Русский flag Русский Español flag Español

Case Studies

2025-10-12

Integrating a page created in an external website builder into your domain allows you to extend functionality and maintain a consistent interface style. This article explains how to use an NGINX reverse proxy to embed pages from an external service (for example, example.website-builder.com) into your site your-main-site.com at paths /path1/ and /path2/.


⚙️ How it works

NGINX forwards requests from your domain to the external site, acting as an intermediary between the user and the builder service.

Read more
2025-10-11

Many website owners, startups and small projects want an email like info@вашдомен.ru, but aren’t ready to pay for corporate email hosting.
ImprovMX solves this — it forwards incoming mail from your domain to any personal mailbox (for example, Gmail or Yandex) for free. The free plan has limits on the number of aliases and forwarded mail volume; active use may require a paid plan.


🧐 Step 1. Create a free email alias

  1. Go to improvmx.com.
  2. In the Your domain name field enter your domain (for example, vashdomen.ru). Make sure it’s registered and active.
  3. In the Your email address field enter the address where all mail will be forwarded (for example, my.personal.email@gmail.com).
  4. Click Create a free alias.

After that the service will generate the required DNS records for your domain.

Read more
2025-10-06

Introduction

Let’s Encrypt is the standard for obtaining free TLS certificates. Most often certificates are issued via the HTTP-01 method, which requires a reachable web server on port 80. However, for internal services or wildcard certificates (for example, *.example.com) it is more convenient to use DNS-01, which verifies domain ownership via TXT records in DNS and does not require open ports.

This article covers:

  • Issuing certificates via the Cloudflare API,
  • Issuing certificates via Amazon Route 53 (AWS),
  • Integration with web servers Nginx, HAProxy and Traefik,
  • Automation of certificate renewal.

Note: Instructions are relevant for Certbot 2.x, acme.sh 3.x, Nginx 1.18+, HAProxy 2.4+, Traefik 2.x on Linux (Ubuntu/Debian). For other OSes or tool versions adjustments may be required.

Read more
2025-10-05

Moving a website to a new server or restoring it after a failure can sound like a scary task, especially if you’re new to web development or administration. But don’t panic. With the right approach and a step-by-step plan you can handle it without stress. Below is a breakdown of the whole process: from backup to functionality checks, including ISPmanager and FreePanel panels and local testing via hosts without changing public DNS.

Read more
2025-10-03

Introduction

If you are a beginner system administrator or developer, you’ve probably faced the task of managing network traffic. One of the most powerful tools for this is HAProxy, a high-performance load balancer for TCP and HTTP.

In this article, we will cover:

  • what TCP proxying is,
  • why to use HAProxy,
  • a sample configuration for beginners,
  • security and monitoring tips.

What is TCP Proxying?

TCP Proxying is the forwarding of TCP connections from a client to a server (or group of servers) through an intermediary. Unlike an HTTP proxy that operates at the application layer, TCP proxying happens at the transport layer, making it universal for any TCP protocol: from databases to mail services.

Read more
2025-10-01


Task

🚀 Create your own fast and reliable proxy, register it in Telegram to track statistics, and optionally make it public.


Solution Choice: Docker + Official MTProto Image

  • Why Docker? Docker allows you to run the proxy in an isolated container without installing unnecessary dependencies on the server. It’s clean, secure, and incredibly fast. The docker-compose.yml file describes the entire configuration in one place, making the launch and management process trivial.

    Read more
2025-09-22


Getting a new VPS is just the beginning. By default, the server is insecure and not ready for production use. This checklist will help you step by step to prepare your VPS: close security holes, enable updates, and configure the basic infrastructure.


1. First login and changing the root password

Connect to the server via SSH:

ssh root@YOUR_IP_ADDRESS

Change the temporary password to your own unique and complex one:

passwd

2. Create a new user with sudo

Working as root all the time is dangerous. Let’s create a regular user:

Read more
2025-09-21


This article is compiled as a “cheat sheet” for SOHO/SMB networks: common issues, their symptoms, causes, quick fixes, and diagnostic checklists. Suitable for both engineers and admins who maintain the MikroTik ↔ Keenetic bundle.


📑 Navigation


1) EoIP “freezes” when transferring large files

Symptoms: SMB/FTP hangs, speed fluctuates, RDP drops. Causes: incorrect MTU/MSS, fast-path with IPsec, NAT/Firewall errors.

Read more
2025-09-19


Introduction

WP-CLI is the official command-line tool for WordPress, allowing you to manage your sites without logging into the admin panel. With WP-CLI, you can install plugins, update WordPress core, manage users, handle database tasks, and even run advanced automation workflows.

In this guide, we’ll explore what WP-CLI is, how to install it, and provide practical examples of its most useful commands.


What is WP-CLI?

WP-CLI (WordPress Command Line Interface) is a PHP-based tool that enables direct interaction with WordPress through the terminal. It covers almost all admin tasks and sometimes goes beyond the WordPress dashboard:

Read more
2025-09-18


Introduction

Netplan is a utility for declarative network configuration in Linux (Ubuntu, Debian, and derivatives). It is usually used for simple cases like Ethernet or Wi-Fi, but it can do much more:

  • tunnel interfaces (IPIP, GRE, VXLAN, WireGuard),
  • VLAN,
  • bridges,
  • bonding (interface aggregation).

These features allow building complex network topologies — from home VPNs to data centers and cloud environments.


Tunnel interfaces

Tunnels encapsulate packets of one protocol into another. They are used for VPNs, inter-server connections, or network isolation.

Read more