Skip to main content

Home/ Groups/ DISC Inc
jack_fox

Web Hosting 101 - The Basics - 0 views

  • Linux servers are open source and can be based on a number of different distributions, such as Ubuntu, Debian, Red Hat, CentOS, or FreeBSD.
  • the most common forms of web hosting available are: Free Web Hosting Shared Web Hosting Managed Web Hosting VPS Web Hosting Dedicated Web Hosting Cloud Web Hosting
  • Free web hosting is offered by various companies primarily in order to up-sell other domain services or to publish advertising on pages that are hosted under the account.
  • ...33 more annotations...
  • With shared web hosting, there may be thousands of different businesses, individuals, and organizations all serving their website files to the public from the same computer.
  • The web hosting company employs systems administrators to manage the server software installation and security updates. The hosting clients use file transfer management tools to host web pages in HTML or other programming languages which serve the files to the public through the browser. The hard disk space on the remote server can be used for other purposes than web hosting, for example remote file storage, email accounts, sandbox web development, mobile app support, or running software scripts online.
  • Shared web hosting accounts can cost as little as $1 – $3 dollars per month and rarely cost more than $20. It is estimated that over 90% of the websites on the internet use shared web hosting to keep their information online 24 hours a day. Shared web hosts never turn off their services and offer seamless hardware upgrades in the data center that can keep a website online for years. Most of the available web development tools will integrate easily with a shared hosting account.
  • The main disadvantage of shared web hosting is that it is not able to scale effectively to support the traffic of large websites and usually includes strict limitations on the use of CPU processing power because of the pooled resources. Shared web hosting does not typically support the user installation of server extensions through the command line that are important for custom web development and mobile app support.
  • There is still no opportunity for advanced systems administration and custom server configurations on most shared hosting plans. Security on shared web hosting frameworks is not considered robust enough for sensitive corporate information and government accounts. There can also be performance issues that develop on a server if one domain is consistently consuming shared resources or hit with a DDoS attack. Because systems administration and root server configuration control is taken out of the hands of shared web hosting users, they are often overly reliant on the service company for tech support.
  • Shared web hosting is recommended for self-published websites and small business networks.
  • Managed web hosting is a version of shared hosting where the service company specializes in platform-specific products that support custom development frameworks. Examples of this can be seen in Pantheon and Acquia Cloud for Drupal, Nexcess for Magento, or WP Engine for WordPress. Managed host companies provide optimized server environments that can speed up website performance and page load times for high-traffic, CMS-driven websites.
  • Virtual Private Servers (VPS) are a web hosting solution designed to give more power and flexibility to website owners for custom developed software requirements and complex applications. Technically, a VPS will operate in the same manner as a dedicated server while operating on a partitioned hardware framework that allows for the use of only a fraction of the resources of the host machine.
  • Understanding which virtualization platform the VPS web hosting company is using to manage data center resources and client configurations is important.
  • Developers often prefer VPS accounts because they can custom configure the server with the choice of operating system and install whatever additional server extensions are required for programming web applications
  • The main benefit of VPS hosting is that website owners can “dial in” the exact amount of server resources that are required to optimize the performance of a complex website.
  • The main disadvantage of VPS web hosting is the complexity of systems administration required to install and manage the server software, which requires a lot of command line knowledge and background in web server configuration.
  • Inexperienced users can leave security holes in the environment that hackers using automated script bots and known server or database exploits can easily detect and target. Using a standardized cPanel, CentOS, & WHM environment or administration panels like Webmin and Virtualmin can help simplify the server administration process considerably by adding a GUI layer to access common tasks
  • VPS web hosting accounts are best suited for developers who need to custom configure the environment with server extensions that shared web hosts will not support. Typically these are related to the use of database frameworks other than MySQL, programming languages other than PHP, and server frameworks other than Apache.
  • Dedicated web hosting is the most expensive and flexible of all of the service plans offered by companies in the industry, as site owners are able to directly rent or lease a complete rack-mount server in a data center.
  • Dedicated servers are required to host the largest sites by traffic on the web, as well as by mobile apps which require elite performance
  • The main disadvantage of a dedicated server is that it is costly compared to shared hosting or VPS plans, and expensive even when compared to the price of the underlying hardware itself. With dedicated servers, the client is paying not only for the use of the server, but also for the trained technicians who manage it, the overhead costs of the data center, and access to the internet backbone. Data center costs include not only rental of office and warehouse space, but also the electricity required to run all of the servers and keep them cool. Data centers must also have back-up power generation facilities in case the local electricity supply is cut. All of the residual costs are included in the annual price of a dedicated server plan. Nevertheless, it is still often much cheaper then what would be required to manage a data center for a single business independently.
  • Cloud web hosting provides solutions for websites that need more processing power and require more than a single server instance because the amount of online traffic, including the number of queries to the database and resource files, is too high in volume for a single machine
  • Cloud web hosting is defined by the deployment of server clusters that scale automatically with the user traffic and processing power needs of a website, including advanced software applications for elastic load balancing, file storage, and database optimization
  • Cloud web hosting is similar to content delivery networks (CDNs) which use distributed global servers, advanced page caching, and file management software to optimize website performance for large websites. Many cloud hosting companies will offer the ability to choose the operating system, database framework, and geographic location of the server itself as part of the configuration options.
  • Cloud web hosting is designed for remote computing applications and required by large web sites whose user traffic exceeds the limits of what a single server instance will provide. Cloud web hosting is particularly designed to meet the needs of websites with large database requirements.
  • Not every website will require cloud hosting, but small businesses and start-ups who scale their traffic and user communities often find managed cloud services a reasonable option over dedicated servers because of the ability to “pay-as-you-go” for only the amount of server resources used and for the ability to keep sites online through cluster scaling at the times of peak user service provision.
  • The major downside to cloud hosting is the uncertainty involved with the variability of costs with sites on the “pay-as-you-go” model. Another problem can be associated with “hype” in the industry, which can lead to over-pricing and over-billing for unnecessary services or introductory plans.
  • Cloud web hosting can be similar to VPS or dedicated server frameworks where the systems administrator has the ability to custom configure the installation of the operating system with software extensions that are not available in shared hosting environments. Some managed cloud hosts simplify this process by offering optimally configured solutions with a proprietary base software package.
  • Some of the main features to look for in any web hosting account are: Server Architecture Operating System Version Domain Management Tools Systems Administration Tools Bandwidth & CPU Limitations Free Offers & Promotions Data Security Technical Support
  • Before purchasing any web hosting account, it is essential to verify the server hardware being used on the platform. Currently there is a wide variety of difference between the different versions of Intel Xeon, Atom, Itanium, and AMD Opteron servers deployed in data center use.
  • The version of Linux installed, for example CentOS and Cloud Linux, can also come with licensing restrictions due to the use of WHM and cPanel. The use of other Linux distributions like Ubuntu, Red Hat, Debian, FreeBSD, etc. in web servers is mostly related to developer preference for systems administration
  • Many hosting companies claim to offer “unlimited” bandwidth and data transfer. However, if a website uses too many CPU resources, it may still be throttled or taken offline at times of peak user traffic.
  • A web hosting company should provide a guaranteed uptime of at least 99.9% as part of the service plan.
  • Website owners should make sure that any web hosting plan will be configured securely, including firewalls and monitoring software to prevent intrusions by automated script-bot attacks. Check whether the web hosting company offers DDoS attack protection and auto-alerts for unauthorized logins. While shared web hosting plans include the company services related to upgrading the installed operating system and server software with the latest security patches, VPS and dedicated server accounts will need to be responsible for this through a qualified systems administrator. Web hosting companies that provide automated site file and database back-up tools like raid disk mirroring on advanced accounts provide an extra layer of site security in case of a server crash or technical error that leads to data loss.
  • Managed hosts have the advantage of experienced technical support teams with platform-specific knowledge
  • Small business website owners and independent publishers should start with a shared web hosting account, then upgrade to a VPS or Cloud hosting plan if the traffic scales beyond what the server will support.
  • While shared hosting under cPanel and CentOS remains the industry standard, innovations in cloud computing are changing the web hosting landscape quickly. Many web hosting companies are now offering “hybrid” approaches that combine the best features of cloud and shared hosting into a high-performance, low-cost retail plan that offers integrated load balancing, page caching, and CDN services on elite server hardware configurations.
  •  
    "Linux servers are open source and can be based on a number of different distributions, such as Ubuntu, Debian, Red Hat, CentOS, or FreeBSD."
jack_fox

