willem.com

Server on Willem's Blog

Backup Rotation Scheme

Rotate your backups with 'rsync-backup-rotator'

Dec. 15, 2023
Learn about the rsync-backup-rotator tool that helps you automatically rotate backups using rsync, creating and maintaining multiple recovery points from your backups.

In today's digital age, safeguarding your data is paramount. Simply creating a copy of your files may not be enough as they can get corrupted, overwritten or blocked by ransomware. Having multiple, time-rotated (and ideally, offsite) backups is a stronger defense. I created a new tool, rsync-backup-rotator, to help you with this.

Using AI to generate code

Programming with super powers

May 3, 2023
Discover how AI-generated code can revolutionise your software development process and optimise cloud performance in our fascinating exploration of GPT-4's transformative capabilities.

As part of my software optimisation efforts to cut cloud costs, I needed to replace an existing piece of inefficient server software with something that uses more robust (yet fragmented) tooling available in Debian GNU/Linux. Could the GPT4 language model deliver me some AI magic? Read along!

Cutting Cloud Costs

The Significance of Software Optimisation

Apr. 5, 2023
Facing sky-high cloud costs, I found software optimisation vital. Discover how I saved 90% on cloud expenses!

Like many, I faced soaring cloud service costs for my clients, prompting a wake-up call. To stay afloat, it's essential to incorporate software optimisation as a strategy for managing cloud expenses. Join me as I share how I managed to save up to 90% on cloud costs through optimisation!

CAPTCHA Alternative

Protect your forms in a user friendly way

July 30, 2022
If you're looking for a user-friendly alternative for CAPTCHA's you should check this post out where I outline how I protect web forms against malicious actors and spammers.

Chances are that you've encountered a CAPTCHA in the wild: they protect web forms by asking you to type over weirdly rendered characters or by asking you to select photos containing a particular thing. Why are they used and is there a user friendly alternative?

Protecting VMware ESXi

Improve security using a firewall and proxy server

Aug. 31, 2021
In response to a possible security breach on a VMware ESXi host machine, I search for a way to improve security of the management console using NGINX and a firewall

In response to an incident on a server, I detected a possible security breach. The affected machine ran VMware ESXi, a bare metal hypervisor used to run virtual private servers. In standalone mode, a web based management console offers full control over the infrastructure, posing a risk.

Migrating to the Cloud

Clearing an on-premise server room

June 30, 2021
Helping a customer clear its on-premise data room and migrate to the cloud: an adventure full of cables, cabinets and bandwidth!

For a Dutch organisation that serves customers throughout Europe, I was asked to help dismantle a live server room. Instead of simply pulling the plugs, some of the services had to be migrated to the cloud. For fun and inspiration I share three different strategies to do so.

Realtime service uptime monitoring

Discover problems before your customers do

Feb. 2, 2021
Downtime happens and it is nothing to be ashamed of, just make sure that you set yourself up to discover problems as soon as possible! Know about problems before your customers do!

Downtime happens and it is nothing to be ashamed of, just make sure that you set yourself up to discover problems as soon as possible! You can use realtime uptime monitoring to automatically keep an eye on your servers and services. Read along to find out how.

Designing a multi dimensional capacity queue

Managing kitchen-, delivery- and pickup capacity

Dec. 2, 2020
Dealing with a capacity queue is challenging, but if you take the time to model it right it is possible to create a performant and reliable system.

This month I needed to create additional dimensions to a capacity queue mechanism. The food ordering app that I created needed to be able to restrict capacity based on the number of orders, the contents in individual orders and the dispatch type (takeaway/delivery). Read along to find out how I used a Lambda Architecture to do this.

How to use rsync to make backups

Explaining a powerful file transfer tool

Oct. 30, 2020
In this post I'll explain how to use rsync to transfer files to another computer system in an efficient manner, suitable to be used in a backup script.

It is very important to make backups of your data, as you never know when disaster strikes! One powerful, cross platform, tool to help you achieve this is 'rsync'. In this post I'll explain why rsync is useful and how you can use it to set up your own backups.

Syncing files seamlessly between smartphone and tablet

Using unison to automatically sync between GNU/Linux and the iPhone

Sep. 16, 2020
In order to optimise my workflow, I was looking for a way to seamlessly access the same files on both my computer and smartphone. Read along to find out how I did it.

In order to optimise my workflow, I was looking for a way to seamlessly access the same files on both my computer and smartphone. This is useful to when you want to quickly send files from your computer using your smartphone through various messaging apps and vice versa. Read along to find out how I did it.

Linking Lemmid Store with kitchens

Integrating with external systems that you don't control

June 12, 2020
Designing backend servers to connect with external services is challenging as you need to take into account unreliability and unpredictability.

As part of the food ordering app I am building, I needed to design a reliable way to link the app to external systems. These external systems are beyond my direct control and include different checkout registers, kitchen management systems and ticket printers. Read along for more on designing for the unknown and unreliable.

