-
Cloud Computing Tutorials
-
How To Reset Your MySQL or MariaDB Root Password
-
How to Convert React Class Components into Functional Components using React Hooks
-
How To Allow Remote Access to MySQL
-
How to Install Node.js On Ubuntu 20.04
-
How To Secure Apache with Let’s Encrypt on Ubuntu 20.04
-
How to install WordPress with Ubuntu 20.04 and a LAMP Stack
-
How a Private Cloud is Crucial for Strategic Flexibility
-
Critical Disaster Recovery Mistakes to Avoid
-
VEXXHOST’s Announcements Recap
-
How to Simplify Package Version Management at Scale
-
Reasons To Take Advantage Of Cloud-Based Data Warehouses
-
Debunking Common Open Source Myths
-
Cloud Pricing 101: Public vs. Private
-
The Top Cloud Computing Challenges Faced By All Industries
-
Private Clouds & The Cloud Ecosystem
-
Exploring Hybrid Cloud
-
Cloud Security: Private vs. Public
-
Continuous Integration, Delivery & Deployment, Explained
-
Deep Dive into Serverless
-
Bare-Metal v.s Virtual Machines
-
Deep Dive on VEXXHOST’s Virtual Machines
-
Deep Dive into OpenStack’s Heat, Horizon & Keystone
-
What to Consider When Planning a Move to the Cloud
-
Securing Your Data With a Cloud Provider
-
Introduction to Canadian Data Privacy
-
Load Balancers-as-a-Service vs Installable Load Balancers
-
Combining Security and Speed With VMs and Kubernetes
-
How To Setup Highly Available Web Servers with Keepalived & Floating IPs on Ubuntu 16.04
-
How To Deploy Python Web Applications with Bottle Micro Framework on Ubuntu 16.04
-
How To Securely Set Up Shipyard 2.0.10 with TLS on CoreOS
-
How To Run Nginx in a Docker Container on Ubuntu 16.04
-
Setup Continuous Integration Pipelines with GitLab CI on Ubuntu 16.04
-
Installing the Latest MySQL on Ubuntu 16.04
-
How To: Install Apache Server On Ubuntu 16.04
-
How to: Setup Cassandra & Run a Single-Node Cluster on Ubuntu 16.04
-
How To Install Elasticsearch 1.7, Logstash 1.5, & Kibana 4.1 (ELK Stack) on Ubuntu 14.04
-
How To Create a High Availability HAProxy Setup with Corosync, Pacemaker & Floating IPs on Ubuntu 14.04
-
How to Use Prometheus to Monitor Your CentOS 7 Server
-
How To Deploy a Hugo Site to Production with Git Hooks on Ubuntu 14.04
-
How to configure HTTP authentication with Nginx on Ubuntu 14.04
-
How to install, configure & use Jenkins on Ubuntu 14.04
-
How To Install & Use Hugo, the Static Site Generator, on Ubuntu 14.04
-
How to install IonCube Loaders on Ubuntu 14.04
-
How to install Elasticsearch on Ubuntu 14.04
-
How To Work with Docker Data Volumes on Ubuntu 14.04
-
How To Install and Use Docker Compose on Ubuntu 14.04
-
How to Deploy a Symphony Application to Production on Ubuntu 14.04
-
How To Install WordPress & PhpMyAdmin with Docker Compose on Ubuntu 14.04
-
How To Deploy a Clojure Web Application on Ubuntu 14.04
-
How to setup OpenVPN Server and Client on Ubuntu 14.04
-
How To Install & Setup Puppet Master and Client on Ubuntu 14.04
-
How to deploy a MariaDB Galera cluster on Ubuntu 14.04
-
How to Install and Use Docker on Ubuntu 14.04
-
How to install and use Logwatch on Ubuntu 14.04
-
How to use cron jobs for automation on Ubuntu 14.04
-
How to setup HHVM server on Ubuntu 14.04
-
How to install & configure WordPress 4.2.2 on CentOS 7
-
How To setup LAMP stack on CentOS 7
-
WordPress App on Ubuntu 14.04 LTS
-
How to Upload Custom Images with OpenStack
-
How to Setup OpenStack CLI Tools
-
Getting started with Docker in minutes using Docker Machine
-
MEAN & Socket.IO Integration Tutorial
-
Getting Started with MEAN Stack
-
Small Dive Into Meteor.JS
-
CentOS 6 to CentOS 7 Upgrade Procedure
-
How to Setup Remote System Logging with rsyslog on Ubuntu 14.04 LTS
-
10 Essential & Useful Ruby on Rails 4 Gems
-
10 Essential Laravel 4 Packages Everyone Should Use
-
Ruby on Rails vs. Laravel: Getting Started
-
