What Can Shared Hosting and VPS Users Do About Shellshock?
Monday, September 29th, 2014Tavis J. Hampton
ARTICLE If you follow tech news at all, you have by now probably heard about the “Shellshock” vulnerability affecting Bash across all Linux, BSD, and Unix variants that use the shell program. For dedicated server users, the solution is quite simple,...
4 Ways to Make your Website a Target for Intrusion
Wednesday, September 10th, 2014Tavis J. Hampton
ARTICLE Web hosting security can be complex and time consuming. There are so many creative ways for people with nefarious intent to do harm to your website, and you might spend a good amount of time trying to make sure they...
Interview: Shay Rapaport of Fireblade
Sunday, August 31st, 2014THN News
ARTICLE http://www.youtube.com/watch?v=ztlxB-rRztE&feature=youtu.be Video Interview with Shay Rapaport of Fireblade. Ben: Hi, how are you doing? This is Ben Fisher. I’m with The Hosting News and we’re here at HostingCon 2014. We’re here with Shay Rapaport with Fireblade. Fireblade is where you...
Interview: Sam Renkema SpamExperts
Saturday, August 30th, 2014THN News
ARTICLE Video interview with Sam Renkema of SpamExperts. Ben: Hi. How are you doing? This is Ben Fisher. I’m with www.thehostingnews.com. We have today with us a very special guest. This is Sam Renkema from SpamExperts. They are a spam and...
5 Web Application Security Tips
Friday, August 29th, 2014Tavis J. Hampton
ARTICLE Most websites run some type of web applications that depend on server-side scripting. While this type of scripting adds a tremendous amount of functionality, it also presents a number of security issues. What follows are five web application security tips...
application firewalldevelopersopen sourcepermissionssecurity
Hosting Security Standards and Regulations Compliance
Wednesday, August 6th, 2014Tavis J. Hampton
ARTICLE Hosting security is not just about making sure your website, server, data center and infrastructure are safe. It also involves ensuring your web host’s security measures comply with your organization’s standards, industry standards and government regulations. For many businesses, security...
Password Managers Can Help Prevent Cybercrime
Saturday, July 26th, 2014Tavis J. Hampton
ARTICLE They might be reading your emails, studying your shopping habits, or even using your computer as a spam machine to send male enhancement offers to unsuspecting third parties, and these are the mild scenarios. Cybercriminals can do serious damage to...
Use Password Aging to Enforce VPS Security
Friday, July 18th, 2014Tavis J. Hampton
ARTICLE If you are moving from shared hosting to a VPS, one thing you might not be accustomed to dealing with is having shell access to your account. You can use SSH to directly manipulate your Linux or Unix virtual private...
Are Backups and Recovery a Part of Security?
Friday, June 20th, 2014Tavis J. Hampton
ARTICLE There is little doubt that backups and recovery are vital parts of a healthy web hosting experience. But are backups and recovery part of security? If you do not have good backups, is the security of your website, server or...
backupsblockingfile systemshosting securitypasswords
Understanding Web Server File Permissions
Tuesday, May 27th, 2014Tavis J. Hampton
ARTICLE If you are new to web hosting, one topic that may be a bit of a challenge for you is web server file permissions. Anything you upload to your site will have a set of permissions associated with it. In...
apple Blacknight blog cloud Cloud computing cloud hosting cloudlinux Codero colocation cPanel Data Center data centers DDoS dedicated server Dedicated Servers Facebook Globalsign Go Daddy Google handy backup hosting i2Coalition ICANN linux Managed Hosting microsoft MySQL novosoft open-xchange open source Parallels Phoenix NAP R1Soft security ServInt Softaculous softlayer spamexperts ssl virtualization VMware VPS web hosting windows wordpress
Latest from Gawkwire
Top Web Hosts