Feature Image

How To Configure SSH Key-Based Authentication on a Linux Server

Introduction SSH, or secure shell, is an encrypted protocol used to administer and communicat ...

Read more

Feature Image

How to setup database cluster for high availability : Digital ocean with Maria DB

When dealing with applications on the cloud, it is often best to have replications and redundan ...

Read more

Feature Image

What if we can code humans. Comparing humans with machine !

Let me start by asking each one of you reading this blog a question. Do you live every moment of yo ...

Read more

Start Creating & MANAGING Beautiful Websites/Stores/Businesses

contact us | Terms and conditions | affiliates