≡ Menu

How to Stop Referral spam in Google Analytic

Have you ever encountered the peaks of unexplained access by examining data from Google Analytics for your website? Or have any significant increase in access to the site requires your attention with worsening performance? These sprouting number of spams in Google Analytics are rendering the reports useless for further analysis. An alarming trend of referral spam creeping in Google Analytics makes you more vigilant over the issue and how to fix it for better data insights. Due to flooding Referral Spams from social buttons and many other sources people are now combating the issue by applying filters to manage the useless data they are receiving.
blog_image_1

Types of Referral Spam
With Due regards to Google Analytics, there are two flavors of Spam: Spammy Web Crawlers and Ghost referral traffic.
Ghost referral traffic being the majority of the spam with so-called ghost nature never access your website. It might seem wonder to you but since they never access your website, they do hamper the Google analytics that monitors your website traffic.The rocket science behind this is that they uses the measurement protocol, which allows the user to send data directly to Google Analytics. By using this, generally spammer generates a random code and leaves a “Fake VISIT” without even knowing who they are hitting.
2-2
Crawlers in contrast to ghost referral traffic they do access your website and has a prominent presence in the Google search pages. These spams crawl your pages by ignoring the rules like robots.txt that are supposed to stop spiders from crawling specified pages. When they visit your website, they do leave imprints of the legitimate visit thus polluting your reports. Check in the list that might help you identify spams of either nature.
6-2
5-2
How to detect referral spam?
The easiest way to detect referral spam in Google Analytics is identifying the unusual and suspicious referrals that don’t have any real reference to your website.
You want to refrain them visiting your site to be sure you can use the data they leave in your reports.

Checking Referral hostname

This method is the most reliable method to detect Ghost Referrer Spam, it contains a field either as (not set) or as a fake hostname.To discover the hostname they are using follows the quick steps:
-In the Google Analytics admin window navigates to Reporting Tab.
-Select Acquisition.
-Select All channels by expanding all Traffic.
-Click on Secondary Dimension type Hostname and select.

The Ghost Referrer Spam have an invalid hostnames since they are untargeted whereas the Crawlers Referrer spam, on the other hand, holds a valid hostname.
Alternatives to detect Referral Spam
*Audit the Landing Page
The other way to notice Referrer Spam is by checking the page they are targeting. The targeted page could be either the Home Page (identified by a slash) or a fake page that doesn’t hold any relevance to your website.
7
* Checking Metric Number
– Spam either accounts for a high or low numbers.
– Navigate to reporting section in your Google Analytics account.
– In the Lateral Bar Select acquisition tab.
– Select Referrals by expanding traffic.
– A table like below will turn up.
how-to-detect-referrer-spam
Check with referrals that have numbers like 0% or 100% in new sessions or bounce rate, or average session duration of 0 or 1 Second.
Ghost spam is easier to detect as they use the fake data whereas the crawlers are little cumbersome to analyse. If you still hold the confusion to analyse the referral spam you can access the updated list for the prominent suspected spams.
Stop Referral Spam in Google Analytics
You can go through the valid hostname filters in the Google analytics to stop the Referral Spam creating disasters in Google Analytics report. It will take care of all ghost spam in any form ( Referral, Organic or Fake visit).
If you still find it bit time consuming and still want help in configuring the necessary filters and settings we can give you a hand at [email protected] or call us now at +91 9652744233

Valid Hostname filter is one in a way most efficient filter than the rest of the options available. I haven’t encountered any spam since applying this filter months ago thereby strongly recommend this for use. There are huge advantages of this method over the other.
1. You can stop the spam before it hits you. (Proactive approach)
2. You require only one filter to stop the spam, instead of creating several subsets of filters for the spam as in other options.
3. This Valid Hostname filter will stop ALL the ghost spam in any form whether it shows as a referral, keyword or direct visit.

How Filter Works?
The Most important part of the solution is to work upon the valid hostnames to not exclude any licit traffic.
Note: As a best practice you should always have a view without filter no matter what are the filters for, so if you don’t have one I recommend you to create one.
Creating new filter
Prerequisite is to have a list of your hostnames.
– Visit the Reporting tab in Google Analytics account.
– Within the Lateral tab select the Audience.
– Expand technology and Select Network.
– At the top of the report be sure to select the Hostname because the default you service provider is selected.
4 – When you land in there, you will see a table like this and among these find and copy all the Valid Hostname.
3
-After gathering the valid hostname, you must create an expression that matches all of them.
yourdomain\.com|otherdomain\.com|translateservice\.com|yourshoppingcart\.com|otherservice\.net

The complexity of expression can range depending on the age and size of the website. If you have subdomains you can omit adding all of them if you are adding yourdomain.com; it will match any subdomain of yours like blog.subdomain.com or support.subdomain.com.
After generating the regular expression, you should add it to an INCLUDE Hostname filter.
– Now in the Admin tab select View where you want to apply the filter.
– Select Filters
Note: If you haven’t created an “Unfiltered” View, create one now it will help you to check later if this or any other filter is working correctly
– Select New Filter
– Select Create New Filter and enter the valid hostname filter as a name.
– Within the Filter type choose custom.
– Be cautious you choose include and select Hostname from the dropdown.
– Finally paste the expressions that you built with the valid hostname in Filter Pattern.
8
I strongly recommend verifying the filter before application to save time on testings and protecting your data.
Its better to verify data before saving. A table will appear showing you sample data of before and after application of data.
Verify-filter-GA
Confirming the data validity, you can proceed to save the filter.

