<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AlkoHost.comServer Security | Your Web Hosting Solution</title>
	<atom:link href="http://alkohost.com/category/server-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://alkohost.com</link>
	<description>Your Web Hosting Solution</description>
	<lastBuildDate>Fri, 05 Apr 2013 19:53:42 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>RSA attackers hit over 700 other firms</title>
		<link>https://alkohost.com/rsa-attackers-hit-over-700-firms/</link>
		<comments>https://alkohost.com/rsa-attackers-hit-over-700-firms/#comments</comments>
		<pubDate>Fri, 18 May 2012 15:16:14 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Server Security]]></category>

		<guid isPermaLink="false">http://localhost/hosttest/?p=330</guid>
		<description><![CDATA[Over 760 organisations are likely to have had their networks compromised by the same attackers who launched an advanced persistent threat to infiltrate the IT systems of RSA Security. The revelations were made by security expert Brian Krebs in a blog post on Monday, and blow a hole in the wall of silence that followed...&#160;<a href="https://alkohost.com/rsa-attackers-hit-over-700-firms/" class="link-more">READ MORE</a>]]></description>
			<content:encoded><![CDATA[<p>Over 760 organisations are likely to have had their networks compromised by the same attackers who launched an advanced persistent threat to infiltrate the IT systems of RSA Security.</p>
<p>The revelations were made by security expert Brian Krebs in a blog post on Monday, and blow a hole in the wall of silence that followed the attacks.</p>
<p>Krebs listed over 760 organisations which &#8220;had networks that were compromised with some of the same resources&#8221; that hit RSA, including big tech firms Google, Novell, Qualcomm and Facebook.</p>
<p>He explained that the networks of the organisations on the list had &#8220;phoned home&#8221; to some of the same command and control infrastructure used in the RSA attack in March, which was initially believed to have been carried out in order to compromise the SecureID system and thus infiltrate US defence contractors.</p>
<p>The attacks may have been occurring as early as November 2010, said Krebs, although he did add that some of the firms on the list were probably not original targets, for example, ISPs.</p>
<p>&#8220;It is not clear how many systems in each of these companies or networks were compromised, for how long those intrusions persisted, or whether the attackers successfully stole sensitive information from all of the victims,&#8221; Krebs said.</p>
<p>&#8220;Finally, some of these organisations (there are several anti-virus firms mentioned) may be represented because they intentionally compromised internal systems in an effort to reverse engineer malware used in these attacks.&#8221;</p>
<p>Nevertheless, it&#8217;s a fascinating snapshot into the scale of the attack and it may be telling that the vast majority of command and control networks used were located in the Beijing region.</p>
]]></content:encoded>
			<wfw:commentRss>https://alkohost.com/rsa-attackers-hit-over-700-firms/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cloud Computing is now</title>
		<link>https://alkohost.com/cloud-computing-is-now-2/</link>
		<comments>https://alkohost.com/cloud-computing-is-now-2/#comments</comments>
		<pubDate>Fri, 18 May 2012 15:15:00 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Server Security]]></category>

		<guid isPermaLink="false">http://localhost/hosttest/?p=328</guid>
		<description><![CDATA[Cloud computing is all the rage. &#8220;It&#8217;s become the phrase du jour,&#8221; says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition. As a metaphor for the Internet, &#8220;the cloud&#8221; is a familiar cliché, but when combined with &#8220;computing,&#8221;...&#160;<a href="https://alkohost.com/cloud-computing-is-now-2/" class="link-more">READ MORE</a>]]></description>
			<content:encoded><![CDATA[<p>Cloud computing is all the rage. &#8220;It&#8217;s become the phrase du jour,&#8221; says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition.</p>
<p>As a metaphor for the Internet, &#8220;the cloud&#8221; is a familiar cliché, but when combined with &#8220;computing,&#8221; the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers [1] available over the Internet. Others go very broad, arguing anything you consume outside the firewall is &#8220;in the cloud,&#8221; including conventional outsourcing.</p>
<p><strong>[ Stay on top of the state of the cloud with InfoWorld's "Cloud Computing Deep Dive [2]&#8221; special report. Download it today! | Also check out our &#8220;Private Cloud Deep Dive [3],&#8221; our &#8220;Cloud Security Deep Dive [4],&#8221; our &#8220;Cloud Storage Deep Dive [5],&#8221; and our &#8220;Cloud Services Deep Dive [6].&#8221; ]</strong></p>
<p>Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT&#8217;s existing capabilities.</p>
<p>Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) [8] providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.</p>
<p>InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here&#8217;s a rough breakdown of what cloud computing is all about:</p>
