On January 27, 2015, Linux world was struck by critical vulnerability called GHOST. The bug exists in GNU C Library (or Glibc) functions gethostbyname and gethostbyname2 starting from glibc-2.2 version released in 2000; it was fixed in glibc-2.18 version released in May 2013, therefore, only LTS distributions are vulnerable:
- Ubuntu 12.04,
- Debian 7,
- RHEL 6 and 7,
- CentOS 6 and 7.
Note: other libc implementations (such as uclibc, musl) are not vulnerable to GHOST. More →
The fight against hacking is probably the most pressing server security related problem. It is quite difficult to find a golden mean between the user authentication inconvenience and the risk of identification fake. Often one-factor authorization procedure is too vulnerable. It is usually not enough to protect your machine against cracking. It is obvious that the authorization procedure that consists of two or more factors provides higher safety level.
Two-factor authorization (or 2FA) is a login process that combines two criteria of different types. It is accepted to distinguish following factors (or login criteria types): More →
One of the most important things that you should do immediately after initial server setup is to protect your machine against unauthorized access via SSH. Otherwise network scanning programs will quickly find out that your server port 22 is open. In that case, the only thing a hacker has to do to get the full control of the system is to fit the root user password.
Apparently unprotected SSH poses a grave security threat to your server. Of course, there is no absolute protection on the Internet. So your task is to make the attacker’s work as difficult as possible. Let’s examine a few safety precautions to reduce the risk of VPS cracking via SSH. More →
Server cracking is one of the most vital Internet issues today, that especially concerns sites with high traffic or profitability. In fact, this is the problem every internet business owner faces the prospect of. That is why it is highly important to take specific measures to stop hackers beforehand.
But how to avoid hacking and computer viruses? To protect VPS from hacking you have to fully control it, carefully adjust its settings, and monitor system changes. Luckily, modern technologies can greatly lighten your work! More →
Recently, more and more attention is drawn to cloud hosting. This is one of cutting-edge technologies gradually mastered by hosters. Nevertheless, the majority of people does not fully understand what such kind of hosting actually is, that is why there are so many misconceptions concerning its functionality.
At present, cloud servers are subdivided into two types – private and public. Private server presupposes the availability of own data center, while public one is fully open to the general public so that anyone can get the data. More →
While looking for reliable hosting every web-developer makes own specific demands and wishes. Willing to satisfy all the most exacting requirements of every customer, VMFrame offers several advantageous VPS hosting packages among which perfect propositions for both beginners and professionals can be found. More →
Probably, in life of every website owner comes a moment when quantity and quality of resources provided with shared hosting are not enough for his project’s proper functionality. In such a contingency, many web-developers hurry on to move up to vps host. But when is it really necessary?
Some inexperienced users naively believe that you should transfer your website only after your daily traffic reaches a particular point. But the real necessity of switching to vserver occurs when the resources of shared hosting are completely exhausted, and traffic has nothing to do with that. In this case a user faces several knotty problems: More →
In this article we are going to provide a thorough description of hosting services features and make objective recommendations that can help you in choosing the most appropriate hosting type.
What is a Shared Hosting
Shared hosting implies one server resources allocation among several sites; that is why it is the cheapest and the most widespread hosting type. Shared hosting is good for “light” projects not requiring large amount of system resources.
So called managed hosting is a popular tendency appeared in the web service industry almost simultaneously with virtual private servers. These servers suffer from one grave shortcoming – a person needs to have appropriate skills and plenty of time on its administration. The point is that inexperienced users often face severe difficulties concerning technical management of virtual servers; therefore host providers offer such additional services as monitoring and notifications sending, storage and database administration, security and load balancing. Thus, managed web host is an optimal decision for unpracticed web-developers.
Looking for reliable managed host provider, a beginner has to know some important points. First of all, you should pay attention if host company provides system management services that are used on a virtual hosting the most frequently, viz. security, firewalls, monitoring, notifications, and data backup.
Cloud Hosting Basic information:
Cloud services did not make great progress until recently, thus, they were available only to advanced users. Nowadays, due to Global Network wide spread occurrence, this technology is easily accessible to beginners just like to professionals.
Host service is one of the most called-for services on the Internet. Until recently webhost was subdivided into three types: dedicated server (separate machine), VPS (virtual private server), and virtual host (a great number of sites allocated on the one server). Today cloud host actively supplants the other three types. More →