- Install cPanel on a Virtual Server Running CentOS 6 with 7 Simple Steps
- Clear Your System Cache in Ubuntu with These Quick Steps
- Install MariaDB on CentOS 7 with these Simple Steps
- What is an A Record?
- Smartermail vs. Mailenable – What does it hold for you?
- Common Issues with Website Migration
- Tips to Evade Spamming
- Dirty Cow Vulnerability – Check How Dirty It Is?
- It’s Time to Update Your Server
- How to Change the Listening Port for Remote Desktop?
Category Archives: Web Hosting
When your browse something your web browser, a cache of the websites you visit is saved by the browser in order to load the subsequent visits quickly. Similarly, Linux too keeps a system cache – apt-cache, application cache, etc. – so subsequent loading of the application will be very fast.
Cache is a good concept when viewed from a user’s point but do you know it keeps utilizing your system’s memory. Also, at some point, you need to ensure that all the unnecessary data or junk files are deleted which are usually in the form of the cache so that your system remains fresh and less loaded.
An open-source database management system, MariaDB is commonly installed as part of the popular LEMP (Linux, Nginx, MySQL/MariaDB, PHP/Python/Perl) stack. The data is managed by MariaDB by using a relational database and SQL (Structured Query Language). It acts as a fork of MySQL that is managed by the original MySQL developers. Since it’s designed as a replacement for MySQL, it uses commands that reference mysql and is the default package on CentOS 7.
This tutorial explains the installation of the latest version of MariaDB on a CentOS 7 server.
What is an A Record? The A in A record stands for Address. An A record is used to find the address of a computer that is connected to the internet from a name. If you are visiting a website, send an email or connect to Facebook or do anything on the internet, the address you enter is a word that is connected with dots.
What are A records?
A record will map a fully qualified domain name to an IP address and that are most often used record type in any DNS configuration. Address records can be configured in a domain for a specific host like www.example.com or sometimes it will represent with an @ symbol.
When migrating a website from a previous provider, it is important to test out the site while in development to ensure a smooth transition. If a website is incorrectly migrated, you can run the risk of losing not only functionality but also traffic and search visibility. Common issues that can persist following the move of all data, databases and emails are:
- Contact/Enquiry Forms – Commonly, these forms use customized parameters and components that most likely won’t exist within your new server. Furthermore, mail scripts can present a problem by specifying an SMTP mail server that is not compatible with the new host.
- PHP and Module Version Differences – Identify the prerequisites of your site by using a simple PHP info script. You can then deploy a system that will be qualified to run your existing service.
- Permissions – All custom permissions must be present to ensure no loss of functionality during an FTP migration. Plesk migrations can be used to guarantee all permissions and setting are transferred. Free migration services are offered by certain providers.
Following a sound migration process will give you the best chance at identifying issues quickly to relieve a lot of pressure and frustration.
Email spamming is an ever present issue that can cost you or your business time and money. It is surprisingly easy for email addresses and computers to be hijacked for spamming purposes. Here are steps you can take to increase security and ensure you stay off the blacklist.
- Make sure your computer is free of viruses. Many free anti-virus programs are on the market. Find one, make sure it is updated and scan your computer.
- Starting fresh is important if you believe your computer or accounts have been compromised. Reset your passwords – this includes email passwords.
- Use strong passwords as preventative measures. Strong passwords usually contain a combination of the following: Uppercase and lowercase letters, numbers, and punctuation.
- Don’t store passwords. This includes storing on your browser, FTP client or email client.
- Keep your passwords secret. Passwords are important and should not be shared with anyone.
- Test your computer for keystroke loggers or spyware to ensure passwords stay secret.
- Third party applications and plugins that aren’t updated are vulnerable to penetration
- Protect servers and websites by regularly scanning with maldet (linux) or clamwin (windows).
You might be getting for software updates several times. Though knowing it’s important, you might be ignoring it always.
Surely there are reasons behind ignorance – “Sending an email to the client is important right now”; “It’s my presentation day today so I need to finish the presentation”; “What if something breaks?”
But, when something goes wrong with your software, you hear the nagging voice at the back of our head saying we made a bad decision.
You need to hear it clearly that software updates can’t wait – significantly when it comes to your servers or business systems. Software updates contain critical bug fixes which if left unpatched; your system is a fish in the barrel for the hackers.
Whenever you type a website address into your browser, the address (say for example the web address: (www.domainnamehere.com) is translated into a set of numbers, known as an “IP address” (the IP stands for internet protocol). So whenever you type a domain name into your browser your computer is actually directed to the IP address that the domain name is associated with.
Every site on the internet has an IP address, and every site can be reached by typing in its IP address, with some exceptions. Some websites on the internet will be hosted on the same server, which means they will have the same IP address. So for example, two websites like www.hisname.com and www.hername.com may be hosted on the same server; in which case a person looking for one of these sites will be routed to the appropriate site by the server. In cases like this, where more than one site uses the same IP, the IP address will be known as a “Shared IP address”. If a website has its own unique IP address that no one else uses, then that IP address will be known as a “unique IP address.”
When browsing the internet you may have gotten the occasional popup informing you that the site you want to browse has a security certificate that is not trustworthy; other variants may include: “the security certificate presented by this site is not trusted” or “the security certificate used by this site was not issued by a trusted certificate authority.” These are known as SSL errors (Secure Socket Layer errors). The message you get informing you of the SSL error will vary depending on the browser you are using.
Most internet applications run on the basis of DNS then it may be emails, website browsing, messengers, etc. But very few detect the presence of this extensively used service. And this is the reason why the vulnerabilities in DNS service are ignored by server administrators resulting in easy exploitation by hackers.
Usually, securing a server involves server software plus application software security, file system security, physical and network security.
Below are steps to secure your DNS server –
You might sometimes need to block a specific IP address from accessing your server for several reasons. Follow the simple instructions below which include creating an IPSec Security Policy specifying to block access to specific IP address –
Step 1 – Hover your mouse to Start Menu and click on Run.
Step 2 – Type “secpol.msc” in the run window and click OK.
Step 3 – The Local Security Settings window will open. Click on “IP Security Policies on Local Computer”.
Step 4 – Go to the right window pane, right-click and select “Create IP Security Policy”.