Apache and NGINX Together

Apache behind Nginx

Using Nginx as the primary frontend webserver can increase performance regardless if you choose to keep Apache running on the system. One of Nginx’s greatest advantage is how well it serves static content. It does so much more efficiently than Apache, and with very little cost to memory or processing. So placing Nginx in front will remove that burdern off Apache, leaving it to concentrate on dynamic request or special scenarios. Read More

How to install CentOS Web Panel in CentOS 7

centos

CentOS Web Panel (CWP) is a free web hosting panel for RPM-based distributions like CentOS, and provides an easy-to-use interface to manage your server. CWP comes with a huge variety of features/services, and unlike other control panels, it can automatically install a LAMP stack with a Varnish cache. Some of its other features include:

  • CSF firewall
  • File system lock
  • User management
  • DNS management
  • SSL generator
  • System & services monitoring
  • File manager
  • SQL services

In this tutorial, we will look at how to install CentOS Web Panel in CentOS 7 and configure some of its services once the installation is complete. Read More

What is SSH?

SSH

Security always plays a major role on the internet: That’s why the SSH security procedure is firmly anchored in the TCP/IP protocol stack. The SSH protocol allows users to establish a secure connection between two computers. The network protocol has been in use since 1995 and has been revised several times since then. We explain the most important terminology of the SSH protocol and how encryption works.

What do you need SSH for?

SSH enables two computers to establish a secure and direct connection within a potentially unsecure network, such as the internet. This is necessary so that third parties can’t access the data stream, which would result in sensitive data falling into the wrong hands. Even before secure shell, there were ways to establish direct connection between two computers, but the corresponding applications such as Telnet, Remote Shell, or rlogin were all unsecure. SSH encrypts the connection between two computers and enables a second one to be operated from one computer.

Read More