Friday, December 30, 2011

Best and Cheap Web Hosting Company Review

Web Hosting Hub, an award-winning hosting company, offers top quality web hosting services at the very low price of only $3.95/mo with the highest level of technical support. Web Hosting Hub's All-in-One hosting plan,Cheap Web Hosting Comapnies,Cheapest Hosting Companies Reviews,Reliable Web Hosting,Uptime Reliablity of Hosting Company ,Web Hosting Reviews,Free Domain Name
Unlimited Websites
90 Days Money Back Read More

Cheapest Web Hosting Dec 2011 InMotion

Cheap Web Hosting Company Inmotion,24/7 Technical Support
99.9% Server Uptime
90 Days Money Back    Read More
Cheapest Web Hosting Companies List,Best and Affordable Web Hosting Companies,Low Price Hostinig Companies,Reliable Web Hosting Companies,Web Hosting Companies Reviews
Inmotion Hosting is one of the best web hosts around and is the most popular among businesses for a secure and reliable experience. Established in 2001, Inmotion Hosting can be considered a veteran in the web hosting industry. Backed by a team of experts with diverse technical backgrounds, Inmotion Hosting focuses on the latest technology to provide the best reliability for a smooth experience.

Wednesday, May 25, 2011

Technical Support for web hosting client

Technical Support is a backbone of any web hosting company,With out technical support Web hosting company cant develop neither with a weak technical support a web hosting company can satisfy their customer
we strongly beleive that Providing technical support to our valued client is very essential,Technical support is different type and Technical support has different level some unknow hosting companies claim to provide ftp cpanel username and password quickly is consider strong technical support,some web hosting companies providing very basic Technical support to their hosting clients due to limited Technical support client left web hosting company even that web hosting company offer cheapest web hosting rates because a client who purchase web hosting package has different purposes most of clients are buy hosting package for their business website and they cant afford in delay due to technical problem , Like technical problem in Their mail server, SMTP Error, spam issues pop issues, website configuration errors, different software packages problem in their web hosting site, Disk space issues, Bandwidth issues, operating Plesk panel for clients operating cpanel for clients, These are some time daily routine problem face by web hosting clients and there are lot of other Technical support issues
for this purpose Most of the web hosting companies dedicate two support Department simultaneously one is customer Support Department which often help and support to hosting client at basic level like cpanel username password , outlook express configuration cpanel and plesk panel operating for clients and Second is Technical support department , Primary responsibility of Technical Support department is to provide support at server level like there are lot of hosting client who buy dedicated server whether it is windows dedicated server or it is Linux Dedicated  server to solve these server problems need special Technical expertise and at this level  technical support are often paid technical support web hosting company charge for this level Technical support

Monday, May 23, 2011

Reseller Account Features


Are you interested in Reseller web hosting?Plan to start your own web hosting setup with minimal investment and minimal Web hosting Technical Knowledge?Or you tired of From your problematic and expensive Reseller account what ever the circumstances we have the right affordable and most reliable Reseller plan ,Karachi web hosting offer most flexible and cheaper Reseller plan according to your need and according to your web hosting requirements.Most reseller hosting plans allow resellers to create their own service plans and choose their own pricing structure.In many cases, resellers are able to establish their own branding via customized control panels and name servers we not only sell cheap and affordable Reseller account we also provide complete and quick Technical support to our Reseller clients,Most of the web hosting companies selling Reseller account at high price with almost no technical support,But karachi web hosting company Sell Reseller account with maximum Technical Support,In karachi web hosting Reseller account you can choose and decide your own hosting packages according to your and your client needs, In our Reseller account you can customize bandwidth and disk space of client change DNS entries ad-ons sub domains software installation and much more liberty, These all features will increase your business and soon you will be capable expand your business with help of karachi web hosting company,Karachi web hosting Reseller hosting does not require extensive knowledge of the technical aspects our Cpanel/WHM and parallel plesk based Reseller are just click and play ,you dont need to configure any thing else,Every thing will be ready for your in Karachi web hosting Reseller PlansOur suggestion on Reseller Account Buy your Reseller plan elsewhere but always insiste on following thingsPrices of Reseller Plans and check the flexibility of Reseller planAvailability and level of Technical support offering Reseller AccountSoftware Available in Server of Reseller account Method and techniques  of installing softwre for client end
world class web hosting guide,Web hosting news reviews views web hosting free technical support only available at www.webhostingmatters.com

Web Hosting company features

Web Hosting Reliability:
If you are planing to buy Hosting , whether it is shared hosting, Dedicated hosting, VPS server, Reseller account,you will consider seriously which company is more reliable, Reliability of hosting company in what sense you,will take?obviously you will consider following things maximum availability of Hosting server vps servers dedicated,servers, Goodwill of hosting company,Dont trust only on cheap web hosting company that is not enough if you are,professional person and want to grow yourself in internet market, ask web hosting company for their other services,
Web Hosting Technical Support:
what do you take means of Technical support? just to get Cpanel and ftp Username password quickly?Or just a quick,AutoResponder from Support@dummywebhosting.com after submiting Support Ticket?Technical Support is beyond from these,Few Services,what if you fell in trouble and your Hosting company unable to solve your web hosting issue or delaying,your quick solveable problem since several days with out any reason,Delaying in Technical support and again and again,forward your support ticket to other Deptt untill unless Client exhausted or hyper and then web hosting company offer,to upgrade services or offer high level technical support with 5 or 10 dollars per Ticket,is that not a very cheap,way to earn money from client by Dummy Web hosting companies,Most of the web hosting clients are not aware from these,techniques adopt by dummy web hosting companies.But we will not serve you like that, we have experienced Professional who beleive in solving problem of clients,Rather than to creating problems for customers like most of the cheap web hosting companies do

Disk Space Availability from web hosting company:
When You plan for Host your web site, you also think about how much disk space you required for your newly website once you will search on internet for web hosting companies and specially you search web hosting companies on Google search engine you may see thousands of web hosting companies claiming they are the cheapest web hosting in the world,if you read their web hosting packages you will see in reward of low price they offer very low disk space some time,it does not fullfil the requirement of a web site owner who is looking for cheap web hosting company,so must also see,the web hosting company disk space offer,
UpTime of Web Hosting Server:
Before  finalizing web hosting company make sure what is the up time of that web hosting company , and is that real mean of it,I must say 99.99 % web hosting companies offering 99.99 % UP Time of their web server, but infact that is not a reality
Web Hosting Data Transfer(Bandwidth):
web hosting data transfer rate is very crucial, if you have a blog 0r a website which need reasonable amount of disk space you must consider it seriously before finalising the web hosting company, you shoudl know once you upload data from FTP software or you check your emails and download attachments or your website is being visited by internet surfer in all that ways your bandwidth will consume and if you have sitemap page and you need your sitemap page frequently updated by Google crowler in this scenario you will need Bandwidth at least more than 10 GB, so before purchase web hosting package must consider Bandwidth offer by web hosting company
copyright Data  No permission to Republish or Reproduce
world class web hosting guide Web hosting articles news reviews Technical support available only at
www.webhostingmatters.com

Tuesday, May 17, 2011

What is Blog?

Basic function of blog is write some thing by indivituala about individual, when this blog technology started most of the blogger use to publish their own journal and or use to publish personal diary,but these days blog is not limited to for personal diary or personal journal now blog has huge variety , millions of blogger use blog for different purposes and their blog visited millions of time daily now even blog  , blogger sell their items publish advertisement ,posting videos messeges etc,This has caught the attention of small companies to large corporates as they began to know that blog is an effective channel to tighten the relationship with the client base. In a short period of time, blogs on product updates, company news blog and even company CEO's blog started to mushroom.
world class web hosting knowledge base web hosting articles news reviews technical support,world class web hosting articles only in www.webhostingmatters.com

Difference between CMS and Blog?

Difference between CMS(content management system) and blog is different but not quite mysterious, Basic function of CMS is to to manage content, a full
featured content management system can help you to organize an entire  library online if you want to, and these type of CMS are generally used in online publishing or websites that is dealing with lots of articles, books, audio, video etc and it also provides the searching capabilities,and about the blog is is branch of Content management system and blog is like showcase and on certain topic whicn mostly writer and blogger focusing and here is main difference between CMS And Blog is that blog can provide communication between one to one and one to many but if you see in CMS there is lack of this feature
world class web hosting knowledge base web hosting articles news reviews technical support,world class web hosting articles only in www.webhostingmatters.com

What is Microsoft sharePoint?

