Intel® SGX press release featured image

CloudSigma Partners with Intel to Deliver Next-Generation Confidential Computing

Zug, Switzerland – April 2022– Thanks to CloudSigma’s successful collaboration with Intel as a Titanium Partner, we have launched the ability for customers in Switzerland to create Intel® Software Guard Extensions (Intel® SGX) with their cloud servers. The new feature enhances the user experience through advanced security features for confidential computing. Intel® SGX is a security-related instruction set built into …

Generating SSH Key Pairs with PuTTY featured image

Generating SSH Key Pairs with PuTTY to Connect to a VPS

Security is a prime consideration for server admins, especially when there is a need to access servers remotely at regular intervals. Protection from cyber-attacks is of crucial importance to streamline workflows and to ensure business continuity. The standard practice of using a username and password is highly insecure, unsafe, and ineffective. You need a robust and advanced method like SSH …

Apache Tomcat installation blog post featured image

Installing Apache Tomcat 9 on Ubuntu 20.04

Apache Tomcat software is a Java-based HTTP server that can run Java technologies like Java Servlet, JavaServer Pages (JSP), and Java Expression Language. The advanced built-in customization options, high flexibility, and impressive stability make the software highly in-demand and a popular pick among developers globally. Let’s see what makes Apache Tomcat stand out among competitors: Open-Source Apache Tomcat is an …

Routing Web Traffic without a VPN using SOCKS Tunnel-

Routing Web Traffic without a VPN using SOCKS Tunnel

When it comes to securing your footprint on the web, you may have heard about VPNs, right? VPN acts as a middleman between your computer and the internet. All the traffic passes through the VPN server, effectively masking your IP address and location. However, VPN isn’t the only form of a proxy server. SOCKS (Socket Secure) is a similar network …

firewall featured image blog post

Configuring a Firewall with UFW on Ubuntu 18.04

A firewall is one of the core components of securing a system. It’s responsible for managing the incoming and outgoing connections over the network. It’s the primary line of defense for your servers and data. This is why it’s paramount to have a well-configured firewall. In this guide, we will walk you through the steps of setting up a firewall …

Wordpress Cloud Hosting featured image

Why Should You Turn to WordPress Cloud Hosting for Your Website?

Gone are the days when cloud computing used to be nothing more than just a buzzword. In fact, it has become a necessity if a company wants to keep up with its competitors and focus on developing its business. If you are currently paying a third-party provider for web hosting services, it is high time for you to seriously consider …

secure redis featured image

How to Install and Secure Redis on Ubuntu 18.04

Redis is a powerful in-memory key-value store that can be used as a database server, cache, and message broker. It’s widely known for its fast performance, flexibility, and support for a wide variety of languages. It’s free and open-source software that’s written in the C programming language. In this guide, check out how to install and secure Redis on Ubuntu …

How-To-Setup-a-Firewall-with-UFW-on-an-Ubuntu-and-Debian-Cloud-Server-01

Setting up a UFW on Ubuntu and Debian Cloud Server

Introduction We all know that computer security is essential for protecting your data. If a hacker was to find their way into your server, they can cause some serious damage. To make sure this doesn’t happen, you need to employ the appropriate security measures. The first line of defense that any incoming threat would encounter in a safeguarded system would …

Relational Database Management Systems Compared featured image

SQLite vs MySQL vs. PostgreSQL: Relational Database Management Systems Compared

Introduction Database management tools are mostly used by the relational data model. This model organizes data into tables consisting of columns and rows. While this model remains dominant in terms of storing and managing worldwide data, there are other data models such as NoSQL and NewSQL out there. In this tutorial we will delve into three of the most widely …

OpenSSL featured image

OpenSSL Essentials: Working with Private Keys, Certificate Signing Requests, and SSL Certificates

OpenSSL is an open-source cryptography library that includes a variety of commands used in the TLS Protocol and Public Key Infrastructure. OpenSSL was released in 1998 and is available for Windows, Linux, macOS, and BSD systems. The OpenSSL command will help you perform various tasks including Certificate Signing Request (CSR), private keys generation, and SSL certification. OpenSSL is important because …

UFW featured image

The Basics of UFW: Learning the Essential Firewall Commands 

Introduction UFW stands for uncomplicated firewall. It is a frontend platform that enables you to easily manage your firewall functions and commands. You get UFW as a default option with your Ubuntu server. Maximizing the potential of the commands and functions of the firewall can be difficult if you are not already familiar with the tool. Our goal is to …

Nginx with Let's Encrypt featured image

How to Secure Nginx with Let’s Encrypt on Ubuntu 20.04

Having a secure website is vital to ensuring a reputable online presence for any business. Website security should be among your top concerns especially if you are transferring sensitive data between your website and your website visitors. A simple Google search of ‘how to secure a website’ will bring you several directives. One of the top results is an SSL …