After soliciting the invalid data, you can save the filter. The filter you created doesn’t require much maintenance. It is very important that every time you add a Hostname or include your tracking-ID in any service, you need to include it at the end of the regular expression.

Either it is a webmaster, marketing manager, blogger or a site owner who are investing valuable time and resources cannot afford disrupted statistics altered by spam. Monitoring and continuously optimizing the marketing actions are the main building block of each online strategy; thus the analysis must rely on accurate and reliable data.
Henceforth there is an immense need for the spam free google analytics report.

If you have any doubt about that, contact us now!

{ 0 comments }

RAID levels Infographic

Infographic showing comparisons between the various RAID Levels.

Infographic-01-5

For more details visit: https://www.ibeehosting.com or speak to our Specialist today at +91 9652744233

{ 0 comments }

20% OFF Google Apps Promo Codes for 2016

As a Google Apps partner we are authorized to send you exclusive Google Apps Promotion codes. You will instantly get a Google Apps Promo Code that works in October 2016. Get 20% discount per user or $10/user off straight away and save money on Google Apps signups and discount varies from country to country. For example, if you need ten users you can save $100 on the payment you make to Google by using our unique coupon codes.

Get G Suite Promo Code

How to apply Google Apps for work promo code and save money?
Once you receive the promo code from us follow below steps to receive the 20% discount (Note – this is for the first time user and the first year of G Suite accounts)

  1. Login to your Google Apps admin account at admin.google.com and click on billing section
  2. After going to billing section you need to select your billing plan to see the promotion code link, you will be able to see promotion code link only after selecting the billing method.
  3. Copy and paste the promo code we sent to your email ID; sometimes we send 50% off codes as well. These codes have limitations based on the volume of users, geography and billing plans.
  4. Now after getting a success message on applying promo code click on continue, you will be taken to the order summary page, here you may not see the discounted pricing, promo code discount will be applied at the final stage before you make the payment because of tax calculations, etc.
  5. By this you will be finishing billing setup, now go to billing section again and click on transaction history to see the applied discounts for your order.
  6. Under billing section, you will find click more besides to Google Apps subscription; there select access billing account to get to the transaction history page.

Check the below image for reference and proof that we provide working G Suite(Google Apps for work) promotion codes.

Google Apps promo code proof

Google Apps promo code proof

Savings and discounts on Google Apps for work per user vary from country to country:

  • India – 300 INR off per user
  • USA – $10 off per user
  • Australia – $10 off per user
  • UK – £6.5 per user
  • Singapore – $10 off per user
  • Spain – €10 per user
  • Brazil, Chile, Mexico, Canada and Columbia – $10 off per user
  • Japan – $10 per user
  • France, Italy, Belgium, Portugal, Ireland, Netherlands and Germany – $10 off per user

This Google Apps promotion codes program is currently available only in USA, Canada, UK, Spain, Singapore, Australia, Hong Kong, Brazil, India and few other countries. Others might have to wait until it gets introduced in their respective countries. Also, this G Suite Promo Code program is not available for Google Apps ultimate edition; it is applicable only for Google Apps for Work Edition.

Benefits of Google Apps (now known as G Suite):

Google Apps is a powerful collaboration suite that comes with a variety of tools like Email, Docs, Spreadsheets, Presentations, hangouts for videos, etc. These tools over the period improved the productivity for many organizations who adopted Google Apps for their organizations IT needs. Several other providers are competing in this space, but Google Apps is a pioneer and the most engineered product I have seen.

Get more work done from anywhere on any device with Google Apps for Work (G Suite). It includes:

  • Gmail: Get an email address with your domain name such as [email protected]
  • Google Drive: Easily share files using online storage
  • Google Calendar: Choose to share your online calendars publicly or just within your company
  • Google Docs: Collaborate with others on the same document at the same time and avoid version control issues
  • Google Hangouts: Hold meetings without being in the same room – Wave hello, see them smile and gauge their reactions through easy team video meetings with up to 15 people. Hangouts is included with your Google Apps subscription.
  • Google Forms: Get feedback from your customers quickly and easily – What’s your favourite page on your website or sandwich on your menu? Find out by creating a simple online survey using Google Forms. Responses are saved automatically so you can analyse and share them in real time.