Scalable application design without magic

Leveraging client computing power for high performance with many users

May 11, 2020
I needed to design a scalable backend infrastructure that could handle lots of concurrent users. I did this by leveraging the client's computing power having it handle most of the user interaction workload.

As part of the online food ordering app I'm building, I needed to design a scalable backend infrastructure that could handle lots of concurrent users. Scalability is considered a hard problem to tackle. Often it's presented like it's something magical, done by million dollar companies using secret tools. But, there is no such thing as magic, or is there?

Traffic shaping using iptables and tc

Limiting outbound network bandwidth per client IP-address

Apr. 1, 2020
This month I responded to an automated alert indicating excessive bandwidth usage on a server, requiring me to apply traffic shaping to mitigate the traffic.

Last month I received an automated alert indicating excessive bandwidth usage, usually a sign of trouble. When this happens, you should follow a standard incident procedure, trying to isolate the source of the traffic before shutting it down. The cause of this incident was not what I expected however... requiring a different kind of mitigation than a simple blockade.

Designing and implementing a (micro) payment system

Monetising my blog with coffee, Apple Pay and Mollie

Mar. 25, 2020
Designing and implementing a micro payment system with an emphasis on simplicity. Read about how I did it in this post.

Online payments are now more important than ever as businesses are disrupted by the COVID-19 virus. It drives my customers to seek new ways to make money online. I designed and implemented a (micro)payment system. This post is about achieving simplicity by solving complex challenges.

Monolithic vs Microservices software architecture

Choosing the right design for your app development

Mar. 3, 2020
This week I flew to Gothenburg to talk about enterprise software architecture, read along to learn about choosing the right architecture for your app development

This week I flew to Gothenburg to meet people from a large international shipping company, talking about the development of enterprise level software. During the meeting there were various experts in the room, one of them asked me on choosing the right software architecture (for big, complex, enterprise level apps). A very good question, well worthy for a blog post.

Your own addressbook and calendar cloud

Share contacts, agendas and tasks with CardDAV/CalDAV

Feb. 28, 2020
You can setup a CardDAV/CalDAV server to manage your own contacts, addressbook, agenda and task data and share it between your devices.

If you use different devices and computers to get things done, you might want to synchronise contacts, agendas and tasks. You can use any of the 'big cloud' services for this, like Apple iCloud, Microsoft Office 365 and Google Gmail. But, if you prefer not to share your addressbook and calendar with big American companies, you can do it yourself.

Building a professional 72TB NAS

Configuration and installation of an HPE ProLiant DL380 server

Nov. 22, 2019
This month I installed a professional HPE ProLiant DL380p server in a datacenter in Amsterdam, read this post to see how this was done!

Over the past few years I have been moving my data and work from local computers (mostly laptops) into the cloud. Cloud computing is done by servers in a datacenter, powerful computers that do the hard work. As my company grew, I needed more capacity. It was time to add some power to my cloud!

Fighting backscatter spam at server level

Configure Postfix to block spam before it enters the server

Sep. 10, 2019
Deal with backscatter spam by implementing a stringent SMTP delivery policy at MTA level.

This month I had to deal with backscatter spam, affecting one of the mail servers I manage. As server engineer I make sure that servers don't send spam and that incoming email gets filtered. Despite all good efforts, this server kept being blacklisted for sending spam to iCloud, Office 365 and Google Gmail for Business (G Suite). Read along to find out how what caused this and how to fix this.

Dig for dummies

Explaining an highly useful network tool

May 24, 2019
Learn how to use the dig command to query domain name servers to find the source of network problems, IP-addresses, hostnames, mail servers and related info.

When you're building websites, apps or email services you may run into domain names and their configurations. When everything is working as it should, most of this is invisible. But when troubleshooting a domain name configuration, it may be necessary to dig a little deeper... read along to learn how!

WordPress: 10 tips to secure your website

Keep hackers out of the world's most popular content management system

Mar. 31, 2019
A lot of people use WordPress to manage their website. Prevent your site from being hacked using this blog post.

A lot of people use WordPress to manage their website, therefore it's no surprise people ask me to have a look at their site's security. As ethical hacker, I encounter WordPress in different shapes, sizes and states. Some of them are really badly protected against hacks. Prevent your site from being hacked using these 10 practical tips.

Understanding the security concerns in shared hosting

Considering open ports and unused network facing services

Feb. 28, 2019
People pay me to hack them, provided I'll explain how I did it. Read along to learn how hackers use security holes to hack your app, webshop or website!

People pay me to hack them, provided I'll explain how it was done, so future hacks can be prevented. As security consultant, I scan for weaknesses in my clients' apps, webshops and websites. Very often a hack starts by exploiting a security hole that is visible remotely. Read along to learn how hackers find security holes and what you can do to secure them.

Is the Apple Watch the modern tool watch?

Testing the Apple Watch's usefulness in real life

Nov. 2, 2018
I tested the Apple Watch during my work in Frankfurt this week where I had to go inside an internet data centre.

