Transferring Your Hosting Towards us.


There could be multiple reasons for businesses to migrate to a new web hosting service provider. The reasons vary from low disk space to poor customer service or frequent breakdowns of the server.

Switching to a new web hosting provider may look overwhelming. However, in reality it’s not so. This article highlights important points in this regard.

Choosing a new web hosting provider
You need to consider various aspects when choosing a new web hosting service provider. These include the operating system (OS), the bandwidth and disk space requirements, the uptime and customer service.

Uptime is important because when your website is down, visitors/customers at your site might be annoyed and this may impair your site’s credibility. In actual dollar terms, you may end up losing hundreds or even thousands. The new service could claim to provide 100% uptime, which is less likely. Ensure to verify the claims.

Further, check when they execute scheduled maintenance – during peak hours or during non-peak hours. If they do it at peak hours, your business is likely to lose substantial traffic and revenue.

Bandwidth and disk space:
The bandwidth and the disk space provided by the new web hosting service provider are important because the former affects the speed and the latter gives the data storage space. Check if the new service provider offers a higher bandwidth and disk space at the same cost. If they don’t, then we suggest you to execute a cost-benefit analysis for the two aspects. This is likely to help you take a sensible decision.

The type of operating system (OS)
While migrating from one web hosting service provider to another, it is better to stick to the same OS as the one you are using (Windows or Linux) because it’ll make migration easier.

Unless you have a very good reason, do not change the OS. If you are planning to opt for a new OS, you need to check for whether that OS is being offered by the new web hosting service provider.

In addition, your site needs a database such as MySQL or Access. While MySQL is compatible with both Linux as well as Windows, Access is compatible only with Windows. It’s therefore sensible to take a look at these points when you migrate to a new OS.

Customer service
Good customer service is crucial while choosing a new web hosting service provider. Check if customer service is available around the clock and seven days a week. They should be using phone calls, SMS, or live chat. These options ensure faster communication. You could visit the web hosting service provider’s website to check the credibility of the service provider.

What after moving on a web hosting service provider ?

Back-up your website
Switching to a new web hosting service provider involves making sure your site is safe from potential hazards like loss of files including HTML files, images, application, scripts, plugins, and so on. You should secure them by taking a backup in a separate computer. You could do this by using an FTP to download all the files.
DNS changes and propagation
Your transfer to the new web hosting service provider is not complete until you update your DNS and submit it to the new service provider. Until then, your new service provider might assign you a temporary IP address. With this IP address, you could check if the website is functional. You should ensure your domain name is changed as you need. For this, you need to communicate with the domain registrar. They would advise how to change. If your domain registrar has inbuilt tools, the job will be easy for you.

Configure email:
After migration of your site to the new web hosting service provider, make sure to recheck the configuration of your email. Not doing so may lead to failure of the email service.
Check internal links:
Once the transfer process is complete, check internal links using link checking tools. Ensure all links work as they did before the transition. In addition, check for log files and errors and troubleshoot the issues.

Cancel the old account:
After you close all the process involved in the transition, you need to close the account with your former web hosting service provider. It’s sensible to keep the account live for a week as a backup option until you are sure that the transition happened accurately.

Test new website:
After migration, it’s important to recheck in detail if your site is working perfectly. Especially, check for the look and the features of internal web pages including forms, apps, plugins, etc.

Let your visitors know while you are in the transition
Make sure to leave a message on your web page requesting your audience to bear with patience while your site will have downtime during the transition. It’ll give an impression that you’re concerned for the trouble caused to your audience. It’ll also help enhance the credibility of your site.

Moving to a new web hosting service provider is tricky. It involves multiple things like your business’s website, profits and managing the transition. However, the transition could be made smooth provided you plan properly and execute efficiently.

Dedicated Server Security Audit



Security is of paramount importance on today’s internet. We pay special attention to each server’s security to provide peace of mind for our clients. All WebHostingWorld servers undergo a ten point security inspection when they are deployed.

Point 1: Check kernel version.The Linux kernel is the core system program of every Linux system.. We always check your kernel version to make sure there are no known exploitable vulnerabilities. If any kernel vulnerabilities are discovered, we will update it immediately and contact you to schedule a reboot.