Currently there are more than 5 million companies are using Google Apps for Work(G Suite) which was called as Google Apps for business earlier, and we tried exploring other competitive products as well but from my observation Google Apps is the best among the cloud-based collaboration tools. The best part is it works seamlessly across the multiple types of devices and enterprise-class security from Google from its world-class data centres. The latest material design approach gives an edge to these tools to serve content seamlessly across the devices.

Google Apps promotion code

More About Google Apps Promo Code

Google is more depended on few countries for getting sales like USA, Canada, UK, and Brazil. They get the maximum sales from these countries, and it started invested heavily in digital marketing by giving direct ads in youtube, TVs, and other alternate mediums. We have updated new coupons today, we sometimes offer 50% Google Apps promo codes as well, so hurry up and get benefited with this opportunity.

So far, as a reseller of Google Apps, we have helped more than 200 customers to bring them to Google’s collaborative platform, we help our clients with 24×7 email support for all the migration, setup, and technical queries. Google doesn’t issue any promo codes to any coupons websites like retailmenot, coupons.com, etc. and only works with referral partners and Google Apps resellers like IBEE Hosting.

About G Suite Referral Program

G Suite Referral Program is now changed to G Suite Referral Program. Selling Google apps or G Suite will get 20% discount to resellers and most of the times customers ask for this discount to sign up with resellers otherwise they don’t see any value in reseller offerings, now discounted G Suite or Google Apps will directly give benefit to customer, This move of Google Apps referral program irked Google Apps for work resellers and started protesting over blogs and forums. This program is a direct competition to Apps resellers where their margins will shrink, and leads will go directly to Google. As a brand, Google always has an advantage against resellers. Though there is a benefit of recurring revenue for partners than one time $15 per user in referral program still Google Apps partners are not satisfied with this kind of approach from Google. Users who joined Google Apps referral program now gets a free domain name for one year from Google Domains.

{ 0 comments }

SPDY Protocol – Making the web Faster Initiative

An early bird’s eye of let’s make the web faster initiative – SPDY (pronounced as “SPeeDY”) came into existence with the goal to mark a substantial decrement in Website Load time. It didn’t imprint the replacement of HTTP but modularised it with the HTTP 1.1 by enumerating no. of features to nimble up web transactions.

blog_image-2

SPDY was evolved by Google and soon prospered on almost all the Google Products.In a short span of time, big Tech companies like Facebook, Twitter and WordPress.com soon practiced it.

This article will feature on the basics of SPDY and its functionalities in accelerating your Web Performance.

SPDY Design and features
SPDY adapts itself into the existing architecture by adding a session layer onto an SSL that allows for multiple concurrents, interleaved streams over a Single TCP Connection.

SPDY_Stack
Download packages

Supported platforms

  • CentOS/Fedora (32-bit and 64-bit)
  • Debian/Ubuntu (32-bit and 64-bit)

System Requirements

  • Apache 2.2 (≥2.2.4)
  • mod_ssl enabled

Before encroaching into the features of SPDY let’s dive deep into the problems that SPDY solves.

Problems that popularised in HTTP 1.1
With HTTP 1.1  number of bugs creeped in affecting the request and response between a client and server. These flaws aggregated to website performance.

Note: Check your website performance, try these online free tools:
webpagetest.org and gtmetrix.com

SPDY is incorporated with the objective of providing functionality that aids in resolving following:

Scarce number of connections
The approach through which HTTP is designed, it says that  each resource crave for a separate HTTP request to a server. On an average modern browser supports up to 6 concurrent connections with server. This shows if more than stated connections are required from the same server the browser will have to wait until one among the allocated resources has been downloaded before it can open another request. this phenomenon has significant effect on the page load time.
With the advent of HTTP pipelining  this problem was about to elope but it is still penalised with First-In, First-Out (FIFO) problem.

Note: Research accomplished by HTTPArchive shows that the average web page consists of 84 requests from 30 different domains.

HTTP HEADERS
The second issue in HTTP bucket is the use of uncompressed and unnecessary headers.
HTTP headers serves as fundamental to web transactions work but all this has to be directed through wire and so more header you have, the longer request will take.

Today’s technologies that compress the headers are usually optional. There exists still, the potential for compressing or emitting headers that are not required.

Developer workarounds
Web developers have strategically adopted numerous techniques to decrease load times. Few among them are:

  • Image Sprinting– Combining number of smaller images into one image ‘sprite’ and then using CSS to display the correct section of the sprite on the required page.
  • Concatenation and minification–  Combining multiple CSS or Js files in order to reduce the HTTP requests for a page. Whilst minification corresponds to the art of removing whitespace and other supplementary content within the files to reduce their size.
  • Domain Sharding– Putting the resource under sub-domains so that the browser can open more parallel connections.
  • Inline Resources– Using the Data URIs to embed the HTML code resulting in decreasing the number of HTTP requests.