This week I went to Frankfurt for business. I had to perform maintenance to servers in a data centre. This seemed like a great opportunity to test the Apple Watch's usefulness in real life (other than health and fitness). I wondered, is the Apple Watch the modern tool watch?

Optimising images for the web and performance

Reduce filesize with jpegoptim, optipng, pngcrush and pngquant

Sep. 26, 2018
Make your website faster by optimising the images. This posts explains how you can do this.

One way to make your website faster is to make it smaller. Not with tiny fonts, but with less bytes! More than half the weight of an average website is because of images. Yet very few people optimise their images for the web and performance, time to find out how much bytes you can safe!

Google Analytics vs AWStats

Understanding web traffic statistics software

Aug. 20, 2018
Comparing Google Analytics with AWStats to find out where they differ and which is better.

This month I have been working on website statistics, tracking traffic using different technologies. Some of my customers use Google Analytics, others use AWStats, and some use both. Which is better is often debated, but few people really understand the differences. Time to shed some light on the magic of web statistics.

Cyber security: 5 easy tips to protect your server against hackers

Server hardening best practices for Windows and Linux

Mar. 10, 2018
These 5 practical cyber security measures will improve the safety of server, website and data.

This week one of my clients was hacked and asked me for emergency assistance to help secure their server infrastructure. It was a web server that ran WordPress websites on Apache (with PHP/MySQL), including a few webshops with customer data. This hack could easily have been prevented with the following best practices, is your server secure?

Updating Snake '97

About the challenges of developing a wildly popular game

Feb. 21, 2018
This month I bit the bullet big time: I redesigned the game engine of the wildly popular Snake '97 game. Read about the design challenges in this blog post.

Few years ago my brother threw a beer on my iPhone in an Amsterdam bar. The poor thing didn't like the Dutch brew as much as I do: it died. While waiting for a new phone to arrive, I used an old one that couldn't do anything but texting, calling and... Snake! The idea for Snake '97 was born and this month it was time to update the wildly popular game.

Clouds below my floor

Building a little datacenter in my basement

Aug. 31, 2017
Building a little datacenter in my basement utilising a very fast internet connection.

At my home I have this crazy fast optical internet connection. It is a 600MB up and down fibre connection which directly arrives in my home (no copper cables involved). It's like a private internet highway. Reason enough to find out if I could do something to make better use of all this speedy fiber galore...

All blog posts
By introducing a unique, use-only-once, token for each message it becomes much harder for malicious actors to automate the process of sending messages - protecting your form against spammers
By introducing a unique, use-only-once, token for each message it becomes much harder for malicious actors to automate the process of sending messages - protecting your form against spammers
Somewhere in a datacenter there is a machine like this hosting your website
Somewhere in a datacenter there is a machine like this hosting your website
AI's instructions how to use the generated code - most real programmers can learn from its clarity in communication
AI's instructions how to use the generated code - most real programmers can learn from its clarity in communication
Eating pizza during development is how you
Eating pizza during development is how you "live the algorithm"
Using the iftop tool to see bandwidth usage per connected IP-address
Using the iftop tool to see bandwidth usage per connected IP-address
Set up UptimeRobot to detect the text that you expect when the service is online
Set up UptimeRobot to detect the text that you expect when the service is online
Connecting frontend with backend technology, simple as 1-2-3
Connecting frontend with backend technology, simple as 1-2-3
Separating the main backend server from the external systems by introducing a purpose built 'connector server'
Separating the main backend server from the external systems by introducing a purpose built 'connector server'
The same files on both my smartphone and tablet - it just works!
The same files on both my smartphone and tablet - it just works!
Pre-authenticate traffic to the administrative console through a small and simple Debian GNU/Linux server with nginx proxy
Pre-authenticate traffic to the administrative console through a small and simple Debian GNU/Linux server with nginx proxy
Snake '97 rocking the carts with Angry Birds and WhatsApp
Snake '97 rocking the carts with Angry Birds and WhatsApp
“The sky is the limit” if you master the architecture you have chosen (just don’t change it during flight!)
“The sky is the limit” if you master the architecture you have chosen (just don’t change it during flight!)
Two proxy servers providing secure access to multiple VMware hosts
Two proxy servers providing secure access to multiple VMware hosts
Inspecting quality: left original, right pngquant
Inspecting quality: left original, right pngquant
Ordering food online
Ordering food online
World champion of Snake '97 - but not for long...
World champion of Snake '97 - but not for long...
HPE ProLiant DL380p server powered on, green lights indicate the drives are working, monitor is connected and showing the boot process
HPE ProLiant DL380p server powered on, green lights indicate the drives are working, monitor is connected and showing the boot process
Typical piece of Google Analtyics JavaScript code - you can clearly see it referring to Google's servers
Typical piece of Google Analtyics JavaScript code - you can clearly see it referring to Google's servers

More Server on Willem's Blog

All blog posts

Articles (147)