How to setup a local web server ? Easiest Way..

For a developer at a beginner stage, it’s a good option to setup a local environment to learn development. Those who are ready to join the web based development stream, hear is a quick guide to setup a local server and running the codes on your local machine before you hit it to the world.

Step 1

Based on the machine that you are working on, you need to choose the tools / variants of tools.

If you are using Windows OS or Ubuntu or Mac OS, you can opt from multiple Apache-MySQL distributions available in market. Few of them are – XAMPP, WAMP, AMPPS.

I’ll suggest to go for XAMPP when it comes to setting up a local development server. It’s available for use on Windows, Mac, and Linux distribution.

“Why I suggest XAMPP, well it’s not because of any functional difference, it’s because I have been using it since long and I am totally satisfied with its performance”.

-Vikash Mishra

Talking about XAMPP : XAMPP is an easy to install Apache distribution containing MariaDB, PHP, and Perl. Just download and start the installer. It’s that easy.

Step 2

Once you are done with installing any of the above Apache-MySQL distributions, you need to launch it and start the Apache and MySQL services.

XAMPP Control Panel

Once your Apache and MySQL services are up and running, you are ready to go with the next step.

NOTE:

  • Depending on the version of your OS, it may happen, that you get errors while launching services. In such cases, you need to either download the latest version of the XAMPP distribution or if you are using the latest one, you need to downgrade to a lower version.
  • There can be chances of clashes in port numbers with services running on your PC. For eg: Generally, Microsoft Skype port number clashes with Apache. You will need to troubleshoot it by either changing the port number or by removing the application that conflicts.

Step 3

Once your servers are up and running, you can navigate to your preferred browser and hit the following URL

http://localhost/ – hostname set during the installation of xampp

OR

http://127.0.0.1 – Loopback IP of same server

Once you hit the above URL, you will be taken to the default landing page of XAMPP.
Now you can get into the folder structure to put your own code and check if your development server is working or not.

In Windows, if you have installed the XAMPP with default settings, then your public directory will be in C:\xampp\htdocs\

If you are on a Mac Machine, you need to go into Finder -> Applications -> XAMPP -> xamppfiles -> htdocs

In this folder, you can put your files and can access it from the browser using the above URL

Step 4

Moving forward, to access the local server on other devices, you will need to connect the device to the same network. For example – If your local server is connected to your home WiFi network, you will need to connect another device, say your mobile phone, to the same WiFi network.

Once you are connected with same network on both the devices, go to the command prompt (in windows), terminal (in Linux and Mac), on your local server and hit the below command –

Mac and Linux -> ifconfig

Windows -> ipconfig

IP Address in Windows

You will get the IP address of your local server. Now hit the IP address in you another device browser to access the htdocs folder of your local server.

When you hit the IP address of the local server in another PC’s browser, it searches for the server in your network, and reaches to the local server, and this request is received by the Apache server running in your XAMPP distribution.

Once the Apache server receives the request, it processes it and returns back the response.

This short and simple tutorial can help developers to setup a small local development environment and look forward for better responsive design and optimized coding, and move it to a global platform using either of the available hosting options like shared hosting, or a VPS, or Dedicated Server

How to secure your office / home WiFi router?

There has been a huge growth in use of internet through different mediums. One of the largely used one is WIFI. People now-a-days setup wifi connection at their homes and offices to use internet for different purpose. But they are unaware of the security risks of the same. An unsecured Wi-Fi router running on the default manufacturer settings could be a liability when it comes to hackers and Wi-Fi squatters accessing your private information and burdening your broadband.

If your Wi-Fi network isn’t secured properly — a public IP address, no unique Wi-Fi password — you could be letting anyone with a wireless-enabled device gain access. You might not be worried about someone using your wireless connection, but the real risk is exposing sensitive information you send and receive — your emails, banking information, and maybe even your smart home’s daily schedule — to cyber-criminals.

Basic router security
There should always be a strong password on every router to keep you secure from the bad guys out there.. Now a days, the routers come with default settings and default passwords, that work as plug and play systems, but you should change these passwords as soon as you start using them. Keep a note that a complex, unique, and tough to guess password will give you some good sort of security. It will take only some couple of minutes to set it up, you just need to follow the instructions, which varies router to router.


