A ‘Proxy Server’ which is also called ‘Proxy’ most of the time, is a computer system which works as a gateway between a local network and comparatively larger network (most of the time internet). Security and improvement in performance are the two major factors making Proxy servers very popular. It also can be used to monitor incoming and outgoing resources throughout a specific network.
The main concept of proxy server working is existing in between connection of sender and receiver of data. The incoming data is received at one port and then it is forwarded to receiver / receivers (network) through another port. Due to it’s critical existence between sender and receiver a Proxy server makes it very difficult for hackers to access the data as there is no direct way to reach to network.
How it improves performance?
Proxy server has the ability to store the results produced for several requests made by number of various user of network. So when the repeated requests made by other users of that same network, for the same data (web-page), it need not to forward the request for the data it has stored in the memory. This saves a lot of time of responding the repeated requests sent by users.
How it improves security?
Proxy servers are also capable of of filtering requests. One can set proxy server to prevent the network users from accessing specific websites. So blocking malicious and unwanted websites by setting filter through a Proxy server is very efficient utility.
The popularity of DDoS prevention / mitigation services is increasing and the reason is that the method of this kind of attack’s execution is very well studied and well known to a lots of web hosting providers. DDoS stands for ‘Distributed Denial of Service’. DDoS attackers who are essentially also master crackers, only needs to create a network of compromise computers or aid of botnet which are are used collectively to attack on a web hosting server. DDoS attack is involved a high amount of artificial traffic flow. This high traffic flow caused in high consumption of bandwidth and packets on the web server to make it victim of DDoS attack. Not only high load of traffic but fake information requests also used on a large scale to bring down the web server, so that the genuine visitors and users will also loose the access of the same server.
DDoS Attack Prevention
There are many web hosting providers in India who provides effective DDoS Attack Protection services along with reliable web hosting services. These DDoS attack preventive services include use of various techniques to tackle hacking attacks which are also executed by using newer methods. The software and hardware used in such type of services are need to be updated on consistent basis as hackers and attackers keep studying all these things to overcome the security system.
All incoming traffic towards the web server is to be kept under inspection and a systematic analysis of all the traffic is need to be carried out to sort out the malicious traffic out of total traffic. As soon as any such malicious traffic is found which is generally from the same location is reported as threats detected through a specific alerts. Such alerts can save a web server before attack it done or before huge damage is done to the server after DDoS attack. Smart Web hosting companies also create a database of such attackers and hackers including the destination used for the attack, because this helps a lot to remain alert from such possibly dangers.
If you run a business oriented website then security is the area which needs to be specially taken care of. Backup is one of most important tasks on your website hosting account because it is the only hope for getting all your data back in disastrous situations like website got hacked, data is stolen away keeping your website totally empty, corruption in databases or data lost due to human errors. R1Soft is a backup solution for the organizations which want to backup daily change which happens in between the two backups performed. It is also well known as cheap and highly reliable disk to disk server backup application for both Windows Server and Linux server, this utility is known as CDP (Continuous Data Protection) in Web Hosting Services industry.
Conventional backup solutions are found with certain limitations especially when the data needs to be protected continuously. In these old type of backup solutions the total data of a server is needed to be backed up at each time you need to perform a backup. This causes the load on your server to rise and such large files become difficult to manage, you need more disk space for it. R1Soft came up with the backup solution which is capable of detecting files which have been changed since you performed your last backup, and it only takes the backup of such files. R1Soft overwrites such changed files only and saves not only disk space but also the other resources on your web hosting account. Furthermore for reducing the size of the data backed up compression technology is used efficiently which further makes improvement in speed while the backup and restoration process goes on.
According to the official website of ‘R1Soft’ near about over 200,000 mission critical Windows and Linux servers use R1Soft’s high performance disk to disk server backup software around the world.
