<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AlkoHost.comAlkoHost.com | Your Web Hosting Solution</title>
	<atom:link href="http://alkohost.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://alkohost.com</link>
	<description>Your Web Hosting Solution</description>
	<lastBuildDate>Fri, 05 Apr 2013 19:53:42 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>RSA attackers hit over 700 other firms</title>
		<link>https://alkohost.com/rsa-attackers-hit-over-700-firms/</link>
		<comments>https://alkohost.com/rsa-attackers-hit-over-700-firms/#comments</comments>
		<pubDate>Fri, 18 May 2012 15:16:14 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Server Security]]></category>

		<guid isPermaLink="false">http://localhost/hosttest/?p=330</guid>
		<description><![CDATA[Over 760 organisations are likely to have had their networks compromised by the same attackers who launched an advanced persistent threat to infiltrate the IT systems of RSA Security. The revelations were made by security expert Brian Krebs in a blog post on Monday, and blow a hole in the wall of silence that followed...&#160;<a href="https://alkohost.com/rsa-attackers-hit-over-700-firms/" class="link-more">READ MORE</a>]]></description>
			<content:encoded><![CDATA[<p>Over 760 organisations are likely to have had their networks compromised by the same attackers who launched an advanced persistent threat to infiltrate the IT systems of RSA Security.</p>
<p>The revelations were made by security expert Brian Krebs in a blog post on Monday, and blow a hole in the wall of silence that followed the attacks.</p>
<p>Krebs listed over 760 organisations which &#8220;had networks that were compromised with some of the same resources&#8221; that hit RSA, including big tech firms Google, Novell, Qualcomm and Facebook.</p>
<p>He explained that the networks of the organisations on the list had &#8220;phoned home&#8221; to some of the same command and control infrastructure used in the RSA attack in March, which was initially believed to have been carried out in order to compromise the SecureID system and thus infiltrate US defence contractors.</p>
<p>The attacks may have been occurring as early as November 2010, said Krebs, although he did add that some of the firms on the list were probably not original targets, for example, ISPs.</p>
<p>&#8220;It is not clear how many systems in each of these companies or networks were compromised, for how long those intrusions persisted, or whether the attackers successfully stole sensitive information from all of the victims,&#8221; Krebs said.</p>
<p>&#8220;Finally, some of these organisations (there are several anti-virus firms mentioned) may be represented because they intentionally compromised internal systems in an effort to reverse engineer malware used in these attacks.&#8221;</p>
<p>Nevertheless, it&#8217;s a fascinating snapshot into the scale of the attack and it may be telling that the vast majority of command and control networks used were located in the Beijing region.</p>
]]></content:encoded>
			<wfw:commentRss>https://alkohost.com/rsa-attackers-hit-over-700-firms/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cloud Computing is now</title>
		<link>https://alkohost.com/cloud-computing-is-now-2/</link>
		<comments>https://alkohost.com/cloud-computing-is-now-2/#comments</comments>
		<pubDate>Fri, 18 May 2012 15:15:00 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Server Security]]></category>

		<guid isPermaLink="false">http://localhost/hosttest/?p=328</guid>
		<description><![CDATA[Cloud computing is all the rage. &#8220;It&#8217;s become the phrase du jour,&#8221; says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition. As a metaphor for the Internet, &#8220;the cloud&#8221; is a familiar cliché, but when combined with &#8220;computing,&#8221;...&#160;<a href="https://alkohost.com/cloud-computing-is-now-2/" class="link-more">READ MORE</a>]]></description>
			<content:encoded><![CDATA[<p>Cloud computing is all the rage. &#8220;It&#8217;s become the phrase du jour,&#8221; says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition.</p>
<p>As a metaphor for the Internet, &#8220;the cloud&#8221; is a familiar cliché, but when combined with &#8220;computing,&#8221; the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers [1] available over the Internet. Others go very broad, arguing anything you consume outside the firewall is &#8220;in the cloud,&#8221; including conventional outsourcing.</p>
<p><strong>[ Stay on top of the state of the cloud with InfoWorld's "Cloud Computing Deep Dive [2]&#8221; special report. Download it today! | Also check out our &#8220;Private Cloud Deep Dive [3],&#8221; our &#8220;Cloud Security Deep Dive [4],&#8221; our &#8220;Cloud Storage Deep Dive [5],&#8221; and our &#8220;Cloud Services Deep Dive [6].&#8221; ]</strong></p>
<p>Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT&#8217;s existing capabilities.</p>
<p>Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) [8] providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.</p>
<p>InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here&#8217;s a rough breakdown of what cloud computing is all about:</p>
<p><strong>1. SaaS<br />
</strong>This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS &#8220;desktop&#8221; applications [9], such as Google Apps and Zoho Office?</p>
<p><strong>2. Utility computing<br />
