Corporate Blogs

Comparing Shared Hosting vs VPS: Which Is Right For Me?

Liquid Web Official Blog -

There are an almost limitless number of options available for website hosting, especially if you have a number of websites. You can pack all of your sites into a single Shared hosting plan, utilize a reseller-style hosting which allows you multiple Shared hosting accounts, or get full assisted control of your hosting with a Virtual Private Server (VPS). But when is it better to stay on a Shared Hosting plan compared to upgrading to a small VPS Hosting plan? Here are some key questions to consider: How much disk space does your site need, and how quickly do you expect that to grow? Does your site need a higher memory limit than average, or does it require more processing power? Are there additional server-side applications that you need for back-end processing, like LaTeX, FFMPEG, ImageMagick, or Java? Do you have an application that runs exclusively on Windows, or would a less expensive Linux package work just as well? How much bandwidth do you currently use or expect to use for all of your websites? What kind of content do you have on your sites (online shopping, static content, private information, blog, etc)? Get industry-leading tips on getting the right hosting infrastructure for your business. Subscribe to the Liquid Web newsletter and get content like this sent straight to your inbox. Shared Hosting Vs VPS Hosting: Six Areas To Consider Let’s dive into six core areas to consider as you make your decision: Traffic volume Management level Controllability Resource availability Scalability Price Traffic Volume The amount of bandwidth in and out of your server is one consideration. Inbound bandwidth is usually less important than outbound bandwidth because unless your visitors will be uploading a lot of data, inbound HTTP requests will be small in size compared to the documents and images that your site will return for each page request. Shared hosting platforms are usually not set up for high volumes of traffic and processing since the power of the server must be distributed between dozens, or sometimes hundreds or thousands of other users and websites. But, for average sized and trafficked sites, such as hobby sites or “pamphlet” information-only domains, or even small blogs, shared hosting is perfectly acceptable. Sites that require more intense server-side functions, like online stores or sites which generate documents such as invoices or quotes, or sites which convert audio or video on the fly, may need more resources allocated than would come with your average Shared hosting account. Additionally, sites which have higher outbound bandwidth, like those that serve up audio or documents to users, will need additional bandwidth (and disk space) that Shared hosting may not provide, and a VPS would be better in those cases. The plain number of visitors or page loads on your site may not completely describe the processing and bandwidth needs of your site. If the site is not properly optimized for processing, the server will have to work harder for each page load. And, if you utilize a Content Delivery Network (CDN), then your outbound bandwidth usage will be considerably lower since images and other static files will be served from other locations. Comfort Level Once you have your list of requirements, think about your comfort level with controlling your hosting. In the realm of both VPS and Shared hosting, there is a breadth of support types available. If you prefer a hands-off approach, you might want someone else to monitor the services on your server, help you install programs, troubleshoot server issues, and make adjustments to configurations. So, a fully-managed hosting package with a server control panel might be better, though it comes at a slightly higher cost. If you are comfortable working on your own server and have some command line knowledge, an unmanaged VPS without a control panel could save some support and licensing costs. Most Shared hosting will be fully managed since you will not have the access levels necessary to manage the machine yourself. Advantageously, some hosting providers may specialize in one type of website hosting, such as supporting Joomla sites or assisting with commerce site integrations. If you know you will need assistance in the future with your specific hosting type, it may be worthwhile to seek out providers that could assist you with your particular needs. Controllability This leads us to a major difference between VPS and Shared hosting. If you need to have specific software installed, or need special configurations on your server, it could be uncommon to find a Shared hosting package that includes exactly that feature set. (though it is common to find hosting providers that will already have installed popular software, like FFMPEG or ImageMagick) And, it would also be unlikely that your host would install a special package for you on a shared machine, which could pose a security risk to other tenants. Therefore, a Shared hosting package would have low controllability. A VPS, on the other hand, gives you complete access into your system, so that you can enable, disable, install, or remove any software you wish, and adjust configurations exactly to your specifications. So, you aren’t restricted to the software that your hosting provider gives to your environment. Resource Availability A shared hosting package is, of course, shared amongst multiple occupants. Therefore, if you have a “noisy neighbor” who is overusing CPU time or eating up memory, then there will be less available for the remaining websites, including yours, causing them to suffer in performance. Modern Shared hosting providers will combat this by introducing resource limitations, such as maximum RAM usage, maximum number of processes, and maximum CPU percentage. These work to combat the “noisy neighbor” problem, but could limit you from temporarily overusing resources to run, say, statistics, or compile your nightly order list. Being able to temporarily break these shared resource limits is called “bursting”, which is an option for some hosts. To a much lesser extent, the noisy neighbor issue is also present on Virtual Private Servers that have multiple tenants per server node. Multiple virtual servers can be run on one physical server, but modern hypervisors (the software that runs the parent machine) are intelligent enough to silo VPSs very well, and even if one VPS is going hard and running out of memory, even to the point of having a kernel panic or halt state, the other VPSs on the parent machine will generally take no notice at all. But, several hosts also offer bursting of CPU and RAM for VPSs, which can still affect your own private server. There are “Virtual Dedicated” packages available at some hosts which provide all of the resources on one parent (dedicating it to your VPS) to avoid noisy neighbors but retaining the hypervisor’s scalability and management. Scalability Shared server packages are generally not very elastic. Options for changing the resources on your package generally include increasing your disk quota, and in some cases, removing limits on your CPU access. However, more meaningful adjustments to your resources would necessitate migration of your account to a more powerful server, or if one is not available, upgrading to a VPS or Dedicated hosting package, a task which takes considerable time. VPSs will have more functionality available for adding or removing resources, including CPU cores, system memory, and additional disks or disk space through your hosting provider. If you are, for instance, running a promotion in which you expect to receive considerable extra traffic, then a VPS will afford you the ability to scale up your server size, adjust your server-side settings to utilize the new resources, and once traffic has tapered, resize back down to your original values. Price One of the major differences between VPS hosting and Shared hosting is the average price of each platform. Shared hosting could be had for anywhere between $2 and $30 a month from various vendors, while VPSs start somewhere around $30, with nearly no upper price boundary. With these various price points come varying amounts of resources, including support, Memory/CPU resources, disk space, and bandwidth. Different hosting providers may provide different price points for seemingly identical resource availability, but make sure you discern these differences carefully. Find out what kind of scalability is available, if there are any baked-in backup solutions for the platform, support response times, and what portions of the hosting platform are managed. You should also ask to see what self-service documentation is present and whether you can preview the control panel and management interface for your hosting. Finally, see if there are extra costs necessary for any of these add-ons that could affect your final monthly or yearly hosting costs. Which One Is Right For You? There are strong advantages to both Shared and VPS hosting, and there is no perfect catch-all answer for which you should pick; your hosting needs to be tailored to the current and future needs of your websites. But, resources and costs are always driving factors. If you already have multiple Shared hosting accounts for multiple domains, you could save a good deal of money by combining them into a single VPS. And, if you feel your Shared hosting service is limiting your site’s performance, upgrading to a VPS can unleash its full potential by allowing you to tune settings specific to your needs. If you are hosting just one or two domains that don’t have outrageous requirements, a Shared hosting package could suit you perfectly. Cloud VPS At Liquid Web Cloud VPS at Liquid Web is built for reliability and performance. It’s faster than AWS or Rackspace and comes standard with backups, security, and our fully managed guarantees. The post Comparing Shared Hosting vs VPS: Which Is Right For Me? appeared first on Liquid Web.

