Industry Buzz

New gTLD Testimonial: New Angle Media

1&1 Online Success Center -

New Angle Media is a marketing technology agency that specializes in creating software, solutions, and studio productions for a number of high-level clients. President of the agency, Kristopher Brandt, understands the importance of keeping up with the newest technology trends, since he is always recommending the same thing for his clients. With the introduction of hundreds of new generic top-level domains to the market, Brandt jumped on the opportunity to secure a new, relevant domain name for his business. “With better search placement and a whole new world of branding opportunities opening up with these next-generation domain names, we are excited to see the possibilities going forward,” said Brandt. “This new era of domain extensions will really allow us to micro target our marketing efforts and help us clearly distinguish who we are and what we do.” Brandt plans to set up the new NewAngle.Solutions domain name to redirect to a specific landing page on the existing agency website. This way they can target a specific audience for marketing purposes, and clearly measure how effective their efforts are. “The new TLDs provide virtually limitless opportunities for highly-targeted branding that will allow small businesses to acquire domain names that identify their specific industries or areas of focus,” said Brandt. Brandt also encourages other business owners not to miss out on the opportunity to a secure a new, relevant domain name for their website. “The Web and its underlying technology and now infrastructure are constantly changing, and businesses large and small must proactively adapt or risk being left behind,” he said. “As usual, 1&1 is ahead of the curve in staying on top of the latest Web technology and we are pleased with their industry leading service.”

Heartbleed Bug

HostGator Blog -

The post Heartbleed Bug appeared first on HostGator Web Hosting Blog | Gator Crossing.You may have now heard of the “Heartbleed Bug.” Before we continue, we want to reassure you that if you are hosting on a HostGator shared or reseller server, that your server has already been patched. For everyone else, HostGator customer or not, we have created the following tool to assist you with determining whether or not your site is presently vulnerable and what further action to take, if necessary: https://heartbleed.hostgator.com/ Now, what exactly is the Heartbleed Bug? Technically speaking, it is a serious vulnerability in the popular OpenSSL cryptographic software library. In layman’s terms, it allows the ever-present nefarious individuals the ability to intercept and decode encrypted data. The following quote comes from heartbleed.com: “The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.” The bug is so-named due to a normal function between two computers across a network (such as the Internet) sharing an encrypted connection. The “heartbeat” is simply a pulse, or packet of information, sent from one machine to the other to ensure the connection still exists. This functionality is what allows the exploit to occur, in that the heartbeat is simulated by a third party in such a way as to allow them access to the memory of the receiving server. What this translates to is virtually unlimited, and untraceable, access to a myriad of private information which potentially can include usernames, passwords, and even credit card information. The full extent of the situation is not presently known. What is known is that we should all consider all of our passwords to be compromised. As a result, you absolutely want to update any passwords for anything and everything you log into online. However, if you change your password for an account on a server that has not been patched, then you can consider the new password compromised as well. For full information regarding this situation, we recommend reading the associated Wikipedia article. web hosting

Now Available - New Memory-Optimized EC2 Instances (R3)