</strong>The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera&#8217;s AppLogic and Cohesive Flexible Technologies&#8217; Elastic Server on Demand. Liquid Computing&#8217;s LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.</p>
<p><strong>3. Web services in the cloud<br />
</strong>Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services &#8212; such as Strike Iron and Xignite &#8212; to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.</p>
<p><strong>4. Platform as a service<br />
</strong>Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider&#8217;s infrastructure and are delivered to your users via the Internet from the provider&#8217;s servers. Like Legos, these services are constrained by the vendor&#8217;s design and capabilities, so you don&#8217;t get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com&#8217;s Force.com [10], Coghead [11] and the new Google App Engine [12]. For extremely lightweight development, cloud-based mashup platforms [13] abound, such as Yahoo Pipes [14] or Dapper.net.</p>
<p><strong>5. MSP (managed service providers)<br />
</strong>One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.</p>
<p><strong>6. Service commerce platforms<br />
</strong>A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They&#8217;re most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.</p>
<p><strong>7. Internet integration<br />
</strong>The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central &#8212; which wanted to be a universal &#8220;bus in the cloud&#8221; to connect SaaS providers and provide integrated solutions to customers &#8212; flamed out in 2005.</p>
<p>Today, with such cloud-based interconnection seldom in evidence, cloud computing might be more accurately described as &#8220;sky computing,&#8221; with many isolated clouds of services which IT customers must plug into individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled services running on an agile, scalable infrastructure should eventually make every enterprise a node in the cloud. It&#8217;s a long-running trend with a far-out horizon. But among big metatrends, cloud computing is the hardest one to argue with in the long term.</p>
]]></content:encoded>
			<wfw:commentRss>https://alkohost.com/cloud-computing-is-now-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Password security is broken say experts</title>
		<link>https://alkohost.com/password-security-is-broken-say-experts/</link>
		<comments>https://alkohost.com/password-security-is-broken-say-experts/#comments</comments>
		<pubDate>Fri, 18 May 2012 14:10:44 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[General Activity]]></category>
		<category><![CDATA[Videos]]></category>

		<guid isPermaLink="false">http://localhost/hosttest/?p=301</guid>
		<description><![CDATA[Identity fraud is one of the biggest threats to unwary web users today. It can come in a variety of forms but is often the result of an online account being hacked or details phished via social engineering. I recently met Jason Hart, former ethical hacker and now managing director of secure authentication firm Cryptocard,...&#160;<a href="https://alkohost.com/password-security-is-broken-say-experts/" class="link-more">READ MORE</a>]]></description>
			<content:encoded><![CDATA[<div>
<div>
<p>Identity fraud is one of the biggest threats to unwary web users today. It can come in a variety of forms but is often the result of an online account being hacked or details phished via social engineering.</p>
<p>I recently met Jason Hart, former ethical hacker and now managing director of secure authentication firm Cryptocard, who has been banging on for years about how password-based approaches to account authentication are no longer sufficient.</p>
<p>Now, of course, he would say that, given that Cryptocard&#8217;s job is to sell alternative two-factor-based authentication technology, whether it&#8217;s via key fob token generators, or passcode-generating software which can be installed on a smartphone.</p>
<p>However, the sheer number of security breaches which have occurred because password security systems have been cracked in the most basic and simple way backs up the two-factor message.</p>
<p>&#8220;Why should a [hacker] go to the effort of finding a vulnerability when he could target the password?&#8221; Hart told <em>V3</em>.</p>
<p>&#8220;The problem has always been there but the reliance of social networks and cloud computing [sites] on passwords has been explosive. Password security is the only thing that impacts confidentiality, integrity, availability, accountability and auditability.&#8221;</p>
<p>Most retail banks in the UK have got the message and now issue customers with some form of one-time password generating device to try to deny the dedicated fraudster. But problems persist elsewhere. Online cloud-based services have grown to staggeringly high numbers and most of them still use passwords as the primary means of account entry.</p>
<p>Twitter, Facebook, Google and virtually all other web firms have been of the opinion that to do otherwise would be unnecessarily burdensome to the user, incur cost to them and fatally tip the security/usability balance the wrong way so as to actively discourage people from signing up.</p>
<p>Hart, of course, believes this is a narrow minded approach that leaves such firms woefully unable to protect their customers. As an ethical hacker, Hart told <em>V3</em> he has spent much of his time finding ways to crack password systems, with little difficulty.</p>
