September 10, 2025
Jitsi Meet: Enabling Authentication and Server Optimization
In the previous article, we deployed a basic Jitsi Meet server using Docker.
Now let’s look at how to secure your server, enable authentication, and optimize performance for stable video calls.
Authentication: Invite-Only Access
By default, Jitsi Meet allows anyone to create rooms. To restrict access — enable Secure Domain.
- Open the
.env
file and find the Prosody (XMPP server) section.ENABLE_AUTH=1
AUTH_TYPE=internal
Here, internal
means that users will be stored locally.
September 5, 2025
Logrotate and Docker: Why and How?
Introduction
Logrotate
is a powerful tool for log management in Linux, but its interaction with Docker has its own specifics.
This guide explains how to properly use logrotate
with Docker containers and when it’s better to rely on Docker’s built-in log management tools.
Docker Containers and Logs
Docker collects logs from the standard output streams (stdout
and stderr
) of containers and, by default, stores them as JSON files:
September 3, 2025
Swap is virtual memory on disk that saves your VPS from crashing when RAM runs out. On low-cost servers, it’s an indispensable tool to avoid failures during short-term memory usage spikes. Setup is simple: create a file, enable it, and add it to autoload. But remember — it’s insurance, not a replacement for RAM.
Introduction
Modern VPSs are usually provisioned with enough RAM but often without swap (swap file or partition). This is a deliberate choice by providers who want you to quickly upgrade to a more expensive plan.
July 4, 2025
Introduction: Why Do You Need a Website Control Panel?
Imagine you’ve bought a piece of land and built a house on it (your website). Now you need to manage the house: connect electricity (domains), install plumbing (databases), set up security (SSL certificates), maintain order (files), and even let tenants in (FTP users). You could do all of this manually, but it’s complex, time-consuming, and requires specialized skills.
This is where website control panels come in. These are graphical web interfaces that significantly simplify the process of managing your web server and all the components needed to run a website. Instead of entering complex terminal commands, you simply click buttons and fill out forms in a user-friendly browser interface.
July 1, 2025
Part 1: Getting to Know n8n – Your Swiss Army Knife for Automation
Introduction to n8n: What is it and why does it matter?
In today’s fast-paced world, routine tasks can consume too much time and energy. This is where automation tools come to the rescue. You’ve probably heard of “low-code” and “no-code” concepts that allow you to build powerful applications and automate processes without deep programming knowledge. One of the most prominent tools in this space is n8n.
June 19, 2025
In today’s internet-driven world, where data constantly travels between millions of devices, it’s often not enough to establish a direct connection — you may need a “middleman.” That’s where a proxy server comes in. It acts as a bridge between you (the client) and the destination resource (server), handling network requests on your behalf. Understanding how proxies work is critical for network security, optimization, and access management.
What is a Proxy Server?
A proxy server (from the English proxy — representative, intermediary) is a server in a computer network that acts as an intermediary between a user (client) and other internet servers. All client requests go through the proxy first, which then forwards them to the destination server. Responses from the destination server also return to the proxy first before being sent back to the client.