Posts

Showing posts from 2015

Xen Vs OpenVZ

Image
While both Xen and OpenVZ are open source server virtualization technology, there exists some big differences between the two.  I think potential VPS customers might need to check the applications that need to be hosted to determine which one is the preferable virtualization technology. On one hand you have Xen, a para-virtualization platform that gives you much of the dedicated server behavior.  You run your own instance of Linux kernel, you can load your own kernel modules, you have properly virtualized memory, IO and scheduler, and it’s stable and predictable.  On the other hand you have OpenVZ, an operating-system level virtualization system that is just a thin layer on top of the underlying OS. It is simple to understand, has lower overhead, which usually translates to better performance. OpenVZ Memory Model. First of all, when VPSLink’s OpenVZ Link-3 says “256MB guaranteed”, it actually means around 232MB of “privvmpages”, 14MB of “

MONITOR YOUR WEB SERVERS REAL TIME

Image
If your team is managing the web servers for one of the busiest ecommerce site or a social media run site, its not quite easy to address all monitoring needs just by looking at the Nagios, Munin and other tools as they collect the data from server and then produce the infographics or send alerts. Even if you don’t have these tools setup, its better to use tools that give visibility to real time data in a readable format. Take a look at the situation where your web server (Nginx) is failing to serve the pages of your PHP or Rails application hosted. If you don’t see the web service failing but the application not being able to load the sites (Ex: 502 error upstream was unable to serve the page), it is sure that the webserver needs to be checked for configuration optimization. Ngxtop one such tool that you would like to use with your Nginx. This would get you a quick and easy access to incoming requests coming your way from various ip’s, help you see the U

The world of Software Testing

Image
Software testing is a critical element of software quality assurance and represents the ultimate process to ensure the correctness of the product.  The quality product always enhances the customer confidence in using the product thereby increases the business economics. In other words, a good quality product means zero defects, which is derived from a better quality process in testing. Software is an integrated set of Program codes, designed logically to implement a particular function or to automate a particular process. To develop a software product or project, user needs and constraints must be determined and explicitly stated. The development process is broadly classified into two. 1. Product development 2. Project development Product development is done assuming a wide range of customers and their needs. This type of development involves customers from all domains and collecting requirements from many different environments. Project Development is don

cPanel Updates – January 2015

We have new updates from cPanel. 1. Introducing cPanel & WHM 11.48   cPanel, Inc. has released cPanel & WHM software version 11.48 in the CURRENT tier. The newest version of cPanel & WHM has arrived and it’s filled with exciting new updates for both hosting providers and website owners.  With advances in both mail and security, along with bolder branding opportunities, users will gain even more control of their cPanel experience in this latest version. Reinforced Security cPanel & WHM 11.48 includes a stronger, more comprehensive security package that incorporates the latest in OWASP ModSecurity rules. With the addition of updates to their brute force protection system, cPHulk, this version promises to be their safest, most secure release to date. Bolder Branding Hosting providers have increased brand visibility now that Paper Lantern has been extended into cPanel Webmail. In addition, the classic X3 layout is available a

Poodle – SSL Security Threat Explored

Poodle  is a breed of dog with legs that resembles cotton candies. It is intelligent and a regular staple at dog shows. Even the most friendly dogs have the propensity to bite.  Now we see all kinds of security alerts and snafus likes heartbleed and shell shock!!! The latest in addition is POODLE. All of this started when a team in Google developed and tested an attack named POODLE  (Padding Oracle On Downgraded Legacy Encryption) which uncovered vulnerability in  Secure Sockets Layer (SSL) version 3 protocol or in short SSLv3. SSLv3 is an obsolete but still used encryption in both older and new web browsers.  (It is an 18-year-old protocol which was replaced by the TLS protocol) POODLE tries to force the connection between your web browser and the server to downgrade  to SSLv3.  The POODLE attack takes advantage of the protocol version negotiation feature built into SSL/TLS to force the use of SSL 3.0 and then uses this new vulnerability to decrypt sele