BIP MD uses base-2 (sometimes also referred to as base-1024) rather than base-10 (sometimes...BIP Cloud Manager Overview
Click here to login and access your BIP account. Note: For security purposes BIP has...CentOS 8 add second IP-address / alias
Sometimes you need to add an alias on the interface. In CentOS 8 add second IP can be done in...Generate SSH Keys on Windows with PuTTYgen
Secure Shell (SSH) is a cryptographic network protocol used for a secure connection between a...Getting Started with BIP
Welcome To BIP! Thank you for choosing BIP as your cloud hosting provider! This guide...How Client Onboarding Works
You’ve made the decision to move forward with hiring us as your new cloud IT hosting provider....How To Choose A BIP Data Center
Deploying your BIP server to a geographically advantageous data center can make a big...I don't have my Two-Factor Authentication device with me
Should you need to login to the client area but don't have the device upon which you...I no longer have my Two-Factor device and/or backup code
On occasion you may no longer have the device upon which you configured two-factor...IP Geolocation: The Good, The Bad, & The Frustrating
This article is from team ARIN: By Jon Worley - Technical Services Lead...Introducing Two-Factor Authentication
What is it?Two-factor authentication adds an additional layer of security by introducing a...Using SSH on Windows
OpenSSH As of late 2018, OpenSSH is included with some versions of Windows. Cygwin Cygwin is...Using Your System's hosts File
The Linux hosts file lives at /etc/hosts and it creates static associations between IP...When purchasing a VPS, what do “hostname”, “ns1 prefix”, and “ns2 prefix” mean?
NS stands for NameServer also called domain name servers (DNS). Domain names like www or...Which app do I need for Two-Factor Authentication?
Our Two-Factor Authentication uses a system called 'Time Based Tokens'. There are many...