Microsoft share point is basically web based application produced by microsoft The most popular version of Share point is SharePoint Foundation 2010,You can download it free of cost from microsoft download center,In past it was called as a WSS, means Windows SharePoint Services,Microsoft SharePoint” is like using the word “Microsoft Office,Microsoft designed Share point as highly
scaleable supporting multiple organizations on a single 'server farm SharePoint provides various methods for customization and configuration of web areas, all of which have granular governance configurations. Beyond basic page-editing,file-storing and custom design'branding' capabilitiesAll the features that are
available in SharePoint Foundation 2010 are available in SharePoint Server
2010 as well. The second simple feature has increased all the technical
characteristics that are vital to enterprise level scale of measurement and
support for strong web application campaigns.
world class web hosting knowledge base web hosting articles news reviews technical support,world class web hosting articles only in www.webhostingmatters.com

Zend Optimizer

Basically zend optimizer is to use increase the php performance by going over the intermediate code generated by the standard Zend run-time compiler ,zend optimizer is available free every where, You can download it free of cost ,zend optimizer always loaded as php engine,The Main feature of zend optimizer application is to speed up the php,
You can check the zend optimizer software system requirement by the following link
http://www.zend.com/store/products/optimizer-sysreq.php
How to install Zend Optimizer
for installation of zend optimizer you need to become member of zend optimizer website after becoming member you need to login to it Go to free download page option download the version you require and save it to your local pc
Double click the package like ZendOptimizer-x.x.x-windows-i386.exe
follow the instruction and install accordingly
Below are the Operating system supported by Zend optimizer
Linux x86
Linux x86-64
Linux Power
Solaris Sparc 8, 9, 10
Solaris x86 9, 10
FreeBSD x86 5.x, 6.x
Windows x86 2000, XP, 2003OS X Mac Power
AIX pSeries 5
Below is the supported webserver by zend optimizer
Apache 1.3.x
Apache 2.0.x (Prefork mode only)
IIS 5, 6
Here are the php version supported by zend optimizer
4.2.x up to 4.4.x
5.0.x, 5.1.x
Always bear in mind that Zend Optimizer will *not* run if the following PHP settings are enabled:
1. Thread Safety
2. Enable Versioning

Worldclass web hosting guide web hosting articles news reviews technical support www.webhostingmatters.com

Monday, May 16, 2011

How to convert HTML Pages into php of your website

This problem frequently arise when a user OR website owner want to change his website from Html pages into php pages,but the problem is that most of website owner does not know how to do it ,most of the website owner just know that after changing his website from html to php will loss all his indexed page and after losing page indexing in google and all other search engine will ultimately loss of ranking of his website,question is that how to avoid this problem and how can safely change html website to php website.The Method is although simple but you have to carefull,migration from html based website to php website first thing you must remember that server where website hosted must be linux webserver or unix web server, This must not be on Microsoft Webserver because Mircorsoft server does not support html website migration to php website,You also need to use a hosting company
that allows server overrides using the .htaccess file. Almost all except the extreme low-end hosting companies allow server overrides, but that question needs to be asked,before you commit to hosting services .htaccess file is a hidden file which reside in Root Directory,you need to configure ftp account to access this task download the file on your local pc so you can work on it and if you dont have this .htaccess file there you need to creat it but remember you should work on this newly created .htaccess file in Text Editor,The first method simply tells the server to run all htm and html files through the PHP processor.Just add the following directive to the .htaccess file. There are two variations,depending upon how the server has been configured. Some trial and error testing issrequired to see which method works with your server configuration.This code should work on most Apache servers that are configured to run PHP as a module.AddType application/x-httpd-php .htm .html Some servers run PHP as a CGI. If the first method does not work, try this method
AddHandler application/x-httpd-php .htm .html
---------------------------
To test this, simply add some PHP code to one of your HTML scripts, such as the following.
Only the words, “this is a test” should display.
<?php echo "this is a test"; ?>

world class web hosting guide web hosting articles web hosting news Reviews Technical support   www.webhostingmatters.com

Be aware from Free Themes

Thousands of the Blogger and website owner using Free themes for their blog and website which easily available on thousands of sites and free theme distributor offer amazing services features inside the Themes,Basically the purpose of free themes developer is mostly injecting his own codes and links which defenitely cant alters.footer.php script contains an encoded section intended to prevent users from altering or removing outbound links embedded in the footer. Many authors of these themes sell links to site owners, embed them in the footer script, and then encode the script so that they cannot be removed,Many free themes have coded hidden elswhere in themes which is if replace or
altered it cause theme failure or not work,so what to do if you have manage and configure your that theme properly creating your own category in that wordpress themes, injecting adsense codes and other affiliation advertisement code and but your theme sudden stop and cant response.Many of the free themes have a clause in the terms of use agreement that prevents users from legally removing or altering encoded scripts,This may not be a legitimate legal restriction, The php coding in Theme under GPL Licensing,So precisely is that be aware from Free themes and if you still want to use free themes that must be neat and clean and before deploying and using this free theme you must check the coding inside the theme , remove the suspicious codes if possible but if you observe after removing codes (suspecious code) inside the theme dont use that themes

world class web hosting guide ,web hosting articles news reviews  webhostingmatters.com

Wednesday, May 11, 2011

Php Tutorials Guide video

This php turorials guide will help you to understand the basics of php and how php interact and how php work,

Php basics Guide

Php is always use with combination of web server like Apache
php request are always received by web server and handled by
interpreter The results obtained after execution are returned
to the Web server which takes care of transmitting them to the
client browser your script can perform calculations, process user
input, interact with a database,With PHP the goal is to use the
processing powers of the server to build (usually) dynamic webpages
A very basic example is showing the correct greeting for the time
of day on a webpage
In a human term You write a direction Good Morning if it is before
10am but after 5am, “Good Afternoon” if it is after 10am but before
6pm and “Good Night” after 6pm, before 5am. Instead of receiving all
the code for this and processing it in your browser
world class web hosting guide, Web hosting articles news reviews, www.webhostingmatters.com

Monday, May 9, 2011

How to Secure Php script in Linux Server

Below is the very simple method to secure your php script in Linux server , Read Below and follow step by step This simple but great method will secure your php script used for your website
PHP is the most popular scripting language for apache and mysql. You will need to disable system level functions in the php configuration file.
nano /usr/local/lib/php.ini
Look for the lines and make sure you have the lines as below..
disable_functions = exec,system,shell_exec,passthru
register_globals = Off
expose_php = Off
magic_quotes_gpc = On
It is best to keep magic_quotes to on as otherwise you forms using POST may be used for SQL injection attacks.

world class web hosting guide web hosting articles web hosting news web hosting reviews webhostingmatters.com

Mail Server IP Black List and spam filtering Issues

Due to huge amount increase in email sending and as huge amount of email sending increase huge amount of spam emails also sending  by email sender due to thhis reason email service provider,force to apply aggressive emailfiltering policy which create problem to email sender and users using own domain to send email, and due to aggressive email filtering some time even legitimate,emails are also filtering, so if you want your email does not exclude from their spam filter you need a proper and valid PTR so your emails are legitimate and can transport to exact destination,so lets discuss what is a ptr record,basically A PTR Record is a valid hostname which should be valid domain from your dedicated server,to indentify your email during the sending.his type of query is always done by default and the result,is shown in email headers. Having a configured or customized PTR record will help giving your server more,credibility when sending emails.An optimal PTR record would be the server’s principal hosted domain.You can have your Reverse DNS configured or changed by opening an assistance request with our system administration team
world class web hosting support guide Web hosting articles reviews news  webhostingmatters.com

Wednesday, May 4, 2011

how to install wordpress using Fantastico

Below is the simple method how to install wordpress sotware using Fantastico, in this video you will watch step by step method and will be able to install word
World class web hosting guide www.webhostingmatters.com web hosting issues news reviews support articles




Server Creating Emails automatically

Once your server creating emails automatically and inform you via email that following services failed
imap on cl-t031-513cl.yourdomain.com failed
sshd on cl-t031-513cl.yourdomain.com failed
cpanellogd on cl-t031-513cl.yourdomain.com failed
queueprocd on cl-t031-513cl.yourdomain.com failed
These type of emails comes again and again when your server MYSQL consuming huge amount of CPU, and in this case your server other services like IMAP, SSHD, CPANELLGD      ETC services failed , you have immediately log in to whm go to phpmyadmin and check the process which consuming huge amount of cpu usage and sleeping process you can kill these process by pressing kill button , if you see continuously this error messeges you must log in to your linux server  via ssh and run below command it will fix your possible problematic mysql dbs it will take time depend on the amount of mysql databases , but be patience untill unless this below command complete its work
mysqlcheck -Ao
Run this command in ssh and see the magic for optimization

