Reading time: 4 minutes
NGINX is open-source software designed as a web server in the first place to combine performance and stability. Many well-known companies are using NGINX due to its performance optimization for handling a large number of connections. The NGINX is the most reliable server with its event-driven, asynchronous architecture. It also works as a reverse proxy…
Reading time: 4 minutes
Whether you play games or not, the gaming industry grows rapidly every year. Since most modern games include advanced graphic details, the download size sometimes exceeds 100 GB. Even though this might not seem a lot, many casual gamers might lose patience and decide not to install the game. Post-game downloads are common since updates…
Reading time: 3 minutes
Web Application Firewall protects your web service by filtering, monitoring, and blocking any malicious HTTP/S traffic going through to the web application. WAF prevents any non-authorized data from accessing or leaving the app. Having WAF is just like having a toll booth, for example, tool booths allow only paying customers to drive on the toll road…
Reading time: 4 minutes
Managing server infrastructure introduces a vast array of operational challenges. Among other things, reducing bandwidth consumption and speeding up server upgrades can be a fundamental improvement and make the administrator’s life much easier.Ubuntu Server instances use APT package management system for software management. It allows system administrators to easily install and upgrade software across all…
Reading time: 3 minutes
Everyone seems to be jumping on the edge computing bandwagon these days, but why? This article goes into the details of what edge computing is and how we got here. It all started with the CDNs Content Delivery Networks, or CDNs for short, enable you to push all kinds of content to your end-users from…
Reading time: 1 minute
OpenSSH project had been working on version OpenSSH 8.0p1 in 2019 when they published that “scp” protocol thus the “scp” command has a vulnerability with verification of the file name sent by server against the one that client actually requested. This issue was mitigated in OpenSSH 8.0p1 but, was never fully applied across the platforms.Reference: https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-March/037672.html An…
Reading time: 4 minutes
Should 0 bytes responses be cached or not (on middle points like CDN or other proxies) is a problem that can be addressed by two entities: RFC Client’s request For client’s request to be met it’s assumed that #1 is honored. What RFC says for 0 bytes caching, basically, is that if a file (or…
Reading time: 5 minutes
Most of the time when checking logs we’re presented with a lot of data we may necessarily not need, or we have to manipulate it in some way or present it to a client in a specific way. All of that can be done using a scripting language or utilizing AWK right from the terminal…
Reading time: 7 minutes
Looking for a good solution, at least for my use case, I’ve stumbled upon interesting approach to find and remove nginx cached files by regex pattern. This is proxy_pass or fastcgi cached files, regardless. Repository with source code can be found on github: https://github.com/perusio/nginx-cache-purge The script gets the arguments from regular expression to calculate the match within…
Reading time: 5 minutes
Reverse proxy Hey all! I wanted to give a short (really short) intro to reverse proxy and how common use case is configured with nginx as a reverse proxy. Tried to keep it short as much as possible. Difference between proxy and reverse proxy Proxy is used to route requests to a well-known endpoint even…
Fill out the enquiry form and we'll get back to you as soon as possible.
Fill out the enquiry form and we'll get back to you as soon as possible.