Category: Tutorials

The Liquid Web knowledgebase provides information on thousands of topics surrounding every aspect of hosting, Linux, Windows, and countless other article types that help boost your Liquid Web experience!

Reading Time: 8 minutes

In this article, we will be discussing what it means to employ a “Managed Server” versus an “Unmanaged Server” and what the primary differences are. This article is written in response to ongoing questions we have received from clients regarding the types of resources, services, and capabilities that are included when a managed server is selected for use.

Continue reading →
Reading Time: 3 minutes

In this day and age, changing passwords regularly is essential to your internet security. Frequent updates prevent unwanted access to your accounts and sensitive data and keep you one step ahead of possible cyberattacks. By changing passwords regularly, you can stay one step ahead of potential cyberthreats and enhance your digital safety.

Continue reading →
Reading Time: 7 minutes

UFW is the acronym for the Uncomplicated Firewall application used to administer your firewall rules on Ubuntu, Debian, and Arch Linux. As you proactively manage your firewall to avoid cyberattacks, blocking internet protocol (IP) addresses or whitelisting only those IPs allowed are two different firewall management approaches that can assist you. Regardless of the approach, all system administrators want to manage the incoming network traffic and firewall security to stop bad actors with harmful intentions.

Continue reading →
Reading Time: 8 minutes

In today's ever-changing cybersecurity landscape, protecting your server from potential attackers is critical. AlmaLinux, a stable and community-supported Linux distribution, serves as a solid base for hosting services. However, proactive measures must be made to harden the server's defenses, and Fail2Ban is one such vital tool for this purpose.

Continue reading →
Reading Time: 5 minutes

Like an Apache virtual host, a NGINX virtual host (server block) allows you to host multiple domains or websites on your server. The configuration of NGINX virtual hosts — or server blocks as they are referred to on NGINX — will be covered in this article. The Linux distribution documented in our scenario discussed below will be AlmaLinux.

Continue reading →
Reading Time: 7 minutes

In this article we will examine how to integrate a Bitwarden instance with the Cloudflare Access product from Cloudflare, Inc. Adding an additional degree of security and control is typically required for this integration to communicate with the Bitwarden service for password management.

Continue reading →
Reading Time: 6 minutes

This article will walk you through the Yarn installation process on AlmaLinux in simple steps. AlmaLinux provides a solid base for a wide range of development projects, and installing Yarn on this platform can help with project dependency management. We will also explore how Liquid Web products can help this installation by offering a reliable hosting environment and competent support.

Continue reading →
Reading Time: 10 minutes

Logical volume management (LVM) is a powerful storage administration framework that abstracts the physical layout of storage devices by introducing logical volumes. Taking advantage of the Linux device mapper kernel driver, LVM offers a software version of a storage area network (SAN), allowing for more efficient and flexible storage utilization and management through dynamic resizing and storage allocation.

Continue reading →
Reading Time: 6 minutes


An NTP or Network Time Protocol server is a crucial component in networked environments that synchronizes computer and device clocks, ensuring accurate and consistent time for various operations. It obtains precise time information from reliable sources and distributes it to client devices, providing synchronized clocks across the network. This synchronization is vital for log accuracy, security protocols, coordination in distributed systems, and regulatory compliance.

Continue reading →
Reading Time: 7 minutes

Email has become an integral part of communication, whether you’re running a small business or you’re a larger corporation. Since email is so widely used in daily life, many assume it’s safe and secure. Yet no one knows where every email comes from — and therein lies the problem. However, email authentication is a best practice that can help alleviate some of the risk. As well, regarding the topic of email security, The top 6 reasons to separate business email from your server article looks at the value of our Premium Email Hosting product offering. It has many advanced features to block cyber threats related to email.

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434