Tuesday, May 3, 2011

how to solve slow mysql server problem

Once your server creating emails automatically and inform you via email that following services failed
imap on cl-t031-513cl.yourdomain.com failed
sshd on cl-t031-513cl.yourdomain.com failed
cpanellogd on cl-t031-513cl.yourdomain.com failed
queueprocd on cl-t031-513cl.yourdomain.com failed
These type of emails comes again and again when your server MYSQL consuming huge amount of CPU, and in this case your server other services like IMAP, SSHD, CPANELLGD      ETC services failed , you have immediately log in to whm go to phpmyadmin and check the process which consuming huge amount of cpu usage and sleeping process you can kill these process by pressing kill button , if you see continuously this error messeges you must log in to your linux server  via ssh and run below command it will fix your possible problematic mysql dbs it will take time depend on the amount of mysql databases , but be patience untill unless this below command complete its work
mysqlcheck -Ao
Run this command in ssh and see the magic for optimization

Saturday, April 30, 2011

Delivery Failure Messege from recipients

Delivery Failure Messege from recipients
This is very common error messege face by the users and most of the users
dont know why is it and how to solve , and they dont know whether this
error from their own side or from the person side to whom they are sending
email or any other side,Well this messege came due to lot of reasons
Main reason is that , Every thing is okay from your side but your Internet
service provider Firewall revoke this email because the email ID and the domain of that email is black listed in Baracuda and other firewall lists,
untill unless that Email holder and domain holder cant clear his mail server
from black list this will continously occur,Ask to the Email Holder or domain holder of this mail server to clear his IPaddress, so email can be send
and other reason is that your email id or domain is black list and due to this
reasons your emails cant reach at Yahoo Email boxex and Hotmail and some gmail accounts too ,you have to submit query to request for clearing IP address of your mail server
at MXTOOLBOX Website
or you can change Mail server  IP Address to avoid this problem
This article is get from 

Webhostingmatters.com        World class web hosting guide

Top Web Hosting Security Issues

Security is one of the key issue when you are choosing a web hosting company, a web hosting company which has weak security can cause unlimited loss to a website owner,Web Site security is  not a small issue which a website owner can ignore easily, Below are some very important topics which a website,Owner must consider before launching a business website or any website. Read More
world class web hosting guide www.webhostingmatters.com

Friday, April 29, 2011

ASP.net Web Hosting Basics

Asp Web hosting often used by that companies which want dynamic data driven to your website , you may use ASP (Active Server Page) embed in your website Asp coding features is that once a user view a web page contain Read More

world class web hosting guide articles news views reviews, www.webhostingmatters.com

what are the Best Web hosting features

What are the Core features of a Best Web Hosting Company
Choosint A web hosting Company is very easy But
Choosing a best web hosting company according to your requirement
Is very tough task,I strongly recommend Review all below points before finalizing Web Hosting company for you Read More Here
World class web hosting guide , Web hosting articles reviews and views,  www.webhostingmatters.com

Sunday, April 24, 2011

Backup method of mysql database using phpmyadmin

Below is a video post which will enables you to create backup of mysql database using phpmyadmin,follow the steps and you will done your job Read more and watch video tutorials
world class webhosting guide  articles news reviews, Knowledge base www.webhostingmatters.com

How to Take Backup of worpress website or blog?

Backup of wordpress blog is very importance,because wordpress blog is very sensitive and dynamic some time unauthorized attempt on your blog can Read More
world class web hosting guide articles news reviews support www.webhostingmatters.com

Friday, April 22, 2011

What is EPP Code for your domain?

if you are domain owner and dont know about epp code ,it means you are unprotected on internet and online business,EPP is basically Authorization Read More


world class web hosting guide www.webhostingmatters.com

Thursday, April 21, 2011

Create a sitemap for your blog or website

wordpress optimizing tips

There are lot of pages on internet which will try to guide
you how to optimize the wordpress blog, and may be there
are some sincere to give knowledge about this matter,
but precisely you main thing is this you have to work hard
for optimizing wordpress blog , with out strong knowledge
and fine steps you can tune up your blog read more
world class web hosting guide  www.webhostingmatters.com

Monday, April 18, 2011

Hackers and DDOS Attack

Hackers and ddos attack always in hot news of IT and web hosting news, Hackers always try to distrub several well known website by their unethical acts, here is another news from Pcmag:A hacker with ties to the NBC show "To Catch a Predator" was sentenced to 24 months in prison this week for launching a virus that infected 100,000 computers.Bruce Raisley, 48, will spend two years in prison, in addition to three years of supervised release and a $90,386.34 fine, New Jersey U.S. Attorney Paul J. Fishman announced Friday.Raisley used to work with Perverted Justice, an organization that identifies online pedophiles. Its workers pose as underage kids and set up real-life meetings with the pedophiles who target them, at which point they are apprehended by police. Perverted Justice's services were used by NBC's "To Catch a Predator," which taped and aired these real-life meetings and arrests.Read More
world's largest web hosting guide webhostingmatters.com

Saturday, April 16, 2011

Away from Rogue Website Hosting Companies

Outright scams by website hosting companies are rare, but they do exist and should be watched out for. We had a case in the forum where the web host used the server to intercept all page requests for all sites of all of their website hosting customers. If a request was from a person, the normal page was returned, but if a request was from a major search engine spider, the web host’s server scam modified the page that was returned, by dynamically adding a set of links to it. This was done to all the web host’s customers’ sites, and without their knowledge or permission.

Most of the added links pointed to the web host’s own websites, but some pointed to non-existant (virtual) sub-folders within the customer’s site. When any search engine spider requested a page within those non-existant sub-folders, the system dynamically created a page of links to the host’s own sites, and the host’s sites got even more links pointing to them. When people requested any of the non-existant pages, they were redirected to the site’s home page, but for search engines, each hosting customer’s site contained sections that the customer didn’t put there, and didn’t know existed. The extra sections couldn’t be seen by FTP, because the sub-folders and pages didn’t physically exist. They were virtual, dynamically created, sub-folders and pages, which were only ever seen by search engine spiders. Read More
world's great web hosting guide webhostingmatters.com

How to Protect Your Site from DDoS Attacks

What is a DDoS Attack?

A DDoS attack is a Distributed Denial of Service attack. These attacks have been known to take down entire corporations, and even entire web hosting companies in some instances. They work because they mimic realistic traffic habits to a certain extent, so there is no way to spot them until it is too late. When a hacker employs a DDoS attack they send a massive influx of artificial traffic to a site or to a web server, so rapidly that the server simply cannot handle the load and shuts itself down. The result is near instant downtime, and the loss of revenue for anyone that is hosting their site on that server. The reason why it is called Distributed Denial of Service is because the hacker is distributing a server load that causes automatic denial of services on behalf of the web server Read More
world's great web hosting guide  www.webhostingmatters.com

How to Enable or allow ICMP ping incoming client request in Linux csf firewall

once you installed Linux based firewall CSF and after installation your ping request has been blocked or it shows that packet are dropping at 80% or some time 90% , You need to reconfigure your firewall and here is the method of it

Rule to enable ICMP ping incoming client request ( assuming that default iptables policy is to drop all INPUT and OUTPUT packets)



SERVER_IP=”202.54.10.20″

iptables -A INPUT -p icmp –icmp-type 8 -s 0/0 -d $SERVER_IP -m state –state NEW,ESTABLISHED,RELATED -j ACCEPT

iptables -A OUTPUT -p icmp –icmp-type 0 -s $SERVER_IP -d 0/0 -m state –state ESTABLISHED,RELATED -j ACCEPT



Restart your firewall

World's greatest web hosting guide  www.webhostingmatters.com

what is ASP Web Hosting?

ASP or Active Server Pages is basically a scripting language that assists webmasters in developing interactive web pages effortlessly and effectively. This tool is built on programming technology and is effective for the host servers as it can create innumerable interactive web pages at ease.

