Blog Archives - Netrouting
Home

USA: 305-705-6983International: +31 88-045-4600

blogger

24 Aug 2015

Virtual Private Servers – Why It Is Still Friendly For New Developers?

The world of IT can be frustrating. Whether you’re a code ninja, social media guru coding the next best thing, a rock star programmer set to build a revolutionary application, or just a beginner looking for a development environment to experiment, you’ll need a host. With the word ‘hosting’ getting tossed around like empty promises […]


Continue reading

blogger

13 Aug 2015

Deciding on your Colocation Service Provider

In order to keep up in this hyper-competitive world, a business needs to run as effectively and efficiently as possible. With more companies going out of business each day, running effectively is not only important but it is increasingly becoming critical. It is especially critical for smaller and medium sized businesses to maximize efficiency because […]


Continue reading

blogger

21 Jul 2015

Early detection and preventive measures for DDoS attacks

Denial of Service attacks is a form of concentrated and planned broadcasting of packets to a destination server with the deliberate intention of disrupting services running on that server. The target might be a particular port running a service or a random port/service. Distributed Denial of Service (DDoS) is more like the vicious cousin of […]


Continue reading

blogger

16 Jul 2015

Advantages of Using a CMS to Run Your Site

Do you have state-of the-art computers, with best servers and cutting-edge tools, but still use the plain HTML to update the text of your website? You might be doing yourself a disservice. One of the best investments which you could make for your website and your business is investment in a content management system. Your […]


Continue reading

blogger

18 May 2015

How to Optimize Web performance for Best User Experience

The idiom ‘Variety is the spice of life’ has taken a literal meaning in today’s turbo-charged world. The wealth of choices we are faced with in current consumer world has made users fickle and impatient. Today’s users are constantly connected to internet and this continuous connection has only added to the impatience of a user. […]


Continue reading

blogger

04 Mar 2015

NGINX as a Reverse Proxy

In this article we will learn how to setup NGINX as a reverse proxy for apache web server. Now there are plenty of articles online with intricate details that might be confusing and too complex for your taste. What I am describing here is a very simple bare-bone configuration which you can setup within 10 […]


Continue reading

blogger

26 Feb 2015

Setting up Rails Applications in your cPanel Server

With the increasing demand in Ruby on Rails application we have now decided that we will help our customers to get their Rails application up and running on our servers. Follow the steps given below to set a rails application on your cpanel account. Setting up a Rails Application on your main cPanel domain with […]


Continue reading

blogger

18 Feb 2015

Mapping Transferred MySQL Databases to a cPanel Account

Account migration from one cPanel server to another cPanel server is pretty straight forward and easy. Backups can be generated from WHM or a cpanel account (using the backup wizard) and transferred to a remote server via FTP or using SCP. Restoration of this account (backups are usually in cpmove-username.tar.gz format) at the destination involves […]


Continue reading

Netrouting

15 Dec 2014

Poodle Vulnerability – How to Secure your Online Transactions

Google recently tested a type of attack called POODLE, which is short for  “Padding Oracle On Downgraded Legacy Encryption”.  This led to the discovery of a vulnerability in  Secure Sockets Layer (SSL) version 3 protocol or in short SSLv3.  POODLE could allow a man-in-the-middle attack leading to hijacking and decryption of the session cookies that […]


Continue reading

Netrouting

15 Dec 2014

Poodle – Vulnerabilities in Older SSL Versions and Preventive Measures

After a slew of security alerts pertaining bash shell shock and SSL heart bleed, a group of researchers at Google recently tested a type of attack called POODLE, which is short for “Padding Oracle on Downgraded Legacy Encryption“. This laid bare open a vulnerability in Secure Sockets Layer (SSL) version 3 protocol or in short […]


Continue reading