Firewalls

How to Edit the hosts File in Windows and linux to Load an Example Domain from a Localhost Proxy

In a previous post, we wrote about configuring putty ssh port forwarding. However, for this to be useful, you do need to edit /etc/hosts (in linux) or the “hosts” file (in windows) to point your target domain to 127.0.0.1. So to help you get that going, this article will show how to edit those files

How to Use PuTTY as a SOCKS Proxy: A Step-by-Step Guide

If you want to securely access remote networks or encrypt your network traffic, using PuTTY as a SOCKS proxy is a great solution. This technique allows you to forward network traffic through a secure SSH tunnel, using the SOCKS protocol to provide a convenient way for applications to access the tunnel. In this blog post,

How to Use SSH Tunneling with PuTTY: A Step-by-Step Guide

If you want to securely access services on remote networks or encrypt your network traffic, SSH tunneling with PuTTY is a great solution. This technique allows you to forward network traffic from one network location to another in a secure manner, protecting your data from eavesdropping and tampering. In this blog post, we will provide

IPv4 Address Subnetting Explained

Every server at IOFlood comes standard with one /29 worth of IPv4 IP addresses.  Additional IP’s can be added at an extra cost, up to a total of one single /24 (or equivalent) worth of IPv4 addresses per server.   But how many IP’s do you really get with a /29 or a /24? In this

How to set up source nat routing (SNAT) in iptables to load balance outbound connections across multiple IP addresses

In our earlier days, before IOFlood, some of us ran web based proxy services. These were popular at workplaces or schools for accessing websites that were blocked there, such as gmail and myspace (remember myspace?). One common problem that came up, was that with so many users each sharing one IP on one server, our

nf_conntrack: table full, dropping packet — A solution for CentOS Dedicated Servers

A common problem you may experience is sluggish performance or disconnections from your Centos dedicated server, even though there is sufficient CPU, ram, disk i/o, etc. After some troubleshooting, you may come to believe you are being DDoS attacked, but you don’t see an unusual amount of traffic, and there’s no single IP or handful