Amazon Web Services Blog -

I talked about the upcoming memory-optimized EC2 instance type (R3) last week and provided you with configuration and pricing information so that you could start thinking about how to put them to use in your environment. I am happy to report that the R3 instances are now available for use in the following AWS Regions: US East (Northern Virginia) US West (Northern California) US West (Oregon) EU (Ireland) Asia Pacific (Tokyo) Asia Pacific (Sydney) Asia Pacific (Singapore) Memory-OptimizedR3 instances are recommended for applications that require high memory performance at the best price point per GiB of RAM. The instances include the following features: Intel Xeon E5-2670 v2 "Ivy Bridge" Processors Hardware Virtualization (HVM) only SSD-backed instance storage, including TRIM support Enhanced Networking with lower latency, low jitter, and high packet-per-second performance The R3 instances are available in five sizes, as follows (prices are in US East (Northern Virginia); see the EC2 pricing page for full information): Instance Name vCPU Count RAM Instance Storage (SSD) Price/Hour r3.large 2 15 GiB 1 x 32 GB $0.175 r3.xlarge 4 30.5 GiB 1 x 80 GB $0.350 r3.2xlarge 8 61 GiB 1 x 160 GB $0.700 r3.4xlarge 16 122 GiB 1 x 320 GB $1.400 r3.8xlarge 32 244 GiB 2 x 320 GB $2.800 You can launch the r3.xlarge, r3.2xlarge, and r3.4xlarge instances in EBS-Optimized form, with additional, dedicated I/O capacity for EBS volumes. The r3.8xlarge instance features 10 Gigabit networking. Customer ReactionSeveral AWS customers have been working with the R3 instances in preparation for today's launch: Netflix is the world’s leading Internet television network with over 44 million members in 41 countries enjoying more than one billion hours of TV shows and movies per month, including original series. Coburn Watson, Manager of Performance Engineering at Netflix told us: We run many memory-hungry applications to support the volume of content our customers access. These applications require instances with high memory footprint and high memory bandwidth. By delivering high memory capacity, and high performance, R3 instances address these needs at a low cost and we are already planning to utilize them to support many of our applications and services. MongoDB is one of the most popular NoSQL options on AWS. It uses aggressive memory caching for its data file management and benefits from access to copious amounts of memory. Matt Asay, VP of Marketing and Business Development at MongoDB, told us: R3 instances provide a broad spectrum of compute and memory scaling options for our customers to realize full memory caching potential of MongoDB.  Our customers can start with a smaller instance for testing and early development, and scale to larger R3 instances as they move to production. Metamarkets enables buyers and sellers of digital advertising to understand and visualize large quantities of data in real-time. Patrick McBride, Head of Technical Operations for Metamarkets, told us: A key part of our analytics platform is Druid, our open source datastore that’s built to analyze tens of billions of records in under a second.  For certain query types, R3 instances help us reduce Druid’s median query time by nearly 50%. That means a better experience for our clients, who rely on us to deliver insights right when they need them. Partner SupportMany APN (Amazon Partner Network) Technology Members are working to make their offerings available on the R3 instances. Here's a sampling: Buddha Labs - Hardened Red Hat Enterprise Linux 6 x64 for Cluster Instances and DISA STIG Red Hat Enterprise Linux 6.4 x64 For Cluster Instances. Parallel Universe - Parallel Universe with Cluster Instances (Red Hat Enterprise Linux, SUSE LES, Ubuntu Server, Amazon Linux, GPU Amazon Linux). SoftNAS Cloud - High Performance Cloud NAS and SAN. MathWorks - MatLab and Simulink. -- Jeff;

