Blog by category Articles

How to Recover a Deleted Database in MySQL: Steep-By-Step Guide Article
5 min read
How to Recover a Deleted Database in MySQL: Steep-By-Step Guide
Database files can be lost due to a power outage or computer crash, and critical files are never an acceptable outcome. The good news is that it's possible to recover a deleted MySQL database; we'll show you how.
How to Create Wildcard SSL Certificate OpenSSL: How to Renew SSL Certificate Article
4 min read
How to Create Wildcard SSL Certificate OpenSSL: How to Renew SSL Certificate
Wildcard SSL certificates provide cost-effective security for the main domain and its subdomains. Users can secure an unlimited number of subdomains with a single wildcard SSL certificate. Let’s explore the intricacies of the process of generating a...
Comparison of OpenVPN and Outline Speeds Article
4 min read
Comparison of OpenVPN and Outline Speeds
Let’s compare the speeds of popular solutions like OpenVPN and OutlineVPN. Both solutions are open source, which allows us to install them on our VPS servers and conduct clean tests, ruling out factors such as server channel congestion and third-part...
Types of Lookup Tools to Get Information About a Domain’s DNS Configuration Article
4 min read
Types of Lookup Tools to Get Information About a Domain’s DNS Configuration
Lookup tools are helpful resources for users to obtain specific information regarding the configuration of a domain name system (DNS). These tools are unique in that they retrieve and present details related to a particular DNS record type, including...
How to Clean Up Disk Space with Interactive Bash Script Article
3 min read
How to Clean Up Disk Space with Interactive Bash Script
Each of us may have come across situations when deleting unnecessary files on a server (on Linux machines based on CentOS, Debian, Ubuntu) did not clean up the disk space.
How to Install Sentry on CentOS 7 Article
4 min read
How to Install Sentry on CentOS 7
In this manual we will go through the process of installing Sentry on CentOS 7. We’ll explain how to do it quickly, correctly and reliably. In addition, we will prepare the configuration for Supervisor, with which we will manage the main Sentry servi...
How to Install and Сonfigure Squid Proxy in One Click Article
2 min read
How to Install and Сonfigure Squid Proxy in One Click
Proxies and VPNs are technologies that help protect one’s privacy and security online and that therefore have become necessary tools for almost every user. Some of the key advantages of using proxies and VPNs include improved security and the ability...
How to Recover a Corrupted MySQL InnoDB Database from Files on CentOS 7 Article
2 min read
How to Recover a Corrupted MySQL InnoDB Database from Files on CentOS 7
Sometimes the MySQL InnoDB storage engine may be damaged due to an unexpected shutdown of the database server or for some other reasons. As a result, the MySQL service will not start. Here’s a way to resolve this problem and fix a corrupted MySQL dat...
Article
3 min read
How to install the latest version of haproxy on centos 7
How to set up MySQL database backups quickly, safely and reliably Article
5 min read
How to set up MySQL database backups quickly, safely and reliably
All owners of MySQL databases are familiar with the problem of daily backups. It is important not only to have a consistent copy of all the necessary databases, but also to backup at a given time, without creating an increased load on the working arc...
How to get a wildcard SSL certificate with letsencrypt and cloudflare on Linux server (Centos/Debian/Ubuntu) Article
6 min read
How to get a wildcard SSL certificate with letsencrypt and cloudflare on Linux server (Centos/Debian/Ubuntu)
Let's consider obtaining an SSL certificate for a domain and all subdomains through DNS validation using CloudFlare as one of the most popular DNS services
How to configure SPF, DKIM, DMARC + TLS on Postfix Centos 7 Article
6 min read
How to configure SPF, DKIM, DMARC + TLS on Postfix Centos 7
In order to maximize the delivery of your mailing lists, you must fulfill all the requirements and conditions of the mail services, as well as configure all the necessary set of keys, records and settings on your mail server.