How to Change the PHP Version in cPanel for your VPS Package

Reseller Club Blog -

VPS (Virtual Private Server) Hosting, as we have covered in our previous articles, is a powerful and dynamic hosting infrastructure combining the qualities of both Shared and Dedicated Hosting. It allows you to manage your server seamlessly with complete root access. Since VPS is a self-managed server, it is important that you know how to enable various features on your VPS package. In this tutorial, we will cover, how to change the PHP version in cPanel for your VPS package, however, before we get to the tutorial let us first have a look at what PHP is. PHP stands for Hypertext Preprocessor (earlier called, Personal Home Page). It is an open-source, server-side scripting language that enables developers to develop web applications and can be embedded directly into an HTML code. Moreover, PHP also helps create dynamic web pages for web apps, e-commerce based apps, as well as, database applications. Along with this, it is platform independent and connects with several databases like MySQL, Oracle, PostgreSQL, etc. Now, that we’ve covered the basics of PHP let us move on to understanding how to change the PHP version in cPanel. Follow these steps to know how to change the PHP version in cPanel for a particular domain hosted under the VPS package: Login to your Reseller Account Login to your ResellerClub control panel to see how many active orders, expiring orders are there in your account. Accessing your Products To access your orders, go to your control panel dashboard and click on Products → List All Orders (image 1) → Click on the Domain Name associated with the VPS package you want to access (image 2) image 1image 2 Accessing the VPS Linux KVM package After clicking on the Domain Name, you’ll be redirected to the ‘Domain Overview’ page (image 3). Scroll down to the VPS Linux KVM tab. Here click on Admin Details, and then click on the cPanel link to login to the WHM panel (image 4) image 3image 4 Accessing your WHM Panel After clicking on the cPanel link, the WHM page opens up. Here enter the Username and Password for the WHM Panel, and click on Login In the WHM Panel On the WHM dashboard on the Home page click on Software MultiPHP Manager There are a bunch of software plugins in this tab, to change your PHP version click on the ‘MultiPHP Manager’ plugin In MultiPHP Manager Plugin After clicking on the plugin, select the Domain name for which you wish to modify the PHP version. This can be found at the bottom of the page. Note: Do not change anything else on the entire page Set PHP Version per Domain Click on the drop-down option for ‘PHP Version’ and select the desired PHP version from the list of available PHP versions. After selection click on ‘Apply’ After this step, you will see your PHP version of the domain name has changed. Conclusion: With this, we come to an end of our quick tutorial on, ‘how to change the PHP version in cPanel for your VPS package’. If you have any suggestions, queries, or questions feel free to leave a comment below and we’ll get back to you. Until next time, folks! .fb_iframe_widget_fluid_desktop iframe { width: 100% !important; } The post How to Change the PHP Version in cPanel for your VPS Package appeared first on ResellerClub Blog.

Join Cloudflare & PicsArt at our meetup in Yerevan!

CloudFlare Blog -

Cloudflare is partnering with PiscArt to create a meetup this month at PicsArt office in Yerevan.  We would love to invite you to join us to learn about the newest in the Internet industry. You'll join Cloudflare's users, stakeholders from the tech community, and Engineers from both Cloudflare and PicsArt.Tuesday, 4 June, 18:30-21:00PicsArt office, YerevanAgenda:18:30-19:00   Doors open, food and drinks    19:00 - 19:30   Areg Harutyunyan, Engineering Lead of Argo Tunnel at Cloudflare, "Cloudflare Overview / Cloudflare Security: How Argo Tunnel and Cloudflare Access enable effortless security for your team"19:30-20:00    Gerasim Hovhannisyan, Director IT Infrastructure Operations at PicsArt, "Scaling to 10PB Content Delivery with Cloudflare's Global Network"20:00-20:30   Olga Skobeleva, Solutions Engineer at Cloudflare, "Security: the Serverless Future"20:30-21:00   Networking, food and drinksView Event Details & Register Here »We'll hope to meet you soon. Here are some photos from the meetup at PicsArt last year:

