Русский flag Русский

Case Studies

How to Install Jitsi Meet on Your Server Using Docker

2025-09-09

Want to set up your own fully private video conferencing server?
Jitsi Meet is a great choice, and installing it with Docker is the fastest and most reliable way. This article provides a step-by-step guide to get your server up and running in just a few minutes.


Step 1: Preparation

Before installing, make sure you have:

  • A Linux server (e.g., Ubuntu).
  • A domain name pointing to your server’s IP (e.g., meet.your-domain.com).
  • Installed Docker and Docker Compose.

👉 If Docker isn’t installed yet — use the instructions from the previous article.

curl for beginners: your first step into the world of HTTP requests

2025-09-08

Hello! If you’re even a little interested in the web, you’ve probably heard of curl. It’s a powerful and versatile command-line tool for interacting with web servers. It is used to send and receive data over various protocols: HTTP, FTP, SFTP, as well as mail protocols.

This guide is your first step. We’ll focus on the basics to help you understand how curl works and how to use it for everyday tasks.

Logrotate and Docker: Why and How?

2025-09-05


Introduction

Logrotate is a powerful tool for log management in Linux, but its interaction with Docker has its own specifics. This guide explains how to properly use logrotate with Docker containers and when it’s better to rely on Docker’s built-in log management tools.


Docker Containers and Logs

Docker collects logs from the standard output streams (stdout and stderr) of containers and, by default, stores them as JSON files:


/var/lib/docker/containers/\<container\_id>/\<container\_id>-json.log

If a container generates a lot of logs, these files can take up gigabytes and quickly consume all available disk space.

Swap: Why You Need It and How to Enable It

2025-09-03

Swap is virtual memory on disk that saves your VPS from crashing when RAM runs out. On low-cost servers, it’s an indispensable tool to avoid failures during short-term memory usage spikes. Setup is simple: create a file, enable it, and add it to autoload. But remember — it’s insurance, not a replacement for RAM.


Introduction

Modern VPSs are usually provisioned with enough RAM but often without swap (swap file or partition). This is a deliberate choice by providers who want you to quickly upgrade to a more expensive plan.

MTU Issue on reg.ru and Its Solution via iptables

2025-08-05


Introduction: A Hidden Network Issue

Developers and system administrators using servers on the OpenStack platform (for example, the C*-M*-D* hosting plans from reg.ru) sometimes encounter mysterious network problems. The internet seems to work, but when trying to transfer large amounts of data or establish connections to certain services, requests may hang or fail due to timeouts.

The provider explains this issue as a feature of their infrastructure:

Servers on the OpenStack platform use VxLAN technology, which reserves 50 bytes for service information. Because of this, the maximum transmission unit (MTU) on the server’s main network interface (ens3) is 1450 bytes.

Dokploy: Simple Management of Docker Applications on Your Server

2025-07-29

In the world of self-hosted solutions for application management, Dokploy is a modern and powerful platform designed to significantly simplify the deployment and management of Docker containers on your own server. Forget about the complexities of manually configuring Docker Compose, Nginx, or Traefik—Dokploy offers an intuitive web interface that makes this process accessible even to those just starting their journey into containerization. It’s the perfect solution for developers and teams seeking full control over their infrastructure without unnecessary hassle.

Configuring EoIP Tunnel Between MikroTik and Keenetic: Bridging Networks Over Private IPs

2025-07-17

In the world of networking, there’s often a need to bridge two remote LANs so they behave like a single local network—even when separated by different routers. For MikroTik users, the concept of EoIP (Ethernet over IP) is familiar: it’s a proprietary tunneling protocol that allows creation of a virtual Ethernet interface (Layer 2) over an IP network.

Good news for Keenetic users: since firmware NDMS v2.10, Keenetic routers also support EoIP! This opens up exciting possibilities for advanced network designs.

Case Study: Configuring Port Knocking on MikroTik for Enhanced Security

2025-07-16

In a world where cyberattacks are becoming increasingly sophisticated, protecting remote access to servers and network equipment is of paramount importance. Simply opening ports for SSH, RDP, or web interfaces makes them targets for constant scanning and brute-force attacks.

Today, we’ll explore a powerful yet lesser-known technique that significantly improves the security of your MikroTik (and not only): Port Knocking. It’s not just about “closing ports,” but a smart system that makes your services invisible to most scanners and bots.

What is rp_filter and what is it used for?

2025-07-15

In the world of Linux and networking technologies, there are many subtle but critically important kernel settings. One such setting is rp_filter. This parameter, often overlooked, plays a key role in network security and correct packet routing. Let’s explore what it is, how it works, and why understanding it is essential for every system administrator.

What is rp_filter?

rp_filter stands for Reverse Path Filtering. It’s a Linux kernel mechanism that checks incoming network packets to verify whether they arrived on the interface through which a reply to the sender’s IP address would be routed.

How to Restore Access to WordPress Administrator: Resetting Password via Database

2025-07-14

Losing access to the WordPress administrator account can be a real headache. Sometimes, standard password recovery methods (via email) don’t work, especially if:

  • You forgot both your login and password.
  • The site’s mail sending function (wp_mail) is broken.
  • The WordPress admin panel is broken or unavailable.
  • The only access left is to the database (via MySQL client, phpMyAdmin, WP-CLI, etc.).

In this article, we’ll walk through a reliable and secure way to find the WordPress administrator directly in the database and reset their password using SQL. We’ll follow DevSecOps best practices to avoid breaking serialized data and minimize risks.