Threats to Online Businesses are not new in today’s widely spread internet world. To achieve highest security for an online business SSL Certificate plays an important role. The term ‘SSL’ is basically related with website hosting services. It’s expected from Webmaster to think and implement the security systems in a smarter way. The websites with SSL certificates are the most trusted websites on the internet, the simplest way to identify such websites is the starting of URL as ‘https://’ where as you will find other normal websites starting with ‘http://’. SSL certificate is a Digital certificate assigned to a website which approves the identity of a Website as a secured website. When a website deals with online transaction involved with money the people are very conscious about its reliability and how secure it is to make payment thorough those websites. The specialty of SSL opted websites is that every information is encrypted for security purpose before it passes thorough networks, to avoid an the leakage of sensitive information. So if one is dealing through an SSL secured website then he can be sure that the information he is providing through it will remain fully confidential and secure.
Following are is some of the information that is contained in the SSL Certificate
- Name of the owner of the SSL Certificate
- Serial Number and the Expiry date of the Certificate
- Copy of the certificate owners public key
- Digital Signature of the Certificate issuing authority
We saw ‘What Is WAMP And WAMPServer’ in the last post, here we are going to learn about ‘LAMP’ which is nothing but a substitute to WAMP when one has hosted his website on ‘Linux Hosting Server’. LAMP consists of Linux, Apache, MySQL and PHP/Perl/Python, where Linux is an operating system, Apache is a Web Server, MySQL fulfills database requirements and PHP/Perl/Python work as scripting languages. The idea of LAMP was originally invented in 1999 by ‘Michael Kunze’ in a German magazine, though the four elements were not approached to work together but in the later period these open source applications were made available for free of cost and as a bunch called as ‘LAMP stack’. Because of having the ability to make a strong web application platform, LAMP gained the popularity in very early stage in such a way that in today’s market LAMP services are available as by default with almost all the website hosting services providers.
There are multiple security options available while using LAMP, you can configure Apache and PHP to remain hidden so that your information would not be leaked by any possible hacking attacks. You can find more about LAMP security at :- Is Your ‘LAMP’ Secure Enough?. LAMP tools are easily available with the features of easy configuration and being very robust. Being as an open-source application, LAMP is supported by the larger community, which constantly adds features and development to meet the requirements of it’s users. For deployment, configuration and maintenance of LAMP, one needs to spend very little effort and time, furthermore you don’t need any type of administrative details for it.
As Security is one of the most important concerns in the internet world for webmasters, they should always keep their security system arrangements up to the mark, because hackers are always searching for new possible techniques to control your website and misuse it for their motive. Security measures can be classified in many categories, but a securing a website should cover security of web application as well as security of the web hosting server on which the web applications and website are hosted. Here I would like the share the information over security options on a LAMP (Linux, Apache, MySQL and PHP) as it is the most widely found combination among Linux Hosting Servers.
Instances in which a Web Hosting Server responds to the web browsers which are used by the visitors of the particular website residing on that particular website, that server provides a particular ‘header information’. Apache web servers are known for publishing many details of its environment as well as sometimes PHP also can be found responding in such header parts. Hackers may take advantage of this exposure in such headers of you website. Furthermore if he succeeds in knowing the factors like the type of web hosting services, type of server used, the web hosting platform, the version of scripting engine and other applications then it becomes an easy task for hackers to trace specific bugs or security loopholes. This makes the task easy for hackers to achieve their motives.
But still one can configure both Apache and PHP in such a way that it will remain hidden and will keep the possible attackers in the dark.
In previous posts we saw Cursor Movement commands, Text Modification commands, and commands used in Input Mode. In this post I would like to share the last line mode commands used in a VIM editor.
So following are the last line commands of VIM editor.
w – this command is used to save the file with the same name when you opened it to edit it.
w filename – This command works as same as we use ‘save as’ with windows applications, which allows you to save the new copy of a file with your desired name. The substitute command to ‘w filename’ is ‘sav filename’, the same task of saving a copy of file with other name can be achieved by using ‘sav filename’ command.
n.m w filename – this command is used for saving the content of line number ‘n’ to ‘m’ to the given file name. If you want to refer to the last line number (whatever it may be) then you should use ‘$’ instead of ‘m’.
e filename – This command is used to edit another file than the current one. It’s handy for toggling among the multiple files when used with the following ‘e#’ command.
e# – After using ‘e filename’ when you want to come back to previous file then you should use ‘e#’ command.
e! – This command is used to discard the changes made to a file.
r filename – This command reads the contents from a file and inserts it below the current line.
