Home

USA: 305-705-6983International: +31 88-045-4600

blogger

04 Mar 2015

NGINX as a Reverse Proxy

In this article we will learn how to setup NGINX as a reverse proxy for apache web server. Now there are plenty of articles online with intricate details that might be confusing and too complex for your taste. What I am describing here is a very simple bare-bone configuration which you can setup within 10 […]


Continue reading

blogger

26 Feb 2015

Setting up Rails Applications in your cPanel Server

With the increasing demand in Ruby on Rails application we have now decided that we will help our customers to get their Rails application up and running on our servers. Follow the steps given below to set a rails application on your cpanel account. Setting up a Rails Application on your main cPanel domain with […]


Continue reading

blogger

18 Feb 2015

Mapping Transferred MySQL Databases to a cPanel Account

Account migration from one cPanel server to another cPanel server is pretty straight forward and easy. Backups can be generated from WHM or a cpanel account (using the backup wizard) and transferred to a remote server via FTP or using SCP. Restoration of this account (backups are usually in cpmove-username.tar.gz format) at the destination involves […]


Continue reading

Netrouting

15 Dec 2014

Poodle Vulnerability – How to Secure your Online Transactions

Google recently tested a type of attack called POODLE, which is short for  “Padding Oracle On Downgraded Legacy Encryption”.  This led to the discovery of a vulnerability in  Secure Sockets Layer (SSL) version 3 protocol or in short SSLv3.  POODLE could allow a man-in-the-middle attack leading to hijacking and decryption of the session cookies that […]


Continue reading

Netrouting

15 Dec 2014

Poodle – Vulnerabilities in Older SSL Versions and Preventive Measures

After a slew of security alerts pertaining bash shell shock and SSL heart bleed, a group of researchers at Google recently tested a type of attack called POODLE, which is short for “Padding Oracle on Downgraded Legacy Encryption“. This laid bare open a vulnerability in Secure Sockets Layer (SSL) version 3 protocol or in short […]


Continue reading

Netrouting

25 Nov 2014

How to Avoid “BAD MINUTE” ERROR when you Try to Set a Cron Job

—————————————————————— /tmp/crontab.XXXXXX.crontab”:1: bad minute errors in crontab file, can’t install. Do you want to retry the same edit? —————————————————————— You must have seen this when you try to schedule and save a cron job when the job or command is too long to fit in one line. Crontab delimits jobs with line breaks. Each job […]


Continue reading

Netrouting

15 Oct 2014

In the spotlight: My Dedicated Servers

Get in control of your virtual data center! Introducing the all new Netrouting customer portal. Familiarize yourself with our new user interface with extensive troubleshooting and usability enhancements. Today we’ll be featuring our available management options, available to all dedicated server customers at Netrouting. Logging in to MY NETROUTING Go to https://www.netrouting.com and click on MY ACCOUNT […]


Continue reading

Netrouting

15 Oct 2014

If datacenter pictures are worth a thousand words…p2

Starting a new tradition, we pick up where we left of on our last digital impression of Netrouting facilities in Europe. Enjoy these new pictures of our new facility in The Hague and our flagship facility in Spijkenisse, The Netherlands.   Emergency Generator at THG1 Emergency Generator at THG1 Full racks at THG1 Phase #1 […]


Continue reading

ray

20 Jan 2014

MLK Day 2014 – a day on, not a day off

Taking place each year on the third Monday in January, the MLK Day of Service is the only federal holiday observed as a national day of service – a “day on, not a day off.” We welcome you to join us in honoring Dr. Martin Luther King, Jr.  as we recognize a national day of […]


Continue reading

ray

10 Jan 2014

Netrouting spoofs the spoofers

/spo͞of/ informal a humorous imitation of something, typically a film or a particular genre of film, in which its characteristic features are exaggerated for comic effect. “a Robin Hood spoof. trick played on someone as a joke. Modern telephone network provide Caller ID information which includes the caller’s name and number with each call. This […]


Continue reading