<p><strong>1. SaaS<br />
</strong>This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS &#8220;desktop&#8221; applications [9], such as Google Apps and Zoho Office?</p>
<p><strong>2. Utility computing<br />
</strong>The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera&#8217;s AppLogic and Cohesive Flexible Technologies&#8217; Elastic Server on Demand. Liquid Computing&#8217;s LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.</p>
<p><strong>3. Web services in the cloud<br />
</strong>Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services &#8212; such as Strike Iron and Xignite &#8212; to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.</p>
<p><strong>4. Platform as a service<br />
</strong>Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider&#8217;s infrastructure and are delivered to your users via the Internet from the provider&#8217;s servers. Like Legos, these services are constrained by the vendor&#8217;s design and capabilities, so you don&#8217;t get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com&#8217;s Force.com [10], Coghead [11] and the new Google App Engine [12]. For extremely lightweight development, cloud-based mashup platforms [13] abound, such as Yahoo Pipes [14] or Dapper.net.</p>
<p><strong>5. MSP (managed service providers)<br />
</strong>One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.</p>
<p><strong>6. Service commerce platforms<br />
</strong>A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They&#8217;re most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.</p>
<p><strong>7. Internet integration<br />
</strong>The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central &#8212; which wanted to be a universal &#8220;bus in the cloud&#8221; to connect SaaS providers and provide integrated solutions to customers &#8212; flamed out in 2005.</p>
<p>Today, with such cloud-based interconnection seldom in evidence, cloud computing might be more accurately described as &#8220;sky computing,&#8221; with many isolated clouds of services which IT customers must plug into individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled services running on an agile, scalable infrastructure should eventually make every enterprise a node in the cloud. It&#8217;s a long-running trend with a far-out horizon. But among big metatrends, cloud computing is the hardest one to argue with in the long term.</p>
]]></content:encoded>
			<wfw:commentRss>https://alkohost.com/cloud-computing-is-now-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Why backup your data?</title>
		<link>https://alkohost.com/why-backup-your-data/</link>
		<comments>https://alkohost.com/why-backup-your-data/#comments</comments>
		<pubDate>Fri, 18 May 2012 14:02:47 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Server Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[WebDesign]]></category>

		<guid isPermaLink="false">http://localhost/hosttest/?p=298</guid>
		<description><![CDATA[Superheroes need it, police rely on it and everyone that uses a computer should use some form of it. In the world of mainframes and microchips it&#8217;s called data backup or data recovery and it can mean the difference between a slight computer setback and living through your own electronic apocalypse. Let&#8217;s face it; our...&#160;<a href="https://alkohost.com/why-backup-your-data/" class="link-more">READ MORE</a>]]></description>
			<content:encoded><![CDATA[<p>Superheroes need it, police rely on it and everyone that uses a computer should use some form of it. In the world of mainframes and microchips it&#8217;s called data backup or data recovery and it can mean the difference between a slight computer setback and living through your own electronic apocalypse.</p>
<p>Let&#8217;s face it; our computers are a bigger part of life than ever before. We shop, work and play using computers. They&#8217;ve replaced stereos, encyclopedias, even the mailman. They&#8217;ve become journals, photo albums and canvases for our art.</p>
<p>But computers aren&#8217;t perfect. Files become corrupt, motherboards malfunction, CPUs call it quits taking our precious data with them.</p>
<p>The best defense is data backup software. Backing up data is vital for businesses; lost information can cause a major crisis or worse, lead to business failure. Individuals who don&#8217;t backup computer data run the same risk. While this may not cause financial ruin, it can certainly be frustrating and even heartbreaking. So why do so few of us practice data backup?</p>
<p><strong>Here are the common excuses:</strong></p>
<p><strong> &#8220;I&#8217;m too busy to backup my computer.&#8221; </strong> We are busy; work, family and friends fill our days and leave us little time for boring things like computer maintenance. But today&#8217;s backup software manufacturers make it easy. Through scheduled backups, your system can automatically perform a backup that fits your needs at an interval you choose &#8211; without interrupting life.</p>