Search Engine Optimization for your Reseller Business – A Cheat Sheet

Reseller Club Blog -

You have signed up for a ResellerClub account and have got yourself a slick storefront in the form of the Supersite, or already have your custom storefront and have tied in with our back-end through API or WHMCS. Your business needs impetus, visibility and presence in the eyes of your potential customers and you can get that by targeting one of the biggest sources of traffic on the web – search engines. In fact, when venturing into digital marketing for your business, Search Engine Optimization (SEO) should be one of the first facets to explore, before you try other paid forms of online advertising. Simply put, SEO refers to techniques that increase the visibility and reach of your website by ranking it higher in organic search results. SEO can be divided into two main areas; on-page optimization which covers everything that can be done on the pages of your website to improve the website’s search rankings, and off-page optimization which covers activity that is done on other websites which can impact the ranking of your website – positively or negatively. In this first article we will cover only the on-page optimization aspects of SEO. Now that we know what SEO means (well at least somewhat), let’s start by looking at a few things that are must-knows about on-page optimization: Keywords – The building blocks of every successful SEO effort Keywords can be defined as a set of labels/words/phrases that define the business objective and the content of a webpage. The most relevant and hence most important keywords for your website as a whole will then be the set of keywords that appear most often across all pages of your website. If you want to stand out when compared to your competitors, then it is vital to invest a good amount of time and resources into understanding your Target Audiences better. This will help you narrow down specific keywords that your target group is likely to search for on Google to get to your website. Let me help you understand this better with an example. Let’s say you are a Hosting provider in India, you would start your SEO exercise by preparing a list of phrases that are relevant to your target audience. These terms should be both brand related and generic. To organize it better, you could consider breaking your terms down into category, sub-category and specifics. For example, a category could be Hosting, a sub-category could be Shared Hosting, and a specific term would be buy hosting in India. In order to rank higher in search results, it is essential to ensure that your website contains these keywords. With targeted and relevant keywords, you can increase the click through rate (CTR) of your website, reduce bounce rates and consequently increase conversions. Now that we have identified a list of keywords for your website, you can use them in the following 5 elements of on-page optimization. 1. Page Title 48% people click on a Search Result solely based on the relevancy of the Page Title of the website as seen on Search Engine Result Page (SERP). A Page Title, very simply put, is the first thing your potential customer sees on the SERP, based on which he/she decides whether to visit your website or not. A recommended practice is to include your brand name and specific keywords in your Page Title to make it as relevant to that particular page as possible. The Page Title must be unique for each and every page of your website, indicative of the purpose of that respective page. This simply means that if your potential customer searches for “buy reseller hosting”, then your Page Title should contain “reseller hosting” in addition to your brand name. Moreover, a click on this Search Result should take him/her to the “reseller hosting” product page as opposed to a generic landing/home page of your website. 2. Meta Descriptions: Meta description refers to the description of your website which appears in search engine results. Meta description should contain a brief keyword-rich description of your website focusing on the areas that your business is specialized in. Meta description has a fairly large impact on the click-through rate of your website, and hence must be given serious thought. If a searcher finds it appealing he is more likely to click to find out more information. But if your Meta Description is too generic and isn’t written too well then there is a good chance that your site will simply be ignored. If you are using Supersite 2 refer this link to find out more about adding Meta Descriptions to your Supersite 2 for better SEO. Taking our example forward, your Meta Description could read something like: 3. URL Structure From an SEO perspective, a website’s URL structure must be meaningful and intuitive. A good practice is to ensure URL names relevant have keywords in them, not gibberish numbers, alphabets and punctuation marks. Use the syntax given below as a thumb rule for creating URLs that search engines love. businessname.com/topic-name Supersite 2 allows you to customize URLs for specific Landing Pages with utmost ease. Refer to the link below to find out how you can modify the landing page URLs on your Supersite to meet your SEO goals: http://manage.resellerclub.com/kb/answer/1897 4. Page Content We cannot stress enough upon the importance of unique, high quality, and relevant content on your website. Don’t believe us? Take a look at Google’s quality guidelines to see for yourself. It’s important to ensure that your website content is keyword-rich, as visitor time on site is directly proportional to relevancy for their search result. This simply means that visitors are much more likely to stay on a page if they can see the terms they had searched for on it. However, it’s critical you use these keywords naturally and avoid over-using keywords for the sake of SEO. If keywords are used too frequently for the sake of ranking up in SERP’s, it can appear manipulative and result in your website being demoted or even blacklisted in search results. And hey, no one wants to read content like that, anyway. Please note: In search engine optimization (SEO) keyword density is the measurement in percentage of the number of times a particular keyword or phrase appears compared to the total number of words in a page. The recommended keyword density is said to be 1 to 3 percent. Use a keyword density tool to calculate the keyword density of a webpage to avoid over usage of keywords. Refer to the link below to know more about content customization on Supersite 2. http://manage.resellerclub.com/kb/servlet/KBServlet/faq1106.html 5. Images and Alt Text You can look at including relevant keywords in a natural way in your image titles and alt text. This doesn’t have a significant impact on your search rankings, but it surely helps Google find your website in image searches, thus boosting the accessibility quotient of your website. Again, rather than adding keywords to image titles and alt text only for the sake of SEO, try and improve user experience by being as accurate and descriptive as possible with your images. While this post is by no means is an all encompassing list of principles and tactics to succeed at search engine optimization, it can definitely serve as a reference point for you to begin your SEO efforts. Take a look at our knowledgebase guidelines to learn some more about Optimizing your SuperSite for Search Engines. We hope you found this article useful. Stay tuned for our upcoming post on off page SEO techniques where will guide you through off page SEO activities that you can focus on. We would love to know your thoughts on SEO in the comments below!

