How to Use Plesk for Backups
In this article you will get to know how to backup your Plesk-data to S3-compatible storage.
In this article you will get to know how to backup your Plesk-data to S3-compatible storage.
In this tutorial, we’ll show you how to self-host Bitwarden using a virtual private server (VPS).
Setting up Docker and instantly deploying a Container over and over again can be time consuming. With Cloud-Init this just takes a few seconds!
The Ultimate Guide to Docker installation and deployment using Cloud-Init Read More »
LAMP Stack (Linux, Apache, MySQL & PHP) is widely used for Web applications. In this article we will show you how to set up and run LAMP on your Server. This process only takes 90 seconds – thanks to Cloud-Init.
Get LAMP Stack Up and Running on Your Server in Less than 90 Seconds using Cloud-Init Read More »
Nextcloud is a popular Open Source productivity platform among the self-hosting community. This tutorial will teach you how to install Nextcloud on VPS. We’ve included both a step-by-step video guide and written tutorial.
The process of setting up new server instances can be very annoying and time-consuming. While Docker can be used to replicate a certain software environment, Cloud-Init can be used to replicate the whole server with all of its programs and configurations.
Despite all the hype, virtual machines are not likely to be fully substituted by containers in the future. Those are complementary technologies, not rivals – containers and virtual machines are often used in the same cloud infrastructure.
Containers vs Virtual Machines (Cloud Explained Series) Read More »
User rights is one of the first concepts you have to understand when dealing with Linux. This guide is ideal for users who just installed their first Linux on the computer, or for users who are starting out with their first Linux server. We wrote this article in mind to help our customers as well
A Practical Guide to Superuser Accounts, sudo & root Read More »
Simply password-protecting your Linux server no longer cuts it (they’re vulnerable to online and offline brute force and dictionary attacks, and people historically are terrible with maintaining secure password practices): you have to secure it with SSH keys. This tutorial will teach you what are SSH keys and how to replace the default Linux password