GLIBC GHOST – How to deal with it?

Glibc ghost

A critical vulnerability in the glibc library has been announced by Red Hat Product Security, assigned as CVE-2015-0235 and is commonly called as ‘GHOST’.

What is GHOST? 

A buffer-overflow bug, GHOST affects the gethostbyname() and gethostbyname2() function calls in the glibc library. A remote attacker can make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application.

Impact of GHOST

The gethostbyname() function call is used for resolving DNS which is a very common event. This vulnerability can be exploited by an attacker by triggering a buffer overflow by offering an invalid hostname argument to an application that performs a DNS resolution.

read more

Posted in Web Hosting | Tagged , | Comments Off on GLIBC GHOST – How to deal with it?

CSF is Blocking Your IP? Here’s What You Can Do?

CSF blocking IP

Generally, considered to be an advanced firewall, CSF blocks external IPs (Inbound Connections) to avoid Brute force attack or attack similar to that (Multiple login failures, hacking attempts, etc.) on a server. The firewall might block the connection while uploading files using Filezilla.  It might be possible that Filezilla is trying to open multiple simultaneous connections to speed up the transfer. The firewall may interpret it as brute force or port scan activity and block the IP address from where the connection is originating.

read more

Posted in Web Hosting | Tagged , | Comments Off on CSF is Blocking Your IP? Here’s What You Can Do?

HTTP Status and Error Codes

HTTP Status and Error Codes

HTTP status and error codes are responses that are given by the website servers. The status codes are informational codes while HTTP error codes show an error.

The purpose of these codes is to communicate the cause of the issue so that it can be resolved. You must have seen most of these codes on the internet while browsing like HTTP 404, HTTP 500 and others.

Every HTTP status and error code has two parts:

  1. The code (such as HTTP 404)
  2. The reason phrase (such as Not found)

The phrases are simple phrases that explain the code and are helpful in making sense of the code. For instance, an HTTP 404 error code doesn’t make much sense but HTTP 404 Page Not Found makes sense that the page on the website is not found.

read more

Posted in Dedicated Website Hosting | Tagged , | Comments Off on HTTP Status and Error Codes

Linux Server Security: SELinux or Systemd?

bodHOST Linux Server Security

The security of a Linux server is being always a sensitive issue. Here is what Greg Kroah-Hartman thinks about SELinux (he is one of project developers of systemd).

The recent convention of CoreOS Fest Berlin (9 and 10 May 2016) was particularly rich in action and followed by several specialized portals. During the event, Greg Kroah-Hartman had given some interesting statements on ‘the Linux kernel development process and the security of the operating system’.

The important issue was also touched by Lennart Poettering (currently employed by Red Hat and known for Avahi, PulseAudio, and systemd), he is one of the developers of the project systemd init (process during startup is called into question by the kernel to initialize the user space), which he explained with essential parameters that act on the safety of a Linux server.

read more

Posted in Web Hosting | Tagged , , | Comments Off on Linux Server Security: SELinux or Systemd?

Domain Name Level DNS Management

DNS Management

If you want to learn how to set up your email and domain forwarding, then this article will teach you how to accomplish this.

It’s possible to register a domain with us and not have us host it. This can be done by forwarding the domain to an existing site with an A record. You can also manage this yourself if this is something that you’re capable of doing. If you run into any problems you can always open a support ticket and we can get the issue resolved for you.

To set up Domain Forwarding or manage your DNS it required that change your name severs to the following:

read more

Posted in Dedicated Website Hosting | Tagged , , , | Comments Off on Domain Name Level DNS Management

Ten Simple Commands to Check Your Disk Space

Disk Usage

The ‘du’ command in Linux is a standard Unix/Linux command to check the capacity of disk used by files and directories on a machine. There are several parameter options in which the du command can be utilized to get the results in many formats. Additionally, the du command can be used in a recurrent manner.

Below are the ten useful ‘du’ commands with their examples that will help you to calculate the disk space occupied by the files and directories in Linux.

  1. To calculate the disk space summary of a /home/bodhost directory tree along with its sub directories, enter the below command –

The output displays the number of disk blocks in the /home/bodhost directory as well as its sub-directories.

read more

Posted in Web Hosting | Tagged , | Comments Off on Ten Simple Commands to Check Your Disk Space

When is the Right Time to Upgrade to Public Cloud?

Upgrade to Public Cloud

We are living in the world of applications wherein we have an app developed for every single activity performed and which creates a direct impact on business as well as the brand. If your potential end-user experiences dissatisfaction with your app, he is surely going to switch to your rival app. To avoid this situation, big organizations keep every solution ready prior to opening the throttle.

Since the tech trends are changing, businesses that are hosted on high performance hosted server like the dedicated server needs an upgradation in order to make it highly efficient with the new technology – Public Cloud.

read more

Posted in Cloud Server Hosting | Tagged , | Comments Off on When is the Right Time to Upgrade to Public Cloud?

How To Perform A Full Website Backup?

how to perform cPanel backups

Performing a backup within your cPanel is a simple and straightforward process.  Normally we recommend our clients take their own backups. Backups on Shared and Reseller servers are guaranteed, but it is always good to have own copy of backups, as we all know “better safe than sorry” is the key to success. Knowing this our clients can make the best decision when buying hosting.

Getting a direct backup from your cPanel is a straightforward and easy process. Here is how you do it:

  1. First you must log into your channel
  2. Go to the files sub section and look for the backups link
  3. Choose complete a full website backup
  4. Make the “Home Directory” the backup destination

After performing the steps, let the process run for a few minutes and when you come back and refresh you should now see the backup available to download. Ensure that you download it to your local machine and keep it in a safe place.

read more

Posted in Control Panels | Tagged , , , , , | Comments Off on How To Perform A Full Website Backup?

Intel Xeon E5-2600 Expands its v4 with 22 Core

E5-2600 v4With 22 Core, 14 nm engraving, security and telemetry functions strengthened, Intel Xeon E5-2600 v4 meet the performance requirements of servers.

With metronomic pace, Intel respects its timing for processors renewal for servers. Thus, unveils the successor of Xeon E5-2600 v3 that worked on the micro-architecture Haswell. For v4, Intel preferred micro-architecture Broadwell instead of Haswell. The latter is known in the world of mainstream processors and has been adapted to the world of data centers and especially Cloud.

read more

Posted in Web Hosting | Tagged , , , | Comments Off on Intel Xeon E5-2600 Expands its v4 with 22 Core

The Excellence of Virtual Disaster Recovery

The Excellence of Virtual Disaster Recovery

The elegance of technology has made our life styles easier than yesterday. It is developing day by day. The best example for its grace is Software. It has eliminated the complexity of different aspects. Everything is happening now in a fraction of seconds! But it has got up with a negative trait as well. If anything goes wrong, sometimes the data which is stored gets formatted instantly. This leads to countless number of problems. Mainly in computers, which are used officially, there exist confidential data which should not be disclosed. If such information gets erased, the company suffers form a lot of problems. To eliminate this burden, Virtual Disaster Recovery has taken birth which allows a back up for the data.

read more

Posted in Dedicated Website Hosting | Tagged , , | Comments Off on The Excellence of Virtual Disaster Recovery