• December 30, 2022

One-Click GitLab

Introduction The One-Click GitLab application is a ready-to-use GitLab Community Edition (CE) running on Ubuntu Server. GitLab requires an instance with at least 2GB RAM and 2 CPU cores. Self-Signed SSL It’s preferred to configure GitLab with a domain name and valid SSL certificate, but it’s possible to access the GitLab application…

Read More

Implement Apache CouchDB with Python on Ubuntu 20.04

Introduction Apache CouchDB is a NoSQL document-based database server that stores data in JSON format. This guide explains how to access CouchDB in Python. By default, CouchDB ships with an HTTP API for performing database operations. However, you may want to combine the power of the CouchDB database with the…

Read More

How to Repair a Corrupted MySQL Table

Introduction MySQL is a Relational Database Management System (RDBMS). An RDBMS is a database management system (DBMS) that stores related data in tables. These tables form rows called records and columns called attributes, with a unique key identifying each row. RDMSes such as MySQL include functionality to preserve data integrity,…

Read More

How to Migrate to Vultr Managed Databases

Introduction Moving your databases to Vultr is a simple task with our managed migration systems. In this guide you’ll find instructions to migrate to Vultr Managed Databases for MySQL, PostgreSQL, and Redis. MySQL Migration You can migrate any existing MySQL database to a Vultr managed database as long as the…

Read More

Install and Configure Redis on CentOS 8

Introduction Redis is an open-source in-memory data structure store. You can use it as a Memcached alternative to store simple key-value pairs, as a NoSQL database, or even a message broker with the Pub-Sub pattern. This guide will show you how to install, configure, fine-tune, and secure Redis on CentOS…

Read More

Cross Site Scripting Vulnerability in Horde Webmail

Situation Cross Site Scripting Vulnerability in Horde Webmail discovered in the Horde webmail. Impact A code vulnerability in Horde that allows an attacker to gain full access to the email account when it loads the preview of an OpenOffice document from an email attachment. Call to Action The vulnerability has no…

Read More