How to Secure Web server ?

What is Web server A web server can be either a software unit or a hardware unit, which provides the web pages via HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web. Web server is a computer where the web content is stored. Basically web server is used to … Read more

What is JSP ?

Define JSP : It is the full form of Java Server Page (JSP). It is a server side programming technology and used for creating web application ,that enables the creation of dynamic, platform-independent method for building Web-based applications. It is based on HTML, XML, SOAP, or other document types. There are JSP tags to insert Java code. The … Read more

Best Practices to secure from DDoS Attack

what is DDoS Attack DDoS stand for Distributed Denial -of-service Attack. It  is defined as a malicious user trying to make a machine or network resources unavailable to use. A distributed denial-of-service (DDoS) attack is an attempt to disrupt the traffic of a targeted server, service, or network by overwhelming it with a flood of … Read more

How to protect Your Site Against DDoS Attack

The distributed denial -of- service (DDoS) Attack  is one of the most popular and terrify attacks cybercriminals like to use to attack websites. since the arrival of the new millennium, hackers have DDoS (Distributed Denial -of -service attack) to Shut Down some of the world’s biggest websites.  There are various type of variations of the … Read more

How to secure from DDoS Attack

Introduction of DDoS Attack : A distributed denial-of-service (DDoS) attack operates as its name implies; it’s a form of cyber attack that disrupts connectivity or network services to deny service to users. Attacks generally feature tools, such as a bot, that overwhelm the network with repeated signals until it can no longer process genuine requests from users. … Read more

What is DDoS Attack. Basic introduction of DDoS

It stands for Distributed Denial-of-service (DDoS) Attack. Distributed Denial-of-service (DDoS) Attack, is defined as a malicious user trying to make a machine or network resources unavailable to use. In which multiple compromised computer systems attack a target, such as a server, website, or another network resource, and cause a denial of service for users of … Read more

How to install Asterisk on LINUX

Asterisk is a free, open-source framework for building communications applications and is sponsored by Sangoma. Asterisk turns an ordinary computer into a communications server. Asterisk powers IP PBX systems, VoIP gateways, conference servers, and other custom solutions. It is used by small businesses, large businesses, call centers, carriers, and government agencies, worldwide. What Can You … Read more

How to change MySQL data directory

Information managed by the MySQL server is stored under a directory known as the data directory. The following list briefly describes the items typically found in the data directory, with cross references for additional information: Data directory subdirectories. Each subdirectory of the data directory is a database directory and corresponds to a database managed by … Read more