Knowledge Base - Technical Tutorial and Support

How to Configure Nginx as a Reverse Proxy in Ubuntu 14.04

In simple words Proxy is nothing but an intermediate entity or  service/system/application/computer through which a user makes a request for resource/file/service and gets its response.   A Proxy can be classified into three different types.   A Simple Proxy A Forward Proxy A Reverse Proxy     A Proxy Server that serves the user requests and responses without any…

READ MORE

How to Install and Configure MongoDB in Ubuntu 14.04

MongoDB is one of the highly used Document databases out there. Unlike traditional databases like MySQL and PostgreSQL, it does not store data using tables with rows and columns. It uses json like documents to store databases.   The major plus point from a developer perspective is the ability to create dynamic…

READ MORE

How To Install Docker and Use Containers in Ubuntu

Virtualization is a really a hot topic and something that has made the cloud possible. Without virtualization in place, we would have never reached the point where we stand right now.  If you have ordered for a VMCentral VPS, then you are using virtualization.   We will be discussing about Container virtualization…

READ MORE

How to Configure Redis Master and Slave

  Redis is a popular key value store that can be used for storing different types of data and retrieve it back. It is very fast in response as all data it stores is in memory(well redis has built-in persistence as well, in which it will keep the snapshots in disk…

READ MORE

How to Configure SSH to Accept Only Key Based Authentication

SSH is one of the highly used tool by system admins and devops guys to access a remote server. SSH allows a user to access a remote system securely. SSH was made as a replacement for the older technologies like telnet and rsh(These older technologies used to send sensitive information…

READ MORE

How to Secure Linux Server with Fail2ban

One of the most common form of attack that people face on the internet is brute-force attack. In brute-force attack, the attacker never tries to decrypt an encrypted password, but he tries a random list (or say a dictionary of possible passwords) against a service that he wants to crack. Say…

READ MORE

How to Configure MySQL Master Slave Replication

MySQL is one of the highly used open source relational database. Configuring a standalone MySQL is really simple and straightforward, and it only involves installing the mysql-server package and creating the required databases inside for your applications to read and write to.  Although a single standalone MySQL database server does…

READ MORE

Enabling Multi-Factor Authentication For Your VMCentral Account

What’s the Problem with a Simple Username and Password?  Traditional way of authentication is only with a username and a password. The main problem with this simple authentication approach is…. “An attacker can get full access to the account, by simply getting hold of your password through a hack or guessing it…

READ MORE