Since all these strategies are useful in escalating the load time still, they are very cumbersome to implement.

Troubleshooting these with SPDY
Let us take a look of some of the features that SPDY aims to fix

Multiplexed streams
SPDY accounts for unlimited concurrent streams over a single TCP Connection. Since the requests are interleaved on a single channel the efficiency turns out to be much higher in terms of fewer network connection, fewer but more densely packed , packets are issued.

image01

Reducing Upload Bytes  image02

Reducing Download Bytes

image03

Reducing Total Packets

Request Prioritization
SPDY flow include prioritization. Server can be instructed to send the important resources as soon as the available bandwidth is ensured. This helped to overcome First-in First-out problem.

HTTP Header compression
SPDY compresses the request and response HTTP Headers, resulting in fewer packets in transmission with fewer bytes.

Server Push
This a  salient feature of SPDY and has an ability to create server-initiated streams. This allow server to push resources down to client prior to client’s request for the same.
This is in command with Data URIs to embed images within the same HTML markup page as We know the required resources to be requested thus eliminating the need for extra request.

Using SPDY Today
Now since you are well versed in SPDY basics and functionalities you can put this into use and reap benefits. The primary  gain from SPDY is readily availability primetime. The major notable point is that SPDY requires SSL. This generates a slight latency penalty but ensures a secure connection between the communicating nodes.

Browsers that back up SPDY – Chrome, Opera, and Mozilla Firefox. Microsoft is also among the peers.

Check if a website properly supports the SPDY protocol, the super fast HTTP replacement and troubleshoot any problems with the configuration.- SPDYCheck.org

Disadvantage of SPDY protocol is cPanel doesn’t yet support HSTS and SPDY seamless integration for https only websites. Also some browsers doesn’t have any clue about this and serve the website on both http and https even if you have 301 redirects to one URL on https, this makes duplicated pages and get the website penalised by search engines.

We at IBEE Hosting have experts to configure your Dedicated Hosting Servers with SPDY and HSTS protocols to make your website speedy and at the same time avoid content duplication.

{ 0 comments }

The Flavors of Linux Operating System

Often Confused with questions like these – when to prefer which flavor of Linux OS? Do these belong to the same family? Are these one versions of the other? Are these up to date? People often dwell on these questions and to choose among the pool in a state of confusion. Here is a quick note that will address all the unanswered questions and can make you understand a basic difference among all.
banner

Fedora
This flavour of operating system is the foundation for the commercial Redhat Linux version. It weighs more on features and functionality along with free software. Fedora can be used freely within a community and has third party repositories this makes it unlicensed distro version of the Linux OS and imparts a community driver feature for accessibility. This category of OS receives a regular update every 6 Months making it a more scalable in terms of performance.

Unlike Ubuntu, Fedora doesn’t make his desktop environment or other software. Fedora project uses “upstream” software facilitating a platform that integrates all the upstream software without adding their custom tools or patching it much. Fedora arrived with the GNOME 3 Desktop Environment by default, even supposing it to be available for other desktop environments also.

650x488xfedora-gnome-3-desktop.png.pagespeed.ic.NHyf2xCLCf

Redhat
Red Hat Enterprise commercializes its Linux distribution intended for Servers and workstations. It is the most favored version of Linux OS and relies on open source Fedora version.
This version caters to long releases to ensure stability among its features.  This version is trademarked to prohibit the Red Hat Enterprise Linux Software from being redistributed. Nonetheless, the core software is free and open-source.

RHEL-7.1-Desktop-600x450
CentOS
CentOS is a community version of Redhat. It is a community project that takes the Red Hat Enterprise Linux code, removes all Red Hat’s trademarks, and makes it available for free use and distribution.
It is available free, and support comes from the community as opposed to Redhat itself.

centos-5.2

Conclusion

If you’re looking for one of the most reliable, secure, and dependable platforms for both the desktop and the server, look no further than one of the many Linux distributions.
With Linux, you can assure your desktops will be free of trouble, your servers up, and your support requests at a minimum.

More Resources:

If you’re looking for more resources to help guide you through your lifetime with Linux, check out the following resources:

Linux.com: Everything you need to know about Linux (news, how-tos, answers, forums, and more )
Linux.org: Everything about the Linux kernel (with plenty of beginners, intermediate, and advanced tutorials)
Howtoforge: Linux tutorials
Linux Documentation Project: Plenty of documentation (some may be out of date)
Linux Knowledge Base and Tutorial: Plenty of tutorials.

{ 0 comments }

After the recent clarification from Google that they treat sub domains as equivalent to new domains web masters having an issue on how to migrate their sub domain blogs like blog.domain–name.com to domain–name.com/blog especially for the large sites having multi server architecture. For example if you have one web server one DB server and log server, if you want your blog to be hosted in log server because of wordpress blog requires PHP and Mysql software in web server and you don’t want to overload your web server with so many software or you want to use WordPress blog from a shared hosting account then you can use this Windows ARR or http proxy, below is the step by step process to configure Windows ARR and http proxy on windows servers.