Depending on your router, you might have options for different kinds of encryption. The most common router encryption types are WEP, WPA and WPA2. Commercial routers from brands like Netgear, Linksys, and ASUS often include:

Wired Equivalent Privacy (WEP): This is the oldest and most popular form of router encryption available. However, it is the least secure of all encryption protocols. It uses radio-waves that are easy to crack. For every data packet that is transmitted it uses the same encryption key. With the help of automated software, this information can easily be analyzed.

Wi-Fi Protected Access (WPA): The Wi-Fi Alliance came up with WPA to offer an encryption protocol without the shortcomings of WEP. It scrambles the encryption key thereby getting rid of the problems caused by hackers cracking the radio-waves. This is also a less secure form of encryption, partly because of legacy hardware and firmware that still used WEP as their main protocol. However, it is a significant improvement over WEP.

Wi-Fi Protected Access 2 (WPA2): This encryption type is currently the most secure and most recent form of encryption available. You should always select WPA2 if it is available. It not only scrambles the encryption key but is also does not allow the use of Temporal Key Integrity Protocol or TKIP which is known to be less secure then AES.

Advanced Encryption Standard: When possible, you’ll want to use AES on top of WPA2 or WPA. This is the same type of encryption used by the federal government to secure classified information. Routers made after 2006 should have the option to enable this on top of WPA2.


Always follow the below rules:

Update your router with new firmware and keep it up to date
Updating your router’s firmware is an important security measure to help protect your router against the latest threats. Most modern routers allow you to enable notifications to prompt you when the manufacturer makes patches and updates to the router’s firmware available. Some manufacturers may even push the update automatically to your hardware, so you don’t have to do anything. However, there are some routers that have updates within the settings option. In this case, the user has to make sure that the firmware is manually updated regularly.

Change your login credentials and router password on regular basis
Traditional routers come with a default password created by the manufacturer. While it may look complex and resistant to hacking, there is a good chance most models of the same router share the same password. These passwords are often easy to trace or find on the internet. Make sure you change these passwords on setup and also ensure regular password update of your router.

Always use WPA2 to secure your wireless network
Wi-Fi Protected Access 2, better known as WPA2, is a commonly used network security technology used on wireless routers.

It is one of the most secure encryption options available in the market since 2006. WPA2 scrambles the traffic going in and out of the router. That means even if someone is within range and can see traffic, all they see is the encrypted version.

Disable WPS
Wi-Fi Protected Setup (WPS) was created with the intention of making the user experience easier and quicker when connecting new devices to the network. It works on the idea that you press a button on the router and a button on the device. This makes both devices pair automatically.

The user has the option to use a personal identification number, or PIN, to setup the device to create a connection. This eliminates the use of the 16-character WPA password that most routers use.

However, because of the PIN, WPS earned a bad reputation for being insecure. The PIN is an eight-digit number that can easily be hacked by repeatedly using various combinations of the usernames and passwords. This is carried out with the help of software. This kind of an attack is called a brute force attack.

Most routers allow users to disable WPS. Even if the PIN option appears to be disabled, it is wise to disable WPS. In recent years, it was discovered that many routers from reputed manufacturers allowed PIN-based authentication even when it appeared to be disabled.

Get rid of any risky or unverified services
It would be wise to disable remote access to your router when you are actively connected to it.

Take UPnP, for example. Universal Plug and Play or UPnP is an easy way to allow devices to find other devices on your network. It can also alter the router to allow devices from other networks to access your device. However, it has helped hackers to introduce malware and viruses by making them bypass the firewall. Mirai Botnet is an example of one such attack.

Other router security helpers
Aside from your router settings and making sure to use your Wi-Fi network’s security features, there are some other options, like using a virtual private network, in addition to device security and identity theft protection in the form of all-in-one protection like the NEW Norton 360 with LifeLock.

Use a virtual private network or VPN
A virtual private network (VPN) encrypts connections between devices, creating online privacy and anonymity. A VPN can mask your internet protocol (IP) address so your online actions are virtually untraceable. VPN services establish secure and encrypted connections to provide greater privacy of the data you send and receive, even on secured Wi-Fi hotspots.

