try.directtry.direct

TryDirect blog

Article preview image

Best Cloud Providers in 2022

Cloud solutions do not require traditional IT costs, hardware, and software. The cloud model outsources all non-core business tasks, saving capital investment and support. Public cloud users can get the IT resources they need, and even the entire virtual data center, at a small price and pay only for what they use.

Our team has compiled a list of some of the most popular cloud providers currently available to help you make the right decision. Check this detailed analysis of all the pros and cons and choose the best mobility source for you and your business.

Article preview image

How to Protect Servers Using Iptables

A firewall is a tool that builds the network security of the server. It plays a significant role in monitoring the in-out flowing traffic. Thus, it becomes an important element for anyone who uses the internet.

Iptables is one of the oldest and most preferred tools used by many Linux users and system administrators.

In this tutorial, you will learn how to protect servers using iptables, basic iptables commands, and the application of the same on the Rocky Linux 8/CentOS 8.

Article preview image

How to Connect Your Server Using SSH With PEM Key File

This article aims to show you how to connect your server using SSH with the PEM key file. You will also learn how to set up a secure connection to your remote server from different platforms like Windows, Linux, and macOS.

Article preview image

PostgreSQL 14 Is Getting Faster| The Latest Upgrade

PostgreSQL 14 packs several features that developers have been waiting for a very long time. This update focuses primarily on improving performance and providing users with a faster, more secure, and user-friendly working environment.

If you have missed out on the huge change, no need to worry! Here, we will cover all the major features added to PostgreSQL 14 that developers should know.

How To Securely Transfer Files Using SFTP

In the previous article, you learned how to connect your server using ssh with the PEM key. In this article, we will show you how you can use the same SSH key, PEM file to securely transfer files using SFTP.

How to Secure Your Server Using Firewalld

The previous article about iptables demonstrated how it can be used to secure your system. Recently, a new firewall called FirewallD was introduced by Red Hat Enterprise Linux 7.0 (RHEL). FirewallD is the default firewall for Red Hat/CentOS/Rocky Linux and the SUSE family.

This tutorial will provide you with a basic understanding of FirewallD and the ways to secure your system using the firewall-cmd command.

Article preview image

How to Check Whether Your Server Is Online Using a Linux Command Line

We often need to check connectivity to troubleshoot network issues, or want to check whether our server is online. We created this article to show you how to do this.

There are many handy Linux tools for this:

1. Ping

Ping is one of the most widely used commands to check whether a server or remote host is up and responding. Ping sends ICMP ECHO_REQUEST to the server.

If ICMP is blocked from the server-side or cloud provider, then the ping command may not work as expected (like AWS ec2 instance).

Here, we assume that cloud providers firewalls do not block ICMP.

Everything You Need to Know About Fail2Ban

No application can be considered completely secure. Majority of them have flaws and weak areas, leaving doors open for security threats. You can opt for various solutions to secure your data. One of the most well-known ways is by using Fail2Ban.

What is Fail2Ban?

The obvious definition of this application includes monitoring the logs of common services and looking for malicious signs. It scans the log files and automatically bans the IPs with suspicious activity (e.g. a large number of failed login attempts) . These might include exploitations, password failures, etc.

Another Fail2Ban feature is to update the firewall rules. It comes with various filters, including apache, ssh, courier, etc. Each of them serves a different purpose and can be configured.

How to Use Fail2Ban to secure your server?

Now that you know what Fail2Ban is, let’s see how to use Fail2Ban to secure your server. Check this comprehensive Fail2Ban configuration guide:

How to Check Open Ports On a Linux Server?

How to check open ports on a Linux server?

We often have to check open ports on our Linux server to troubleshoot server problems, configure a firewall, and improve our server’s security. There are many third-party tools for this available in the market. In this article we will show you how to use nmap, netstat, ss, and lsof commands to check the open ports and find out the applications associated with those ports.

IP command In Linux With Usage Examples | Guide 2022

Many Linux users have used the ifconfig command as a primary tool for obtaining network information. However, this command is obsolete, and we now have the IP command in its place. The IP command has many features compared to the old ifconfig command. Today, you will learn how to use it by practical examples.

Best New Features of MySQL 8.0

MySQL is the most popular Database Management System that has upgraded over time, every upgrade coming with many exciting features. The same refers to MySQL 8.0.
MySQL 8.0 features set is something every developer should be aware of. We created an overall article about the new features of MySQL 8.0 for those, who’ve missed the update or would like to learn more details.

Hetzner Cloud Review | The New Features 2022

Firewall security with advanced protection

You can easily secure your infrastructure using stateful firewalls at no extra cost. Define inbound and outbound rules to deny unnecessary traffic. Once configured, you can assign as many cloud servers as you need.

Load balancer to distribute traffic

Load balancers make it stress-free to scale requests by automatically distributing traffic through your infrastructure. It handles use cases such as ...