As a sysadmin, our basic responsibilities is to provide a secure infrastructure to the organization. In our daily function we come across a lot of request for FTP user creation. FTP is a service which allows user to transfer files from one system/server to a remote server/system. FTP User Isolation is one of the best ways to secure your IIS FTP site and prevent users from accessing restricted content. Whether your Windows Cloud server provides dedicated hosting or shared hosting, leveraging FTP user isolation will provide an additional layer of security over the standard authentication and authorization. FTP User Isolation can be leveraged…
Author: ZT Admin
Before we directly jump to the configuration part, let me first explain what is SSL/TLS. SSL and TLS are cryptographic protocols that provide authentication and data encryption between different communication endpoints (e.g., a client connecting to a web server), with SSL the predecessor to TLS. Every few years we see that the new versions of SSL/TLS is released to address the security vulnerabilities (e.g., BEAST, POODLE, DROWN) and support the strongest and most secure cipher suites. The latest being TLS 1.3, which was just approved by the IETF (Internet Engineering Task Force). As a industry best practice, you should disable the old protocols which are vulnerable…
Basic Linux commands used by SysAdmin and Developers man – Manual Command man – Manual command in Linux is used to display or check the user manual of any command that we can run on the terminal. ls – List Command ls – List command in linux is used to list contents of a directory. The -l option enables long listing format as shown below: You can also type ls -l in short as ll and both shows same output as shown below: cat – Cat(concatenate) command cat – (short for “concatenate“) command in linux is one of the most frequently used command in…
The below tutorial will give you a brief idea of Docker basic required to start the Docker journey. Please go through the complete video and drop a message in the comment section if you have any doubts and we will be happy to assist you clearing your doubts in your Docker journey. https://www.youtube.com/watch?v=VlSW-tztsvM
This tutorial explains how to configure multiple HTTPS site on a single IP using Server Name Indication (SNI). The process is split into two parts: Configuring multiple sites. Installing SSL and binding to the HTTPS URL. Configure the websites Please follow below steps to configure webiste in IIS: From the Start screen, find Internet Information Services (IIS) Manager and open it. In Internet Information Services (IIS) Manager, in the Connections pane, expand the name of the server. Right click on sites and Add website. 4. Provide Site name, Application pool, Physical path and the most important in hosting multiple site on single IP is the Host Name…
If your website is collecting any sensitive information (including payment details, email and password), then you need to be secure. One of the best ways to do that is to enable HTTPS, also known as SSL (secure socket layers), so that any information going to and from your server is automatically encrypted. The prevents hackers from sniffing out your visitors’ sensitive information as it passes through the internet. Your visitors will feel safer on your site when they see the lock while access your website – knowing it’s protected by a security certificate. Nowadays, SSL certificate available is of various…
DevOps has become an IT buzzword that is defined in different ways by different people. According to me, Devops is a set of practices that streamlines the software organization culture wherein the software devlopment, testing and operations coordinates effeciently to build, test and release a product much faster and more reliably. The main objective of the DevOps is to inculcate automation and monitoring at all steps of software building, from integration, testing, releasing to deployment and infrastructure management. DevOps aims at shorter development cycles, increased deployment frequency, and faster software releases, identify and solve issues quickly in close alignment with…
In order to understand DNS failover, let’s first understand what is a failover, when is this used and what are the advantages of using failover architecture. WHAT IS FAILOVER? Failover is the operational process of switching between primary and secondary server in the event of downtime. Such downtime could be caused by either scheduled maintenance, or unpredicted system or component failure. In either case, the object is to create fault tolerance. To ensure that mission-critical applications or systems are constantly available, regardless of the type or extent of the fault. In the larger picture, failover is a key component of business continuity…