Skip to main content

推荐几种hosting选择



我推荐的都是linux系统,windows的不熟悉。

根据你网站的流量,可能有不同的选择,
估计流量大的,也不需要我推荐了,
所以我针对没啥流量的推荐。

综合考虑稳定性,还有速度这些因素,推荐amazon ec2和linode的VPS。

第一个就是amazon ec2的micro instance,这个是607MB内存,
单独买的话,是一个小时 $0.02 ,
流量是1GB流量(从服务器出去的流量) $0.12,头一个G不要钱,
对小网站来说,流量一个月没几毛钱。
所以按小时买,那一个月大概是14块钱。

还可以一次性掏100刀,然后三年期间的hourly rate变成0.005刀,
这样平均一个月大概是$6.4。

这个要是觉得贵,就没话说了,就是两瓶啤酒的钱,或者每个月手机费用的X分之一。

第二个呢,就是linode最便宜的plan,一个月20刀,这个的好处是,还含有200GB
的流量,这些流量在amazon那里就值这么多钱了。然后24gb的存储也比amazon的
大一点。内存是512MB。

amazon ec2的micro instance比linode这个差在cpu能力,还有读写能力(磁盘的和内
存的),cpu性能大概是linode那个的 1/3-1/4.

最后说一下512MB内存能干啥?以linode为例, 跑django的网站,我估计跑2-3个普通
网站应该没问题,
跑php的wordpress,跑个10个8个应该也没啥问题。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...