Explore Blog

Fixing Redirect Loop on Cloudflare SSL

RunCloud Team

May 11, 2023

3 min read

Fixing Redirect Loop on Cloudflare SSL

If you are using Cloudflare proxy to hide your server’s IP address from the internet, then you might encounter a glitch that causes visitors to get stuck in a redirection loop. Eventually, the request times out with an error message saying, “Too many redirects”. In this article, we will investigate why websites might get stuck …

DKIM – What Is It & Why Your Emails Need It

RunCloud Team

Feb 16, 2023

5 min read

DKIM – What Is It & Why Your Emails Need It

Are you tired of seeing your emails end up in the spam folder? Want to protect your business from phishing attacks? Then you need to know about DKIM! Recent studies show that using DKIM (DomainKeys Identified Mail) significantly increases email deliverability and reduces the risk of phishing attacks. It really can be that easy –  …

Docker Security — Best Practices to Secure a Docker Container

RunCloud Team

Sep 22, 2022

7 min read

Docker Security — Best Practices to Secure a Docker Container

Docker has quickly become one of the most popular platforms for software developers and teams that wish to streamline software development, shipping, and execution. However, most developers don’t secure their containers properly. According to security analysis by Prevasio, of around 4 million Docker images, more than 2 million had critical vulnerabilities. That’s a damning statistic, …

23 Best Chrome Extensions To Protect Your Privacy

RunCloud Team

Jan 25, 2022

14 min read

23 Best Chrome Extensions To Protect Your Privacy

Are you looking for extensions to enhance your security and privacy? Although Incognito Mode aims at making your browsing experience secure, sometimes it just isn’t enough. Chrome may be the world’s most popular web browser, but it isn’t the most private one. It does, however, provide a number of Chrome extensions that you can freely …

How to Use Cloudflare Firewall Rules to Protect Your Web Application

RunCloud Team

Jul 09, 2021

8 min read

How to Use Cloudflare Firewall Rules to Protect Your Web Application

For more than ten years, the Cloudflare team has provided security services to website creators worldwide and is currently helping thousands of businesses maintain and secure their online resources. Since its creation, Cloudflare has released many strong firewall utilities, such as IP rules, CIDR rules, ASN rules, country rules, and HTTP user-agent blocking, to name …

FTP vs. SFTP – What’s The Difference & Why It Matters

RunCloud Team

Jun 10, 2021

6 min read

FTP vs. SFTP – What’s The Difference & Why It Matters

Trying to understand the difference between FTP and SFTP? Using FTP (or SFTP) is the easiest way to connect directly to your server – but what are the differences between the two protocols & which should you use? In this article, we’ll compare FTP vs. SFTP as commonly used data transfer protocols, go through their advantages …

Google FLoC – What You Need to Know & How To Opt Out

RunCloud Team

Apr 22, 2021

8 min read

Google FLoC – What You Need to Know & How To Opt Out

There has been a lot of talk lately surrounding Google’s Federated Learning of Cohorts (FLoC) initiative, which is quickly becoming a hot-button topic both in the tech community and major mainstream publications. In this blog post, we’ll cover what Google FLoC is, why it matters, and how we’ve made it easy to disable it in …

How To Use ModSecurity and OWASP CRS For Web App Firewall (WAF) To Secure Your Website

RunCloud Team

Jun 22, 2020

5 min read

How To Use ModSecurity and OWASP CRS For Web App Firewall (WAF) To Secure Your Website

With security as a primary focus this year, we are happy to bring ModSecurity and OWASP CRS for your Web Application Firewall (WAF) in RunCloud. This feature helps protect your website from many types of attacks against your web application. You can easily enable or disable ModSecurity WAF to each web application in your RunCloud …

Why Authentication Using SSH Public Key is Better than Using Password and How Do They Work?

RunCloud Team

Nov 28, 2018

4 min read

Why Authentication Using SSH Public Key is Better than Using Password and How Do They Work?

What is SSH? SSH, or Secure Shell, is a network protocol that allows users to remotely manage their servers or computers over the Internet, in which the communication between the two machines are strongly encrypted and protected from being eavesdropped. The user runs a client on his or her machine and the network connection carries …

© 2025 RunCloud Sdn Bhd