Transferring Your Hosting Towards us.

untitled

There could be multiple reasons for businesses to migrate to a new web hosting service provider. The reasons vary from low disk space to poor customer service or frequent breakdowns of the server.

Switching to a new web hosting provider may look overwhelming. However, in reality it’s not so. This article highlights important points in this regard.

Choosing a new web hosting provider
You need to consider various aspects when choosing a new web hosting service provider. These include the operating system (OS), the bandwidth and disk space requirements, the uptime and customer service.

Uptime
Uptime is important because when your website is down, visitors/customers at your site might be annoyed and this may impair your site’s credibility. In actual dollar terms, you may end up losing hundreds or even thousands. The new service could claim to provide 100% uptime, which is less likely. Ensure to verify the claims.

Further, check when they execute scheduled maintenance – during peak hours or during non-peak hours. If they do it at peak hours, your business is likely to lose substantial traffic and revenue.

Bandwidth and disk space:
The bandwidth and the disk space provided by the new web hosting service provider are important because the former affects the speed and the latter gives the data storage space. Check if the new service provider offers a higher bandwidth and disk space at the same cost. If they don’t, then we suggest you to execute a cost-benefit analysis for the two aspects. This is likely to help you take a sensible decision.

The type of operating system (OS)
While migrating from one web hosting service provider to another, it is better to stick to the same OS as the one you are using (Windows or Linux) because it’ll make migration easier.

Unless you have a very good reason, do not change the OS. If you are planning to opt for a new OS, you need to check for whether that OS is being offered by the new web hosting service provider.

In addition, your site needs a database such as MySQL or Access. While MySQL is compatible with both Linux as well as Windows, Access is compatible only with Windows. It’s therefore sensible to take a look at these points when you migrate to a new OS.

Customer service
Good customer service is crucial while choosing a new web hosting service provider. Check if customer service is available around the clock and seven days a week. They should be using phone calls, SMS, or live chat. These options ensure faster communication. You could visit the web hosting service provider’s website to check the credibility of the service provider.

What after moving on a web hosting service provider ?

Back-up your website
Switching to a new web hosting service provider involves making sure your site is safe from potential hazards like loss of files including HTML files, images, application, scripts, plugins, and so on. You should secure them by taking a backup in a separate computer. You could do this by using an FTP to download all the files.
DNS changes and propagation
Your transfer to the new web hosting service provider is not complete until you update your DNS and submit it to the new service provider. Until then, your new service provider might assign you a temporary IP address. With this IP address, you could check if the website is functional. You should ensure your domain name is changed as you need. For this, you need to communicate with the domain registrar. They would advise how to change. If your domain registrar has inbuilt tools, the job will be easy for you.

Configure email:
After migration of your site to the new web hosting service provider, make sure to recheck the configuration of your email. Not doing so may lead to failure of the email service.
Check internal links:
Once the transfer process is complete, check internal links using link checking tools. Ensure all links work as they did before the transition. In addition, check for log files and errors and troubleshoot the issues.

Cancel the old account:
After you close all the process involved in the transition, you need to close the account with your former web hosting service provider. It’s sensible to keep the account live for a week as a backup option until you are sure that the transition happened accurately.

Test new website:
After migration, it’s important to recheck in detail if your site is working perfectly. Especially, check for the look and the features of internal web pages including forms, apps, plugins, etc.

Let your visitors know while you are in the transition
Make sure to leave a message on your web page requesting your audience to bear with patience while your site will have downtime during the transition. It’ll give an impression that you’re concerned for the trouble caused to your audience. It’ll also help enhance the credibility of your site.

Moving to a new web hosting service provider is tricky. It involves multiple things like your business’s website, profits and managing the transition. However, the transition could be made smooth provided you plan properly and execute efficiently.

Dedicated Server Security Audit

secure-server

 

Security is of paramount importance on today’s internet. We pay special attention to each server’s security to provide peace of mind for our clients. All WebHostingWorld servers undergo a ten point security inspection when they are deployed.

Point 1: Check kernel version.The Linux kernel is the core system program of every Linux system.. We always check your kernel version to make sure there are no known exploitable vulnerabilities. If any kernel vulnerabilities are discovered, we will update it immediately and contact you to schedule a reboot.

Point 2: Check PHP settings. There are several PHP settings that we recommend be disabled on servers that do not require them.

