Blog

FCC votes for net neutrality, a ban on paid fast lanes, and Title II

The Federal Communications Commission today voted to enforce net neutrality rules that prevent Internet providers—including cellular carriers—from blocking or throttling traffic or giving priority to Web services in exchange for payment. The most controversial part of the FCC's decision reclassifies fixed and mobile broadband as a telecommunications service, with providers to be regulated as common carriers under Title II of the Communications Act. This decision brings Internet service under the same type of regulatory regime faced by wireline telephone service and mobile voice, though the FCC is forbearing from stricter utility-style rules that it could also apply under Title II. The decision comes after a year of intense public interest, with the FCC receiving four million public comments from companies, trade associations, advocacy groups, and individuals. President Obama weighed in as well, asking the FCC to adopt...

How To Use SFTP to Securely Transfer Files with a Remote Server

What is SFTP?

FTP, or "File Transfer Protocol" is a popular method of transferring files between two remote systems. SFTP, which stands for SSH File Transfer Protocol, or Secure File Transfer Protocol, is a separate protocol packaged with SSH that works in a similar way over a secure connection. The advantage is the ability to leverage a secure connection to transfer files and traverse the filesystem on both the local and remote system. In almost all cases, SFTP is preferable to FTP because of its underlying security features and ability to piggy-back on an SSH connection. FTP is an insecure protocol that should only be used in limited cases or on networks you trust. Although SFTP is integrated into many graphical tools, this guide will demonstrate how to use it through its interactive command line interface.

How to Connect...

What is Domain Name Resolution

When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.systemtechs.net. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as 192.168.1.1. Therefore when you type a domain name in your program that you wish to connect to, your application must first convert it to an IP address that it will use to connect to. The way these hostnames are resolved to their mapped IP address is called Domain Name Resolution. On almost all operating systems whether they be Apple, Linux, Unix, Netware, or Windows the majority of resolutions from domain names to IP addresses are done through a procedure called DNS. Domain Name Resolutions As discussed above, Domain Name Resolution is the task of converting domain names...

How To Find Broken Links on Your Website Using Wget on Debian 7

Introduction

How many times have you clicked a HTML link on a webpage only to get a 404 Not Found error? Broken links exist because webpages sometimes get moved or deleted over time. It is the job of the webmaster to find those broken links before the human web visitors or the search engine robots do. Delay in correcting the problem results in bad user experience and possible penalty for search engine page ranking. If your website contains more than a few pages, manually checking each individual link becomes too labor intensive, but there are numerous tools that automate that task. You can use web-based apps, like ones provided by Google Webmaster Tools and the World Wide Web Consortium (W3C), but they generally lack more advanced features. If you run WordPress, you could use...

How to Optimize and Secure a Virtual Private Server (VPS)

How to Optimize and Secure a Virtual Private Server (VPS) This article covers a wide range of methods for securing and optimizing your VPS. We do not provide any warranty for this article, so if you are not sure what you are doing please make sure you research before you do it. Secure cPanel/WHM and the Root User on VDS: Checking for formmail: Form mail is used by hackers to send out spam email, by relay and injection methods. If you are using matts script or a version of it, you may be in jeopardy. Command to find pesky form mails: find / -name "[Ff]orm[mM]ai*" CGIemail is also a security risk: find / -name "[Cc]giemai*" (more…)...