This means that Asp web hosting technology is particularly beneficial in today’s internet world where multiple browsers are being used by a single person.Web developers can present their website layout in a similar manner no matter which browser is being used by the visitor. The different page layout problem had become serious for web developers as they had to do a lot of trial runs to see if their version is compatible with all browsers, but the final product always had some problem in one browser or the other as was evident from user complaints.Actually browsers interact with ASP pages in a comfortable way which makes information to be displayed in a dynamic manner irrespective of the browser being used or the individual settings done by the viewer. An efficient ASP interaction depends upon server link between the site and host, infact owing to this, right server selection becomes an important decision which should be made after assessing different shared windows hosting companies. Make sure you choose a credible ASP service for the site hosting purpose. Plus, in case you are intending to develop sites via ASP then ensure getting a hosting facility that attunes well with ASP tools.ASP web hosting was initially launched by Microsoft, which makes it incompatible with Linux-based servers. However, individuals having windows VPS or dedicated Linux hosting can get an edge of installing virtualization software to operate Windows OS. There are instances when a Windows web hosting account will not have ASP software and you will need to install the software first. For proper installation, you will need to get your hands on a genuine copy of the software and do manual installation with a CD. Keep this in mind however, that ASP is completely incompatible with Windows ME and Windows XP Home.In case you do not have a know-how as to how to install ASP software, you had better get it done via an all-integrated ASP hosing plan. ASP hosting gives you access to your web server for hosting your websites. ASP hosting service will support you in the correct usage of the technology and provide you access to ASP discussion forums which will let you build upon your web developer’s skills. ASP hosting plans can be of shared windows hosting, windows dedicated hosting, windows VPS or windows dedicated hosting Read More
world's greatest web hosting website     www.webhostingmatters.com

Windows VPS Hosting VS Linux VPS Hosting

This article will define you the difference between Windows vps hosting and Linux vps hosting
Here it is detail
One of the options businesses are turning to today is VPS hosting. VPS means Virtual Private Server. This term is used by internet hosting services. One server is partitioned into many via a VPS method. It is one physical computer, but is a shared web hosting service. It is divided into separate servers and each is allocated to meet business needs. There is specialized software that makes it run like a separate computer. A separate operating system may be run by each. It can also be independently rebooted.
There are two main types of VPS. The two are Linux VPS and Windows VPS. Many question which one is best. A few say it is Linux. There are two simple explanations for this. People believe Linux is more secure is one. The truth is this is not always the case. Those who use Windows Virtual Private Servers are usually more cautious than those that use Linux. Everyone assumes Linux is more secure so those who use it are much more confident. This may be faulty logic.Several reasons why Windows hosting is better exist. One would be that the user is not required to be a trained engineer. Linux is usually cheaper at first, but this is not true in the long run. It takes much more effort on the user’s part to run Linux. Managing Windows is much easier. The business has more time to spend on real business tasks instead of these. This is also another reason that Windows can be more secure in the long run. Windows has remote desktop access. This is standard with Windows and not available with Linux. It allows users to stay in control of editing the VPS. Linux uses a text-based remote access called SSH. This takes more time and is more difficult.One thing to consider when choosing a VPS is what operating system visitors will be using. The type of VPS server nodes used by Windows is Windows Server 2008. The majority of the population uses the Windows OS. Linux VPS usually runs best with Virturozzo VPS. Windows also supports Microsoft SQL server and Microsoft Access. The version of Microsoft SQL that is free is the Express version. Linux VPS does support ASP, but that support is severely restricted. Windows supports ASP and ASP.net webpages and scripts very well.

Monday, March 14, 2011

What is Managed Hosting?

There was a time when hosting companies offered dedicated servers where for the most part, the hosting company did not manage the hosting services that their clients were receiving through the use of the dedicated servers. Businesses and other hosting clients were maintaining and managing the operations of their own servers. This was often difficult and expensive for the hosting clients. A demand arose for hosting providers that would offer a variety of technical and other services with the dedicated servers. This demand brought about the start of managed hosting services. Managed hosting is a form of dedicated server hosting.
The first step in deciding if managed hosting would you is to decide if you need dedicated hosting. Dedicated hosting is often used for websites with a high volume of traffic. Websites that use very large amounts of disk space often need or can benefit from dedicated hosting. Some websites require custom applications and advanced e-commerce features and can therefore benefit from dedicated hosting. These are a few reasons as to why you might need managed hosting for your website. If you come to realize you need dedicated hosting, then you can decide if you will need managed hosting.
Consider the services that you want to be provided by your web hosting company. Do you want them to back up your data for you on a regular basis? Does your website need firewalls and other security measures that you want to be set up by your hosting provider? Do you want your web host to monitor your server for you? If the answer to these questions is yet, you will want to think about using managed hosting services.
Managed hosting can be beneficial for companies. They are able to have their websites hosted and servers maintained by their hosting provider. This can save a business money n the long run. They are paying for the managed hosting services, but will not have the cost of hiring IT people to handle the hosting aspect of their business website. Having people on staff that are able to mange the hosting end of the websites can be costly and time consuming. Allowing the web host to handle these tasks can therefore save a company time and money.
It is important to know that managed hosting does not mean the same thing to every hosting company. Some hosting providers will offer more services than others. For this reason you should look carefully at the managed hosting services provided by any web hosts you are considering to host your website. Make certain you know what services are included with your managed hosting plan. There are several services you are likely to want for certain with your managed hosting package. You will probably be looking for a company that offers server management and monitoring, security measures to protect your data, data backups, hardware and software updates and excellent customer support. As with any form of web hosting, you should shop around to find the host that offers all the services you need and want for your website. Source
There are lot of  Faqs available on managed hosting
webhostingmatters.com/disclaimer

Read More   world's largest website on webhosting matters

How to prevent SQL Injection with MySQL and PHP

Most new web developers have heard of SQL injection attacks, but not very many know that it is fairly easy to prevent an attacker from gaining access to your data by filtering out the vulnerabilities using MySQL extensions found in PHP.
An SQL injection attack occurs when a hacker or cracker (a malicious hacker) attempts to dump the data in a database table in a database-driven web site. In an unprotected and vulnerable site, this is pretty easy to do.
In order for an SQL injection attack to work, the site must use an unprotected SQL query that utilizes data submitted by a user to lookup something in a database table. The data could be from a search box, a login form or any type of query used to look up data using data input by user. It also means that querystring data used to query a database can create vulnerabilities. Read More

Wednesday, March 9, 2011

latest Wordpress 3.0.4 Important Security Update

There is  a news for wordpress about a security update, Version 3.0.4 of WordPress, available immediately through the update page in your dashboard or for download here, is a very important update to apply to your sites as soon as possible because it fixes a core security bug in our HTML sanitation library, called KSES. I would rate this release as “critical.”
Official link : http://wordpress.org/news/2010/12/3-0-4-update/
source
webhostingmatters.com/disclaimer

installation of ioncube on cpanel dedicated server

ionCube is an encoder (encryption method) used to help protect the php files from software piracy. It is normally used by software vendors to deliver their php software(s) in some sort of encoded format to help protect their copyrights and licensing distribution.

The ionCube version of Ultimate Locator is meant for Linux, Unix and FreeBSD platform servers. ionCube can also be run on a Windows server though.

Outsource support

Here are the installation steps for ionCube loader:

Download link: http://www.ioncube.com/loaders.php

wget http://downloads2.ioncube.com/loader_downloads/ioncube_loaders_lin_x86.tar.gz

tar -zxvf ioncube_loaders.tar.gz

cd ioncube

mv ioncube /usr/local/

You can check the path of the php.ini file with the below command:

php -i | grep php.ini

Edit the php.ini file with the following command:

nano php.ini

Then, add the below line in the php.ini

zend_extension=/usr/local/ioncube/ioncube_loader_lin_5.2.so

So, now determine if ionCube is on your dedicated web server, do the following:

Add the below code in you a php file, usually in case of cPanel server it is under your public_html directory



And, access the file in your favourite browser.

Using SSH you can check it with the command:

php –v
source
Knowledge base web hosting guide, world best web hosting guide magazine  webhostingmatters.com

why-do-i-need-24×7-hosting-support-for-my-web-hosting-company?