<p>Password reset options in particular, as was <a href="http://www.v3.co.uk/v3-uk/news/2129718/trend-micro-warns-verified-visa-3ds-password-reset-flaw" target="_blank">observed by Trend Micro&#8217;s Rik Ferguson the other week</a>, can often contain startlingly easy questions, answers to which can be found anywhere online with a little rudimentary digging. And that&#8217;s assuming that the password was not an easy-to-guess name or even a default word in the first place.</p>
<p>More disturbingly still, Hart said he was able to find the personal details of virtually anyone he needed to online, a technique many hackers use to enhance their chances of success in social engineering attacks.</p>
<p>He gave the example of a hacker who could trawl LinkedIn for new job starters, then email a victim who had just begun a job, pretending to be from the new firm&#8217;s IT or HR team. It&#8217;s only a small step from there to persuading the victim to click on a malicious link or volunteer some sensitive financial information.</p>
<p>So where does the responsibility for account security lie? Certainly people need to improve their password habits, but, as Hart argues, passwords really shouldn&#8217;t be used anymore. However, when it comes to the amount of data routinely placed online by web users, the problem is a little less black and white.</p>
<p>LinkedIn was highlighted by Hart as a particular goldmine of personal information for hackers, the added dimension being that it&#8217;s professional information and much more valuable to hackers looking to infiltrate an organisation. So does LinkedIn need to up its game and tighten privacy settings? Well, the firm told me in a statement it is &#8220;constantly assessing its security and privacy policies to ensure all members have a rewarding and safe experience&#8221;.</p>
<p>&#8220;As a member of LinkedIn, you have full control over what information you share with your connections and beyond,&#8221; it added.</p>
<p>&#8220;Privacy settings allow you to control what information you make available to search engines through your public profile, and to control the messages you receive from LinkedIn and other users. The privacy settings also allow you to control visibility and accessibility throughout the web site.&#8221;</p>
<p>A pretty unequivocal &#8216;we&#8217;ve done our bit, it&#8217;s up to the users to do the rest&#8217; message, then. But has the balance of responsibility shifted a little too far onto the user? Privacy policies on sites like Facebook have been criticised in the past for being too complicated for the average Joe to work out. While LinkedIn&#8217;s are a lot simpler than Facebook&#8217;s, they may still trouble some people, and crucially the firm could do more to publicise them.</p>
<p>As online fraudsters get ever more sophisticated and wise to the opportunities afforded by these huge and as yet still largely untapped pools of personal information, more pressure will come on the platform providers to do a little more.</p>
</div>
</div>
]]></content:encoded>
			<wfw:commentRss>https://alkohost.com/password-security-is-broken-say-experts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Why backup your data?</title>
		<link>https://alkohost.com/why-backup-your-data/</link>
		<comments>https://alkohost.com/why-backup-your-data/#comments</comments>
		<pubDate>Fri, 18 May 2012 14:02:47 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Server Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[WebDesign]]></category>

		<guid isPermaLink="false">http://localhost/hosttest/?p=298</guid>
		<description><![CDATA[Superheroes need it, police rely on it and everyone that uses a computer should use some form of it. In the world of mainframes and microchips it&#8217;s called data backup or data recovery and it can mean the difference between a slight computer setback and living through your own electronic apocalypse. Let&#8217;s face it; our...&#160;<a href="https://alkohost.com/why-backup-your-data/" class="link-more">READ MORE</a>]]></description>
			<content:encoded><![CDATA[<p>Superheroes need it, police rely on it and everyone that uses a computer should use some form of it. In the world of mainframes and microchips it&#8217;s called data backup or data recovery and it can mean the difference between a slight computer setback and living through your own electronic apocalypse.</p>
<p>Let&#8217;s face it; our computers are a bigger part of life than ever before. We shop, work and play using computers. They&#8217;ve replaced stereos, encyclopedias, even the mailman. They&#8217;ve become journals, photo albums and canvases for our art.</p>
<p>But computers aren&#8217;t perfect. Files become corrupt, motherboards malfunction, CPUs call it quits taking our precious data with them.</p>
<p>The best defense is data backup software. Backing up data is vital for businesses; lost information can cause a major crisis or worse, lead to business failure. Individuals who don&#8217;t backup computer data run the same risk. While this may not cause financial ruin, it can certainly be frustrating and even heartbreaking. So why do so few of us practice data backup?</p>
<p><strong>Here are the common excuses:</strong></p>