Stopping SharePoint’s CVE-2019-0604

CloudFlare Blog -

On Saturday, 11th May 2019, we got the news of a critical web vulnerability being actively exploited in the wild by advanced persistent threats (APTs), affecting Microsoft’s SharePoint server (versions 2010 through 2019).This was CVE-2019-0604, a Remote Code Execution vulnerability in Microsoft SharePoint Servers which was not previously known to be exploitable via the web.Several cyber security centres including the Canadian Centre for Cyber Security and Saudi Arabia’s National Center put out alerts for this threat, indicating it was being exploited to download and execute malicious code which would in turn take complete control of servers.The affected software versions:Microsoft SharePoint Foundation 2010 Service Pack 2Microsoft SharePoint Foundation 2013 Service Pack 1Microsoft SharePoint Server 2010 Service Pack 2Microsoft SharePoint Server 2013 Service Pack 1Microsoft SharePoint Enterprise Server 2016Microsoft SharePoint Server 2019IntroductionThe vulnerability was initially given a critical CVSS v3 rating of 8.8 on the Zero Day Initiative advisory (however the advisory states authentication is required). This would imply only an insider threat, someone who has authorisation within SharePoint, such as an employee, on the local network could exploit the vulnerability.We discovered that was not always the case, since there were paths which could be reached without authentication, via external facing websites. Using the NIST NVD calculator, it determines the actual base score to be a 9.8 severity out of 10 without the authentication requirement.As part of our internal vulnerability scoring process, we decided this was critical enough to require immediate attention. This was for a number of reasons. The first being it was a critical CVE affecting a major software ecosystem, primarily aimed at enterprise businesses. There appeared to be no stable patch available at the time. And, there were several reports of it being actively exploited in the wild by APTs.We deployed an initial firewall rule the same day, rule 100157. This allowed us to analyse traffic and request frequency before making a decision on the default action. At the same time, it gave our customers the ability to protect their online assets from these attacks in advance of a patch.We observed the first probes at around 4:47 PM on the 11th of May, which went on until 9:12 PM. We have reason to believe these were not successful attacks, and were simply reconnaissance probes at this point.The online vulnerable hosts exposed to the web were largely made up of high traffic enterprise businesses, which makes sense based on the below graph from W3Techs.Figure 1: Depicts SharePoint’s market position (Image attributed to W3Techs)The publicly accessible proof of concept exploit code found online did not work out of the box. Therefore it was not immediately widely used, since it required weaponisation by a more skilled adversary.We give customers advance notice of most rule changes. However, in this case, we decided that the risk was high enough that we needed to act upon this, and so made the decision to make an immediate rule release to block this malicious traffic for all of our customers on May 13th.We were confident enough in going default block here, as the requests we’d analysed so far did not appear to be legitimate. We took several factors into consideration to determine this, some of which are detailed below.The bulk of requests we’d seen so far, a couple hundred, originated from cloud instances, within the same IP ranges. They were enumerating the subdomains of many websites over a short time period.This is a fairly common scenario. Malicious actors will perform reconnaissance using various methods in an attempt to find a vulnerable host to attack, before actually exploiting the vulnerability. The query string parameters also appeared suspicious, having only the ones necessary to exploit the vulnerability and nothing more.The rule was deployed in default block mode protecting our customers, before security researchers discovered how to weaponise the exploit and before a stable patch from Microsoft was widely adopted.The vulnerabilityZero Day Initiative did a good job in drilling down on the root cause of this vulnerability, and how it could potentially be exploited in practice.From debugging the .NET executable, they discovered the following functions could eventually reach the deserialisation call, and so may potentially be exploitable.Figure 2: Depicts the affected function calls (Image attributed to Trend Micro Zero Day Initiative)The most interesting ones here are the “.Page_Load” and “.OnLoad” methods, as these can be directly accessed by visiting a webpage. However, only one appears to not require authentication, ItemPicker.ValidateEntity which can be reached via the Picker.aspx webpage.The vulnerability lies in the following function calls:EntityInstanceIdEncoder.DecodeEntityInstanceId(encodedId); Microsoft.SharePoint.BusinessData.Infrastructure.EntityInstanceIdEncoder.DecodeEntityInstanceId(pe.Key); Figure 3: PickerEntity Validation (Image attributed to Trend Micro Zero Day Initiative)The PickerEntity ValidateEntity function takes “pe” (Picker Entity) as an argument.After checking pe.Key is not null, and it matches the necessary format: via a call toMicrosoft.SharePoint.BusinessData.Infrastucture.EntityInstanceIdEncoder.IsEncodedIdentifier(pe.Key) it continues to define an object of identifierValues from the result ofMicrosoft.SharePoint.BusinessData.Infrastructure.EntityInstanceIdEncoder.DecodeEntityInstanceId(pe.Key) where the actual deserialisation takes place.Otherwise, it will raise an AuthenticationException, which will display an error page to the user.The affected function call can be seen below. First, there is a conditional check on the encodedId argument which is passed to DecodeEntityInstanceId(), if it begins with __, it will continue onto deserialising the XML Schema with xmlSerializer.Deserialize().Figure 4: DecodeEntityInstanceId leading to the deserialisation (Image attributed to Trend Micro Zero Day Initiative)When reached, the encodedId (in the form of an XML serialised payload) would be deserialised, and eventually executed on the system in a SharePoint application pool context, leading to a full system compromise.One such XML payload which spawns a calculator (calc.exe) instance via a call to command prompt (cmd.exe):<ResourceDictionary xmlns="" xmlns:x="" xmlns:System="clr-namespace:System;assembly=mscorlib" xmlns:Diag="clr-namespace:System.Diagnostics;assembly=system"> <ObjectDataProvider x:Key="LaunchCalch" ObjectType="{x:Type Diag:Process}" MethodName="Start"> <ObjectDataProvider.MethodParameters> <System:String>cmd.exe</System:String> <System:String>/c calc.exe</System:String> </ObjectDataProvider.MethodParameters> </ObjectDataProvider> </ResourceDictionary> AnalysisWhen we first deployed the rule in log mode, we did not initially see many hits, other than a hundred probes later that evening.We believe this was largely due to the unknowns of the vulnerability and its exploitation, as a number of conditions had to be met to craft a working exploit that are not yet widely known.It wasn’t until after we had set the rule in default drop mode, that we saw the attacks really start to ramp up. On Monday the 13th we observed our first exploit attempts, and on the 14th saw what we believe to be individuals manually attempting to exploit sites for this vulnerability.Given this was a weekend, it realistically gives you 1 working day to have rolled out a patch across your organisation, before malicious actors started attempting to exploit this vulnerability.Figure 5: Depicts requests matched, rule 100157 was set as default block early 13th May.Further into the week, we started seeing smaller spikes for the rule. And on the 16th May, the same day the UK’s NCSC put out an alert reporting of highly successful exploitation attempts against UK organisations, thousands of requests were dropped, primarily launched at larger enterprises and government entities.This is often the nature of such targeted attacks, malicious actors will try to automate exploits to have the biggest possible impact, and that’s exactly what we saw here.So far into our analysis, we’ve seen malicious hits for the following paths:/_layouts/15/Picker.aspx/_layouts/Picker.aspx/_layouts/15/downloadexternaldata.aspxThe bulk of attacks we’ve seen have been targeting the unauthenticated Picker.aspx endpoint as one would expect, using the ItemPickerDialog type:/_layouts/15/picker.aspx?PickerDialogType=Microsoft.SharePoint.Portal.WebControls.ItemPickerDialog We expect the vulnerability to be exploited more when a complete exploit is publicly available, so it is important to update your systems if you have not already. We also recommend isolating these systems to the internal network in cases they do not need to be external facing, in order to avoid an unnecessary attack surface.Sometimes it’s not practical to isolate such systems to an internal network, this is usually the case for global organisations, with teams spanning multiple locations. In these cases, we highly recommend putting these systems behind an access management solution, like Cloudflare Access. This gives you granular control over who can access resources, and has the additional benefit of auditing user access.Microsoft initially released a patch, but it did not address all vulnerable functions, therefore customers were left vulnerable with the only options being to virtually patch their systems or shut their services down entirely until an effective fix became available.This is a prime example of why firewalls like Cloudflare’s WAF are critical to keeping a business online. Sometimes patching is not an option, and even when it is, it can take time to roll out effectively across an enterprise.

What are “Carrier Hotels” and Why Are They Valuable to Your Business?

The Rackspace Blog & Newsroom -

60 Hudson Street in New York City occupies an entire city block in Manhattan — a pretty valuable bit of real estate. Originally known as the Western Union building, this 1930 art-deco-style beauty once served as the technological center of the global telegraph system. Today, it serves as the modern version of a technological epicenter, […] The post What are “Carrier Hotels” and Why Are They Valuable to Your Business? appeared first on The Official Rackspace Blog.

Craft CMS vs WordPress: Which CMS Is Content King?