Point 2: Check PHP settings. There are several PHP settings that we recommend be disabled on servers that do not require them.

  • “allow_url_fopen”. This setting allows PHP to treat any URL as if it were a file. This poses a security risk for certain PHP applications that do not correctly sanitize include and fopen statements. Most applications do not require “allow_url_fopen” and we strongly recommend that this be disabled (especially for servers running PHP4).
  • “allow_url_include”. This setting was introduced in PHP5.2. Having “allow_url_include” disabled can allow PHP5.2 users to safely enable “allow_url_fopen” if it is needed by an application. Almost no PHP applications require that “allow_url_include” be enabled. For this reason we recommend that “allow_url_include” always be disabled.
  • “register_globals”. This setting allows global PHP variables to be set at runtime through a URL. Having it enabled could allow attackers to modify arbitrary PHP variables. This can lead to SQL injections, arbitrary code execution, and other exploits for vulnerable PHP applications. We generally recommend that “register_globals” be disabled.
  • In addition to these three PHP settings, we also recommend that certain vulnerable PHP functions be disabled. In doing so, the effectiveness of PHP shells and other PHP based malware is reduced. The list of functions that we generally recommend that users disable is as follows:
    dl, exec, shell_exec, system, passthru, popen, pclose, proc_open, proc_nice, proc_terminate, proc_get_status, proc_close, pfsockopen, leak, apache_child_terminate, posix_kill, posix_mkfifo, posix_setpgid, posix_setsid, posix_setuid

Point 3: Check apache mod_security ruleset. Apache mod_security is a software firewall which scans incoming HTTP requests for known exploits. We maintain an internal ruleset for many known exploits. We always check to ensure that the latest ruleset is installed on a server prior to its deployment. Optionally, we can configure your server to daily update its ruleset to ensure that your server is always using our latest ruleset.

Point 4: Check CSF/LFD configuration. CSF/LFD is a software firewall suite which supports automated brute force detection and prevention, process tracking, SYN flood protection, and a wide range of other automated security features. We install and configure CSF/LFD on all our standard Linux servers by default.

Point 5: Check system binaries. We audit your server’s system binary package versions (such as BIND, apache, udev, etc.) to ensure that they are up to date and not vulnerable to any known exploits.

Point 6: Configuration partition mounting options. We change configuration on partitions to lessen risk of filesystem-based attacks, as well as reduce I/O overhead.

Point 7: Disable typically un-needed services. We disable services that are not commonly used to ensure to help ensure the security of the server.

Point 8: Deploy an initial security-focused configurations. We deploy initial security-focused configurations for MySQL, Exim, Cpanel, FTP, SSH, PHP.

Point 9: RKHunter. RKhunter is a program designed to scan your server for known rootkits and detected modified system binaries. We install RKHunter and initialize its state database.

Point 10: BusyBox. We install BusyBox and take steps to ensure its availability even if someone would chmod/chown recursively on /, whether accidentally or not.


How To Manage The Raw Access Logs from plesk panel

Access Log Browser

To access the Log Browser, go to Websites and Domains > Logs. You will be presented with a list of messages gathered from the logs. By default, the Log Browser displays messages present in the monitored logs at the moment of opening. If you want to refresh the list with messages added after opening the Log Browser, click Refresh. Alternatively, if you want to have new messages continuously added to the list, click Start real-time updates.

1To select the logs from which you want to view messages, click the Arrow_down icon, and select the desired logs from the menu.

Manage Log Files

To view all the messages in a log, go to Websites and Domains > Logs > click the  icon > Manage log files. The list of all tracked log files will be displayed.


Here you can click a log file name to view the file content directly in the Log Browser. You can click theIcon_Viewicon next to a log file to open it for viewing in a separate window, or theIcon_downloadicon to download it.

To save disk space, you can enable log rotation that is automatic compressing and/or deleting outdated website log files. To set up log rotation, go to Websites and Domains > Logs > click the  icon > Manage log files > Log Rotation.