Internet traffic can be controlled through Application Request Routing which is the prominent feature of the IIS. A proxy server acts as an intermediary router processing requests  between clients and or Web server workers on the response side.From the request side a proxy server accepts the requests from one  among the multiple clients, and proceed the requests to one of the multiple clients and on the response side, the proxy server accepts a request from the Internet nd distributes it one the multiple web server workers. The Internet assimilates that a proxy server proceeds requests and generate the responses for the same rather than the backend workers.

One among the types of the server is Forward Proxy where Proxy server  handles  an outbound request from the clients, forward it to the internet and generates the response to the client.

In Reverse Proxy, the Proxy Server handles the requests from the Internet and passes it to backend workers and in return generate the response for the same to the Internet.

5

Forward Proxy and Reverse proxy seem to act as a proxy for the request and response side but differ somehow in functionalities. in both the scenarios proxy server isolates the private network from the internet ensuring  the security measures applicability.

ARR as a forward Proxy

Serving ARR as a forward proxy, enables ARR to be a part of an internal network( or Intranet) of Clients computer. It can be used to improve bandwidth usage and performance.

Keep a note that ARR Processes only HTTP traffic, none other protocols are being processed.

7

When the clients send the request naming the target web server, it is being processed as follows and forwards it through the firewall to the internet.

  1. The Forward Server receives the request from a client, and validates that request.
  2. Upon Validation, ARR checks the if there is an already preexisted response to the same, and upon existence ARR sends the response to the client without forwarding the request to the internet.
  3. If the preexisted response does not exist in the cache, Proxy server sends the request through the firewall to an Internet connection, and to the content server that retains the information.

Advantages   

  1. Enhances performance and lowers the network traffic by caching the frequently requested content thus eliminating the request to proceed to the content server.
  2. Aids in improving network security by parsing only the valid requests.
  3. Progress the performance by using IIs Compression (if enabled)
  4. Supports filtering to ensure that policies are met, using URL Rewrite.

Installing and configuring ARR as a forward Proxy

PREREQUISITES

To set up a forward Proxy Server following are the obligatory requirements

  1.  IIS 7.0 or Above windows 2008 or newer tracing role service installed for IIS
  2. Microsoft request routing version 3 and dependent modules.
  3. Minimum of one worker server with working sites and  applications.

Configuring ARR as a forward proxy server

To enable ARR as a proxy, and for creating  a URL Rewrite rules to enable ARR as a forward proxy, proceed as follows.

  1. Open Internet Information services (IIS) Manager.
  2. By navigating in the Connections Pane, Select the Server.
  3. In the Server Pane, Navigate on the Application Request Routing Cache and Double click on the same.
1

4. Go to Server Proxy Setting in the Actions Pane

2

5. In the application Request Routing Page, Select enable proxy

3

6. In the Actions pane, Click on Apply button. This will enable ARR as a proxy at the Server Level.

4

7. To initiate the process of turning ARR into a forward proxy, in the connections  pane, Click on the Server node.

8.Double click the URL  Rewrite in the server pane.

8

9. In the Actions Pane, Click Add Rule(s).

9

10. In the Add rule dialog box, double- click Blank Rule.

10

11. Within the Edit Inbound Rule dialog box, enter ” Forward Proxy” for Name. In the Match URL area, enter the  following:

Using: Wildcards

Pattern: *

11-2
  1. Navigate on the  Conditions area of the Edit Inbound Rule dialog box and then Click ADD
11
  1. In the Add Condition dialog box, select or enter the following:

Condition Input: {HTTP_HOST}

Type: Matches the Pattern

Pattern: *

13
  1. Scroll down to the Action area of the Edit Inbound Rule dialog box, and then enter the following:

Action Type: Rewrite

Rewrite URL: http://{C:1}/{R:0}

12
  1. Click Apply in the Actions pane

Note: This rule enables HTTP messages to pass through the forward proxy. HTTPS (443) messages are not supported on this forward proxy because ARR does not support HTTP CONNECT.

  1. Your Proxy Settings has been configured appropriately in your applications, browsers and etc.
{ 0 comments }

Constant Contact Coupons and Discounts

We introduce our new Business Solutions Email Marketing, Online Surveys and Event Marketing through our Business partner Constant Contact. We offer 60 day free trail, no credit card or billing information required, it is absolutely free to test, additionally we offer free setup and training on how to send emails, generate reports and manage events, we support payment gateways like paypal for event marketing. We also provide time to time promotional campaigns and coupon codes for Constant contact new sign ups and renewals.