Nexcess Blog -

A content-heavy site is about more than just creating content. It’s about managing it. Site owners need to ask themselves what type of user experience they want to deliver. This article will look at two distinct options on the market: Craft CMS and WordPress. WordPress, the most popular CMS around, is free and open source.… Continue reading →

What Are the Limitations of Shared Hosting?

InMotion Hosting Blog -

If you do an online search for a hosting plan, then chances are you will be inundated with “cheap” shared hosting options from a considerable number of companies. For first-time website owners are looking to dip their big toe into the internet pool, and these aren’t bad plans to have.   However, as with anything, there are some downsides to using shared hosting. Let’s look at the limitations of a shared plan so that you can make an educated choice on whether it will work for you or if you need to step up to a better plan. Continue reading What Are the Limitations of Shared Hosting? at The Official InMotion Hosting Blog.

What Is Windows Hosting?

HostGator Blog -

The post What Is Windows Hosting? appeared first on HostGator Blog. When figuring out which web hosting plan is the right choice for your business, you have two main server options: Windows hosting and Linux hosting. If you don’t know anything about what they are and how they’re different, you could risk making the wrong decision out of the gate, and face trouble down the line getting your website working the way you’d like. To help you make the best decision for your business, we’ve put together this guide on what Windows hosting is, who it’s for, and what to look for in a Windows hosting provider. What Is Windows Hosting? Windows hosting is website hosting that uses a Windows operating system. Because the most common web hosting plan options operate on Linux, you can usually assume that anytime a web hosting company doesn’t specify a plan is Windows hosting, it’s Linux hosting. But for a certain subset of website owners, Windows server hosting is the better choice and it’s important to seek out a plan that provides the particular features that come with it. 3 Pros of Windows Hosting Windows hosting isn’t for everyone, but it offers some unique benefits for the businesses that it’s a good fit for. 1. It runs on the familiar Windows operating system (OS). Windows is the most popular operating system in the world. The current OS version alone has over 400 million users, and some estimates put the total user base at more than 1 billion. The Windows system is familiar, and using it is straightforward for millions of people around the world. That said, when it comes to web hosting, most website owners don’t access the web server’s operating system directly. With Linux hosting, you typically use the cPanel, and with Windows server hosting you have the option of the Plesk control panel. But for anyone who plans to use the server user interface directly, Windows hosting provides a much more intuitive user experience than the Linux user interface. 2. It provides compatibility with other Windows tools. For a lot of business, this is the main reason to choose Windows hosting. If your business depends on a number of other Windows tools, then choosing a web hosting platform that plays nice with the various other software products and solutions you depend on will make your life easier. If your website was built using ASP.NET web hosting, then you’ll need to use a Windows server.. Companies that use a Microsoft structured query language (SQL) server for their website and databases will also need to stick with Windows server hosting. Same thing goes if your business uses Microsoft Exchange for your company’s email server and Microsoft Sharepoint for your project management and team collaboration. Basically, the more your business depends on Windows programs, the more likely you are to need Windows server hosting. You can always trust that your web hosting platform will be compatible with all your other legacy programs. And notably, you can trust that whenever your OS and related programs have an update, you don’t have to worry about losing functionality of other programs that depend on them since everything comes from the same company.   Another point worth considering is that most businesses that use a number of Windows-based tools will already employ a lot of tech support professionals that are experts on using, maintaining, and updating Windows programs. The people that already know how to manage your Windows products will have no problem also using your Windows server hosting. 3. It comes with the easy-to-use Plesk control panel. Where Linux web hosting has the cPanel, Windows hosting has the Plesk control panel (although it should be noted that Plesk is also an option available with Linux hosting, just not as commonly used with it as cPanel).  While many users that are already familiar with the OS can directly use the Windows server hosting interface, those that want something a little more user friendly can count on the Plesk control panel to make it easier to make updates and changes to your website. Plesk provides an intuitive user interface that lets you create and manage multiple websites and domains, set up email accounts, and manage reseller accounts. Unlike cPanel, it’s more specifically focused on the needs of commercial website and app owners. It’s compatible with content management systems (CMS) like WordPress, Drupal, and Joomla. And Plesk offers a number of different extensions companies can use to add more functionality to the control panel, including many that increase the website’s security, improve website performance, or add new applications to the website. 3 Cons of Windows Hosting While the benefits of Windows server hosting are significant, there’s a reason that Linux is the default for web hosting solutions.. Windows hosting is great for what it does, but it has a few notable downsides as well. 1. It’s not as secure as Linux hosting. Websites that run on Windows have been the victims of ransomware attacks in recent years with more frequency than Linux ones have. For that reason, Linux hosting is widely considered to be the more secure option for websites. For business websites, security is an important consideration, especially if you sell products through the site and thus collect sensitive financial information from your customers. But even if you don’t have an eCommerce website, if hackers take your website down for hours or days, it’s bad for business and for your overall reputation. While Linux web hosting beats Windows hosting in the security category, which of the two you pick is just one of many factors that influence website security. Even going with Windows hosting, you can do a lot to keep your website protected from hackers by making sure the web hosting company you choose invests in basic precautions, adding additional security software or extensions to your website, keeping all the website software you use up to date, and being careful about the levels of access you provide different people working on the site. 2. It’s more expensive. Windows hosting does cost a bit more than Linux hosting, but the difference is fairly minimal. For instance, HostGator’s Linux-based plans start at $2.75 a month, and our Windows hosting plans start at $4.76. For both types of web hosting plans, the costs do go up as the website’s needs increase, but even for an enterprise-level plan, Windows hosting only costs $14.36 a month. For most of the businesses making a decision—especially for enterprise businesses that already depend on a number of Windows products and systems—those numbers should be manageable, even as Windows hosting costs more. 3. It can be less stable. Linux servers are known for being extremely reliable. They rarely need to be rebooted and can smoothly handle many functions at a time. Windows servers, in contrast, tend to have a little more trouble consistently handling a large number of apps and tasks at a time without interruption. As with any technology on the web, Windows servers have improved in this area over time and can be expected to continue to do so, but they’re generally not quite as consistent in their performance as Linux servers. That said, this is another area where choosing the right web provider can make a big difference. A Windows hosting company that includes a 99.9% uptime guarantee is promising they’ve taken all the precautions to keep their Windows servers working as consistently as possible. With the right attention to maintenance and preparation, a good web hosting provider can help overcome the difference in server reliability between Windows and Linux hosting. Who Should Use Windows Hosting? For most new businesses starting out on the web, getting a shared hosting or cloud hosting plan based on a Linux server makes the most sense because of its affordability and reliability. Where Windows hosting really makes the most sense is for businesses—mostly enterprise or other large businesses that have been around for awhile—that have built their website and other systems on Windows programs. If a lot of your business’s tech relies on Windows, then Windows server hosting is the natural choice. It will work seamlessly with all the other programs you use, and won’t require you to rebuild or work on anything from scratch. And the tech professionals your company relies on to keep all your systems working properly will already know how to work with the Windows hosting OS. In short, if Windows hosting is the right choice for your company, your IT team will likely have strong feelings on the subject. Make sure you bring them into the conversation and let their input determine your web hosting choice. What to Look for in a Windows Hosting Provider If you’ve determined you do need Windows server hosting, then it’s important to find the right web hosting company and plan for your needs. When researching your options, here are a few good features to look for. Software Compatibility Any Windows hosting plan should provide the proper compatibility you need for all your Windows-based programs and software, including: ASP ClassicASP.NETMSSQL (Microsoft SQL Server)MS Access (Microsoft Access)Visual Basic DevelopmentC#Remote Desktop Microsoft ExchangeMicrosoft SharePoint If your business is reliant on any of these though, it doesn’t hurt to double-check that the Windows web hosting plan you choose will work seamlessly with them. In addition, if you use a popular CMS, like WordPress, check that the web hosting plan is compatible with that as well. If you add website tools like Google Analytics and AWstats, or eCommerce software like Magento or Woocommerce for an online store, be sure to check those as well.. Often, web hosting companies will advertise compatibility with common software solutions on the website, but if you don’t find the information there, you can check with the sales team for more information. Stability While as previously mentioned, Windows hosting has a weaker reputation for stability than Linux, finding the right web hosting provider can make all the difference in ensuring your website works consistently. The thing to look for here is a promise of at least 99.9% uptime. That’s how often the company guarantees your website will be up and accessible to your visitors. Some companies, like HostGator, even back that promise up with a money-back guarantee, so you know they’re serious. Even if Windows servers aren’t quite as reliable as Linux ones, the right company that knows how to take proper care of them can help make up the difference. Security Every business has to prioritize website security. The stakes are too high not to. Windows hosting may have more vulnerabilities than Linux hosting, but by choosing a reputable provider with a strong reputation for security, you can avoid much of the risk. Look for a company that uses firewalls to protect their servers, and that provides SSL certificates as part of their offerings. And check if they provide additional security software or other options to help you further protect your website from hackers. Reputation Reviewing the different plans available from various web hosting companies and the promises they make is just one part of making an informed decision. Also look into their reputation in the larger industry. Check out websites with third-party reviews to gain an unbiased look at the company’s reputation and determine if it’s in line with what you’re looking for. Customer Service Even if you have a tech team full of Windows experts, you may occasionally need customer service help from your web hosting provider. Confirm that your web hosting choice offers 24/7 customer service. If your website ever fails, you need to be sure you can get it working again right away. And make sure they offer multiple ways to get in touch. You should be able to use the communication format of your choice, whether that’s phone, live chat, customer portal, or email. Find the Best Windows Hosting Plan for You If Windows hosting is the right choice for your company, make sure you find the particular Windows hosting plan and provider that offers what you need. HostGator’s Windows hosting solutions cover all the bases we’ve covered here, and you can choose between two levels based on whether you’re running a SMB business or have a larger enterprise company. Either way, you can count on the compatibility and features you need at a reasonable price. Whether you are looking to do Windows hosting, Virtual Private Server hosting, or dedicated server hosting, HostGator has got you covered. Contact our team of experts today to get started. Find the post on the HostGator Blog