Now a days web hosting
is a global business, and to help your customer you need hosting support services which have to be available 24×7 i.e. during all time zones which would definitely get their problems fixed within time.
In a case, if you have an existing customer who is a owner of a web design company and is in a meeting with their potential client and giving him a online presentation/demo and is facing some technical problems which has to be fixed by the web host. This is an embarrassing situation for them – especially if your hosting company doesn’t have access to the support staff 24×7, this customer will have to wait for you to come online during your working hours and get their issue fixed.
Now, think if you have a 24×7 support team – this client will come on your website and contact you by the support channels you have i.e. live chat and help desk support. And, your technical support staff available on duty is notified about the issue by the support channels you have and gets the problem fixed within no time. This is what a customer expects from your company, and I bet they would spread the name of your company across the web or known ones, which would give you more business.
Whether you’re a web hosting reseller, VPS hardware node/container owner or a dedicated server owner – it’s mandatory to have a 24×7 support online presence to help your clients. Source
knowledge base web hosting website
webhostingmatters.com

webhostingmatters.com/disclaimer

Sunday, March 6, 2011

Deferred mail when sending to Yahoo ?

Issue: Mail sent to Yahoo-based addresses, particularly from mailing lists or forms, results in a deferred mail report, as in this example:

SMTP error from remote mail server after initial connection: host b.mx.mail.yahoo.com [66.196.97.250]: 421 4.7.0 [TS02] Messages from (IPADDRESS) temporarily deferred due to user complaints - 4.16.56.1; see http://postmaster.yahoo.com/421-ts02.html

Despite the claims in the deferral message, there are no user complaints regarding either mail from the server or from the domain from which the mail is being sent. A review of the relevant newgroups, operator mailing lists, and spam filtering/blacklists show no complaints regarding mail from the server or from the client domain.

Solution: At this time, there is no solution. Deferred mail will return to the queue for periodic retry, as is the case with other mail that cannot be immediately delivered for any reason. Depending on which of Yahoo's mail servers receives the next connection, the mail may be delivered, or may be deferred once more. This is only controlled by Yahoo, and is not an issue we can address.

Further notes: We, like others, have been unable to receive any answer from Yahoo as to what conditions exist that cause them to defer mail in this manner. Deferrals have occurred on servers where mail activity is minimal at best, and where no automated mailings or forms exist, and on servers where there is high mail traffic, both in- and outbound. When contacted via their form, Yahoo often sends back (days later) a request for information that has already been provided to them, rendering the process useless and unnecessarily time-consuming. The following thread from an operator's group to which we subscribe is an excellent indication of the issues that many people are experiencing at this time with delivery to Yahoo-based mailboxes: http://www.merit.edu/mail.archives/nanog/msg07305.html
webhostingmatters.com

Why Cannot send email: No valid recipient error?

Symptom: Client using Outlook reports that sending mail fails with an undeliverable notice. The error message in the undeliverable notice indicates a 503 (No valid recipient/recipient must precede data) error.

Cause: Outlook settings must be modified to authenticate when sending.

Resolution: Select Tools -> Email Accounts -> View or change existing email accounts -> Select the affected account -> Change. On the account properties screen, choose More Settings -> Outgoing server. Enable the option "My outgoing (SMTP) server requires authentication". Generally, if the client is checking mail and sending it from a created POP account, leaving the first option ("Use the same settings as my incoming mail server") is sufficient. If the user wishes to send mail under a different login, change to the "Log on using" option and input the appropriate username and password. Note that for all secondary email users, the login name is the full email address of the user. Source

webhostingmatters.com

Tuesday, March 1, 2011

how Can my domain registration information be made private?

ICANN rules require the use of valid information for domain registrations. However, the Hosting Matters contact information can be used by any client who wishes to remain more anonymous than public WHOIS data will allow. To have the Hosting Matters data appear for domains registered on behalf of clients, please contact support via the web or via email to request the modification of the domain WHOIS data.

Parallels Plesk Panel Adds Open-Xchange

pen-Xchange announced today tighter integration with the latest industry-standard control panel Parallels Plesk Panel 10.1, enabling hosting customers and resellers to choose their favorite WebMail application.

Open-Xchange will be available as an option that can be selected in the e-mail setup screen of Parallels Plesk Panel — making it easy for hosting and SaaS providers to replace the Standard Plesk Webmail in existing shared hosting environments with the feature-rich AJAX interface of Open-Xchange and deliver true business-class e-mail features.

“With Open-Xchange’s new availability with Parallels Plesk Panel in addition to Parallels Automation, Partners of all sizes can now easily deliver business class e-mail and communication solutions,” said John Zanni, vice president of alliances at Parallels. “This new capability delivers on what we have heard service providers want: make it easy to get started and the ability to upsell advanced features.” Read More

How do I transfer my domain to Hosting Matters for management?

To transfer a domain to Hosting Matters for management, please begin by ensuring the domain is unlocked at the current registrar, and that the authorization code/EPP key has been retrieved from the current registrar. Domains that are locked will fail the transfer process even if approval is given to the notices sent out from the registrars to proceed. Domains that are already expired, domains that have been transferred to a new registrar or registered within the past 60 days, and domains that have been expired and renewed within the past 60 days cannot be immediately transferred. Expired domains must be renewed, and in all other cases, the transfer request cannot be submitted until the 60 day waiting period window has passed.

The transfer request itself can be submitted via the automated transfer request ordering system at https://secure.hostmatters.com/cart.php?a=add&domain=transfer to begin processing. During the process, the system will prompt for the authorization code and for the nameservers to be used for the domain. The nameservers should be those already in use by other domains attached to the account. If unsure about the nameservers to enter, please contact support for assistance.

At the end of the transfer request processing, the system will prompt for either new billing/contact information to be used for the order, or for a login to an existing profile. To tie the transferring domain to an existing client area profile, choose the login option, and enter the email address and password for the profile to add this new domain.

The cost of domain transfer for the most common extensions is $12, and will extend the registration period by one year past the current expiry of the domain. Subsequent renewals are processed at the standard fees for each domain extension. Please note that not all domain extensions can be transferred. If unsure whether a particular extension can be transferred in for management, please contact support to determine eligibility.

Source hostingmatters.com

2010 Annual SEO & PPC Competition Awards – Winners Announced

topseos.com, an independent authority on search vendors has recently announced the winners of 2010 in SEO & PPC categories as part of their Annual SEO & PPC Competition Awards. The Annual SEO & PPC Competition is the first and only category-based internet award competition dedicated exclusively to online providers over 30 countries worldwide. Companies or agencies wishing to register for competition may do so before the extended deadline on 31st of March 2011.

Companies joining this competition will reap numerous benefits as companies are able to leverage against competitors, get their name in front of Fortune 500 CIOs, attract better quality customers and employees, be recognized as a leading firm and show off their achievements. This competition is geared to help represent the excellence, achievement, and passion towards satisfied clients and aid online companies to further leverage their unique position and breakthrough competitive clutter. Read More

Monday, February 28, 2011

how to Shoring Up Defenses Against DDoS Attacks??

DDOS Content Sponsored by BlockDos.Net Block DOS
(The Hosting News) – A DDoS attack is defined a distributed denial of service attack. This kind of attack tries to make a computer resource unavailable to users. There are different ways in which this kind of attack can be carried out. The reasons and targets for these attacks vary, but the end result is the same, shutting down a system so users cannot access it. The point of a DDoS attack is to prevent an internet site or service from functioning normally or at all. The most targeted web sites for these kinds of attacks are banks, credit card payment gateways, e-business sites and root name servers. A common method of attack is to flood the server with external communications so that it cannot communicate with legitimate traffic, or causes the server to run so slow it is rendered in effective, causing actions to time out. A DDoS attack is carried out by either forcing the target computers to reset, or consuming resources to the point that the targeted computer or server can no longer achieve its primary function. Attacks like this will also limit or stop all communication between the user the victim. A DDoS is a crime most, it violates the Internet Architecture Boards’ internet proper use policy, and TOS of all major internet service providers.

There are different programs that can be used to perform DDoS attacks, some are actually written for benign use, but can be used for malevolent purposes. These programs are written with the intent of performing DDoS attacks while others are true packet injectors and able to perform other tasks.

Examples of the legitimate tools used are hping, socket programming, and httping. There are also underground tools available for such attacks.

Signs of an Attack

The US Computer Emergency Response Team defines symptoms of a DDoS attack as :

Unusually slow network performance, either processes or opening files.

Unavailability of a website

Inability to access a web site

Dramatic increase in spam emails, this is an email bomb.

DDoS attacks lead to issues with branches of a network being attacked. The attack over loads the network; other branches will try to compensate for the increase in traffic. This causes the whole network to slow down. A large enough attack can shut down entire regions of internet connectivity.

Types of tactics a DDoS will use

These are the most common types of DDoS Attacks:

1) Consumption of computational resources: such as bandwidth, disk space, or processor time.

2) Disruption of configuration information: such as routing information.

3) Disruption of state information: such as unsolicited resetting of TCP sessions.