You can delete log files that have been rotated (log files that have not yet been rotated cannot be removed).

Add a Custom Log File

You can add any custom log file from you web site directory to track its changes in the Log Browser. To do this, click the Add Custom Log button on the Manage Log Files page. The tree with your web site folders will be displayed. Select the file that you want to add to the Log Browser and click OK.

Note: Only plain text files can be selected. In order to be properly displayed, your custom log file should have timestamps for each log entry, otherwise it will not be parsed correctly.


As a result, the selected log file will be displayed in the list of managed log files.


If you no longer want to monitor this custom log file, click theStop_tracking_iconicon next to it. This does not remove the file from your file system, but simply removes the file from the list of files available in the Log Browser.

You can also open a text file in the Log Browser directly from the File Manager, using the Open in Log Browser option.


When you open a log file from the File Manager in the Log Browser, it is not yet added to the list of logs viewed in the Log Browser on a permanent basis. To add the file to the Log Browser, click the Add to Log Browser as Custom file button.


Easyapache-4 News!!!

EasyApache 4 was introduced in cPanel & WHM version 11.52 and has grown into a stable  product. As of version 58 EasyApache 4 is out of BETA, and is the default for any new cPanel installation.

Why EasyApache 4  I want to tell you :

  • Building with EasyApache 4 is Fast

    No need to full recompile of Apache and PHP for adding new module. With EasyApache 4 deliver Apache, PHP, and our supported PHP modules as RPMs, which means that adding a new module takes seconds.

  • Updates are  Automatic  with EasyApache 4

    Since EasyApache 4 is all RPM based, the operating system automatically takes care of updates for you

  •   PHP7 Support included in EasyApache 4

PHP7 will only be available for cPanel & WHM customers as part of EasyApache 4.             cPanel  already considering adding PHP 7.1, which just entered its third Alpha.

  • Multiple versions of PHP supported :EasyApache 4

    With cPanel & WHM version 58, We are  adding the ability to mange multiple PHP versions from WHM.

  • Easy to switch to EasyApache 4

    Switching  on easyapache4 is easy to do using our simple command-line script, and the conversion process requires no additional work from you

  • All  EasyApache RPMs are open source and available on github! Advanced users who want to customize the EasyApache 4 RPMs provided by cPanel can do so with ease!


So Get Set Go!!!!!

What is BCC in an eMail


BCC is a function used in emails and have an interesting purpose in some cases. An average email recipient has three classes, the first is the usual “To” recipient “CC” and finally the “BCC”. The first one is intended for the main recipients of the email, the second is for those recipients who are to receive a copy of the mail, and finally, the BCC who will receive a copy of the email but their email will not be seen by the other recipients. The usefulness of the BCC is to allow a long list of people interested in receiving the email, but for some reason they want to remain hidden.

The “To” field is for sending mail to people who are active in a project or subject of the email. This field addresses all visible together by interest of the email. This is because it is assumed that all are related to work and therefore have to keep in touch. On the other hand, the “CC” field are people who will not directly addressed email, and can also be interesting to know their e-mail each other.

The “BCC” field may be people who are related in some way to the job or project, but it is not essential that your email addresses are known. This can be for several reasons. The most common use for the primary recipient does not know who is receiving a copy of the email. While this can be done easily by a second copy of the message body and by forwarding the BCC field allows us to do this in a simple way and in a single step.

The BCC recipient will see the main direction on who is sending the mail (the “To” field), but the main target will see it is the only one who is sending the email. In mailing lists, the BCC camp is normally used as a courtesy for individuals who are part of the list. Even if everyone agrees to share your e-mail, have a mailing list too long is a risk of spam. It is also a risk for the subject of certain viruses, which include all the email addresses to replicate. The BCC field stops get all directions.

The meaning of BCC is Blind Carbon Copy, and is a term that predates the computers we know. At other times, when letters were written, it was done alternating pages of carbon paper between normal paper where it was written. When writing a letter several copies were made. Addresses and greetings were often left blank during the carbon copy, and then added by hand later. In this way the recipient does not know who else was receiving the letter.