Best Practices to secure from DDoS Attack

what is DDoS Attack DDoS stand for Distributed Denial -of-service Attack. It  is defined as a malicious user trying to make a machine or network resources unavailable to use. A distributed denial-of-service (DDoS) attack is an attempt to disrupt the traffic of a targeted server, service, or network by overwhelming it with a flood of … Read more

How to protect Your Site Against DDoS Attack

The distributed denial -of- service (DDoS) Attack  is one of the most popular and terrify attacks cybercriminals like to use to attack websites. since the arrival of the new millennium, hackers have DDoS (Distributed Denial -of -service attack) to Shut Down some of the world’s biggest websites.  There are various type of variations of the … Read more

How to secure from DDoS Attack

Introduction of DDoS Attack : A distributed denial-of-service (DDoS) attack operates as its name implies; it’s a form of cyber attack that disrupts connectivity or network services to deny service to users. Attacks generally feature tools, such as a bot, that overwhelm the network with repeated signals until it can no longer process genuine requests from users. … Read more

What is DDoS Attack. Basic introduction of DDoS

It stands for Distributed Denial-of-service (DDoS) Attack. Distributed Denial-of-service (DDoS) Attack, is defined as a malicious user trying to make a machine or network resources unavailable to use. In which multiple compromised computer systems attack a target, such as a server, website, or another network resource, and cause a denial of service for users of … Read more

How to install Asterisk on LINUX

Asterisk is a free, open-source framework for building communications applications and is sponsored by Sangoma. Asterisk turns an ordinary computer into a communications server. Asterisk powers IP PBX systems, VoIP gateways, conference servers, and other custom solutions. It is used by small businesses, large businesses, call centers, carriers, and government agencies, worldwide. What Can You … Read more

How to change MySQL data directory

Information managed by the MySQL server is stored under a directory known as the data directory. The following list briefly describes the items typically found in the data directory, with cross references for additional information: Data directory subdirectories. Each subdirectory of the data directory is a database directory and corresponds to a database managed by … Read more

How to set up multi-master slave in MySQL

Today, We will see how to set up a multi-master slave in the MySQL replication process. Read more: Replication with Different Master and Slave Storage Engines Also Read: Reset ( Re-Sync ) MySQL Master-Slave Replication MariaDB 10 supports multi-source replication, and each MariaDB Galera node can have up to 64 masters connected to it. So … Read more

MySQL: How to ignore errors when importing data?

Recently, I faced an issue while importing data to MySQL. Here are the steps that help me to solve and ignore the error. Read more: show progress on MySQL DB Import Use the –force (-f) flag on your MySQL import. Rather than stopping on the offending statement, MySQL will continue and just log the errors … Read more