Quantcast
Channel: Bobcares Blog Feed
Browsing all 170 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Configuring Apache for Maximum Performance

Apache is an open-source HTTP server implementation. It is still the most popular web server on the Internet. The August 2015 Web Server Survey conducted by Netcraft [1] shows that about 37.51% of the...

View Article


Image may be NSFW.
Clik here to view.

Top 5 operating systems for your Docker infrastructure

Recently we covered how CoreOS can be a great operating system for secure, scalable Docker based infrastructure. Docker docs says that you can get Docker working in 11 major operating systems that...

View Article


Image may be NSFW.
Clik here to view.

Preventing DDoS Attacks

DDOS, or Distributed Denial of Service is an advanced version of DOS (Denial of Service) attack. Like DOS, DDOS also tries to deny important services running on a server by broadcasting packets to the...

View Article

Hardware vs Software firewall: A brief comparison

“Google has listed your server as a malware source! Its been hacked into, and is being used to spread malware!” I'm sure this is a message that you never hope to get in your mailbox. But, how confident...

View Article

Image may be NSFW.
Clik here to view.

How to troubleshoot high load in linux web hosting servers

Even in this age of high configuration servers and cloud instances, server load spikes are all too common. Getting the approach right is half the work done in troubleshooting a high server load. In our...

View Article


Rapid web application deployment - How to use Docker to reduce time to market

Release early, release often. And listen to your customers. This famous philosophy (abbreviated RERO) by Eric Raymond is now the de-facto product planning strategy of web application developers. It...

View Article

Image may be NSFW.
Clik here to view.

Are your servers secure?

Are your servers secure? In a word, No. No machine connected to the internet is 100% secure. This doesn't mean that you are helpless. You can take measures to avoid hacks, and give your customers...

View Article

Bullet proof Django security - How application isolation in Docker improves...

When it comes to security, the rule of thumb is, any open vulnerability WILL be exploited sooner than later. Django provides a strong foundation for to build secure web applications, but is that...

View Article


2 non-obvious reasons for "550-Please turn on SMTP Authentication" error in...

SMTP error from remote mail server after RCPT TO:<user@domain.com>: host domain.com [xx.xx.xx.xx]: 550-Please turn on SMTP Authentication in your mail client. 550-(mail.server.net)...

View Article


How Active VisitorTracker Campaign malware spreads and how to block it

On 18th Sep, Sucuri reported a sudden spike in the number of WordPress, Joomla and other CMS sites infected with the now infamous visitorTracker_isMob malware code. Using a malware signature published...

View Article
Browsing all 170 articles
Browse latest View live