4) Disruption of physical network components: Such as the actual server

5) Obstructing the communication media: between the intended users and the victim so that they can no longer communicate adequately.

The DDoS attack may also use malware to cause further damage:

* Max out the processor’s usage so no work gets done
* Cause Microcode errors in the machine
* Lock up the computer by giving the processor erroneous sequencing
* Locking up the computer through the operating system through resource starvation.
* Crashing the operating system itself.

Weapons of a DDoS: What can be used against you?

ICMP Flood: ICMP flood, also known as Ping flood or Smurf attack, is a type of Denial of Service attack that sends large amounts of (or just over-sized) ICMP packets to a machine in order to attempt to crash the TCP/IP stack on the machine and cause it to stop responding to TCP/IP requests.

Tear Drop Attacks: Use corrupted IP fragments of overlapping over sized payload to over load a target’s computer. This can cause the operating system to crash due to the TCP/IP reconfiguration reassembly code.

Peer to Peer Attacks: An attacker uses other computers to attack a victim, over loading the victim’s computer.

Permanent Denial of Service Attacks: Attacks that are so destructive they cause hardware to be reinstalled or replaced.

Application Level Floods: Floods the victim server with an overwhelming number of packets, causing the CPU to become confused and crash due to lack of resources.

Nuke: This attack is just as it sounds. The attacker sends corrupt data over and over to the victim until the computer locks up.

Distributed Attack: The attack comes from multiple fronts the attacker hides his whereabouts this way. The multiple fronts then flood band width, or take up resources causing system crashes or locking up the server.

Reflected Attack: This attack uses forced requests sent to multiple locations to flood the victims computer with response.

Degradation of Service attacks: Attackers use infected computers to degrade service of a server by flooding it intermittently. This type of attack is hard to detect because the victim has to determine if the traffic on the server is normal or not.

Unintentional Denial of Service: This is not an intentional attack, but is a result of users being directed to a smaller site from a larger site. The smaller site is typically unprepared for a jump in traffic.

Denial-of-Service Level II: This locks the network off the net, by triggering a defense protocol to block traffic to the internet. This will take the network off the net without shutting down the network itselfBlind denial of service: The attacker must be able to receive traffic from the victim, then redirect the traffic then either subvert the routing fabric, or use the attackers own IP address. This type attack the attacker can use multiple forged IP addresses to launch the attack.

DDoS Attacks: End Game
DDoS attacks can take a website down quickly and emphatically. By knowing what you are facing you can defend against them. DDoS Attacks range from brute force incursions, to surgical strikes against key components of a network. The right tools to set up your defenses and a DDoS attack can be stopped cold.
source

Sunday, February 27, 2011

what are the Country-wise Domains Distribution???

Rank Country Domains
1 United States 75,449,126
2 Germany 6,434,977
3 China 4,635,894
4 United Kingdom 4,428,289
5 Canada 3,838,831
6 France 3,076,331
7 Australia 2,467,180
8 Japan 2,094,023
9 Spain 1,458,640
10 Italy 1,347,722
11 Netherlands,The 1,213,614
12 HongKong S.A.R. 1,165,992
13 Turkey 970,573
14 Korea 809,869
15 India 601,679

knowledge base web hosting guide zaftech.ca latest updates and news and reviews of web hosting

what are the Global Domain Growth Trends??

Weeks Total Domains Gain Loss Net
02/21/11 121,745,129 777,324 541,662 235,662
02/14/11 121,509,467 910,946 555,119 355,827
02/07/11 121,153,640 855,688 491,562 364,126
01/31/11 120,789,514 855,773 535,827 319,946

Content Delivery Network (CDN) Service by NEXCESS.NET

NEXCESS.NET, a provider of shared hosting, dedicated servers, colocation and server clusters, today announced the availability of content delivery network (CDN) service to its hosting customers. The CDN service is powered by EdgeCast Networks, a rich media content delivery network.

The company articulates that its CDN service is designed to significantly improve web site performance by reducing physical distance, and in turn, latency, between the server and end user. It also reduces the distance from a network topology standpoint, ensuring that content requested by end users is always served by the server that will perform best for that user. Customers of the CDN service should see improved global performance over traditional web hosting thanks to the delivery of static user content from servers in 19 points of presence, distributed between North America, Europe, Asia, and Australia.

It states that in addition to performance improvements seen directly in the user experience, customers of the company's content delivery network should experience a number of other advantages over traditional hosting. This includes decreased load on servers that host dynamic content, and improved rankings with search engines such as Google, which has specifically cited site performance as a factor in calculating a site's ranking.

"We feel that our customers will see significant benefits in leveraging the advantages of CDN hosting for their static content," commented Chris Wells, President & CEO of NEXCESS.NET. "As time goes on, the web is becoming less forgiving of slow web sites, and studies have repeatedly proven that end users gravitate towards content with the fastest load times."

what are the cloud computing trends in 2011?

Hosting.com surveyed nearly 600 individuals with significant IT planning and budgeting responsibilities regarding the cloud computing industry and their purchasing intentions. The survey results and analysis are published in our annual Cloud Trends and Best Practices Report.

The Report introduces compelling data regarding the adoption rates of cloud, obstacles and usage.
Key Trends for 2011

* Explosive Growth
44% of respondents indicated cloud computing was an executive priority.

* Business Continuity and Disaster Recovery Are Driving Growth
BCDR services cited as top reason for investment in the cloud.

* Hybrid Solutions Will Be An Important Catalyst for Cloud Migration
Over 30% of respondents reported that their cloud services provider must provide integration with their existing services.

* Cloud Servers a Legitimate Threat to Server Sales: 80% likely to consider cloud servers to replace physical servers.

Saturday, February 26, 2011

How to add a user in Dedicated Linux Web server?

for adding a user please follow these steps
To begin, SSH into your server as root. Once you’re logged in, you should see a shell prompt similar to:

root@server[~]#
The command to add a user is as below. I will be using the username as “support”.
root@server[~]# /usr/sbin/adduser support
Once the user is added you can verify by using the below command:
root@server[~]# cat /etc/passwd | grep support
 
Set a password for the user (support)
 
 Use the below command to set password for the user “support”:

root@server[~]# passwd support
ote: Make sure you pick a secure password which will consist between 
6-8 characters, and will contain letters, numbers, and punctuation
marks.
To make sure this user account that you have created works, open another SSH window and proceed to log in with the user “support”. Once you’ve successfully verified that this account works, you may exit the session.
Verifying su’s command permissions, and ownership 
 
root@server [~]# ls -la /bin/su 

The output should be:
 
-rwsr-x---  1 root wheel 61168 Nov 18 07:17 /bin/su* 

Thursday, February 24, 2011

free web hosting

100 MB web hosting
5 GB web traffic
No banner ads
Free web template
Free domain name*
Free domain transfer*
FrontPage Extensions
FTP & File manager
1 domain hosting
5 sub-domains

15 POP3 accounts
POP3 and SMTP server
Web e-mail
MySQL & phpMyAdmin
PHP, Perl & Crontab
SSI support
Raw access/error logs
Traffic/Badwidth stats
24/7 customer support
1 hour response guarantee

what is Web Hosting Hardware?

Hardware for Hosting Companies comes in a variety of items, including servers, switches, and the like.  Server hardware are prebuilt rackmount styled servers that can be customized to fit the individual or company needs.  Most hardware companies offer upgrade service and bulk equipment plans.  Additional services include on-location support, online trouble-shooting and customized datacenter options.  read more

what is ddos attack??

A DDoS attack is defined a distributed denial of service attack. This kind of attack tries to make a computer resource unavailable to users. There are different ways in which this kind of attack can be carried out. The reasons and targets for these attacks vary, but the end result is the same, shutting down a system so users cannot access it. The point of a DDoS attack is to prevent an internet site or service from functioning normally or at all. The most targeted web sites for these kinds of attacks are banks, credit card payment gateways, e-business sites and root name servers.  A common method of attack is to flood the server with external communications so that it cannot communicate with legitimate traffic, or causes the server to run so slow it is rendered in effective, causing actions to time out. A DDoS attack is carried out by either forcing the target computers to reset, or consuming resources to the point that the targeted computer or server can no longer achieve its primary function. Attacks like this will also limit or stop all communication between the user the victim. A DDoS is a crime most, it violates the Internet Architecture Boards’ internet proper use policy, and TOS of all major internet service providers. read more

what is cPanel Web Hosting?

