Friday, June 06, 2008

Today's resell hosting Article

Current resell hosting News

Nobody Check 1.03 Released

Mon, 18 Dec 2006 19:26:43 +0000
I’m very excited to announce that 1.03 of Nobody Check is ready for download.
This FREE security tool is now better than ever.
The Nobody Check tool is a new and unique security tool that can detect malicious processes that are running on your Linux server and report them to you in real time or by email. ...]

More PHP Projects to require PHP5

Wed, 11 Jul 2007 06:03:20 +0000
This vicious circle has been going on for sometime now but its about to stop, come 5th February 2008.
PHP5, a successor of PHP4 was launched about 3 years ago but has not witnessed widespread use mostly due to its incompatibility with PHP4. Most scripts and software today are written in PHP4 even though PHP5 comes ...]

Finding a good virtual Web hosting company can done by asking current and former customers about their experience. I know this may seem like a big pain in the ass, and maybe impractical, but think about how critical your web presence is to your operation. If you’re site goes offline due to a web hosts tech issue, you’ll very likely spend hours on the phone and on your email trying to get back up. Many online tools are available that can assist you to find an extremely reliable hosting service. With the myriad of choice available, it is necessary for the consumer to discriminate. Since shared Web hosting is conceived as only a low-end, low-margin commodity by the industry itself, it is necessary for the consumer to be very wary. There are literally thousands of hosts that offer shared and virtual Web hosting services. While many provide extremely good service, others provide service that is less than desirable. In order to find suitable Web hosts, consumers must conduct due diligence.

I’ll be back soon to make some recommendations based on my own research.

5 htaccess Tricks Every Webmaster Should Know

Thu, 24 Apr 2008 12:38:10 GMT
Here are 5 sets of .htaccess directives every webmaster should know.

Vyatta - My Basic Setup Guide

Thu, 29 Nov 2007 11:00:00 -0500
If you haven�t already been introduced to Vyatta� Vyatta meet reader, reader meet Vyatta.Vyatta is a fairly new Opensource, Debian based router that�s taking geeks by storm. And I can tell you from personal experience with Vyatta that it�s a powerful system.

So, I would put together a quick start guide on getting Vyatta working �out of the box.� Here it is�

Professional Web Hosting and eCommerce

Fri, 11 Apr 2008 16:03:36 +0000
Professional web hosting and eCommerce offers are constantly increasing. It’s directly the result of one of the fastest growing sectors of the Internet that is eCommerce.
People are becoming accustomed to buying things from Internet store fronts and every year the volume and value of sales increases substantially.
If you would like to open up your own ...]

Warning to all: 'latest' RHEL4 OpenVZ Kernel has a root exploit!

Wed, 11 Oct 2006 13:24:01 -0400

Background:
OpenVZ is a (stripped down) free, open-source version of Virtuozzo linux virtualization software. The modified OpenVZ kernel allows server operators to partition their servers into multiple Virtual Environments running a different Linux distribution.

Outdated Kernel:
As of now (Oct 10th, 2006) the latest Kernel listed on the RHEL4 download page (version 2.6.9-023stab016.2) is vulnerable to a root exploit that was first reported in July of 2006. That means that OpenVZ has had the vulnerable kernel available for download for around 3 months!

Response from OpenVZ: (*UPDATE*)
The response from OpenVZ was quick & effective - we contacted them at around 10PM on Oct 10th and by 6AM on October 11th (~ 8 hours) they released an updated version (2.6.9-023stab030.1). This does not negate the fact that a vulnerable kernel was left available for download for ~3 months, but I am quite pleased with their response.

update 2: OpenVZ sent an email to their list today (October 11th) at around 1PM EST saying "Everybody using 023 kernel is advised to upgrade." - perhaps they should have mentioned the root exploit in the email as a reason to drive people to upgrade.

Damage:
This only effected the OpenVZ kernels, not the Virtuozzo kernels. Our paid Virtuozzo installations were in the 2.6.8 branch which was not affected. A handful of our OpenVZ servers running 2.6.9 were vulnerable - we've updated them immediately. Unfortunately we became aware of this because one of the servers was actually exploited.


Server Security & Incident Tracking:
It goes without saying that if an attacker manages to get root access to a server, somewhere a sysadmin will forgo a night of sleep trying to recover.

'root' access to a server is absolute - root is the ultimate Unix user. Once an attacker gains root access, he/she can do anything. Cleaning a box that has had a root exploit is a nightmare, and many will argue not even possible. Because the 'root' user has the ability to modify anything on the system, any system binary can be replaced with a trojan'd version. Any configuration file can be changed to allow an attacker access through an unexpected port, ssh keys can be added to let an attacker in and cronjobs can be put in place to ensure that their exploits will stick around even if a sysadmin deletes them. An attacker can add a new user to /etc/passwd with uid '0' (root). The list goes on (and I don't want to give malicious people any more ideas!)

Having a malicious entity gain 'root' access to a server is a worst-case scenario for any system administrator.

How do you know if you were rooted?
There are many obvious signs:

  • log files disappear
  • suspicious processes are running on the server
  • programs with names like 'sendmail' are running on a non-standard port
  • files will be modified

Many system administrators will just know when something does not feel right.

What can you do?

Arguably the most important thing that must be done after an attack is finding the source of the exploit; what php script was exploited? what kernel bug was exploited? etc If you don't close the security hole, the hackers will just jump back in.