Always use a firewall
A firewall monitors incoming and outgoing network traffic and allows or blocks specific traffic. It is an important security feature to look for when selecting a router. For the online safety of your network and devices, it’s smart to never disable a firewall.

Install and use a strong antivirus and security software
Setting up security for your wireless network doesn’t take much time at all and will do much to help protect you against hackers. Cyber-criminals work tirelessly to gain access to your personal and financial information. A small investment in security software could go a long way.

Even if you don’t have neighbors you want to prevent from borrowing your Wi-Fi, you’ll be protecting yourself from more dangerous snoops. Especially now that so many homes are connected and various devices are using Wi-Fi, you’ll be wise to protect all of the information those devices contain. Don’t take chances. Just a few minutes of selecting the right home Wi-Fi router settings can mean all the difference to your connected world.

 If you are still worried about securing your network from invaders, and want to secure your network, or if you are looking for network security experts, get in touch with us today! our team will be happy helping you out.

We provide all sort of network setup, network security and data monitoring services.

For any service requirements, connect with us here

Network Maintenance

Network maintenance basically means you have to do what it takes in order to keep a network secure, up and running and it includes a number of tasks and we do exactly the same:

  • Troubleshooting network problems.
  • Hardware and software installation/configuration.
  • Monitoring and improving network performance.
  • Planning for future network growth.
  • Creating network documentation and keeping it up-to-date.
  • Ensuring compliance with company policies.
  • Ensuring compliance with legal regulations.
  • Securing the network against all kinds of threats.

Whatever network maintenance model you decide to use, there are always a number of routine maintenance tasks that should have listed procedures, here are a couple of examples:

  • Configuration changes
  • Replacement of hardware
  • Backups
  • Monitoring

Normally we will create a list with the tasks that have to be done for your network. These tasks can be assigned a certain priority. Making changes to your network will sometimes impact productivity of users who rely on the network availability. Some changes will have a huge impact, changes to firewalls or access-list rules might impact more users then you’d wish for.

Our team of expert keeps in mind the higher availability and stability of the network. We ensure lower downtime for maintenance and upgrades. Before any such activity, our team sets up the best planning and time-spans with proper communication for the same.

For any service related query, you can get in touch with us here

Network Planning and Setup

We help individuals and companies in planning and setting up their network. Our services includes Network planning, Hardware setup and configuration, Host configuration, Software configuration, Server deployment and lot more. All we do follows some major steps according to the companies’ / Individual’s requirements.

It is painful for companies and individuals to plan and setup a proper network which can satisfy their needs. But believe us, we will help you to setup it up and you will keep yourself away from that pain.

From our past experience we believe that while setting up a network, a proper planning is the major part. As planned networks satisfy the needs and keeps the work up without any hazels. A proper planned network is highly available, robust, scalable and provides connectivity to all authentic people keeping your data safe from outside world.

We help companies / individuals setting up intranet connection, internet connection, VPN, Security setup and lot more.
Ranging from sharing of devices over network to sharing of data, setting up policies, setting up access control, setting up hardwares and lot more. We provide all the services under one hood.

Companies always have a deep concern of security of data, we can understand the importance and need of it. That’s why we have a policy of security first while setting up any network.

For small businesses and individuals, setting up a router with plug and play functionality, should keep in mind that plug and play devices are vulnerable. For people who are looking for setting up their home / office network over simple router can go though the below blog which will guide you securing your home/office WiFi network.

How to secure your office / home WiFi router?

For offices which need

  • Secure network
  • Scalable network
  • Robust network
  • Who have need of high availability over secure connections like Virtual Private Network (VPN).
  • Who have a futuristic approach of handling their network and data.

Should opt for our network planning and setup services.

We ensure that all the required hardware and software are properly configured. Hardware ranging from routers, firewalls, access-points, switches, etc. are planned and configured by experts.

We have a team of highly experienced and highly certified professionals. We ensure proper service and solution for all kind of networking needs.

For further details, you can get in touch with us here

Network Security

Network security is any activity designed to protect the usability and integrity of your network and data.

