Category: Systems

Search
30th anniversary of the first Linux release

Linux: from a hobby to a collaborative tech revolution

September 17th, 2022 was Linux’s 31st anniversary. Linux was first released as a free operating system kernel on September 17th, 1991. What started as “just a hobby” for Linus Torvalds became the kernel of the GNU OS and one of the world’s most important operating systems. Linux’s history from 1991 to 2022 Linus Torvalds was

READ MORE
secure connection with VPN

What is a VPN, how does it work and what is it used for?

A VPN or Virtual Private Network provides online security, privacy and anonymity. It is an excellent tool for protecting daily digital activities, both business and personal. From something as simple as sending an email to connecting to the dashboard of your company’s cloud environment without it being accessible over the Internet. In this article, we

READ MORE
SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm’s end of useful life

SHA-1 cryptographic algorithm has reached its end of useful life, after 27 years since its publication. The National Institute of Standards and Technology (NIST) recommends replacing it for newer, more secure algorithms like SHA-2 and SHA-3. It aims for the SHA-1 hash function to be completely phased out by the end of 2030. SHA-1 cryptographic

READ MORE
Commonly used Linux commands

65 commonly used Linux commands

The following commonly used Linux commands allow users to perform numerous tasks using the Command Line Interface (CLI) instead of the Graphical User Interface (GUI), increasing control and speed. List of some of the most used Linux commands The following list includes helpful and interesting Linux commands to use distributions more effectively and enjoy greater

READ MORE
SSH keys set up guide

Step-by-step guide to setting up SSH keys on a Linux server

Would you like to learn to set up SSH keys on a Linux server or to use public key authentication? We have created this step-by-step guide about how to set up SSH keys on a Linux server to improve security when establishing a remote connection. There are diverse alternatives to establish a remote and secure

READ MORE
Linux 6.0

Linux kernel 6.0

Linux kernel 6.0 introduces diverse performance improvements, support for new hardware and security fixes, among other things. This new major version is the successor of the Linux 5.x.y series, whose last version is Linux 5.19. Linux 6.0: some new features and improvements On October 2, 2022, Linus Torvalds announced Linux 6.0 as an update with

READ MORE
Geographical redundancy or georedundancy

Georedundancy: building a stronger business continuity strategy

Georedundancy or geographical redundancy allows companies to increase availability, resilience and fault tolerance. Relying on geographically distributed data centers contributes to building a stronger business continuity strategy. It is also referred to as “geo-replication” or “geographical replication”. What is georedundancy? Georedundancy consists in replicating data and IT infrastructure in multiple remote data centers. Its goal

READ MORE
New local privilege escalation vulnerability in VMware Tools

New local privilege escalation vulnerability in VMware Tools

On August 23rd 2022, VMware confirmed an important-rated security vulnerability affecting VMware Tools. This local privilege escalation vulnerability impacts Open VM Tools as well. VMware Tools vulnerability: CVE-2022-31676 Identified as CVE-2022-31676, this VMware Tools vulnerability can allow a potential attacker with local non-administrative access to the guest operating system (virtual machine) to escalate privileges as

READ MORE
Top web servers 2022

Which are the most popular web servers?

Nginx and Apache are undoubtedly the two most used web servers worldwide. Each of them holds about a third of the market. According to W3Techs’ data, Nginx holds about 34.2% of the market and Apache about 31.2% — 28.9% and 22.6% respectively according to Netcraft’s data. This list includes some of the most popular web

READ MORE
High Availability (HA)

High Availability (HA)

High Availability or HA eliminates single points of failure in IT systems to minimize the impact of a disruption in systems, databases and applications. Thus reducing the risk of damaging productivity and losing revenue. Redundancy and automatic failure detection are key features to achieve HA. High Availability & Operational performance High Availability refers to an

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.