Server Security Requirements and References: Information Technology - Northwestern Univ... - 0 views

  • Each and every recommendation will not be applicable to every server; therefore the system administrator should exercise their own judgment in conjunction with their department's own requirements and business needs. Deviations from the recommended guidelines should be documented
  • if a department is required to comply with PCI (Payment Card Industry) regulations, the specific recommendation has been labeled with "PCI/DSS"
  • All local and domain accounts with privileges above normal user level should have a minimum 15 character passphrase and must be changed at least once every quarter.
  • ...9 more annotations...
  • Machines may not be connected to the network until they have had the latest OS and application updates applied, anti-viral software installed and activated, firewall enabled, AND a strong passphrase enabled on all accounts.
  • Departments must establish, maintain, and effectively implement plans for emergency response, backup operations, and post-disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations.
  • Encrypted backups should be taken regularly, and all on/off site storage should be physically secure.
  • Clocks must be synchronized to two (2) internally hosted time servers
  • RedHat Linux
    • jack_fox
       
      Closest to CentOS, the distribution of Linux that FutureHosting uses
  • Encrypt all non-console administrative access. Use technologies such as SSH, VPN, or SSL/TLS (transport layer security) for web-based management and other non-console administrative access.
  • Logs must be available online (electronically) for three months, available on tape (or other removable media) for one year.
  • Establish a process to identify newly discovered security vulnerabilities (for example, subscribe to alert services freely available on the Internet). Update standards to address new vulnerability issues.
  • Remove inactive user accounts at least every 90 days.
jack_fox