Mobile-First Indexing by default for new domains

Google Webmaster Central Blog -

Over the years since announcing mobile-first indexing - Google's crawling of the web using a smartphone Googlebot - our analysis has shown that new websites are generally ready for this method of crawling. Accordingly, we're happy to announce that mobile-first indexing will be enabled by default for all new, previously unknown to Google Search, websites starting July 1, 2019. It's fantastic to see that new websites are now generally showing users - and search engines - the same content on both mobile and desktop devices! You can continue to check for mobile-first indexing of your website by using the URL Inspection Tool in Search Console. By looking at a URL on your website there, you'll quickly see how it was last crawled and indexed. For older websites, we'll continue monitoring and evaluating pages for their readiness for mobile first indexing, and will notify them through Search Console once they're seen as being ready. Since the default state for new websites will be mobile-first indexing, there's no need to send a notification. Using the URL Inspection Tool to check the mobile-first indexing status Our guidance on making all websites work well for mobile-first indexing continues to be relevant, for new and existing sites. For existing websites we determine their readiness for mobile-first indexing based on parity of content (including text, images, videos, links), structured data, and other meta-data (for example, titles and descriptions, robots meta tags). We recommend double-checking these factors when a website is launched or significantly redesigned. While we continue to support responsive web design, dynamic serving, and separate mobile URLs for mobile websites, we recommend responsive web design for new websites. Because of issues and confusion we've seen from separate mobile URLs over the years, both from search engines and users, we recommend using a single URL for both desktop and mobile websites. Mobile-first indexing has come a long way. We're happy to see how the web has evolved from being focused on desktop, to becoming mobile-friendly, and now to being mostly crawlable and indexable with mobile user-agents! We realize it has taken a lot of work from your side to get there, and on behalf of our mostly-mobile users, we appreciate that. We’ll continue to monitor and evaluate this change carefully. If you have any questions, please drop by our Webmaster forums or our public events. Posted by John Mueller, Developer Advocate, Google Zurich

Five Tactics To Increase Conversions On Your WooCommerce Store

Nexcess Blog -

Have you ever visited an eCommerce store to buy a product only to change your mind at the last minute? The answer is almost certainly yes. Most visitors to eCommerce stores don’t buy anything. The eCommerce industry’s average conversion rate is three percent at best. For every hundred people who visit an eCommerce store, ninety-seven… Continue reading →

What Makes WordPress Hosting Different?

InMotion Hosting Blog -

WordPress hosting can handle a variety of different websites, from the small static ones to large data-heavy websites with videos, images, and other fun stuff. This is possible because hosting companies offer different types of hosting. Each type offers benefits to different kinds of websites. As hosting plans can vary greatly, it is important to know which ones offer what, and what type of website they work best with. To do this, let’s go over the four main types of hosting plans for WordPress. Continue reading What Makes WordPress Hosting Different? at The Official InMotion Hosting Blog.