There are many ways that you can diagnose your system for changes and unusual activity:

  • Check the logs (assuming they weren't deleted)
  • use the unix 'find' command to search for files that have been modified or created in the last X days
  • use RPM --verify (if you are running an RPM-based distribution) to verify that binary files are not replaced malicious ones
  • Use 'netstat -apn' to look at incoming and outgoing sockets and inspect the output for unusual items.
  • hire someone who has experience in these situations

Most of the time attackers don't clean up after themselves - while they will delete the server logs to cover their tracks, they will leave behind the scripts that they use - these will be invaluable tools to discover how they exploited your system. Time stamps are also keys to finding out what was changed or added to your system.

"Why did the hacker choose me!"
This is a common question that we get from shared hosting customers who have vulnerable PHP scripts or forums. The answer is, these low-lifes have automated tools that search the internet for vulnerable scripts & forums - and then they notify the attacker of the vulnerabilities so that attacker can proceed.

Most of the time (especially in mass-defacing situations) attacker doesn't have a grudge against your personal website and they are not targeting your website for any reason other than it is vulnerable.

Most of the attackers that we have dealt with have 1 goal: replace all website files with their own political or religious messages.... and to gloat to their underground, hacker friends.

What is even worse is that you have websites with archives of hacks and records of what hacker defaced what website in the form of a competition - which hackers have defaced the most websites today? Websites shouldn't be encouraging hackers to increase their hack count!


Hacking in a Hosting Environment
In the context of a web hosting situation, there are 2 important types of exploits:
* 'localized' Exploits
* Server-Wide Exploits

An example of a "'localized' exploit" would be when a customer who is running an outdated PHP script gets attacked. The customer then gains access to the customers username and overwrites their files, can read their emails & confidential files, etc. For a web hosting company, this is expected and of 'minor' significance. For a customer, this may be the end of the world - files are gone, data is missing or modified and they feel victimized.

What scares system administrators is the server-wide exploits. This can be a direct attack (perhaps an SSH deamon has a vulnerability?) or this can be the result of an attacker who used a 'localized' exploit to escalate his/her privileges to 'root' level. A server-wide exploit is terrifying for web hosts. While web hosting companies will always tell customers that it is the customers responsibility to backup their files, the web hosting company has a job to do: keeping customer files online & accessible 24x7.

Backups
When the worst possible scenario becomes a reality, the web hosting company will usually turn to its backups. Backups come in many shapes and forms - local harddrives to store backups, remote backups and RAID (though that's not really a backup method... it's a redundancy method to protect against drive failure) are just 3 examples. Many hosts employ combinations of local & remote backups.

The problem is: If you store backups on a local server, an attacker can delete them. But, the cost of storing backups on a remote server is measured in additional administrative time & coordination, the cost of more bandwidth and the cost of the external storage space - this can add up to be an expensive proposition, especially if you are backing up to a remote datacenter at fast speeds - the bandwidth toll is expensive. In a web hosting environment, backing up dozens of servers with data retention spans of 1-3 months can require many TB of storage.

Another important decision is the backup schedule: will you backup everything each night or backup important things each night etc. Backing up an entire server each night would increase the CPU load, require much more storage and more bandwidth. Another option is backing up website files (the bulk of the data) once a month and everything else each night. This will help reduce the storage, bandwidth & CPU requirements, but the result will be that you may have to settle for a 1 month old backup if your files are removed.


The moral of the story:

Customers: Keep your scripts updated! Help provide a first line of defense for the server that your website is on. ALWAYS keep backups of your website data on your computer.

Web Hosting Companies: Keep your servers updated! Make sure that you update nightly & that you have good practices in place to help detect, quarantine and recover from an attack.



The Power of Search Engine Friendly URLs

Thu, 05 Jan 2006 00:00:00 EST
I recently invested quite some time into generating search engine friendly URLs for several of my websites to increase my ranking and to have more pages indexed.




resell hosting Products we recommend




Website hosting nowsadays is very competitive. Many web hosting companies offer
tonnes of features at very competitive prices. With so many choices in mind, how
do you choose the right host? I have tried many hosts over the years and finally
landed on one that I feel has the most complete features that I need at the best
possible price, ie BlueHost.



Features

BlueHost provides hosting features that surpass the needs of large commercial
websites:



10 Gigabyte Hosting Space

Host 6 Domains on 1 Account!!!

2,500 POP/Imap Email Accounts

250 GIGS of Transfer

SSL, FTP, Stats

CGI, PHP, MySQL

2000/2002/2003 Front Page Extensions

Free Domain Forever!

Superb/Responsive Support Engineers



Reliability and Performance

So far, I have no problems with the speed and reliability of the server. Most of
my sites hosted by them were never down. If you have google toolbar installed,
just take a look at their page rank. BlueHost.com has a page rank of 8 which is
rare for a web hosting company. This just shows how popular they are in the web.
If you look at their awards page, you will realized that they have a long
history of awards. This is a plus point because it shows that they care about
their customers and more importantly, their performance is consistent.



Support

They have a good support section in the website. Based on my experience, most of
their emails are answered within 2 working days. Though not the fastest around,
their replies are honest and professional. Some hosts will answer you in such a
way that you need to pay them more money to get your problems solved.



Conclusion

In conclusion, BlueHost offers quality and reliable hosting for $6.95 a month
with no hidden charges. With generous disk space and bandwidth, it is unlikely
that you will exceed the quota every month. The many good reviews of BlueHost in
the web speaks for itself.



Click Here to go to BlueHost website.


After writing all this matter on resell hosting, we have undergone a sense of a gratification on its completion. If this information is utilized, we will feel even better.
#






host gator affiliate
| | |

Labels:

0 Comments:

Post a Comment

<< Home