• Server Administration

    December 11th, 2003
    Server Administration
    Article Preview In reading the various industry message boards, I have seen numerous questions and suggestions in regards to hacking and being hacked. I have myself done it, defended it, and helped others with their situations regarding it.I want to take a look at an example of ways to determine if you were hacked, how it was done, what to do about it and how to prevent it. I would like to start by saying that my company does DP (deep penetration) testing (not the kind you’re thinking of!), an analysis of your network which you can read about here.
    The most obvious way to tell if your server has been compromised is when your index page has been defaced or changed. This should be of concern to you but most likely it is your best case scenario because it can be fixed easily. The only thing that you have lost, if anything, is some down time, and a hacker has bragged to his friends about cracking your box.


    Now, if your server has been hacked into and they have taken control of your box, this is where your real problems lie. This means that the hacker has gained access to your htaccess files and all of your reports, and can use your box in any way he wants. An example would be setting up an illegal FTP server to distribute illegal pictures, documents on attacking the government, pirated software, and basically anything else he has a mind to do. Do you know who will ultimately be responsible? Not the person who hacked into your site, but you, the pornographer, will be subject to lawsuits and possible criminal charges even though you had nothing to do with it.


    Here is an example of a situation that applies to this problem. After using nMap to footprint the external network, we focused our attention on an FTP server that was curiously installed outside the firewall. A port scan against the box returned extremely troubling results. In addition to the ...
    Read More Read More

    July 25th, 2003
    Server Administration
    Article Preview Bandwidth theft, hotlinking, file leeching, bandwidth leeching, external linking, remote linking, deep linking and direct linking are all words and phrases used to describe a single problem faced by many Webmasters.Bandwidth theft, hotlinking, file leeching, bandwidth leeching, external linking, remote linking, deep linking and direct linking are all words and phrases used to describe a single problem faced by many Webmasters. They describe the practice of building Web pages that contain unauthorized content links to files hosted by another site.





    Notice that I said content links and not navigation links that lead to another site. Content links are file references that the browser fetches to draw the page such as images, ...
    Read More Read More

    May 8th, 2003
    Server Administration
    Article Preview Search engine placement is a science, and like any scientific project, a proper search engine campaign requires a controlled environment. Even in the best of circumstances, an SEO has a myriad of variables to consider that may have a positive or negative effect on a search engine marketing campaign.Search engine placement is a science, and like any scientific project, a proper search engine campaign requires a controlled environment. Even in the best of circumstances, an SEO has a myriad of variables to consider that may have a positive or negative effect on a search engine marketing campaign. For accurate research to take place, a controlled environment must be entirely free of any Web site instability. A common cause of instability is the downtime that arises when a Web site is inappropriately transferred to a new Web Hosting Provider (WHP).



    ...
    Read More Read More

    January 2nd, 2003
    Server Administration
    Article Preview The Sales Page

    [Part One, Part Two]

    Now that you've set up your site's design, structure, and content, the toughest question of all arises: How will you move your visitors from the home page, through the information they want, and ultimately, to the sales page – where they'll finally click on the all-important “order” button?

    First of all, let's clarify one point which is important to remember as you plan your promotional campaigns and view their results: Just because a customer might not buy what you offer doesn't mean they won't come back in the future, or refer their friends to your site.The Sales Page

    [Part One, Part Two]

    Now that you've set up your site's design, structure, and content, the toughest question of all arises: How ...
    Read More Read More
    December 19th, 2002
    Server Administration
    Article Preview HOSTING HOTLINE





    Content Pages

    [Part One]

    Your site has to be loaded with content. It doesn't have to be like CNN.com, but the more information you provide, the better.HOSTING HOTLINE





    Content Pages

    [Part One]

    Your site has to be loaded with content. It doesn't have to be like CNN.com, but the more information you provide, the better. The main idea is to catch the visitors’ eyes, and get them to sign up, or at least make a good first impression. Ideally, you'd like first-time visitors to bookmark your site for a return visit next time they decide to move to a new host.

    The addition of a few extra resources and links is okay, but don't make a portal out of your site. If you really feel the need to add some special scripts or directories, register a separate domain and start working on a new site, but try not to include these unnecessary add-ons to your hosting site – you'll run the risk of appearing unprofessional.

    Let's now look at each content section, and what it should contain...

