What Is a Reverse Proxy?
A reverse proxy is an intermediary proxy service which takes a client request, passes it on to one or more servers, and subsequently delivers the server’s response to the client. A common reverse proxy configuring is to put Nginx in front of an Apache webserver. Using this method will allow both web servers to work together enabling each to do what they do best Continue reading
The solution for Sublime text Remote Editing: Sublime text is a powerful and most popular text editor for the Linux, Mac and Windows. But most often especially in windows, the issue is remote editing. Combining Sublime Text and ExpanDrive is a powerful solution for that. You can edit and manipulate files on SFTP/FTP or S3 in real-time from directly within the Sublime Text. Continue reading
MySQL Replication is a method, which uses for sync database two or more replica servers. Typically it’s known as “Master-Slave” Replication. Continue reading
We all know that the Microsoft Office is one of the most popular Office Package because of its interface and user-friendly tools. Also, we all know that the MS Access is very popular and handy RDBMS. Query designing and database management tools in access provide a very easy approach to users. Continue reading
It is about Install Laravel. Laravel is a free, open-source PHP web framework, created by Taylor Otwell and intended for the development of web applications following the model–view–controller (MVC) architectural pattern. Continue reading
Introduction: SSH Key Authentication is a way to log in any Linux server without any password. This authentication process uses public and private key instead of password. When a client attempts to authenticate using SSH keys, the server will test the client on whether they have the private key. If the client can prove that it owns the private key, a shell session is spawned or the requested command is executed. Continue reading
Using SSH protocol not only access your remote shell. But also use it for transfer files between computers securely through encrypted communication. You can use any one way out of following: Continue reading
This article is follow up of Enable root login on Ubuntu 16.04 LTS. Assume that you have already set the password for your root account. It will help you allow to login as root over SSH. SSH stands for Secure Shell that is a cryptographic network protocol for operating network services securely over an unsecured network. For example, remote login to computer systems by users. SSH works over port 22. As usual, for better security root ssh access is set as by default “
Prohibit-password",That means to you is that, if you are trying to ssh to your server with your root account and password, you will receive an access denied error. Continue reading
SSHFS (Secure SHell File System) use to mount the remote file system and interact with remote directories and files on a local machine using secure file transfer protocol (SFTP). Continue reading
LEARN & ENJOY COMPUTER FACTS
1) The first computers were programmed using Machine language.
2) A filename is a unique name that you give to a file of information.
3) Any data or instruction entered into the memory of a computer is considered as storage. Continue reading