How to Update Your Old WordPress Posts With the Block Editor

DreamHost Blog -

Since the Block Editor is now the default tool for creating new WordPress content, site owners are having to address the question of what will happen to their older posts and pages. This content will inevitably need updating since the Classic Editor plugin won’t be around forever. Fortunately, there are methods in place for handling this exact situation. If you need to make changes to an old post, you can easily do so without any help from the Classic Editor. This makes it much easier to bring your old and new content into alignment. In this post, we’ll discuss the Block Editor (you might know it by its nickname: Gutenberg) and then we’ll show you two methods for updating your old posts using this new tool. Let’s get started! Understanding the Differences Between the Classic and Block Editors For many years, WordPress users created new content for their websites in a visual editor, now known as the Classic Editor. It consisted primarily of one large field where you could add text, images, and other media. The main downside to the Classic Editor was that some elements — such as tables and content columns — required coding or extra plugins to implement. This arguably made the publishing process more complicated and time-consuming than it needed to be. To address that issue, the Block Editor was created. It enables you to use a system of ‘blocks’ to create content in WordPress. Each block holds a specific type of content, such as a paragraph, an image, a table, a list, or just about any other element you might want to add to a post or page. With blocks, WordPress users can create more complex content without the need for coding. Each block has individual settings so you can customize specific elements. Additionally, you can more easily move content around the page to create columns or other unique layouts. Generally speaking, the Classic Editor is considered the ‘simpler’ of the two options because of its interface. There’s just one field where all of your content goes, as opposed to many separate blocks. However, the Block Editor is built for ease-of-use and can be more user-friendly — especially for those new to WordPress. Get More with DreamPressDreamPress Plus and Pro users get access to Jetpack Professional (and 200+ premium themes) at no added cost!Check Out Plans Switching Over from the Classic Editor to the Block Editor The Block Editor has been ‘live’ since December 2018 and now serves as the default editor for anyone running WordPress 5.0 or later. However, some users have chosen to disable it in order to continue using the old – or Classic – editor. If you’ve been using WordPress for some time and are familiar with the Classic Editor, using the Block Editor may not seem very appealing. After all, it still has compatibility issues with some plugins and themes, and learning a new interface isn’t the most fun way to use your time. However, there are a few reasons to embrace the change. To start with, the Block Editor should streamline your content creation. Once you get past the learning curve, adding blocks can be much faster than stopping to code a table or columns by hand. More importantly, you may want to make this transition for the sake of your site in the long term. While right now you can keep the Classic Editor in place using a plugin, WordPress plans to stop support for that system eventually. For now, support is promised until 2022. However, once updates are no longer being released, having this plugin installed on your site could pose a security risk. At a certain point, moving over to the Block Editor will be in the best interests of your website. What the Block Editor Means for Your Existing Content Fortunately, old posts and pages created in the Classic Editor are preserved in their current format with the Block Editor. Each one features a single, large block called a Classic block. All of your text, images, and other content will be found inside this block, unchanged. The Block Editor’s effect on your theme and plugins is a little more complicated. There have been compatibility issues between the new editor and some themes and plugins, so it’s possible that enabling it will cause problems on your site. In particular, page builders and other plugins that affect the way the WordPress editor looks and functions tend to have trouble with the Block Editor. However, updates have been released for many of these plugins to fix these issues. It’s a good idea to check each of your major plugins (especially any that affect the editor) to see if they are compatible. The Block Editor should be useable with just about any theme. That said, it works better with some than with others. Ideally, you’ll want to use a theme that has been updated for use with the Block Editor or a theme that was created after the new editor’s release and built with compatibility in mind. The best way to avoid any potential issues is to create a staging version of your site. Then you can thoroughly test for any problems before updating your live site. How to Update Your Old WordPress Posts With the Block Editor (2 Methods) Of course, you may not want to leave your old WordPress content as-is. Fortunately, you can update your old posts, pages, and other content types in the Block Editor. There are two primary methods you can use, and each has its pros and cons. Before you can use either of them, you’ll need to make sure you have the Block Editor enabled. For most sites, this is already the case.  In other words, if your site is up-to-date and you haven’t done anything to disable the Block Editor, it should be currently active. Therefore, you won’t need to do anything. Otherwise, either deactivate the Classic Editor plugin or upgrade to WordPress 5.0 or above to automatically switch your site over to the new editor. Then, you can use one of the following two techniques to work on your existing content. Method 1: Continue Editing Your Posts in a Classic Block As we described earlier, existing posts and pages will be converted into Classic blocks. If you want, you can edit your content inside these blocks, just as you would in the Classic Editor. All you have to do is open the post you wish to update, and click on the Classic block. When you do, you’ll see the TinyMCE toolbar appear at the top of the block. It should look very familiar. You can edit within this block exactly as you would in the Classic Editor. If you need to access the Text Editor, you can do so by clicking on the three-dot icon to the right of the toolbar, and selecting Edit as HTML. When you select this option, the block’s content will be shown as code, and you can edit it as needed. To return to the Visual Editor, simply click on the three-dot icon again and select Edit Visually. That should be all you need to update your old posts using the Classic block. Method 2: Convert Your Old Content into Blocks The other option you have available is to convert a post or page’s Classic block into new blocks. This will divide up your content up into individual elements, just as if you had created it using the Block Editor. To do this, click on the three-dot icon and select Convert to Blocks. Your post should then split up into separate pieces. Each paragraph will become its own block, as will every heading, image, list, video, button, and element. You can click on an individual block to edit the content within it. While this process usually goes off without a hitch, you’ll want to make sure that each element of your post has converted to the correct type of block. For example, if a pull quote from your old post has converted into a regular paragraph block, you can change it by clicking on the leftmost icon in the block toolbar. You can then select the correct block type from the options listed. Once all of your blocks are set to the correct types, you can use the toolbar at the top of each to make any specific changes related to alignment and placement within the post. You can also make edits related to each block’s type, such as by altering text styling or image size. In other words, you can now use the Block Editor’s full range of capabilities to work on your content. New Kid on the Block (Editor) Updating old posts is a smart way to freshen up your content and give your site a facelift. If you’re worried about how your old posts will fare in the age of the Block Editor, however, never fear. You can easily make changes to your old posts and pages. While you’re updating your WordPress site, why not upgrade your hosting service too? Our DreamPress plans include 24/7 WordPress support to help with all your Block Editor questions. The post How to Update Your Old WordPress Posts With the Block Editor appeared first on Website Guides, Tips and Knowledge.

