Author: Choudhury S

Choudhury is the founder and chief editor of ZoomTutorials Blog, a leading tutorials and technology blogging site specializing in DevOps, SysAdmin and Cloud Technologies to help IT professionals in their day to day work. He is a Senior Cloud and DevOps Solutions Engineer at a leading eCommerce development Company and has more than 10+ years of Cloud, DevOps and SysAdmin experience working with Fortune 500 companies to solve their most important IT backbones. He lives in Hyderabad with his wife and a son.

IIS

As a sysadmin, our basic responsibilities is to provide a secure infrastructure to the organization. In our daily function we come across a lot of request for FTP user creation. FTP is a service which allows user to transfer files from one system/server to a remote server/system. FTP User Isolation is one of the best ways to secure your IIS FTP site and prevent users from accessing restricted content. Whether your Windows Cloud server provides dedicated hosting or shared hosting, leveraging FTP user isolation will provide an additional layer of security over the standard authentication and authorization. FTP User Isolation can be leveraged…

Read More
IIS

Before we directly jump to the configuration part, let me first explain what is SSL/TLS. SSL and TLS are cryptographic protocols that provide authentication and data encryption between different communication endpoints (e.g., a client connecting to a web server), with SSL the predecessor to TLS. Every few years we see that the new versions of SSL/TLS is released to address the security vulnerabilities (e.g., BEAST, POODLE, DROWN) and support the strongest and most secure cipher suites. The latest being TLS 1.3, which was just approved by the IETF (Internet Engineering Task Force). As a industry best practice, you should disable the old protocols which are vulnerable…

Read More

Basic Linux commands used by SysAdmin and Developers man – Manual Command man – Manual command in Linux is used to display or check the user manual of any command that we can run on the terminal. ls – List Command  ls –  List command in linux is used to list contents of a directory. The -l option enables long listing format as shown below: You can also type ls -l in short as ll and both shows same output as shown below: cat – Cat(concatenate) command cat – (short for “concatenate“) command in linux  is one of the most frequently used command in…

Read More

The below tutorial will give you a brief idea of Docker basic required to start the Docker journey. Please go through the complete video and drop a message in the comment section if you have any doubts and we will be happy to assist you clearing your doubts in your Docker journey. https://www.youtube.com/watch?v=VlSW-tztsvM

Read More
IIS

This tutorial explains how to configure multiple HTTPS site on a single IP using Server Name Indication (SNI). The process is split into two parts: Configuring multiple sites. Installing SSL and binding to the HTTPS URL. Configure the websites Please follow below steps to configure webiste in IIS: From the Start screen, find Internet Information Services (IIS) Manager and open it. In Internet Information Services (IIS) Manager, in the Connections pane, expand the name of the server. Right click on sites and Add website. 4. Provide Site name, Application pool, Physical path and the most important in hosting multiple site on single IP is the Host Name…

Read More
SSL

If your website is collecting any sensitive information (including payment details, email and password), then you need to be secure. One of the best ways to do that is to enable HTTPS, also known as SSL (secure socket layers), so that any information going to and from your server is automatically encrypted. The prevents hackers from sniffing out your visitors’ sensitive information as it passes through the internet. Your visitors will feel safer on your site when they see the lock while access your website – knowing it’s protected by a security certificate. Nowadays, SSL certificate available is of various…

Read More

DevOps has become an IT buzzword that is defined in different ways by different people. According to me, Devops is a set of practices that streamlines the software organization culture wherein the software devlopment, testing and operations coordinates effeciently to build, test and release a product much faster and more reliably. The main objective of the DevOps is to inculcate automation and monitoring at all steps of software building, from integration, testing, releasing to deployment and infrastructure management. DevOps aims at shorter development cycles, increased deployment frequency, and faster software releases, identify and solve issues quickly in close alignment with…

Read More

In order to understand DNS failover, let’s first understand what is a failover, when is this used and what are the advantages of using failover architecture. WHAT IS FAILOVER? Failover is the operational process of switching between primary and secondary server in the event of downtime. Such downtime could be caused by either scheduled maintenance, or unpredicted system or component failure. In either case, the object is to create fault tolerance. To ensure that mission-critical applications or systems are constantly available, regardless of the type or extent of the fault. In the larger picture, failover is a key component of business continuity…

Read More