Reading time: 4 minutes
NGINX is open-source software designed as a web server in the first place to combine performance and stability. Many well-known companies are using NGINX due to its performance optimization for handling a large number of connections. The NGINX is the most reliable server with its event-driven, asynchronous architecture. It also works as a reverse proxy...
Reading time: 4 minutes
Whether you play games or not, the gaming industry grows rapidly every year. Since most modern games include advanced graphic details, the download size sometimes exceeds 100 GB. Even though this might not seem a lot, many casual gamers might lose patience and decide not to install the game. Post-game downloads are common since updates...
Reading time: 3 minutes
Web Application Firewall protects your web service by filtering, monitoring, and blocking any malicious HTTP/S traffic going through to the web application. WAF prevents any non-authorized data from accessing or leaving the app. Having WAF is just like having a toll booth, for example, tool booths allow only paying customers to drive on the toll road...
Reading time: 4 minutes
Managing server infrastructure introduces a vast array of operational challenges. Among other things, reducing bandwidth consumption and speeding up server upgrades can be a fundamental improvement and make the administrator’s life much easier.Ubuntu Server instances use APT package management system for software management. It allows system administrators to easily install and upgrade software across all...
Reading time: 3 minutes
Everyone seems to be jumping on the edge computing bandwagon these days, but why? This article goes into the details of what edge computing is and how we got here. It all started with the CDNs Content Delivery Networks, or CDNs for short, enable you to push all kinds of content to your end-users from...
Reading time: 1 minute
Orange Cloud and joined brands have sent employees to work from home since the beginning of March. The treat of the epidemic was clear at that time so we took appropriate measures and applied the emergency procedures to initiate remote work. We have had the procedure for remote work since the very start of our...
Reading time: 1 minute
OpenSSH project had been working on version OpenSSH 8.0p1 in 2019 when they published that “scp” protocol thus the “scp” command has a vulnerability with verification of the file name sent by server against the one that client actually requested. This issue was mitigated in OpenSSH 8.0p1 but, was never fully applied across the platforms.Reference: https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-March/037672.html An...
Reading time: 4 minutes
Should 0 bytes responses be cached or not (on middle points like CDN or other proxies) is a problem that can be addressed by two entities: RFC Client’s request For client’s request to be met it’s assumed that #1 is honored. What RFC says for 0 bytes caching, basically, is that if a file (or...
Reading time: 4 minutes
Leading meetings that produce results. We’ve all been there – you are stuck in an endless meeting, not really sure why you’re even there in the first place. And you’re probably not alone. When attending such meetings, I have the feeling of being in a hostage situation. Even worse, I can’t stop thinking about all...
Reading time: 5 minutes
Most of the time when checking logs we’re presented with a lot of data we may necessarily not need, or we have to manipulate it in some way or present it to a client in a specific way. All of that can be done using a scripting language or utilizing AWK right from the terminal...
Fill out the enquiry form and we'll get back to you as soon as possible.
Fill out the enquiry form and we'll get back to you as soon as possible.