The cPanel is a unix based web hosting control panel with a graphical interface and automation tools that are designed to simplify the process of hosting a website. The 3 tier structure provides functionality for administrators, resellers and end-users so that they may control the website through standard web browsers. Since cPanel is designed to function as a dedicated server or virtual private server and supports many applications, web hosting service providers and developers are able to automate standard system administration processes easily.

Microsoft Windows 7 SP1 Now Available for Download

Microsoft has released the first Windows 7 service pack today. Windows 7 Service Pack 1 (SP1) is an important update that includes previously released security, performance, and stability updates for Windows 7. Installing SP1 helps keep Windows 7 up to date.
Windows 7 SP1 has been available to MSDN and TechNet subscribers since Feb. 18. Through a recent blog, Microsoft announced that the service pack would be available for download on Feb. 22, 2011.
The new service pack update comes with two new desktop virtualization features called RemoteFX and Dynamic Memory.  read more

how to Configure qmail to use alternate SMTP port 26?

You have a plesk dedicated server and having issues related to SMTP port 25. There are issues where ISP blocks SMTP port 25, in this case we can use alternate port (I will use port 26).
Kindly follow the below steps to change SMTP port on your plesk dedicated (linux) server to 26.
Login to your server
root# cd /etc/xinetd.d
root# ls -l | grep smtp*
root# cat smtp_psa
service smtp
{
socket_type = stream
protocol = tcp
wait = no
disable = no
user = root
instances = UNLIMITED
server = /var/qmail/bin/tcp-env
server_args = /usr/sbin/rblsmtpd -r bl.spamcop.net 
/var/qmail/bin/relaylock /var/qmail/bin/qmail-smtpd
/var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/
cmd5checkpw /var/qmail/bin/true
}
root# nano /etc/services
smtp_psa_new 26/tcp mail
smtp_psa_new 26/udp mail
read more


Wednesday, February 23, 2011

how to connect with my sql?

Interacting with MySQL makes PHP a far more powerful tool. In this tutorial we will go through some of the most common ways PHP interacts with MySQL. To follow along with what we are doing, you will need to create a database table by executing this command:

 CREATE TABLE friends (name VARCHAR(30), fav_color VARCHAR(30), fav_food VARCHAR(30), pet VARCHAR(30)); 
INSERT INTO friends VALUES ( "Rose", "Pink", "Tacos", "Cat" ), ( "Bradley", "Blue", "Potatoes", "Frog" ), ( "Marie", "Black", "Popcorn", "Dog" ), ( "Ann", "Orange", "Soup", "Cat" )
This will create a table for us to work with, that has friends' names, favorite colors, favorite foods, and pets.
The first thing we need to do in our PHP file is connect to the database. We do that using this code:

 <?php 
// Connects to your Database
mysql_connect("your.hostaddress.com", "username", "password") or die(mysql_error());
mysql_select_db("Database_Name") or die(mysql_error());
?>
Of course you will replace server, username, password, and Database_Name with the information relevant to your site. If you are unsure what these values are, contact your hosting provider.
php.about.com

How to Create a Link from a Database?

Often people do our database tutorials, and are able to fetch the information they need and echo it onto a page, but struggle with figuring out how to link their results. This is actually a very simple process. Basically you just echo the appropriate HTML and call the URL in the middle of it. Here are some examples. In this example we are fetching an array and assigning it to $info, and one of the fields holds email addresses.
 while($info = mysql_fetch_array( $data ))
{
Print $info['name'] . "<br> ";
Print "<a href=mailto:".$info['email'] . ">" .$info['email'] . "</a><br>";
}
Notice how we called .$info['email'] twice, once to display the e-mail and once to be used in the link. The actual href linking code is placed around the information using print or echo, and separated with dots.
Here is another example using a web address and website name.
 while($info = mysql_fetch_array( $data ))
{
Print "<a href=".$info['siteurl'] . ">" .$info['sitetitle'] . "</a><br>";
}
Again we first print the <a href= then add a dot to show we are switching gears and now printing something different, in our case the website URL we get from our database array. Finally we add another dot so we can finish our link code </a><br>.
source php.about.com

simple way to install php on mac

Before you can enable PHP on a Mac, you first have to enable Apache. Fortunately this is extremely easy. If you would like more information about Apache on the Mac you can read more here.1.) Click the 'System Preferences' icon in the Dock.
2.) Click the 'Sharing' icon in the Internet & Network section of the System Preferences window.
3.) Place a check mark in the ‘Web Sharing’ box.
That's it! If you want to test if it worked, point your browser to http://localhost/ and you should see the standard Apache test page.
For this next part you are going to need a plain text editor that will allow you to open hidden files. Personally, I use TextWrangler because it's free and it gets the job done. These next steps might be slightly different if you are using a different editor, but the principle is still the same.1.) We want to open the file located at HD:private:etc:apache2:httpd.conf. In TextWrangler we do this by choosing "Open Hidden" from the File menu. 2.) Since it is a root file, we need to unlock it before we can edit. In TextWrangler this is done by clicking the pencil button in the top left hand corner. You will get a pop-up confirming that you want to do this.
3.) Go to line 114, the line should read # LoadModule php5_module libexec/apache2/libphp5.so
4.) Delete the #, the line should now read LoadModule php5_module libexec/apache2/libphp5.so
5.) Save the file. You will be prompted for your password if you are using TextWrangler.
The next thing we want to do is make a copy of php.ini.default and save it as php.ini. Once we have done this we can edit our PHP preferences.1.) First open up Terminal. It is located inside your Systems folder which is located inside your Applications folder. 2.) Enter the following lines, one at a time:
cd /private/etc
sudo cp php.ini.default php.ini

3.) You may now open your new php.ini file using TextWrangler or another editing programing and change the default settings if you wish. It will be located in Macintosh HD:private:etc
read more

what is Backordering at a registrar versus bidding at auctions?

Backordering a domain from a domain name registrar is less than useless and a complete waste of your money. You are almost guaranteed never to receive the domain if it has any perceived value. PERIOD.
The way to go about obtaining possession of an expiring domain is to do a whois seach for the domain, find where it is currently registered, and make a bid in the ensuing auction at the place where that registrar farms out their domains for auction. Place your bid as soon as the domain expires. That way, you also avoid all the drop-catch shenanigans.
If the domain has entered pending delete status, the best way to get the domain is to bid for it at all dropcatchers. It will be delete on the sixth day after entering pending delete, and at this point, all dropcatchers that have a bid on the domain will be trying to get it.
Backordering in this article refers to backordering at a registrar, not backordering at a drop-catcher or expired domain auction house, who may also use the same terminology. Always order your expiring domain name from an expired domain name auction house partnered with the underlying registrar for that domain. It's your best chance of acquiring your name. source webhostingtalk.com


what is Platform-specific hosting?

The term hosting platform refers to the software on which other application programs can be run to provide hosting services. There are many kinds of hosting platforms on the market, each supporting certain software that must be pre-installed on clients' systems. Examples:
  • PHP hosting (.php, .phtml)
  • ASP hosting (.asp, .aspx)
  • Rails hosting
  • Cold Fusion hosting (.cfm)
  • JSP hosting (.jsp)
Hosting platforms can also be described in terms of the operation system being used on the server. The most common operating systems are Windows hosting and Linux hosting. Source webhostingtalks.com

Tuesday, February 22, 2011

what is SMF Server

SMF is stands for Simple Machines Forum. SMF is a open source software package, which permit users to set up their online community within a few moments. Its easy to use and customize.
You can completely control and customize your message board with its template engine. The SSI (Server Side Includes) allows you to create a forum that can intereact with your website pages.
The PHP language and MySQL database are utilized for SMF. SMF is very helpful for you, because It offers you all those features that you require from a bulletin board while having a proper minimum impact on the resources of the server.

Monday, February 21, 2011

Installing Joomla!

There are several ways to install Joomla!.
First, make sure that you have an account on a web server. For most people this means signing up with a hosting company and purchasing a domain that will serve as your site's main address.
  • Option One: One Click Installs. Many hosting companies offer "instant" installation of Joomla!. Follow the instructions your host provides for a one click install.
  • Option Two: Conventional Installs. This method requires that you copy the Joomla! zip file to your hosting account, unzip, create a database, and then run the installation. Complete instructions can be found in the Joomla! Installation Manual. This video takes you through the steps
  • Option three: Demo Site. You can create a working website at demo.joomla.org and then either follow the instructions provided to back up and move the site to your existing host or establish a hosting account at the end of the free 30 day trial. (Note that the Joomla! Project receives a royalty if you choose paid hosting from that site.)
  • joomla.org source

What is Joomla!?