Promotion: 40% Off for 3 Months

40% off for 3 months* when you buy Constant Contact before August 30th 2015 and enter the Constant Contact Coupon or Promo Code SP40DISC at here in checkout.

Email Marketing by Constant Contact® is the easy, effective, and highly affordable way to get your message out to your customers, clients, or members. You’ll create high-impact, professional-looking emails—quickly and with no technical expertise. And, most importantly, you’ll build strong connections with your audience that lead to referrals, repeat business and loyalty.

Online Survey by Constant Contact® makes conducting online surveys and polls simple, fast, and highly affordable. No technical or market research skills are needed! You’ll get the insight, new ideas and the knowledge to help meet your customers’ needs. Keep them happy and coming back to do business with you—and grow your organization as a result. You’ll make more informed decisions-with the broader, more insightful view that Online Survey gives you about what your customers and members really think about your products, services, and communications.

Whether a weekend cooking class, a walk-a-thon, or a hands-on workshop, events are an integral part of how you market your small business or nonprofit organization. That’s why you need Event Marketing from Constant Contact. – the simple, professional way to promote and manage successful events. With Event Marketing, you’ll discover the power of online registration.

Click here to get more information and to sign up for a free Constant Contact trail

{ 0 comments }

As with every successful online entity, comes a time when it outgrows its hosting. For most small to medium websites, shared hosting is enough. This type of hosting offers only a portion of a server’s hard drive. All other resources like the processor, RAM and bandwidth are shared among the users. Shared hosting is a cheap starting point until the needs for additional space, computational power and Privacy become unbearable.

At this point, the most popular option to ensure continuous growth is Dedicated Servers. With this service, the user rents the whole server, including all resources. It costs more than shared hosting but allows for a vast array of heavy duty operations as well as increased privacy and security, since there is no one else using the same server.

Dedicated servers come in two types of Account – Unmanaged Dedicated Server and Managed Dedicated Server.

blog_image_3

Unmanaged Dedicated Servers, still at a higher price point than shared hosting, are cheaper than Managed Dedicated Hosting. However, all maintenance required is in the hands of the user. Updates, reboots and software integration are the sole responsibility of the customer. Unmanaged hosting is a great, cost-effective solution for people or companies with enough knowledge to keep the server operating at its maximum. When it comes to only one server the savings are not impressive, for the cluster of servers the value increases substantially. Whether it is a dedicated expert, hired on hourly basis, to maintain the server or a team responsible for the whole server infrastructure, unmanaged hosting is only suitable if the entity renting it can ensure proper maintenance.

Managed dedicated servers are more expensive than both shared hosting and unmanaged dedicated servers. The reason is; the hosting company takes care of all necessary supervision and optimization of the servers. They rely on expert personnel to maintain and update the system as well as keeping the machines running at their peaks. Operations like reboots, software installation, updating are automatically done by the hosting company. It is a great solution for people without the required knowledge, time or employees to look after the servers.

Some hosting companies facilitates migration between managed and unmanaged dedicated servers. Whether unmanaged is too much to handle or managed is too costly and unnecessary, there are hosts that would support the transfer one or both ways. This transfer frees the user to leverage further the computational power and security of dedicated servers, as well as enjoy flexibility if the situation requires it. The quality of the bandwidth, servers and support depends largely on the hosting company. Many provide general support for all of their services but at the end of the day, it all comes down to the individual provider.

Dedicated servers are very often a necessary tool for growth. The ability to rent a whole server or several allows websites and applications to operate at a higher level without the limitations of shared hosting. Pricing varies and so do the services, in quality, resources and personnel expertise. Nevertheless, most often than not, dedicated servers are the only way to ensure online growth. The choice between managed and unmanaged is more of a case whether or not the user is prepared to handle server maintenance.

Armed with this knowledge hopefully the confusion and curiosity regarding the Fully Managed and Unmanaged Dedicated Server can be put to a halt. You likely won’t be able to choose your new host in the next ten minutes, but you should at least now know the kind of questions you need to ask. Good luck and let us know if you want to try our Dedicated Hosting services at IBEE Hosting.

{ 0 comments }

Google Domains announced with Invitation code

Google announced its long pending project “Google Domains” today. As of now this works only for the users who have invitation codes to register or transfer a domain with Google Domains. Google as a registrar from long doesn’t want to get into mainstream domain and hosting business but after the ICANN added several domain extensions off-late Google want to get into this business seriously and applied for extensions like .Google etc and also become a registrar for many top selling and new extensions.

Google Domains

Now we have no idea on how Google Domains want to take into market, is it only website sales or through resellers which are already in the Google Apps ecosystem or using Google Domains referral programs and issuing Google domains promotion codes.

Google Domains features are promising but need lot of clarity like it mentioned here that it provides 100 free email addresses with the domain, so are they Google Apps for business IDs if so what will happen to the current business users who are paying hefty amount and what will happen to the reseller ecosystem. Is there a cap per user number of domains registration and getting email ids? It also mentions about integration with website builders, how Google domains is going to support with website development or building issues is not yet clear.