    About Us

    This should probably be the most advanced section of your site, and might include:

    Corporate Overview

    Show your ambitions, ideas and future ...
    Read More Read More
    December 12th, 2002
    Server Administration
    Article Preview HOSTING HOTLINE





    There are over 13,000 Web hosting companies worldwide, not to mention all of the “consulting firms” that offer hosting among their many services.HOSTING HOTLINE





    There are over 13,000 Web hosting companies worldwide, not to mention all of the “consulting firms” that offer hosting among their many services. With this kind of competition, every detail counts, since central to your success will be your hosting company's Website.

    This week and the next two, we'll cover some of the most effective ways to increase the traffic to your Web hosting site - how to get more visitors, clients, and most importantly, how to gain recognition in the hosting industry!

    We'll look first at general elements that hosting companies should consider in improving their sites. We'll then consider the type and depth of content a hosting site must display. Next, we'll address the all-important support section, and ...
    Read More Read More
    August 1st, 2002
    Server Administration
    Article Preview INDUSTRY TRENDS





    The Internet is evolving (understatement of the week). Not just changing, as that is constant, but more extreme along the lines of Neanderthal man walking upright.INDUSTRY TRENDS





    The Internet is evolving (understatement of the week). Not just changing, as that is constant, but more extreme along the lines of Neanderthal man walking upright. This new species is called "Web Services."

    Defined, Web Services are programmatic APIs accessible through Internet standards. They are also billed as the third generation of the Internet. In this industry: the first generation involved dial-up bulletin board systems and newsgroups and the second generation we currently live in with HTML and file-based content accessible through a browser ...
    Read More Read More
    June 18th, 2002
    Server Administration
    Article Preview Jeff Dunn is President of Pulse Web Ventures Inc, parent company of XXXstorage.com. This article is a snippet of his seemingly endless knowledge about Web sites, hosting, and Unix, that he passes to his clients on a daily basis.A Rewrite rule has the power to automatically funnel traffic from one Web page to another - all without the surfer’s knowledge. In this first article from a three part series on Rewrite rules, Jeff from xxxStorage.com explains how you can reduce hot-linking and bandwidth theft by adding a few simple lines to the appropriate text files on your Web server.


    A successful adult Webmaster is always aware of the bandwidth his or her site uses and tries to reduce it any way possible to cut down on the amount of money paid to the host. One cause for using more bandwidth than necessary is hot-linking and other forms of bandwidth stealing, often perpetrated by other Webmasters, either evil or ignorant. Using “Rewrite” rules is the most common tip given to adult Webmasters for reducing hot-linking.


    Note: Many novice Web users will just say “use .htaccess.” Although, you may use an .htaccess file to contain your rewrite rule, it is not the .htaccess file itself that helps block hot-linking… so that terminology is in error. It is the contents of the .htaccess file (which can be many different things), which in this case is the Rewrite rules, that perform the operation. ...
    Read More Read More

    April 22nd, 2002
    Server Administration
    Article Preview Adult Webmasters have a lot on their plate, and often there is little time to learn proper syntax for Web server configuration files. Yet if you make a simple mistake in the syntax of your .htaccess file, you could lose your ranking on Google. Mark Jervis is a technical expert for ProHosters.com, and after recently investigating a problem relating to a mysterious drop in available hard disk space he discovered several errors that Webmasters commonly make which effectively exclude them from consideration for the Google search engine.Adult Webmasters have a lot on their plate, and often there is little time to learn proper syntax for Web server configuration files. Yet if you make a simple mistake in the syntax of your .htaccess file, you could lose your ranking on Google. Mark Jervis is a technical expert for ProHosters.com, and after recently investigating a problem relating to a mysterious drop in available hard disk space he discovered several errors that Webmasters commonly make which effectively exclude them from consideration for the Google search engine.

    ...
    Read More Read More

    April 5th, 2002
    Server Administration
    Article Preview Digex's use of Shaquille O'Neal, the Los Angeles Lakers superstar to promote the company as the dominant force in managed hosting worked wonders. The NBA's most powerful player conveyed in a major advertising campaign that Digex was the web hosting powerhouse.Digex's use of Shaquille O'Neal, the Los Angeles Lakers superstar to promote the company as the dominant force in managed hosting worked wonders. The NBA's most powerful player conveyed in a major advertising campaign that Digex was the web hosting powerhouse.


    But even though Thomas Davidsson, Senior VP of Digex in Europe, loved the commercials featuring ...
    Read More Read More

    Page 1 of 2 12 LastLast
1 2 3 4 5