<p><strong> &#8220;I&#8217;m too busy to backup my computer.&#8221; </strong> We are busy; work, family and friends fill our days and leave us little time for boring things like computer maintenance. But today&#8217;s backup software manufacturers make it easy. Through scheduled backups, your system can automatically perform a backup that fits your needs at an interval you choose &#8211; without interrupting life.</p>
<p><strong> &#8220;I don&#8217;t know how to backup data.&#8221; </strong> Like preparing for a natural disaster, most of us understand how important data backup is, but don&#8217;t know where to start. A big step is deciding how you are going to store the data you backup.</p>
<p>One option is Removable Backup Media, but this only narrows the field a little. You could buy a million 3.5&#8243; discs or perhaps invest in a larger-capacity external Zip drive. You could take the plunge into writeable CDs or stretch out your legs with the help of an external hard drive.</p>
<p>Another good data backup option is to backup to an FTP location, which allows you to backup a file, a folder or your entire hard drive to a separate location online.</p>
<p><strong> &#8220;My computer won&#8217;t crash.&#8221; </strong> You&#8217;ve had your computer this long and haven&#8217;t had problems so far why worry about computer backup now? Data backup is about protecting your data&#8217;s future, but with computers, it isn&#8217;t if you crash, it&#8217;s when you crash.</p>
<p>In today&#8217;s high-tech world of sneaky spyware and venomous viruses, you are in more danger of data loss than ever before. Computer viruses grew by as much as 11% percent during 2003 alone.*</p>
<p>Like tires on your car, the electronic circuits your computer rides on will eventually wear down and blow out. When this happens, you can either grieve at your loss or simply restore your data with data backup software.</p>
<p>So with that said, how does one choose the right backup software? There are many varieties available &#8211; some suited to a growing business and others for growing families. Some backup software is for technical experts, other packages for the technically challenged.</p>
]]></content:encoded>
			<wfw:commentRss>https://alkohost.com/why-backup-your-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protect your Web Servers with SSL</title>
		<link>https://alkohost.com/protect-your-web-servers-with-ssl/</link>
		<comments>https://alkohost.com/protect-your-web-servers-with-ssl/#comments</comments>
		<pubDate>Fri, 18 May 2012 09:22:18 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Server Security]]></category>
		<category><![CDATA[Design]]></category>
		<category><![CDATA[Funny]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Illustration]]></category>
		<category><![CDATA[Lighting]]></category>
		<category><![CDATA[Outdor]]></category>
		<category><![CDATA[Photography]]></category>
		<category><![CDATA[Photoshop]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[WebDesign]]></category>

		<guid isPermaLink="false">http://localhost/hosttest/?p=222</guid>
		<description><![CDATA[Do you need SSL? SSL (Secure Sockets Layer) is a technology to encrypt communications between the user and the web server.  It helps to prevent hacker attacks that are based on eavesdropping.  When you use a web page that is protected by SSL, you see a padlock icon that assures you that the page is...&#160;<a href="https://alkohost.com/protect-your-web-servers-with-ssl/" class="link-more">READ MORE</a>]]></description>
			<content:encoded><![CDATA[<h1>Do you need SSL?</h1>
<div>SSL (Secure Sockets Layer) is a technology to encrypt communications between the user and the web server.  It helps to prevent hacker attacks that are based on eavesdropping.  When you use a web page that is protected by SSL, you see a padlock icon that assures you that the page is secure.</p>
</div>
<h2>Is the web site really secure with SSL?</h2>
<div>No.  SSL secures the network communication link only.  Although this is an important security layer for sensitive applications, most attacks on websites are not actually done this way.  Most attacks on websites are actually done in one of the following ways:</p>
</div>
<ol>
<li>The server is attacked directly.  SSL does not protect you from this.  Rather, you need to have a good IT security policy to protect your server.</li>
<li>The user is attacked directly, either by infecting their PC with malware, or by using &#8220;phishing&#8221; to steal their passwords.  SSL does not protect you from this, either.  To protect your own PC from this, you need to use a good anti-virus program, and use lots of common sense and a small amount of paranoia when on the Internet.  However, it is unrealistic to expect that all the PCs of all of your website visitors will be adequately protected.</li>
</ol>
<div>
In other words, SSL does very little to prevent the user or the website from being hacked.  It only prevents 3rd parties from listening to communications between the user and the website.</p>
</div>
<h2>In that case, when is SSL important to have?</h2>
<p>If you are transmitting sensitive private data over the internet, SSL is an important additional security layer.  Although eavesdropping may be a less common form of attack, there is no reason not to protect against it if the consequences are serious.</p>
<h2>What kind of &#8220;sensitive private data&#8221; needs protection?</h2>