{ 0 comments }

How to secure your Linux Server

Security is a crucial aspect of maintaining a Linux Dedicated server and an ongoing challenge for administrators. Especially, as malicious attacks are becoming increasingly smarter and more complex in their nature, posing a constant threat. Although many argue that Linux is inherently safer than other operational systems, it is no exception to these hazards and there are a number of ways to improve security.

Create new user
Upon installation, root is the only user by default on a Linux server. It is advisable to create a new user for server access and usage by the administrator.

Disable root login
The use of root is not recommended unless necessary. Where a superuser is needed, sudo is safer to use than su. Root-level commands via sudo require user authentication and are tracked by default in /var/log/secure. Sudo are specified in /etc/sudoers and can also be edited using the ‘visudo’ utility that opens in VI editor.

Use secure shell (SSH)
Secure Shell is a cryptographic network protocol that offers greater security from password breeches than Telnet and rlogi. Such protocols, using plain text, are susceptible to password discovery via brute-forcing and packet analysis. If an administrator chooses not to use SSH, then particular emphasis should be made on using strong passwords for user accounts and the original root password must be changed.

Although SSH allows the system administrator to communicate with a server using encryption, it is still open to the possibility of an attack. To improve security it is worth removing root entirely as a means of SSH access:

  1. Go to, /etc/ssh/sshd_config.
  2. Change, #PermitRootLogin yes to PermitRootLogin no.
  3. Run, service sshd restart.

So as to improve password protection, changes can be made to the age-limit of a password or the number of times it is used. For instance, a password may be set to have a lifespan during which it is valid, before expiring:

chage –M 60 –m 7 –w 7

M = Minimum of days required between password changes
m = Maximum days the password is valid
w = The number of days before warning that the password will expire

Alternatively, the use of old passwords can be limited by using PAM module :

  1. If using RHEL / CentOS / Fedora, open, /etc/pam.d/system-auth OR, If using Ubuntu/Debian/Linux Mint, open, /etc/pam.d/common-password
  2. Under ‘ auth’ add, auth sufficient pam_unix.so likeauth nullok
  3. Under ‘password’ add, password sufficient pam_unix.so nullok use_authtok md5 shadow remember=5

The server’s memory will now be restricted to the last 5 passwords used. If a user attempts to enter any of those 5 passwords, an error message will be prompted.

Set-up Firewall
Firewalls are a first line of defense in preventing unwanted data from accessing a server. By monitoring the flow of incoming and outgoing information from the server, a firewall will check a particular flow of traffic against the configuration of a server’s set of rules so as to determine whether to accept or reject it.

To utilize the Linux kernel firewall, IPTables must be enabled. This application allows the system administrator to configure the rules that will be applied by the Linux firewall when filtering incoming and outgoing packets.

The central IPTables files are:

  1. # /etc/init.d/iptables [Init scripts]
  2. # /etc/sysconfig/iptables [Rulesets]
  3. # /sbin/iptables [Binary]

To start, stop and restart IPTables firewall with init:

  1. # /etc/init.d/iptables start [Start]
  2. # /etc/init.d/iptables stop [Stop]
  3. # /etc/init.d/iptables restart [Restart]

To start IPTables from system boot:

  • #chkconfig –level 345 iptables on

Update system
Updating the server system is vital. Maintain Linux kernel and running software with the latest available updates to aid in cementing security flaws. To get updates in RedHat or CentOS:

  • Run, yum update

Cleanse system
Software clutter creates greater vulnerabilities and hinders performance. In order to reduce the server’s attack surface and improve its over-all performance, idle and/or unnecessary software can be removed. Packages like NFS, Samba, even X Windows desktop (Gnome or KDE) have susceptibilities and are not needed. Runlevel 3 is the standard runlevel for linux-based servers. To check packages running on runlevel3 use the chkconfig command:

  • # /sbin/chkconfig –list |grep ‘3:on’

To remove packages:

  1. List what is installed: yum list installed
  2. List the package name: yum list
  3. Remove the package: yum remove

Netstat network command can also be used to check for any open ports used by programs:

  • # /sbin/chkconfig –list |grep ‘3:on’

As part of a system cleanse, IPv6 can be disabled if it is not being used. Under network configuration add the following:

  1. Go to, /etc/sysconfig/network
  2. Add, NETWORKING_IPV6=no
  3. Add, IPV6INIT=no

Security extension
Use a security extension such as SELinux on RHEL or CentOS when possible. SELinux (Security-Enhanced Linux) is a Manditory Access Control (MAC) provided by Linux kernel. Having MAC enabled, protects the system from malicious applications that may compromise its security. To see if SELinux is running:

  • Run, sestatus.

