Archive

LINK Gift Card Now Available: A New Way to Pay for Cloud, Hosting, and Domains

Linkdata.com has introduced the LINK Gift Card, a prepaid payment solution designed to make purchasing cloud infrastructure, VPS, hosting, and domain services simple and flexible.

The LINK Gift Card allows prepaid credit to be applied directly to orders or added to an account balance for future use. This gives customers full control over how and when payments are made.

Available Gift Card Values

LINK Gift Cards are currently available in the following denominations:

  • $10
  • $25
  • $50
  • $100

These cards can be used across all Linkdata.com services, including:

  • Cloud infrastructure
  • Virtual Private Servers (VPS)
  • Web hosting
  • Domain registrations
  • Account balance top-ups

This makes the LINK Gift Card suitable for personal use, business budgeting, or gifting services to colleagues, clients, or teem members.


Gift cards can be applied directly when placing an order. The credit is deducted from the gift card balance, reducing or fully covering the cost of the service.


How to Add Gift Card Funds to Your Account Balance

Alternatively, gift cards can be redeemed into your Linkdata.com account balance. This allows credit to be stored and used later for any service.


The LINK Gift Card introduces several advantages:

  • Prepaid control over spending
  • Easy payments without requiring direct card transactions each time
  • Suitable for businesses managing budgets
  • Useful for gifting hosting or cloud services
  • Instant application during checkout or as account credit

Now Available

LINK Gift Cards are now available through authorized retail partners and major outlets. Customers can purchase a card, redeem the code in their Linkdata.com account, and begin using services immediately.

Linkdata.com continues to expand its payment ecosystem to support customers across the region.

How to Build Your Own VPN Using a VPS: A Step-by-Step Guide

How to Build Your Own VPN Using a VPS: A Step-by-Step Guide

How to Build Your Own VPN Using a VPS: A Step-by-Step Guide

Creating a private VPN on a Virtual Private Server (VPS) gives full control over traffic routing, privacy, and performance. Instead of relying on third-party VPN providers, organizations and technical users can deploy their own secure VPN gateway using modern protocols.

This guide explains how to build a high-performance VPN using WireGuard, a fast, modern VPN protocol with a small codebase and straightforward configuration. The tutorial assumes technical familiarity with Linux servers and networking concepts.

Target OS: Ubuntu 22.04 or newer running on a VPS with a public IPv4 address.

Requirements

Before starting the VPN deployment, ensure the following requirements are available.

Infrastructure Requirements

  • A VPS with a public IPv4 address
  • Root or sudo access to the VPS
  • Ubuntu 22.04 or newer installed on the server
  • Open UDP port capability on the provider firewall
  • Stable internet connectivity

Recommended VPS Specifications

  • 1 vCPU or higher
  • 1 GB RAM minimum (2 GB recommended for multiple users)
  • 20 GB storage or more
  • At least 100 Mbps network connectivity

Client Requirements

  • WireGuard client application installed on Windows, macOS, Linux, iOS, or Android
  • Permission to import VPN configuration profiles

Required Skills

  • Basic Linux command-line knowledge
  • Ability to edit configuration files via terminal editors such as nano or vim
  • Basic networking understanding (IP addressing and routing)

Once these requirements are met, the VPN server can be configured and client connections added securely.

Architecture Overview

The VPN server runs on a VPS with a public IP. Clients connect securely and route their traffic through the VPS.

  • VPS public IP: VPS_PUBLIC_IP
  • VPN network: 10.8.0.0/24
  • VPN server interface: 10.8.0.1
  • First client IP: 10.8.0.2
  • Protocol: WireGuard over UDP port 51820

All client traffic will pass through the VPS (full tunnel).

Step 1: Prepare the VPS Server

Log in via SSH and update packages.

sudo apt update && sudo apt -y upgrade

Install required tools:

sudo apt -y install wireguard iptables-persistent resolvconf qrencode

Enable IP forwarding so traffic can pass through the server:

echo 1 | sudo tee /proc/sys/net/ipv4/ip_forward

Make it permanent:

sudo sed -i 's/^#\?net.ipv4.ip_forward=.*/net.ipv4.ip_forward=1/' /etc/sysctl.conf
sudo sysctl -p

Step 2: Generate WireGuard Server Keys

WireGuard uses public and private key pairs. Keep them protected.

sudo mkdir -p /etc/wireguard
cd /etc/wireguard
umask 077

Generate keys:

sudo wg genkey | sudo tee server_private.key | sudo wg pubkey | sudo tee server_public.key

View the public key:

sudo cat server_public.key

Step 3: Detect the Internet Interface

Find which network interface provides internet access:

ip route get 1.1.1.1 | awk '{print $5; exit}'

Common values include eth0 or ens3.

Step 4: Create WireGuard Server Configuration

Create the server configuration file:

sudo nano /etc/wireguard/wg0.conf
[Interface]
Address = 10.8.0.1/24
ListenPort = 51820
PrivateKey = SERVER_PRIVATE_KEY

PostUp   = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -A FORWARD -o wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -D FORWARD -o wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE

Step 5: Open Firewall Port

Using UFW

sudo apt install ufw
sudo ufw allow OpenSSH
sudo ufw allow 51820/udp
sudo ufw enable

Using iptables

sudo iptables -A INPUT -p udp --dport 51820 -j ACCEPT
sudo netfilter-persistent save

Step 6: Start WireGuard Service

sudo systemctl enable wg-quick@wg0
sudo systemctl start wg-quick@wg0
sudo wg

Step 7: Create Client Keys

cd /etc/wireguard
umask 077
sudo wg genkey | sudo tee client1_private.key | sudo wg pubkey | sudo tee client1_public.key

Step 8: Add Client to Server

[Peer]
PublicKey = CLIENT_PUBLIC_KEY
AllowedIPs = 10.8.0.2/32

Step 9: Create Client Configuration

[Interface]
PrivateKey = CLIENT_PRIVATE_KEY
Address = 10.8.0.2/32
DNS = 1.1.1.1

[Peer]
PublicKey = SERVER_PUBLIC_KEY
Endpoint = VPS_PUBLIC_IP:51820
AllowedIPs = 0.0.0.0/0
PersistentKeepalive = 25

Step 10: Import Configuration to Devices

sudo qrencode -t ansiutf8 < client1.conf

Step 11: Test VPN Connection

curl ifconfig.me
sudo wg

Security Hardening Recommendations

  • Disable SSH password login
  • Use SSH keys
  • Install Fail2Ban
  • Keep server updated

Our Partners

©2026 Linkdata.com

Choose a language