<p><strong> &#8220;I don&#8217;t know how to backup data.&#8221; </strong> Like preparing for a natural disaster, most of us understand how important data backup is, but don&#8217;t know where to start. A big step is deciding how you are going to store the data you backup.</p>
<p>One option is Removable Backup Media, but this only narrows the field a little. You could buy a million 3.5&#8243; discs or perhaps invest in a larger-capacity external Zip drive. You could take the plunge into writeable CDs or stretch out your legs with the help of an external hard drive.</p>
<p>Another good data backup option is to backup to an FTP location, which allows you to backup a file, a folder or your entire hard drive to a separate location online.</p>
<p><strong> &#8220;My computer won&#8217;t crash.&#8221; </strong> You&#8217;ve had your computer this long and haven&#8217;t had problems so far why worry about computer backup now? Data backup is about protecting your data&#8217;s future, but with computers, it isn&#8217;t if you crash, it&#8217;s when you crash.</p>
<p>In today&#8217;s high-tech world of sneaky spyware and venomous viruses, you are in more danger of data loss than ever before. Computer viruses grew by as much as 11% percent during 2003 alone.*</p>
<p>Like tires on your car, the electronic circuits your computer rides on will eventually wear down and blow out. When this happens, you can either grieve at your loss or simply restore your data with data backup software.</p>
<p>So with that said, how does one choose the right backup software? There are many varieties available &#8211; some suited to a growing business and others for growing families. Some backup software is for technical experts, other packages for the technically challenged.</p>
]]></content:encoded>
			<wfw:commentRss>https://alkohost.com/why-backup-your-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protect your Web Servers with SSL</title>
		<link>https://alkohost.com/protect-your-web-servers-with-ssl/</link>
		<comments>https://alkohost.com/protect-your-web-servers-with-ssl/#comments</comments>
		<pubDate>Fri, 18 May 2012 09:22:18 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Server Security]]></category>
		<category><![CDATA[Design]]></category>
		<category><![CDATA[Funny]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Illustration]]></category>
		<category><![CDATA[Lighting]]></category>
		<category><![CDATA[Outdor]]></category>
		<category><![CDATA[Photography]]></category>
		<category><![CDATA[Photoshop]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[WebDesign]]></category>

		<guid isPermaLink="false">http://localhost/hosttest/?p=222</guid>
		<description><![CDATA[Do you need SSL? SSL (Secure Sockets Layer) is a technology to encrypt communications between the user and the web server.  It helps to prevent hacker attacks that are based on eavesdropping.  When you use a web page that is protected by SSL, you see a padlock icon that assures you that the page is...&#160;<a href="https://alkohost.com/protect-your-web-servers-with-ssl/" class="link-more">READ MORE</a>]]></description>
			<content:encoded><![CDATA[<h1>Do you need SSL?</h1>
<div>SSL (Secure Sockets Layer) is a technology to encrypt communications between the user and the web server.  It helps to prevent hacker attacks that are based on eavesdropping.  When you use a web page that is protected by SSL, you see a padlock icon that assures you that the page is secure.</p>
</div>
<h2>Is the web site really secure with SSL?</h2>
<div>No.  SSL secures the network communication link only.  Although this is an important security layer for sensitive applications, most attacks on websites are not actually done this way.  Most attacks on websites are actually done in one of the following ways:</p>
</div>
<ol>
<li>The server is attacked directly.  SSL does not protect you from this.  Rather, you need to have a good IT security policy to protect your server.</li>
<li>The user is attacked directly, either by infecting their PC with malware, or by using &#8220;phishing&#8221; to steal their passwords.  SSL does not protect you from this, either.  To protect your own PC from this, you need to use a good anti-virus program, and use lots of common sense and a small amount of paranoia when on the Internet.  However, it is unrealistic to expect that all the PCs of all of your website visitors will be adequately protected.</li>
</ol>
<div>
In other words, SSL does very little to prevent the user or the website from being hacked.  It only prevents 3rd parties from listening to communications between the user and the website.</p>
</div>
<h2>In that case, when is SSL important to have?</h2>
<p>If you are transmitting sensitive private data over the internet, SSL is an important additional security layer.  Although eavesdropping may be a less common form of attack, there is no reason not to protect against it if the consequences are serious.</p>
<h2>What kind of &#8220;sensitive private data&#8221; needs protection?</h2>
<p>Private data is information that should only be known to you (the website owner) and the user.  The most obvious example is credit card numbers.  If you outsource your credit card processing to an external e-commerce gateway, the transactions are protected by your e-commerce provider&#8217;s SSL.  Adding SSL on your website is not necessary.</p>
