Tag: VPN
Top 15 Server Security Practices for 2020
In this article, we will denote the security best practices for 2020 and beyond. Because security is such a challenging subject for many, it often goes unheeded, and as such, many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.
As administrators for many of our VPS servers and Dedicated servers, we may find ourselves needing to do certain things while on the go. We may also not have a laptop or PC within reach. But one thing most of us have at all times is a cell phone. Whether we have an Android or an iPhone, most of us do possess a smartphone. One thing great about these smartphones is their constant connection to the Internet. Having that constant connection makes it simple to use various apps that assist with admin tasks through our smartphones. Here is a list of five applications available both on iPhone and Android. If you are interested in checking them out, click on your phone’s type next to the application name. You can also search for these applications by name in your smartphone’s app store.
HIPAA Compliant Hosting Checklist
In this guide, we outline the essential requirements for HIPAA compliant servers and how Liquid Web helps fulfill these necessities.
How to Use IPMI
IPMI (Intelligent Platform Management Interface) is a great way to manage your server remotely. Having IPMI combined with a Liquid Web VPN is similar to having a remote Kernel-based Virtual Machine (KVM) attached to your server.You’ll be able to perform actions remotely which traditionally accomplished when physically present at the machine. This process includes viewing the startup process, changing BIOS settings, installing the OS, and even power cycling your server. This guide is intended to walk you through the IPMI web interface, and explain the various pages. If you need help accessing IPMI, try this Knowledge Base article instead!
What is HIPAA Compliant Hosting?
HIPAA-Compliant Hosting provides a foundation for healthcare providers to build applications and services that comply with the Health Insurance Portability and Accountability Act (HIPAA) of 1996, which safeguards themselves and their client’s Personal Health Information (or PHI). Anyone who has access to PHI is required by law to follow these rules and regulations to protect the healthcare data's privacy in their charge.
What is a VPN Tunnel?
VPN Tunnel Meaning
The terms VPN or VPN Tunnel are tossed around all over the internet these days, but what are they really?
Encryption?
Connectivity?
A method to hide online activity?
In this article, we review what a VPN tunnel is, and discuss some specifics of this familiar but often misunderstood technology.
IPMI Dedicated VPN
IPMI stands for Intelligent Platform Management Interface. It is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities on the host systems CPU, firmware, and operating system. It defines a set of interfaces used by system administrators for out-of-band management of computer systems.
What is IPMI?
Customer Access with IPMI
Remote Desktop Protocol or SSH shell are great for managing your server remotely. But what if you need to do something outside the operating system, like changing network settings or adjusting the BIOS? Those tools cannot help you because they depend on the server’s operating system to function. Wouldn’t it be great to have KVM-like console access to your remote server? With IPMI, you can get browser based access independent of the operating system.
Using a VPN connection to manage your server can have a handful of benefits. Generally the most important benefit to using a VPN is security. When you connect to the Storm VPN your internet traffic to the Liquid Web network will be encrypted.
How to Configure Your Liquid Web VPN
Liquid Web offers a free Virtual Private Network (VPN) user with every account. A VPN uses encryption to secure your computer’s connection to the Internet and guarantees that all of the data you’re sending and receiving to the Liquid Web network is secured from any potential prying third parties.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.