Proactive Computing | Optimizing IT for usability, performance and reliability since 1997

Category: #Servers (Page 1 of 3)

Auto Added by WPeMatico

How to Set Up a Reverse Proxy With Apache

27cf8f38.jpg
Apache is a versatile web server which offers a full complement of supporting features, some of them via extensions. In this article, we’ll use the mod_proxy module to configure Apache in a reverse proxy role.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/15059/how-to-set-up-a-reverse-proxy-with-apache/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: James Walker

Privacy-Protective Internet Browser Tor Is Running Low on Servers

792a936cb47c77f21212f115ff53ca5d.png

The Tor browser, arguably the best privacy-protective internet browser available for most people, is running low on bridge servers. The decline in servers affects the browser’s ability to combat censorship and provide a gateway to the open internet in places where governments and other entities tightly control access…

Read more…

Source: https://gizmodo.com/privacy-protective-internet-browser-tor-is-running-low-1848095632
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Jody Serrano

How to Run Your Own DNS Server on Your Local Network

c73ebab4.jpg
Running your own DNS server is a great way to accelerate your network’s responsiveness, reduce your reliance on public infrastructure, and benefit from extra functionality like hostname routing. Here’s how to set up a DNS server on a Linux machine using Dnsmasq.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/14816/how-to-run-your-own-dns-server-on-your-local-network/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: James Walker

DKIM, DMARC, and SPF: Setting Up Email Security

46feb9e1.jpg
DKIM, DMARC, and SPF are the three main mechanisms maintaining the security of emails. The related protocols let you prevent unauthorized servers from sending as your domain and give recipients a way to verify emails really come from you.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/14608/dkim-dmarc-and-spf-setting-up-email-security/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: James Walker

What Is Just-In-Time (JIT) Compilation?

08aed692.png
Just-In-Time compilation, or JIT, is a technique used by runtime interpreters for languages like JavaScript, C#, and Java to bring execution speeds closer to the native performance offered by precompiled binary languages like C++.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/6872/what-is-just-in-time-jit-compilation/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Anthony Heddings

How to Recursively Change File Permissions in Linux

linux-file-permissions-featured.jpg Because Linux is a multi-user operating system, it has a mechanism that sets and manages file permissions to ensure that only authorized processes and users can access various directories and files. As you use Linux, you may encounter various instances where you can’t edit files or directories because of the “Permission denied” error, indicating you do not have the required privileges. This tutorial will show you how to recursively change file permissions in Linux to ensure that your permission settings apply to sub-folders and files. How to check file permission(s) in Linux When the “permission denied” error occurs… Read more14633309.gif

Source: https://tracking.feedpress.com/link/12555/14633309/change-file-permissions-linux
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: John Wachira

How to Run Nmap without Root or Sudo

nmap.jpg Nmap, short for Network Mapper, is one of the most used portmapper and network scanning tools. While it is possible to run some of Nmap’s basic functions as an unprivileged/normal user, using most of its advanced features requires root or sudo privileges. For example, some advanced port scanning features like NULL, Stealth SYN Scan, and many others can only work with root privileges because Nmap needs to access raw packet data to give you adequate/usable results. Whenever you try to run such advanced features without sudo privileges, the tool will prompt you with the “requires root privileges” message…. Read more14584469.gif

Source: https://tracking.feedpress.com/link/12555/14584469/run-nmap-without-root-or-sudo
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: John Wachira

Installing Chrome/Firefox on a New Windows Server, the Easy Way

8b58def4.png
Windows Server comes with default “Enhanced Security Configuration” protections for Internet Explorer that block websites that aren’t trusted. The problem? This blocks you from installing a proper browser like Chrome and getting on with the rest of your job.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/10445/installing-chrome-firefox-on-a-new-windows-server-the-easy-way/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Anthony Heddings

Chinese hackers are leveraging flaws in Microsoft Exchange Server to steal emails

Security researchers reported at least 30,000 organizations across the US have been hacked over the past few days by an unusually aggressive Chinese cyber-espionage unit focused on stealing email. The researchers say that many of the organizations targeted in the act include small businesses, cities, and local governments. The group of hackers is exploiting four newly-discovered flaws in Microsoft Exchange … Continue reading

Source: https://www.slashgear.com/chinese-hackers-are-leveraging-flaws-in-microsoft-exchange-server-to-steal-emails-08662578/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Satsuki Then

Everything You Need to Set Up a Plex Server

4a47a0db-5.png
A Plex Media Server makes it easy to stream or share your movie and music collection the same way that you stream Netflix or Hulu. No hassle, no fuss, just dump all your media in the server and stream it to any device. But setting up a Plex server is easier said than done, especially when there are so many different devices that can function as a Plex server.

Read This Article on Review Geek ›

Source: https://www.reviewgeek.com/70552/everything-you-need-to-set-up-a-plex-server/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Andrew Heinzman

« Older posts