Slow Google Sheets? Here are 27 techniques you can try right now - 0 views

  •  
    "The IMPORTRANGE is a slow formula because it's connecting to another Sheet to retrieve data. In general, it's best to minimize the number of these external calls required."
jack_fox

Robots Meta Tag & X-Robots-Tag: Everything You Need to Know - 0 views

shared by jack_fox on 12 Oct 20 - No Cached
  •  
    "add the following HTML snippet to every page on your site to tell Google that you want no restrictions on your snippets: Note that if you use Yoast SEO, this piece of code is added automatically on every page unless you added noindex or nosnippet directives."
jack_fox

BruceClay - Why Safe Browsing Matters to Your Website, Visitors and Rankings - 0 views

  • In 2019 alone, 60% of all CMS applications were found to be out of date at the point of infection, making outdated components and core CMS files the leading causes of today’s website hacks.
jack_fox

- 0 views

jack_fox

What's the Difference Between B2B and B2C Branding? - 0 views

  • The goal of B2B branding and marketing is to convert prospects into customers; then the salesperson takes over.
  •  
    "The goal of their branding is to build trust over the duration of the sales cycle."
jack_fox

Building a T-Shaped Web Marketing Skill Set | Distilled - 0 views

  • For agencies, this is not just about recruiting and attracting T-shaped individuals covering a range of related disciplines, but building processes and assets that support collaboration between them. For individuals and in-house folks without a lot of internal support, it's about cultivating a network of specialists you can turn to when a project fits.
  •  
    "The ability to sell clients and stakeholders on the importance of a given problem/opportunity is often more important than ability to deliver the work yourself."
Rob Laporte

Top 100 Hacker Blog list for Hackers in 2020 | Best Hacking Websites - 0 views

  •  
    "The Hacker News"
Rob Laporte

Website Hacking Statistics in 2020 - WebARX Security Blog - 0 views

  • A very worrisome fact about website hacking statistics and hacking websites is that 98% of WordPress vulnerabilities are related to plugins. (See Figure 7 below.) The most popular vulnerability types in WordPress plugins are Cross-site Scripting and SQL Injection. According to CVE Details, XSS attacks are the biggest threat to WordPress sites. The second most popular type of attack is code execution and third are different bypass vulnerabilities. What is even the most worrisome is that in these top 10 WordPress plugins listed you can see 5 commercial plugins, they have around 21 million downloads and one of these plugins is a security plugin. (Source: WP WhiteSecurity) Source: WP WhiteSecurity To top it off, even more, the sad part is that anyone can create a plugin and publish it — WordPress is open source and nobody is performing a code analysis before the new plugin is sent out for the world. Also, there are no serious security standards for these plugins hence, WordPress plugins are unfortunately prone to vulnerabilities.
jack_fox

Core Web Vitals - Wix vs. WordPress, Shopify vs. Shopware - What's fastest? - SISTRIX - 0 views

  • The WordPress extension WooCommerce lags far behind in last place. Just under half of the WooCommerce shops currently meet the Google specifications. An alarming 26% are actually bad. The self-operated hosting solution with low-performance mass providers is clear here.
Rob Laporte

More Google Search bugs: Top stories indexing snag, coverage report delays - 0 views

  • Coverage report delays. On top of that issue, Google still has an ongoing issue with the Google Search Console coverage report. The coverage report is now about two-weeks delayed. I see data as early as August 31, 2020, while some see data as of September 1. Normally this report is about two or three days behind, not 14 days.
Rob Laporte

How to earn your place in Google's index in 2020 - 0 views

  •  
    "Rendering SEO manifesto"
Rob Laporte

LDAP Injection Risks | Veracode - 0 views

  •  
    "LDAP INJECTION"
jack_fox

How to Choose Google My Business Categories (With Cool Tools!) - Moz - 0 views

  • State of the Local SEO Industry 2020 survey found that, out of all factors, GMB elements (which include categories) have the greatest impact on local pack rankings.
  • take your list of keywords and enter them into your choice of free or paid keyword research tools to discover which terms have the highest potential search volume.
  • Finally, refine your list down to a smaller set of terms that combine the highest search volume with being most relevant and important for your company. In most cases, this is the list you’ll move ahead with, although there are some cases in which you would choose to target lower volume search phrases because they are either a) less competitive, or b) a more exact description of what your business is.
  • ...5 more annotations...
  • the awesome, free, new extension called GMBspy
  • this extension on enables you to go to Google Maps, search for your market competitors and see their categories
  • PlePer’s GMB Category Helper
  • My advice is to experiment with any relevant category and see where it gets you in terms of visibility.
  • check back periodically to see if new categories have become available that could win you new local SERP visibility
« First ‹ Previous 681 - 700 of 3586 Next › Last »
Showing 20 items per page