Germany CC Virtual IT Infrastructure: Pros and Cons
 Virtual IT Infrastructure: Pros and ConsVirtualization is a tool that fully reveals its potential only if it is used wisely.
 What is web hosting?
 What is web hosting?The author talks about why web hosting is needed at all, and what are its advantages and disadvantages. The material can be considered as a guide for choosing a web hosting service that has a detailed infographic.
 5 reasons to choose a VPS
 5 reasons to choose a VPSThis is a post describing the five main advantages of developing your own VPS.
 VDS / VPS: from hosting to clouds
 VDS / VPS: from hosting to cloudsVirtualization methods: what is VPS / VDS and what are their advantages and disadvantages. A little tutorial on terminology, and a couple of words about Microsoft Hyper-V technology.
 Why raise VPS on your dedicated server?
 Why raise VPS on your dedicated server?A little material on how to install a VPS on a dedicated server, why this is a good idea, and what it will lead to.
 Overview-rating of virtual servers VPS / VDS Windows: startups and old-timers
 Overview-rating of virtual servers VPS / VDS Windows: startups and old-timersAn overview of ten hosting providers (the following criteria are noted: disk system performance, processor performance and stability of its work, network speed, equipment “age”).
 IaaS and virtual data center against VPS and VDS
 IaaS and virtual data center against VPS and VDSIn this material, the authors understand the differences between the virtual hosting servers and the virtual data center.
 VPS Guide
 VPS GuideGuide to creating a VPS server from scratch. The author takes into account such aspects as the choice of provider, OS, configuration analysis, security, server testing, etc.
 We optimize $ 5 VPS (512MB RAM / 1 CPU) so that the wordpress site can handle 42,735,587 hits per day
 We optimize $ 5 VPS (512MB RAM / 1 CPU) so that the wordpress site can handle 42,735,587 hits per dayHow to optimize LAMP using only 512 MB of RAM without going into swap.
 Protection of VPS from evil with fail2ban and iptables
 Protection of VPS from evil with fail2ban and iptablesThe main tool in building a Linux host security is the iptables utility, which manages the operation of the firewall. The fail2ban utility also uses iptables to block packets from banned IP addresses and python to detect such addresses.
 Changing the partitioning scheme for a rented VPS
 Changing the partitioning scheme for a rented VPSIs it possible to make an arbitrary disk partitioning scheme on a virtual server? If you do not know the solution to this problem or just want to look at an example implementation, here you will find the answer.
 Best Practical Tips for Linux VPS
 Best Practical Tips for Linux VPSA few tips on installing your own VPS hosting on Linux.
 Ten practical tips for optimizing Wordpress work
 Ten practical tips for optimizing Wordpress workThese solutions will improve the performance of Wordpress hosting.
 Low cost VDS hosting in Russia. Is it possible to? Part 1
 Low cost VDS hosting in Russia. Is it possible to? Part 1“Ayhor Hosting” gradually justifies the possibility of the existence of a decent and at the same time inexpensive hosting in Russia.
 Loukost hosting dedicated servers in Russia. Is it possible to? Part 2
 Loukost hosting dedicated servers in Russia. Is it possible to? Part 2Continuation of the previous post, but now the author talks about the cost of renting dedicated servers.
 Hosting game server on VPS Windows
 Hosting game server on VPS WindowsOn the hosting of games on VPS-servers. What will come of it, which OS to choose (especially Windows and Linux), as well as analysis and solution of typical problems.
 A bit about security in the "cloud": Experience IaaS-provider "1cloud"
 A bit about security in the "cloud": Experience IaaS-provider "1cloud"Transferring infrastructure to the cloud has undeniable advantages, but it is also a rather subjective matter. Certain confusions are brought in by certain myths that are related to the issue of cloud security. In this material, we share our own experiences and talk about the work of our IaaS provider.
 A brief introduction to trust, or why you can not run blindly without checking scripts from the Internet
 A brief introduction to trust, or why you can not run blindly without checking scripts from the InternetAbsolutely all security is built on your trust in certain people or companies, be it Linus Torvalds, the Ubuntu Security Team, or the author of a small useful utility. This is an article about network security and problems of trusting unfamiliar sources and scripts (using the example of a security threat to a VPS server).
 How to protect VPS hosting from DDoS attacks
 How to protect VPS hosting from DDoS attacksStep-by-step instructions for securing VPS against DDoS attacks. Plus recommendations for installing utilities.

 How to secure a Linux system: 10 tips
 How to secure a Linux system: 10 tipsAt the annual LinuxCon conference in 2015, Linus Torvalds shared his views on system security. He stressed the need to mitigate the effect of the presence of certain bugs competent protection, so that if one component fails, the next layer covers the problem. In this material we reveal this topic from a practical point of view.
 We protect private keys from theft from VPS
 We protect private keys from theft from VPSAt the beginning of each semester, students of the master's program of the Department of MIT of the Academic University (St. Petersburg) and representatives of partner companies come together to discuss projects. In one of the projects made at Parallels Labs, a student of the SPBAU investigated the possibility of implementing a virtual Hardware Security Module (HSM). As a result, he added his VHSM implementation to the open-source project OpenVZ. Read about his decision here.
 Securing Linux VPS
 Securing Linux VPSA list of recommended for familiarization and use of tools and technologies to ensure the safety of VPS on Linux (starting with firewalls and UFW and ending with Aide, Bro, RKHunter).
 Grab full control over someone else's Digital Ocean cloud (Doorkeeper vulnerability)
 Grab full control over someone else's Digital Ocean cloud (Doorkeeper vulnerability)Of the several security reports, the author identifies one (already corrected) with the simplest bug and the greatest potential. This bug allowed to take control over someone else's account.
 Photo tour of the "cloud" of 1cloud
 Photo tour of the "cloud" of 1cloudOur story about the 1cloud equipment, which “grumbles” in the Tier III data center racks in St. Petersburg (SDN) and in Moscow (Dataspace).
 The peaceful profession of bomb shelter
 The peaceful profession of bomb shelterMaterial about hosting provider RUVDS, its formation, operation and organization of its data center. Photo excursion through the machine rooms.
 Practical experience with little-known European cloud hosting
 Practical experience with little-known European cloud hostingThe author describes his experience with several obscure European cloud hosting and shares objective assessments and subjective impressions. An article about the opportunities, advantages and disadvantages of cloud hosting.
 About hacking servers FirstVDS
 About hacking servers FirstVDSFirstVDS’s own investigation of compromised servers. This is a story about its results.
Source: https://habr.com/ru/post/319374/
All Articles