So these were last line VIM commands used to operate a Linux hosting server.
Forgetting passwords is one of the most common incidents when one works with a lot of computer devices and web hosting servers. Not remembering the password and being unable to access the computer or server is very frustrating. But fortunately you can reset the forgotten passwords on both Linux Hosting and Windows Web Hosting accounts. Here I would like to share the process of resetting the root password on a Linux Hosting account.
- You can reset your password by rebooting a system in single user mode.
- After booting your server, you can face GRUB boot loader where you should select kernel by using arrow key, because from it you can boot the system.
- Press the key ‘e’ to enter in to edit mode for editing a entry.
- Choose the second line starting with the word kernel, and again press the key ‘e’ to append to the ‘single user mode’.
- To the end of line insert a space and type ‘s’ and hit ‘Enter’ button.
- Now press ‘b’ for booting the system kernel in single user mode.
- You will come to shell prompt where you need to type ‘passwd’ command to reset the password.
- Enter your new password and hit the ‘Enter’ key.
That’s it. Here you have successfully reset your password. Now you can reboot the system for normal use.
VDI is a short form of Virtual Desktop Infrastructure, which is a technology developed as a utility for managing web hosting services within a data center. This technology basically designed for providing better manageable environment with desktop, better security, supervision with easy operation of help-desk. Almost all of know about the widely used virtualization technology which provided the cheap vps hosting as a more reliable and cost effective web hosting service option for webmasters. Similarly Virtualization also provided benefits to web hosting services providers by saving lot of things terms of energy, electricity, space (rack-space) and better manageable web servers. VDI is a technology which is also related to Virtualization and it allows a user to have full control to end users of desktops, applications and data which is accessed directly from data center but still it can be experienced like their own personal desktop.
For a webmaster it is very essential task to keep desktop systems updated with the latest required versions of softwares and applications, drivers, security systems and other required stuff. Without using a VDI this all is done by creating images manually which contains operating system, applications, drivers, security arrangements and other critical stuff making it very much time consuming. If any mistake happens while creating these images one can face a lot of errors while deploying them, which will waste more time, efforts and also money. But with the use of VDI image creation and management can be done in more improvised and predefined manner, because you need not to create the image manually.
VDA also allows any legacy hardware of external devices to accessed and used without any interruption. Security provided with VDA is up to the mark as with VDA integration your desktop data get the protection of firewalls. Speedy deployment of applications with better management, time and cost cutting, end user satisfaction with the minimum possible errors are the main features a data center can get by adopting Virtual Desktop Infrastructure.
Apache Servers are one of the most important web server softwares of Linux hosting services and generally it has no demands from the webmasters opting for Windows Web Hosting services. A patch can be defined as a small application or a program of software designed for fixing the existing problems or drawbacks with it’s current version. This fixing can be in terms of vulnerabilities, bugs, inabilities and uncompetitiveness compared to other similar competing softwares. In short the patch is the difference between the previous version and upgraded version of a software. Similarly Apache patches are designed to improve the performance of Apache within different areas. Official Patches released by Apache can be treated as upgraded versions of Apache. If one has the Apache source product installed then the patches will be installed or updated automatically, otherwise the files will be there in the actual patch and one can find them under any of the ‘reloc’ directories. Being an open source a person can develop a patch as per his requirements and can also share it with others. But though the patches are developed with the purpose of fixing problems and bugs, a wrongly developed patch can affect inversely with the performance of Apache. Few of the developers also have provided the patch management softwares in the market to manage the patches with the ease. Even few of such softwares can update multiple computers at the same time withing multiple networks.
The range of these patches is very wide and one can choose from the basic home editions to ones which can mange high number of commercial computers networks. The choice is available according to the webmaster’s needs to make their web hosting services more suitable for their website.. Patches related to improvising security features are supposed to be most popular patches among webmasters.
Note : The official patches downloads are available at – http://httpd.apache.org/download.cgi