<p>Passwords may also be sensitive if they access private data or functions, such as bank account statements, email inboxes, and so on.  Passwords that merely access a members-only area are less sensitive, because these resources are shared and not truly private.</p>
<p>Note that personal information such as names, email addresses, phone numbers, and mailing addresses are not private.  This is information that is meant to be shared with others.  SSL does not really protect information that is already publicly available in more accessible formats such as the phone book.</p>
<p>(However, you do need a good privacy policy when storing and using people&#8217;s personal information, to assure your users why you need their personal information, and what you intend to use it for.  This is mostly because some organizations have a history of selling their databases of personal information against the wishes of their clients.  SSL does not help with this, however.)</p>
<p>There is a grey zone between private data (which should be known only to you and the user), and personal data (which is known and used by many others).  Individual pieces of personal data may not be a big deal, but if you collect enough personal data, identity theft may become a plausible threat.  Special account or identity numbers (SSN, SIN, drivers license, health care, or passport numbers for example), along with birth dates, common security questions (eg. mother&#8217;s maiden name, names of family members), and information of that nature may collectively comprise an identity that could be stolen for nefarious purposes.  The more of this sort of information you collect, the more SSL might be a worthwhile addition to your security policy.</p>
<h2>I don&#8217;t store lots of personal data, my private members&#8217; area is not especially sensitive, and I outsource credit card processing to a secure e-commerce provider.  Is there any other reason why I might want SSL?</h2>
<p>Not everybody knows what SSL protects or how it works.  All they know is that the little padlock icon is &#8220;good&#8221;.  If your users are pestering you because you don&#8217;t have the padlock icon, then it may be easier just to get SSL than to try to explain all the security nuances of why it won&#8217;t help them in this case.</p>
<p>Web browsers often throw up security dialogs when you move between SSL web pages and regular web pages.  These dialogs are meant to be a more obvious variant of the padlock icon&#8211;to advise the user when their communications are encrypted and when they are not.  They may pop up, for instance, when you finish paying at an e-commerce page, and are then redirected back to your website to get your receipt.  However, dialog boxes sometimes seem like error messages to inexperienced users, who may attempt to cancel or reverse the operation they started.  If this causes problems for you on your website, you may want to consider adding SSL just to prevent these dialog boxes from appearing.</p>
<p>In both of these cases, it is important to understand that SSL is not really protecting your website communications.  Rather, it only being used to smooth over user interface and security issues that your users may not adequately understand.</p>
<p>One extra useful thing that SSL allows for is verifying that the website owner is really who they claim to be.  If you are at risk of being spoofed by phishers, or otherwise need to be able to prove to your visitors that you really are who you claim to be, then SSL can help users confirm your identity by clicking on the padlock icon to get more information about you.</p>
<h2>I probably don&#8217;t need SSL, but it might be best to get it just to be safe.  Is there any downside to using SSL when you don&#8217;t need it?</h2>
<p>Yes.  SSL is slower because every single byte of information needs to be encrypted and decrypted by both the user and the webserver, and this takes significantly more effort than simply transmitting in the clear.  SSL not only encrypts information typed into forms by users, but also the text of web pages, style sheets, scripts, images, and videos.  Most of this does not need to be encrypted, but it gets encrypted anyway (otherwise the browser will complain that the secure page contains insecure elements).  If you use SSL on a website that doesn&#8217;t need it, every user will pay a price in speed, and your website will &#8220;max out&#8221; on its performance sooner because much of that performance is being diverted to encryption.</p>
<p>SSL also creates an administrative burden, because the certificates cost money, require paperwork and verification by a third party, and need to be renewed, just like domain names.  They also require private IP addresses, which may incur an extra cost if you do not already have a private server.</p>
]]></content:encoded>
			<wfw:commentRss>https://alkohost.com/protect-your-web-servers-with-ssl/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
<!--
Using theme: CloudHost by ThemeFuse.com 
Elapsed time: 1.0903 seconds 
Memory usage: 3,932,160 bytes 
-->