Joomla! is software that lets you make and update web pages easily.
You can think of a Joomla! website as bringing together three elements.
  • Your content, which is mainly stored in a database.
  • Your template, which controls the design and presentation of your content (such as fonts, colors and layout).
  • Joomla! which is the software that bring the content and the template together to produce webpages.

Joomla Guide for begginers

Here is some useful content for you about joomla
a leading open source Content Management System (CMS) platform. Joomla! is a well-tested, extensible and effective tool supported by a very active and friendly community of developers and users.
Do you want to get started with Joomla!, but you have no idea where to begin? If so, you have come to the right place. The Absolute Beginner's Guide to Joomla! is just for you.
Although you could spend a lifetime learning Joomla!, if you master the basics you will be able to make a very attractive and useful basic website in very little time and with no no special technical skills.
joomla.org

How To Install IonCube Loader in WHM Cpanel

What is IonCube ?
Secure and license your PHP scripts with the ionCube PHP Encoder. Protect files with PHP encoding, encryption, obfuscation and licensing capabilities.
Prepare Webserver and PHP
I assume you already have apache webserver and php installed on your server.

Download IonCube and Install it :
Login as root into your server
$wget http://repository.wowtutorial.org/ioncube_loaders_lin_x86.tar.gz
$tar zfx ioncube_loaders_lin_x86.tar.gz
$mv ioncube /usr/local
Find your php.ini
$php -i | grep php.ini
Configuration File (php.ini) Path => /usr/local/lib
Loaded Configuration File => /usr/local/lib/php.ini
Edit your php.ini
$pico /usr/local/lib/php.ini
### add this line in your php.ini
zend_extension=/usr/local/ioncube/ioncube_loader_lin_5.2.so
## save this file
$
Important : if you have zend optimizer and zend manager installed on your php
Please make sure ioncube_loader is on the top of zend list.
Ex php.ini :
[Zend]
zend_extension=/usr/local/ioncube/ioncube_loader_lin_5.2.so
zend_extension_manager.optimizer=/usr/local/Zend/lib/Optimizer-3.3.0
zend_extension_manager.optimizer_ts=/usr/local/Zend/lib/Optimizer_TS-3.3.0
zend_optimizer.version=3.3.0
zend_extension=/usr/local/Zend/lib/ZendExtensionManager.so
zend_extension_ts=/usr/local/Zend/lib/ZendExtensionManager_TS.so[/code]
Restart Webserver
$service httpd restart
Verify your PHP with phpinfo or php -v
$php -v
PHP 5.2.5 (cli) (built: Mar 17 2008 14:00:52)
Copyright (c) 1997-2007 The PHP Group
Zend Engine v2.2.0, Copyright (c) 1998-2007 Zend Technologies
with the ionCube PHP Loader v3.1.32, Copyright (c) 2002-2007, by ionCube Ltd., and
with Zend Extension Manager v1.2.0, Copyright (c) 2003-2007, by Zend Technologies
with Zend Optimizer v3.3.0, Copyright (c) 1998-2007, by Zend Technologies
source wowtutorial.org

how to Getting A Grip On Your Network Security??

By now, we are all well aware of the wild, wild world of the Internet. Anyone who has stood up a server, registered the domain name, and gotten some links to their site, knows that your servers almost immediately start getting “sniffed” by various sources. In many cases, this sniffing leads to an attempt in short order to try to analyze your server for various known holes or flaws. Organizations with much larger resources than yours (think: governments and the Fortune 100) routinely are disrupted, defaced, or outright brought down for the count so you can be sure that truly foolproof network security is nearly impossible to guarantee. What you can do for your server infrastructure, however, is “get a grip” on the basics of network security. There are enough gaping holes out on the Internet – many leading to databases or network access of great interest to hackers – that if you succeed in plugging all the common security holes, you will have thwarted the vast majority of infiltration attempts. read more

how Go Daddy Wins Best Security Team Award

Many people know about Go Daddy’s reputation for racy Super Bowl commercials, but few know the world’s top Web hosting provider is also a powerhouse when it comes to keeping people safe on the Internet – blocking more than 100 million attacks every day. Last night, the company was recognized for having the IT industry’s “Best Security Team” at the 14th annual SC Magazine Awards in San Francisco.
The Go Daddy IT Security Team helps protect more than 46 million domain names under management, more than 8.8 million customers and is the authoritative DNS for one-third of the Internet, ensuring a safe online experience for users across the globe.
In its six years of operation, the Go Daddy IT Security Team has matured from one person to more than 50. The security team works around the clock, running robust, 24/7 Network and Security Operations Centers and monitoring 100,000 security events per second. Dedicated team members are constantly monitoring for attacks or anomalies across Go Daddy’s systems, proactively detecting threats and working swiftly to eliminate them.
“Millions of people depend on Go Daddy to be their personal IT security department, which allows our customers to focus on building their businesses and enhancing their Web presence,” explained Go Daddy CEO and Founder Bob Parsons. “Go Daddy is working hard all day, every day to protect our customers’ websites … it’s an honor to see our IT Security Team recognized with this award from SC Magazine.”
One strategy for security effectiveness is the team’s recurring Go Daddy “Hackfest” event which takes place internally. The team works with developers from departments inside Go Daddy. The event proactively seeks out product vulnerabilities. The approach not only secures Go Daddy products, but also familiarizes the rest of the company with security processes.
Through the use of an innovative tool called SIM (Security Information Management), the Go Daddy IT Security Team has also helped the company become a pioneer for Internet security analysis and response. SIM is a new approach based in large part on a security network’s ability to defend itself before it is attacked.
Many customers turn to Go Daddy as their personal IT security department and technology authority. Go Daddy has dedicated customer security advisors available by phone or e-mail 24/7 to assist with any security needs or concerns a customer may have.

basics of Cloud Web Hosting

Cloud Hosting
Websites hosted on the cloud hosting platform operate on clustered servers so that online operations are not limited to single servers. Cloud hosting benefits include a high level of scalability which makes it possible for website expansion to be achieved without typical server resource limitations.
Security, load balance and hardware resources are all handled virtually, so that website access includes processing power distribution over multiple servers in real time. This also means that issues such as migration between servers and sudden surge crashes can be easily avoided with cloud hosting.
Cloud hosting can also be a much more cost efficient solution, since charges are based upon the quantity of computing power used. Because cloud hosting provides near-instant expansion as service demands increase – without having to address hardware and server requirements, it is a viable web hosting solution for many online businesses.
BeanSprout – Business Partnership Network for Web Hosts  http://www.thehostingnews.com

US President Turns to the Cloud to Cut IT Costs

The Obama administration announced it will increase its focus on cloud computing as a means to keep IT costs under control.
During his federal budget proposal, Obama made it clear that he sees the cloud as an excellent way of lowering IT costs in 2012.
Although Obama’s $79.5 billion IT budget is a considerably large amount for spending, it is expected the administration will be able to keep spending flat, due to the cost savings it’s expecting to make through the move to cloud computing and data center consolidation.
According to numerous reports, it is estimated that the move by the federal government could reduce IT spending by around $3 billion.
Federal CIO Vivek Kundra recently announced the government “will be able to reduce our data center infrastructure expenditure by approximately 30 percent. The adoption of cloud computing will play a pivotal role in helping the government close the productivity gap between the public and private sectors.”
Kundra recently released the governments cloud technologies strategy. According to Kundra, the new strategy “will revolve around commercial cloud technologies where feasible, launching private government clouds, and utilizing regional clouds with state and local governments where appropriate.”
Kundra’s report estimates that if the government reallocates $20 billion of its IT budget to cloud technologies, it could reduce data center infrastructure costs by more than 30 percent.

Sunday, February 20, 2011

what is Web Hosting Billing??

The simple process ofweb hosting billing can be easily handled with billing software that creates invoices and automatically bills customers. The software keeps track of what has been paid as well as the invoice status. There are also tracking devices in place that include account usage, so that appropriate storage or bandwidth fees may be easily and automatically added.
Some of the features of a web hosting billing program may include automated signups, payment processing and account provisioning in an online, recurring, web based system.
In addition, billing software can be used as an effective business maintenance development and management tool, since it may be set up to alert customers as service limits are approaching. When clients appreciate being notified before excess usage fees are assessed, the web hosting billing system can also serve as part of an effective customer support system. Source  thehostingnews.com