Articles
BIPmd uses base-2 (sometimes also referred to as base-1024) rather than base-10 (sometimes...
BIP Cloud Manager OverviewClick here to login and access your BIP account. Note: For security purposes BIP has...
CentOS 8 add second IP-address / aliasSometimes you need to add an alias on the interface. In CentOS 8 add second IP can be done in...
Generate SSH Keys on Windows with PuTTYgenSecure Shell (SSH) is a cryptographic network protocol used for a secure connection between a...
Getting Started with BIPWelcome To BIP! Thank you for choosing BIP as your cloud hosting provider! This guide...
How Client Onboarding WorksYou’ve made the decision to move forward with hiring us as your new cloud IT hosting provider....
How To Choose A BIP Data CenterDeploying your BIP server to a geographically advantageous data center can make a big...
I don't have my Two-Factor Authentication device with meShould you need to login to the client area but don't have the device upon which you...
I no longer have my Two-Factor device and/or backup codeOn occasion you may no longer have the device upon which you configured two-factor...
IP Geolocation: The Good, The Bad, & The FrustratingThis article is from team ARIN: By Jon Worley - Technical Services Lead...
Introducing Two-Factor AuthenticationWhat is it?Two-factor authentication adds an additional layer of security by introducing a...
Using SSH on WindowsOpenSSH As of late 2018, OpenSSH is included with some versions of Windows. Cygwin Cygwin is...
Using Your System's hosts FileThe Linux hosts file lives at /etc/hosts and it creates static associations between IP...
When purchasing a VPS, what do “hostname”, “ns1 prefix”, and “ns2 prefix” mean?NS stands for NameServer also called domain name servers (DNS). Domain names like www or...
Which app do I need for Two-Factor Authentication?Our Two-Factor Authentication uses a system called 'Time Based Tokens'. There are many...