page 1 | 2 | 3
Why do you need a Linux dedicated server ?
There are many good reasons to choose a Linux dedicated server besides excellent stability and no license fees. Here is a top ten list.

1. You can choose your own flavor of the operating system. This guide covers features of the most popular Linux distribution, Fedora 9, to perform common server administrative functions. Linux is chosen for its stability, scalibility, and open architectue. Linux is secure, rock-solid stable, free, a perfect operating system for your server, and can run for years without having to reboot or having to install security patches. Linux is also less vulnerable or even immuned to many types of virus and worm attacks commonly seen on other operating system platforms.

2. You are your own boss literally! Here, it means you are in control of everything. You can install whatever applications and scripts you want. You can do script testing and if anything bad happens (the worst case scenario is to bring down the entire server), no one else is to blame but yourself. You will have the ability to customize the hardware and software installed on your server. You cannot find this priviledge if you are under the roof of shared hosting.

Having control means responsibility and expertise. If you can administer or are willing to learn how to administer a Linux-based server, there is no sense to spend money to get something else which is more expensive, cluttered with unwanted features, less stable, less secure, takes a lot more hardware resources, and in reality can do a whole lot less.

3. Having a dedicated server is in fact more secured compared to shared hosting. This is because a dedicated server can be set up with its own firewall rules to protect its contents and control its access. Therefore, the information stored in dedicated server is less vulnerable to attacks by outsiders or any malicious codes. The Linux environment offers robust and secure file systems which cannot be read, deleted, or even executed by unauthorized users.

All popular Linux operating system platforms offer the following built-in security features:



  • A firewall at the kernel level offers a robust mechanism to stop any blacklisted IP address dead in its track before it reaches your web or mail server. A firewall with a list of banned IP addresses is an effective tool to stop unwanted intruders from wasting your server alloted bandwidth. This list of banned IP addresses can be constructed in an automated fashion with standard Linux tools. This condensed guide also provides real-world examples (parse email headers, rebuild iptables, etc.).

  • The secured shell (SSH) protocol provides an encrypted and secure channel for communicating from a remote computer to your server.

  • A greylisting mail filter can be installed and effectively stop more than ninety percent of the junk mails which may carry malicious contents before reaching your mail server. A list of known users or computers can be maintained to allow access and relay mails to your server to prevent third-party spamming.

  • Best of all is the time-proven Linux file system security (with user, group, and public permissions). Sensitive services such as web and ftp server can be run as a specific Linux user to restrict access to all system directories. In the event of a break-in, the damages are limited to the files and directories allowed to that specific user.

  • Database access is secured with the authentication of user, password, hostname via DNS, specific IP address and database. With the assurance of Linux security, confidential data, sensitive information, or proprietary scripts can be encrypted with password access and safely kept on the server to support your business and archived to other computers in an automated fashion. Your data cannot be accessed by unauthorized users, even by your hosting hardware provider.
  • page 1 | 2 | 3