  • “allow_url_fopen”. This setting allows PHP to treat any URL as if it were a file. This poses a security risk for certain PHP applications that do not correctly sanitize include and fopen statements. Most applications do not require “allow_url_fopen” and we strongly recommend that this be disabled (especially for servers running PHP4).
  • “allow_url_include”. This setting was introduced in PHP5.2. Having “allow_url_include” disabled can allow PHP5.2 users to safely enable “allow_url_fopen” if it is needed by an application. Almost no PHP applications require that “allow_url_include” be enabled. For this reason we recommend that “allow_url_include” always be disabled.
  • “register_globals”. This setting allows global PHP variables to be set at runtime through a URL. Having it enabled could allow attackers to modify arbitrary PHP variables. This can lead to SQL injections, arbitrary code execution, and other exploits for vulnerable PHP applications. We generally recommend that “register_globals” be disabled.
  • In addition to these three PHP settings, we also recommend that certain vulnerable PHP functions be disabled. In doing so, the effectiveness of PHP shells and other PHP based malware is reduced. The list of functions that we generally recommend that users disable is as follows:
    dl, exec, shell_exec, system, passthru, popen, pclose, proc_open, proc_nice, proc_terminate, proc_get_status, proc_close, pfsockopen, leak, apache_child_terminate, posix_kill, posix_mkfifo, posix_setpgid, posix_setsid, posix_setuid

Point 3: Check apache mod_security ruleset. Apache mod_security is a software firewall which scans incoming HTTP requests for known exploits. We maintain an internal ruleset for many known exploits. We always check to ensure that the latest ruleset is installed on a server prior to its deployment. Optionally, we can configure your server to daily update its ruleset to ensure that your server is always using our latest ruleset.

Point 4: Check CSF/LFD configuration. CSF/LFD is a software firewall suite which supports automated brute force detection and prevention, process tracking, SYN flood protection, and a wide range of other automated security features. We install and configure CSF/LFD on all our standard Linux servers by default.

Point 5: Check system binaries. We audit your server’s system binary package versions (such as BIND, apache, udev, etc.) to ensure that they are up to date and not vulnerable to any known exploits.

Point 6: Configuration partition mounting options. We change configuration on partitions to lessen risk of filesystem-based attacks, as well as reduce I/O overhead.

Point 7: Disable typically un-needed services. We disable services that are not commonly used to ensure to help ensure the security of the server.

Point 8: Deploy an initial security-focused configurations. We deploy initial security-focused configurations for MySQL, Exim, Cpanel, FTP, SSH, PHP.

Point 9: RKHunter. RKhunter is a program designed to scan your server for known rootkits and detected modified system binaries. We install RKHunter and initialize its state database.

Point 10: BusyBox. We install BusyBox and take steps to ensure its availability even if someone would chmod/chown recursively on /, whether accidentally or not.

 

How To Manage The Raw Access Logs from plesk panel

Access Log Browser

To access the Log Browser, go to Websites and Domains > Logs. You will be presented with a list of messages gathered from the logs. By default, the Log Browser displays messages present in the monitored logs at the moment of opening. If you want to refresh the list with messages added after opening the Log Browser, click Refresh. Alternatively, if you want to have new messages continuously added to the list, click Start real-time updates.

1To select the logs from which you want to view messages, click the Arrow_down icon, and select the desired logs from the menu.

Manage Log Files

To view all the messages in a log, go to Websites and Domains > Logs > click the  icon > Manage log files. The list of all tracked log files will be displayed.

2

Here you can click a log file name to view the file content directly in the Log Browser. You can click theIcon_Viewicon next to a log file to open it for viewing in a separate window, or theIcon_downloadicon to download it.

To save disk space, you can enable log rotation that is automatic compressing and/or deleting outdated website log files. To set up log rotation, go to Websites and Domains > Logs > click the  icon > Manage log files > Log Rotation.

You can delete log files that have been rotated (log files that have not yet been rotated cannot be removed).

Add a Custom Log File

You can add any custom log file from you web site directory to track its changes in the Log Browser. To do this, click the Add Custom Log button on the Manage Log Files page. The tree with your web site folders will be displayed. Select the file that you want to add to the Log Browser and click OK.

Note: Only plain text files can be selected. In order to be properly displayed, your custom log file should have timestamps for each log entry, otherwise it will not be parsed correctly.

3

As a result, the selected log file will be displayed in the list of managed log files.

4

If you no longer want to monitor this custom log file, click theStop_tracking_iconicon next to it. This does not remove the file from your file system, but simply removes the file from the list of files available in the Log Browser.

You can also open a text file in the Log Browser directly from the File Manager, using the Open in Log Browser option.

5

When you open a log file from the File Manager in the Log Browser, it is not yet added to the list of logs viewed in the Log Browser on a permanent basis. To add the file to the Log Browser, click the Add to Log Browser as Custom file button.

6