<p>Private data is information that should only be known to you (the website owner) and the user.  The most obvious example is credit card numbers.  If you outsource your credit card processing to an external e-commerce gateway, the transactions are protected by your e-commerce provider&#8217;s SSL.  Adding SSL on your website is not necessary.</p>
<p>Passwords may also be sensitive if they access private data or functions, such as bank account statements, email inboxes, and so on.  Passwords that merely access a members-only area are less sensitive, because these resources are shared and not truly private.</p>
<p>Note that personal information such as names, email addresses, phone numbers, and mailing addresses are not private.  This is information that is meant to be shared with others.  SSL does not really protect information that is already publicly available in more accessible formats such as the phone book.</p>
<p>(However, you do need a good privacy policy when storing and using people&#8217;s personal information, to assure your users why you need their personal information, and what you intend to use it for.  This is mostly because some organizations have a history of selling their databases of personal information against the wishes of their clients.  SSL does not help with this, however.)</p>
<p>There is a grey zone between private data (which should be known only to you and the user), and personal data (which is known and used by many others).  Individual pieces of personal data may not be a big deal, but if you collect enough personal data, identity theft may become a plausible threat.  Special account or identity numbers (SSN, SIN, drivers license, health care, or passport numbers for example), along with birth dates, common security questions (eg. mother&#8217;s maiden name, names of family members), and information of that nature may collectively comprise an identity that could be stolen for nefarious purposes.  The more of this sort of information you collect, the more SSL might be a worthwhile addition to your security policy.</p>
<h2>I don&#8217;t store lots of personal data, my private members&#8217; area is not especially sensitive, and I outsource credit card processing to a secure e-commerce provider.  Is there any other reason why I might want SSL?</h2>
<p>Not everybody knows what SSL protects or how it works.  All they know is that the little padlock icon is &#8220;good&#8221;.  If your users are pestering you because you don&#8217;t have the padlock icon, then it may be easier just to get SSL than to try to explain all the security nuances of why it won&#8217;t help them in this case.</p>
<p>Web browsers often throw up security dialogs when you move between SSL web pages and regular web pages.  These dialogs are meant to be a more obvious variant of the padlock icon&#8211;to advise the user when their communications are encrypted and when they are not.  They may pop up, for instance, when you finish paying at an e-commerce page, and are then redirected back to your website to get your receipt.  However, dialog boxes sometimes seem like error messages to inexperienced users, who may attempt to cancel or reverse the operation they started.  If this causes problems for you on your website, you may want to consider adding SSL just to prevent these dialog boxes from appearing.</p>
<p>In both of these cases, it is important to understand that SSL is not really protecting your website communications.  Rather, it only being used to smooth over user interface and security issues that your users may not adequately understand.</p>
<p>One extra useful thing that SSL allows for is verifying that the website owner is really who they claim to be.  If you are at risk of being spoofed by phishers, or otherwise need to be able to prove to your visitors that you really are who you claim to be, then SSL can help users confirm your identity by clicking on the padlock icon to get more information about you.</p>
<h2>I probably don&#8217;t need SSL, but it might be best to get it just to be safe.  Is there any downside to using SSL when you don&#8217;t need it?</h2>
<p>Yes.  SSL is slower because every single byte of information needs to be encrypted and decrypted by both the user and the webserver, and this takes significantly more effort than simply transmitting in the clear.  SSL not only encrypts information typed into forms by users, but also the text of web pages, style sheets, scripts, images, and videos.  Most of this does not need to be encrypted, but it gets encrypted anyway (otherwise the browser will complain that the secure page contains insecure elements).  If you use SSL on a website that doesn&#8217;t need it, every user will pay a price in speed, and your website will &#8220;max out&#8221; on its performance sooner because much of that performance is being diverted to encryption.</p>
<p>SSL also creates an administrative burden, because the certificates cost money, require paperwork and verification by a third party, and need to be renewed, just like domain names.  They also require private IP addresses, which may incur an extra cost if you do not already have a private server.</p>
]]></content:encoded>
			<wfw:commentRss>https://alkohost.com/protect-your-web-servers-with-ssl/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
<!--
Using theme: CloudHost by ThemeFuse.com 
Elapsed time: 0.6294 seconds 
Memory usage: 3,932,160 bytes 
-->