  • It comprise both hardware and software technologies
  • It detects a variety of threats
  • It stops them from entering or spreading on your network
  • Effective network security manages access to the network

How is the network security process?

Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats.

How do you benefit from network security?

Every organization that wants to deliver the services that customers and employees demand must protect its network. Network security also helps you protect proprietary information from attack. Ultimately it protects your reputation.

But most importantly, when it comes to network security solutions, the big question that arises is – WHAT ALL SERVICES DO WE NEED FOR SECURING DATA OVER NETWORK? Right?? So we are here with the answer you need to know before taking any wrong step. When you are working on the internet or on any intranet, or over other connections like VPN etc. you can opt for the following services that fall under network and data security. Namely:

  • Firewalls
  • VPN
  • Application security
  • Access control
  • Email security
  • Behavioral analytics
  • Data loss prevention
  • Intrusion prevention systems
  • Mobile device security
  • Security information and event management
  • Web security
  • Wireless security
  • Network segmentation
  • Anti-virus and anti-malware software

Firewalls

Firewalls put up a barrier between your trusted internal network and non-trusted outside networks, such as the Internet. They use a set of defined rules to allow or block traffic. A firewall can be hardware, software, or both.

VPN

A virtual private network encrypts the connection from an endpoint to a network, often over the Internet. Typically, a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.

Application security

Any software you use to run your business needs to be protected, whether your IT staff builds it or whether you buy it. Unfortunately, any application may contain holes, or vulnerabilities, that attackers can use to infiltrate your network. Application security encompasses the hardware, software, and processes you use to close

Access control

Not every user should have access to your network. To keep out potential attackers, you need to recognize each user and each device. Then you can enforce your security policies. You can block non-compliant endpoint devices or give them only limited access. This process is network access control (NAC).

Email security

Email gateways are the number one threat vector for a security breach. Attackers use personal information and social engineering tactics to build sophisticated phishing campaigns to deceive recipients and send them to sites serving up malware. An email security application blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.

Behavioral analytics

To detect abnormal network behavior, you must know what normal behavior looks like. Behavioral analytics tools automatically discern activities that deviate from the norm. Your security team can then better identify indicators of compromise that pose a potential problem and quickly remediate threats.

Data loss prevention

Organizations must make sure that their staff does not send sensitive information outside the network. Data loss prevention, or DLP, technologies can stop people from uploading, forwarding, or even printing critical information in an unsafe manner.

Intrusion prevention systems

An intrusion prevention system (IPS) scans network traffic to actively block attacks. It not only blocks malicious activity but also tracks the progression of suspect files and malware across the network to prevent the spread of outbreaks and reinfection.

Mobile device security

Mobile security automatically and remotely deletes your data on lost devices. Mobile security prevents you from losing your phone containing vital personal or business data. To prevent the loss of company or personal data, an excellent mobile security solution will be able to erase data stored in your phone. You need to control which devices can access your network. You will also need to configure their connections to keep network traffic private.

Security information and event management

SIEM products pull together the information that your security staff needs to identify and respond to threats. These products come in various forms, including physical and virtual appliances and server software.

Web security

A web security solution will control your staff’s web use, block web-based threats, and deny access to malicious websites. It will protect your web gateway on site or in the cloud. “Web security” also refers to the steps you take to protect your own website.

Wireless security

Wireless networks are not as secure as wired ones. Without stringent security measures, installing a wireless LAN can be like putting Ethernet ports everywhere, including the parking lot. To prevent an exploit from taking hold, you need products specifically designed to protect a wireless network.

Network segmentation

Software-defined segmentation puts network traffic into different classifications and makes enforcing security policies easier. Ideally, the classifications are based on endpoint identity, not mere IP addresses. You can assign access rights based on role, location, and more so that the right level of access is given to the right people and suspicious devices are contained and remediated.

Anti-virus and anti-malware software

These software are used for protection against malware, which includes spyware, ransomware, Trojans, worms, and viruses. Malware can also become very dangerous as it can infect a network and then remain calm for days or even weeks. These software handles this threat by scanning for malware entry and regularly tracks files afterward in order to detect anomalies, remove malware, and fix damage.