Warning display
Having a welcome display that shows a warning when accessing the server is useful to discourage malicious activity. Such a message can be created using Message Of The Day (MOTD). For example, when a user enters the system, a message can appear saying “Welcome . All activity is closely monitored and is being recorded.” To create something along these lines:

  • Go to, /etc/motd

Cronjob control
Determining which users can run cronjobs increases control over a system. This can be done using embedded cron files such as /etc/cron.allow and /etc/cron.deny. To permit a user to run cron, add the username to cron.allow and to restrict a user from doing so, add username to cron.deny. Likewise, to permit or deny all, use ALL instead of username. For example, to deny all users from running cron:

  • # echo ALL >>/etc/cron.deny

Monitor activity
Monitoring user activity and collecting related information is always important, especially when dealing with many users. Logs should be reviewed regularly and it is advisable to move these files to a dedicated log server so as to help prevent intruders from easily modifying them. Common Linux default log files and their usage:

  • /var/log/message [All system logs and current activity logs]
  • /var/log/auth.log [Authentication logs]
  • /var/log/kern.log [Kernel logs]
  • /var/log/cron.log [Cronjob logs]
  • /var/log/maillog [Mail server logs]
  • /var/log/boot.log [System boot logs]
  • /var/log/mysqld.log [MySQL database logs]
  • /var/log/secure [Authentication logs]
  • /var/log/yum.log [Yum log]
  • /var/log/utmp [Login records]OR
  • /var/log/wtmp [Login records]

In addition to monitoring user activity and reviewing logs regularly, such information can be stored in order to be revisited for analysis at a later stage if needed. For example, in the instance of a security or performance issue surfacing.

Psacct and acct are useful tools to aid in monitoring activity by running continuously in the system background. They track user activity and the consumption of resources by services such as Apache, MySQL, SSH, FTP and so on. The psacct package is only available for rpm based software such as RHEL, CentOS and Fedora, whereas the acct package is available for software like Ubuntu, Debian and Linux Mint.

To install the psacct package:

  • # yum install psacct

To install the acct package:

  • $ sudo apt-get install acct OR
  • # apt-get install acct

By default psacct service is disabled and needs to be started manually under RHEL/CentOS/Fedora systems. To activate and run psacct, first check status:
1. # /etc/init.d/psacct status

If status shows message ‘Process accounting is disabled’, then to create a /var/account/pacct file and start services:
2. # chkconfig psacct on
3. # /etc/init.d/psacct start

Once service has started, check status again:
4. # /etc/init.d/psacct status

A message should indicate ‘Process accounting is enabled’.

Recovery measures
Securing a server is not just about protecting it from external threats but also being able to salvage and recover from the impact of a successful attack or any form of system failure.

Backup
Backup important files and keep them safely stored away in a safety vault, at a remote site or even offsite, where they will be available in the event that a disaster recovery is necessary.

Disc partitions
Disc partitions offer greater data security if disaster strikes. By having a number of partitions, data can be both separated and grouped. If one partition becomes compromised or corrupted, the risk of data loss is limited to the affected area. Ensure the following partitions exist:

  • /
  • /boot
  • /usr
  • /var
  • /home
  • /tmp
  • /opt

Third party applications should be installed on an independent file system, under /opt.

Read-only /Boot
Linux kernel and its related files are in /boot directory that is set as read-write by default. Changing it to read-only reduces the risk of unauthorized modification of critical boot files. To do this:

  1. Open, /etc/fstab
  2. Add, LABEL=/boot /boot ext2 defaults,ro 1 2

In order to upgrade kernel, these files will need to be reverted to read-write.

Additional measures
In addition to the fundamental ways of securing a Linux server, there are always more measures that can be implemented to ensure the best possible level of security.

Disabling USB ports

Disabling the use of USB ports helps prevent users from attaining valuable data and protects from contamination by compromised USB devices. To ensure that USB detection is not available:

  1. Create, /etc/modprobe.d/no-usb
  2. Add, install usb-storage /bin/true

Disable alternative booting

Using BIOS set-up, configure settings to disable booting from CD/DVD, Floppy Drive and External Devices. Furthermore, enabling password protection for BIOS will help restrict physical access to the system.

Disable Control+Add+Delete

For most Linux systems, CTRL+ALT+DLETE is a short cut for initiating system reboot. As a pre-emptive measure, disabling the command removes any chance of accidentally triggering this key combination. To do this:

  1. Open, /etc/inittab
  2. Find,
  3. # Trap CTRL-ALT-DELETE
  4. #ca::ctrlaltdel:/sbin/shutdown -t3 -r now
  5. Comment it out

Final thought

Securing a Linux server is challenging but with the right approach and dedication, exposure to risks can be minimized. From taking security measures against malicious attacks to being prepared for disaster recovery, there are numerous ways to protect a system but ultimately, it comes down to the administrators and how meticulous they are in doing so.

{ 0 comments }