How to Secure Your Hybrid Cloud Infrastructure

Reseller Club Blog -

Today, many organisations and enterprises are moving into a more hybrid cloud environment. And why not? Hybrid clouds are agile – they adapt and change to the needs of the organisation. With their unique mix of private, on-premises clouds and public clouds, you can get the scalability, low cost and reliability of a public cloud, while you can get the security, control and customisation and flexibility of a private cloud- It is the best of both worlds. It is projected that by 2020, almost 90 per cent of organisations would have shifted to a hybrid cloud environment (source). However, due to this flexibility and these two worlds (private and public) the security of a hybrid cloud becomes a bit more challenging. In this article, we’re going to look at how to secure hybrid cloud. What is Hybrid Cloud? Simply put, a hybrid cloud is an environment that uses a mix of third-party public clouds and on-premises, private cloud – with orchestration between the two. When workloads move between these two platforms – the private and public clouds – you get greater flexibility and more data deployment options. This allows you to respond to computing changes and business needs with agility. Sounds good right? In order to establish this unique cloud computing environment, you need the availability of a public Infrastructure as a Service (IaaS) like AWS (Amazon Web Services) Google Cloud Platform or Microsoft Azure. Secondly, you need the construction of a private cloud (either through a cloud provider or on your own premises). The third component is a good Wide Area Network (WAN) connectivity between the public and private cloud. Finally, you need to make sure that your Hybrid Cloud is secure. This is where the matter of hybrid cloud security comes in – why is it important and what does it entail? Hybrid Cloud Security While you may have a firm grip on the data in your own private cloud, once you begin to venture into the public cloud space, things become more complex. As more enterprises move to a hybrid cloud environment, more data security concerns arise. These are the top concerns: Cross-Cloud Policy Management: While policies and procedures within the organisation’s private data centre are set, these policies might not transfer well when it comes to the public cloud. Therefore, the challenge is to create, configure and maintain a security policy that is uniform across the entire network. This includes firewall rules, user identification/ authentication and IPS signatures amongst other things. Data Leaks:A key issue for data security administrators is data visibility. When it comes to deciding where data should be stored, organisations must put in the time, care and a tremendous amount of thought. And even then, it’s easy to lose track of the data without ensuring proper data visibility. Data compliance: Before organisations can move data and applications to a service provider cloud, they must make sure they understand all regulatory compliance laws that apply to their data – whether that’s customer credit card data or data spread across multiple geographical locations. Ultimately, it’s the responsibility of the organisation to make sure data of any nature is well-protected. Cloud providers and Cloud web hosting service providers will tell organisations which compliance standards they adhere to. If more is required then the responsibility lies with the organisation to spell out those needs. Scalability: All security tools, procedures and practices need to be scaled for growth. If that hasn’t been done, companies can hit roadblocks because they neglected to build a security architecture that scales itself to the organisation’s infrastructure resources. This brings us to the final question: How to secure Hybrid Cloud? While hybrid cloud environments are more complex, there are multiple hybrid cloud security solutions and practices organisations can put in place, to keep it secure. Isolate Critical Infrastructure: Organisations store incredibly sensitive data on the cloud. However, access to this data needs to be isolated and restricted to a few key personnel, or those who specifically require it. Securing Endpoints: Using the cloud infrastructure does not remove the need for endpoint security. Often, threats and attacks start at the endpoint level. Accordingly, enterprises and organisations need to implement proper endpoint security by choosing comprehensive security solutions that offer application whitelisting and browser exploit protection. Encrypting data: Data – in transit and at rest – needs to be encrypted as a security measure. Organisations must also protect data, while it’s being used and processed by a cloud application. This will ensure that the data is protected for its entire lifecycle. While encryption methods vary according to service providers, organisations can choose the encryption method they prefer and then look for hosting providers who offer the same. Back up Data: It is essential that organisations backup their data – both physically and virtually – in case an attack or system failure leads to a loss of data (either temporary or permanent). Backing up data for your website and other applications will ensure that the data is accessible at all times.   Create a continuity and recovery plan: It’s vital that organisations create a backup plan to ensure that operations continue to run smoothly in a time of crisis (this could include power outages at data centres or disruption of services). A recovery plan could include image-based backups, which will create copies of computers or VMs, which can be used to recover or restore data. Risk Assessment: One good practice for organisations to follow is to constantly update risk assessment and analysis practices. That way, organisations can review the cloud provider’s compliance status and security capabilities. It also allows organisations to look at their own internal development and orchestration tools. Organisations must also keep an eye on operation management, monitoring tools, security tools and controls – both internally and in the public cloud. Vigilance like this allows security teams to maintain clarity and confidence in the controls that are currently in place and will give them time to modify them if required. Choose a Reliable Web Hosting Provider: When choosing a Cloud Hosting provider for your website, organisations must look at the security capabilities. The service provider should be aware that security is a key concern and they should provide adequate security measures to keep your data safe. Good Cloud Hosting providers use the storage systems to ensure unshakeable stability. This ensures that you don’t have to worry about the loss of data due to hardware failures. Ultimately, every hybrid cloud security issue has a corresponding solution. The trick is to identify specific problems early and then create a comprehensive security solution. If organisations do that, they will end up with a powerful hybrid cloud that functions smoothly, is easy to manage and remains secure. .fb_iframe_widget_fluid_desktop iframe { width: 100% !important; } The post How to Secure Your Hybrid Cloud Infrastructure appeared first on ResellerClub Blog.

What To Do When You Fail a Website Performance Test

InMotion Hosting Blog -

Has your website failed a performance test? A bad website hosting service could be to blame. A website performance test measures page speed – the length of time it takes to display all the content on a specific page or the length of time it takes the server to receive that page’s first byte of information. Why is that important? Because visitors aren’t going to sit around and wait for your page to load. Continue reading What To Do When You Fail a Website Performance Test at The Official InMotion Hosting Blog.

