LowEndBox - Cheap VPS, Hosting and Dedicated Server Deals

Managing Your LowEndEmpire With Ansible, Part 1

Tags: , Date/Time: November 20, 2020 @ 5:38 am, by raindog308

Ansible is an automation platform that can be used for provisioning, configuration management, and deployments. It does not require deploying an agent and is suitable to manage any system that allows SSH connections and can run Python 2.7. Ansible is very powerful for fleet management. Currently, many IT organizations espouse a “cattle not pets” or […]

Setup a DNS Nameserver Using NSD

Tags: , , , Date/Time: November 11, 2020 @ 5:37 am, by raindog308

You can still buy little 128MB VPSes for $10-15 per year and they are perfect for serving DNS.  A nameserver does not take much memory or CPU. Indeed, once it’s setup, you’ll probably find your nameserver isn’t doing much at all, because so much is cached with other DNS servers. It just serves as the authority.  […]

Keeping A (log)Watchful Eye on Your VPS With logwatch

Tags: , , , Date/Time: October 27, 2020 @ 1:00 am, by raindog308

Your logs are an invaluable source of information about what’s going on inside your system and can alert you to security issues, service issues, and hardware problems.  But you are only aware of what they’re trying to tell you if you actually read them.  It would be a burdensome chore to login to each system […]

Nginx vs. OpenLiteSpeed vs. Apache

This article was contributed by Dustin B. Cisneros of RackNerd – a provider of shared hosting, reseller hosting, VPS hosting, dedicated servers, DRaaS, colocation, and more. A web server is an integral part of your website. The performance, security, and reliability of your website depend on which web server you are using. There are three […]

Top Ten Things That Should Be In Your Dot Files

Tags: , , , , , , , Date/Time: October 13, 2020 @ 6:49 am, by raindog308

“Dot files” are Unix configuration files that live in your home directory.  They’re often used to store user-specific choices and preferences.  For example: .bash_profile is executed whenever you login via ssh (or any other method).  It is typically used to control your Unix shell experience. .vimrc contains customizations for the Vim editor, while .emacs contains […]

How to Configure Reverse Proxy with NGINX

Tags: , , , Date/Time: October 5, 2020 @ 10:07 am, by Jon Biloh

NGINX is a light-weight web server first released in 2004 which can also be used as a reverse proxy. We have made many tutorials over NGINX at LowEndBox, and recently setup a Node.js Application, it also used NGINX as its reverse proxy, but it used an NPM package to generate the app-specific configurations. In this […]

Shields Up! Protecting Your WordPress Site with Wordfence

Tags: , , , , Date/Time: October 3, 2020 @ 7:42 am, by raindog308

Server and application security are important factors to consider when running a website — especially a website based on WordPress. This easy to use guide will help take you through the steps of ensuring that your WordPress based blog is running as securely as possible thanks to Wordfence (and easy to use plugin that goes […]

How to Set Up WireGuard VPN on CentOS 8

Tags: , , , , Date/Time: October 2, 2020 @ 4:33 am, by Jon Biloh

WireGuard is a modern VPN solution that runs on state-of-the-art cryptography such as the Noise protocol framework, and Curve25519. It provides a much faster experience and outperforms its competitors, such as IPsec and OpenVPN. It provides all this power in a simple and easy to use framework. All it takes to start a VPN connection […]

Increasing Security on Your Linux VPS

Tags: , , Date/Time: September 28, 2020 @ 12:00 am, by Jon Biloh

The internet is the source of income for millions of people, and it could be considered one of the best creations of technology. However, with time, the internet has become vulnerable to security threats. Thus, your Linux VPS is also susceptible to these risks, as it is hosted on the internet. Your VPS can contain […]

Generating and Using SSH Keys, Part 3

Tags: , , , , , Date/Time: September 26, 2020 @ 6:02 am, by raindog308

In previous tutorials in this series, we went over generating SSH keys and how to use them.  We’ll wrap up the series by showing you how to turn off password authentication on your server. Why Configure for SSH Key Authentication Only As mentioned in Part 1, SSH key authentication requires both “something you know” (the […]

Older Posts »