Blog 1 Column

16
Dec

Backup Memory To Host The Windows for Microsoft Hyper-V

As you know, the virtualization platform Microsoft Hyper-V Servers R2 SP1 allows you to redistribute the available memory between the guest OS virtual machine (each machine has a guaranteed minimum, and used memory can grow dynamically up to a certain limit). But to make Dynamic Memory beautifully worked for large...
Read More
14
Dec

Misconceptions Surrounding Colocation Web Hosting

There is so much talk about managed hosting services, dedicated web hosting and cloud hosting, that colocation hosting is getting a bit sidelined. Or misunderstood. Colocation hosting is one of the most efficient and affordable hosting options for small to medium businesses who cannot afford dedicated web hosting and don’t...
Read More
13
Dec

Start up in Windows

Today it is difficult to find an organization that has not been subjected to virus attacks. And although almost everywhere already have antivirus software installed, it is sometimes necessary to manually see where in the registry run programs, and not even necessarily harmful. When searching for the resident malware we...
Read More
11
Dec

Munin. Replacement of MRTG.

Rummaging in the wilds of the Internet has dug up an interesting tool Munin. Its main purpose is rendering many indicators of the operating system on which it is installed and not just on it. The tool is very convenient and easy to install. CentOS for just a couple of...
Read More
11
Dec

Web Database

Sometimes, the databases can grow so huge that they need to be hosted separately to maintain data security and also to isolate the precious data from the buggy applications hosted on a common web server. Depending upon your requirements, you can pick the kind of database hosting service you’re interested...
Read More
10
Dec

Problems connecting to SQL Server Y

On the forums, you often see the question: “Can not connect to SQL Server-y.” Causes of problems with connecting to SQL Server-in can be many, but there are simpler methods of diagnosis and identification of problems connecting to the web hosting server. Step 1. Try to “ping” the database server...
Read More
10
Dec

What does Mod_security refer to ?

ModSecurity is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases...
Read More
10
Dec

How To Secure My Domain Name ?

Brief Description Domain names are a hot commodity these days. For some, selecting a domain name is a thorough process that takes a bit of research and time to complete. While it’s extremely important to select one that fits your business best, you can take things a step further by...
Read More
09
Dec

A list of MS SQL servers to managed C + +

#include “stdafx.h” using namespace System; using namespace System::Collections; using namespace System::Collections::Specialized; using namespace System::Net; using namespace System::Net::Sockets; using namespace System::Threading; using namespace System:ata; using namespace System:ata::OleDb; using namespace System::Text; namespace Util { public ref class SqlServerInfo { private : String^ m_ServerName; String^ m_InstanceName; bool        m_IsClustered; String^ m_Version; int                m_tcpPort; String^ m_Np; String^...
Read More
09
Dec

What does php SUexec refer to ?

Introduction PHPSuexec is the shortened term often used to describe running PHP as a CGI with Suexec. Running PHP as a CGI with Suexec creates a much more secure environment compared to running PHP as an Apache module. Below we will describe the differences in the two forms of PHP,...
Read More