How To Host Multiple Ghost Instances On A Single Server
-
How To Customize your Ghost Instance
-
How To Get Started with Apache libcloud & OpenStack
-
How To Install and Use EasyEngine (ee) on Ubuntu
-
How To Install & Host Ghost with Nginx on Ubuntu
-
How To Mitigate & Fix OpenSSL Heartbeat on CentOS or Ubuntu
-
How To Deploy Django on Nginx, Gunicorn with Postgres
-
How To Install GitLab As Your Private GitHub Clone
-
How To Configure a Galera Cluster with MariaDB on Ubuntu 12.04
-
How To Install FreePBX on CentOS
-
How To Install & Configure Varnish with Apache on Ubuntu
-
How To Install Linux, Nginx, MySQL, PHP (LEMP) stack on Ubuntu
-
How To Install an Upstream Version of Node.js on Ubuntu
-
How To Create a SSL Certificate on Nginx for Ubuntu
-
How To Set Up a Minecraft Server on Linux
-
How To Install Linux, Apache, MySQL, PHP (LAMP) stack on Ubuntu
-
How to protect your SSH server with Fail2Ban on Ubuntu
-
How To Install Rails & Nginx with Passenger on Ubuntu
-
How To Setup Your Own VPN With PPTP on Linux (CentOS, Ubuntu, Debian)
-
How To Set Up Nginx Virtual Hosts on Ubuntu
-
How to add extra swap space on CentOS 6
-
How To Install and Setup Postfix on Ubuntu
-
How To Setup VNC For Ubuntu
-
How To Setup SSH Keys
-
How to Install Git on Ubuntu
-
How to Add Swap on Ubuntu
-
How To Install Ruby on Rails on Ubuntu
-
Fixing 403 Forbidden Nginx Errors
-
Nginx Windows: How to Install
-
Installing Latest Node.js on Ubuntu
-
How To Reset Your MySQL or MariaDB Root Password
Resources
Resources
Useful Links- Comparing the Speed of VM Creation and SSH Access of Cloud Providers - DZone Cloud
- Vexxhost in Canada
- OpenStack Launches Vendor Certification, Federated Identity Support From Over 30 Cloud Providers | TechCrunch
- Public Cloud Compare
- Cloudsoft AMP + VEXXHOST: A Success Story | Cloudsoft
- Comparing the speed of VM creation and SSH access of cloud providers
- Running CoreOS Container Linux on VEXXHOST
- Cloud Computing Review
- Big Data on OpenStack
- Connect Vexxhost cloud service to your Mac
Tag Archives: malware
Ways To Guard Against Computer Identity Theft
Computer Identity theft is a major crime that is expanding each year. If you are a victim of identity theft it may take months, even years, trying to repair credit history. A seriously damaged credit report can compromise your chances of getting a new job, a bank loan, insurance or even rental housing. It’s even possible to be arrested for a crime you didn’t commit if someone else has used your identity to break the law. Continue reading
Comments Off on Ways To Guard Against Computer Identity Theft
Comparing Registry Fix Software To Determine Which One Is Right For You
It is possible that you will have registry problems on your computer and if this happens then to get it back to normal you have got to follow a few simple steps and learn to repair it. To find out how to do this you have got to invest your time and effort to find out more about registry fix software. Continue reading
Comments Off on Comparing Registry Fix Software To Determine Which One Is Right For You
The Largest Cyber Security Concern is Identity Theft
Today’s biggest cyber security concern is Identity Theft . Cyber thieves use many kinds of methods (hacking, use of spyware for intercepting information, etc.) in stealing personal or financial info from their victims, mostly from the computers. Continue reading
Children Should Be Aware Of Internet Theft
Internet theft should concern everyone but especially those that have children that use the internet or will soon. The internet is a fantastic way to learn the latest news, do research for school projects and communicate with friends but it can also be very dangerous. Continue reading
Comments Off on Children Should Be Aware Of Internet Theft