7 Steps To Get Increased Brand Loyalty Through M-commerce

Reseller Club Blog -

Have you thought about how you can increase your brand loyalty? There are many ways to do that but m-commerce is one of the best ways. M-Commerce, that is, selling on mobile devices, is an absolute must for any business. According to Statista, by the year 2021, almost 54% of all online transactions take place by Mobile retail Commerce (M-commerce) as opposed to the traditional E-Commerce platforms. And that is logical too, after all, mobile devices are by definition more convenient. Added to that fact is the situation that Google, is now employing a mobile-first rule, meaning that its rankings will prioritize mobile-friendly sites above everything else. So, if more than half of your potential market is mobile-based, and Google no less is ranking sites by their mobile accessibility, these are two very good reasons to start developing a brand loyalty strategy via M-Commerce. Keep it simple Mobile platforms don’t need bells and whistles. In fact, those same decorative elements actually end up having a detrimental effect by sending potential customers elsewhere due to over-complicated and messy pages. Keep your message clear and concise, and allow the customer to do what they want to do easily and simply. Anything extra is just overkill. Take a look at the AcademicBrits website and see how they handled a lot of information but added simplicity as well. Overkill Example Good Example 2. Quickly reveal value We live in an impatient society, that’s a fact, and online it’s even more cutthroat. Just like in the previous point, get straight to the point and reveal instantly what value you can add to the customer. Don’t hide away terms and conditions, lay them bare, so the customer knows exactly what they are getting involved in, and allow them to take the plunge quickly. As for rewards, don’t make customers work too hard for them. Keep them within easy reach. If you don’t do it, someone else will, and there goes your customer. 3. Make your site customizable Another challenge for developers is that, as well as being simple, a mobile site must also be customizable. After all, no one wants a site that provides a host of unnecessary information and/or products. This is all part of a society that demands instant gratification, so allow your site to be customized in a way that it only displays the content that the user wants. It should be responsive for mobile devices, obviously. Make sure it loads quickly and that it provides a great user experience that feels seamless and effortless. 4. Provide memorable user experience Quite simply, nothing is really enough if you can’t produce some sort of emotional attachment to the user. Nowadays, people want imaginative and relatable experiences from the mobile sites they visit, and big data is not enough. To stand out from the crowd, you need unique experiences and content. “What we are talking about here is the term ‘big emotions’. This means that nothing else will do, and this is a huge challenge for developers and marketers. How can you create an emotional connection with your customer?” asks Sindy Peltier, a tech editor at 1day2Write and Writemyx. Customers are looking for an experience that provides a ‘wow’ factor that very first time. Once you have that first memorable user experience safely tucked into your belt, the next time becomes that little bit easier. 5. Engage the Audience A huge part of building a brand relationship is engaging the customer in the first place. That can be through any number of methods, but you have to maintain the conversation and show that you genuinely listen by taking feedback at every opportunity and using it. Meaningful engagements can be secured through the site itself, or through social media channels. Thus, you need to ensure that your communication quickly becomes an engagement. “Personalize that communication. In the past that used to be incredibly time consuming, but now automation software makes this a very accessible technique. It helps to develop an individual relationship which can be invaluable to a growing brand,” argues Lyndsay Stephens, an M-Commerce expert at Britstudent and Nextcoursework. 6. Use brand partnerships Utilizing a well-considered brand partnership is a really smart way of developing your reputation and quickly securing a loyal following. Not only is it an extremely financially viable technique of growing exposure by piggy-backing onto the already established marketing presence of another brand, by selecting the right brands to get involved with, it shows the customer that you are looking out for them by bringing together two (or more) products or services that you understand they are seeking. It increases convenience, and aligned together with reward schemes, can actually result in infinitely better customer experience with meaningful savings and perks. That is a sure-fire way of building a relationship to last. In summary The stats don’t lie. Mobile platforms are the present and the future of E-Commerce transactions, particularly with the increasingly creative ways of making payments and accessing information. Creating a mobile-friendly platform is therefore not just smart, it is essential when growing brand loyalty and seeking to increase the number of active engagements and conversations. Follow these simple steps to achieving a brand strategy that takes your business to new heights. .fb_iframe_widget_fluid_desktop iframe { width: 100% !important; } The post 7 Steps To Get Increased Brand Loyalty Through M-commerce appeared first on ResellerClub Blog.

How Does My Hosting Provider Affect Site Speed

InMotion Hosting Blog -

Have you ever wondered if your hosting provider can affect site speed? The answer is a resounding, “Yes.” Many experts believe that web hosting is one of the most overlooked factors when it comes to page speed. And the speed of your website matters a lot. Why? Because we live in a world of convenience, where everyone expects everything to happen immediately. The fact is, no one is going to wait three minutes for your website to load. Continue reading How Does My Hosting Provider Affect Site Speed at The Official InMotion Hosting Blog.

The History of Internet Privacy

DreamHost Blog -

It’s been a year since the European Parliament turned the GDPR proposal into active legislation. The General Data Protection Regulation was created to protect the privacy rights of European Union members. Thanks to the GDPR, EU internet users now have the power to control where and how their personal information is used online. Related: DreamHost is GDPR Compliant The battle to respect individual freedoms and privacy isn’t new. Humans have been fighting for our right to privacy since the first loincloth accidentally ripped off in a heated saber-tooth tiger hunt over 300,000 years ago. The Gronk Decision of 320,532 BC was a landmark ruling guaranteeing a right to secondary, backup loincloths to both hunters and gatherers alike. We’ve compiled a brief look back on some milestones in the history of privacy starting in the 1800s and ending at the internet of today. Check it out! The History of Internet Privacy The post The History of Internet Privacy appeared first on Website Guides, Tips and Knowledge.

The Serverlist Newsletter: Connecting the Serverless Ecosystem

CloudFlare Blog -

Check out our fifth edition of The Serverlist below. Get the latest scoop on the serverless space, get your hands dirty with new developer tutorials, engage in conversations with other serverless developers, and find upcoming meetups and conferences to attend.Sign up below to have The Serverlist sent directly to your mailbox. .newsletter .visually-hidden { position: absolute; white-space: nowrap; width: 1px; height: 1px; overflow: hidden; border: 0; padding: 0; clip: rect(0 0 0 0); clip-path: inset(50%); } .newsletter form { display: flex; flex-direction: row; margin-bottom: 1em; } .newsletter input[type="email"], .newsletter button[type="submit"] { font: inherit; line-height: 1.5; padding-top: .5em; padding-bottom: .5em; border-radius: 3px; } .newsletter input[type="email"] { padding-left: .8em; padding-right: .8em; margin: 0; margin-right: .5em; box-shadow: none; border: 1px solid #ccc; } .newsletter input[type="email"]:focus { border: 1px solid #3279b3; } .newsletter button[type="submit"] { padding-left: 1.25em; padding-right: 1.25em; background-color: #f18030; color: #fff; } .newsletter .privacy-link { font-size: .9em; } Email Submit Your privacy is important to us newsletterForm.addEventListener('submit', async function(e) { e.preventDefault() fetch('', { method: 'POST', body: newsletterForm.elements[0].value }).then(async res => { const thing = await res.text() newsletterForm.innerHTML = thing const homeURL = '' if (window.location.href !== homeURL) { window.setTimeout(_ => { window.location = homeURL }, 5000) } }) }) iframe[seamless]{ background-color: transparent; border: 0 none transparent; padding: 0; overflow: hidden; } const magic = document.getElementById('magic') function resizeIframe() { const iframeDoc = magic.contentDocument const iframeWindow = magic.contentWindow magic.height = iframeDoc.body.clientHeight const injectedStyle = iframeDoc.createElement('style') injectedStyle.innerHTML = ` body { background: white !important; } ` magic.contentDocument.head.appendChild(injectedStyle) function onFinish() { setTimeout(() => { = '' }, 80) } if (iframeDoc.readyState === 'loading') { iframeWindow.addEventListener('load', onFinish) } else { onFinish() } } async function fetchURL(url) { magic.addEventListener('load', resizeIframe) const call = await fetch(`${url}`) const text = await call.text() const divie = document.createElement("div") divie.innerHTML = text const listie = divie.getElementsByTagName("a") for (var i = 0; i < listie.length; i++) { listie[i].setAttribute("target", "_blank") } magic.scrolling = "no" magic.srcdoc = divie.innerHTML } fetchURL("")

Webby for Good: Sisterh>>d by Girls Who Code

WP Engine -

Since 1996, The Webby Awards have celebrated the best of the Internet. In the web’s infancy, that meant recognizing trail-blazing websites. Today, the Webbys honor the best of video, advertising, media & public relations, social, apps, mobile, voice, games, and podcasts. Two awards are granted per category: The Webby Award and The Webby People’s Voice… The post Webby for Good: Sisterh>>d by Girls Who Code appeared first on WP Engine.


Recommended Content

Subscribe to Complete Hosting Guide aggregator - Corporate Blogs