Why Every Business Needs a Business Domain Name

GoDaddy Blog -

An online presence is crucial to the success of your business. Most consumers search online for local products and services. If you don’t have a business domain name, that means people are searching for — and not finding — your business online. The first step to building your online presence is to secure a domain name. For more information, see Domain Name Basics. Here’s what a domain name can do for your business: Accessibility — Your actual store might open its doors from 8 a.m. to 5 p.m., but a domain name is available 24/7. You can use your domain name to build a website that provides important information, such as your store hours, phone number, location, and descriptions and images of your products and services. You can even connect with customers personally through a blog. Brand Protection — If you don’t register a domain name and create a site for your business, someone else might. In fact, we recommend registering multiple domain names to ensure brand protection. For more information, see Why should I register more than one domain name? Professional Email — Did you know that when you register a domain name, you can create custom email addresses? For example, if your site is CoolExample.com, then you can create email addresses like Info@CoolExample.com andSales@CoolExample.com. Having your email address at your business name is much more professional that using a free email service. Promotion — Even if you aren’t selling products and services online, you can use a domain name to promote your brick-and-mortar business. For example, you can direct customers to CoolExample.com. On your website, you can advertise upcoming sales and events, offer special discounts or printable coupons, and highlight what’s new. Online Sales — To capitalize on the growing number of online shoppers, consider selling some of your products and services online. It’s the perfect way to expand your business nationally or globally. For details, see Selling Products Online. Don’t get left in the cyber dust! Register at least one domain name, and then learn about building your website. The post Why Every Business Needs a Business Domain Name appeared first on GoDaddy Blog.

Bluehost Update: The Heartbleed Bug and What You Need To Know

Bluehost Blog -

As you may have heard, an Internet-wide security threat emerged yesterday called the Heartbleed bug. Online security is a topic that we take very seriously.  Once we learned about this issue we began addressing it immediately and we’ve compiled this list of questions and answers to help you understand the Heartbleed bug, let you know what we’ve done to address it and let you know what you can do to protect your private information. What is the Heartbleed bug? The Heartbleed bug is a serious vulnerability in the popular OpenSSL cryptographic software library used to secure information traffic across much of the Internet. Because the vulnerability itself could leak/bleed information and it involved the Heartbeat function of OpenSSL, the vulnerability was nicknamed “Heartbleed.” This weakness allows hackers to steal information normally protected by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging and some virtual private networks. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content which allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. What is being done? This vulnerability was assigned an identifier of CVE-2014-0160 and was quickly patched by the maintainers of OpenSSL.  That patch was made publicly available and service providers across the globe, including Bluehost, have already patched, tested, and verified all systems are secured. The security of our customers is a top priority. We began addressing this issue immediately upon disclosure and have successfully applied patches to all of our platforms. The likelihood that private information was compromised is very minimal due to the lack of a public exploit at the time of the disclosure. As always, we will continue to work to protect the security of our customers and their data.  Is my server vulnerable? There was a period when anyone relying on OpenSSL was vulnerable. Upon disclosure of the vulnerability, we immediately patched our entire platform. At this time, our servers are not vulnerable and information is secure. Has Bluehost replaced their SSLs? Yes. Upon the disclosure of the vulnerability we immediately reached out to our SSL providers and began the process of having all of our internal and external SSLs reissued. Will the SSL I purchased through Bluehost be updated? Yes.  While the likelihood of exploitation is extremely low, we are working with our SSL providers to reissue all certificates that were purchased through the Bluehost platform.  This process will be both secured and automated, with individual customer contact as/if needed to ensure all certificates are updated. Should I replace the SSL I purchased through a third party service? That is a personal choice. If you feel it’s worth the time, or if you are dealing with sensitive data, then it’s a good idea to have your cert reissued. The likelihood that your private keys were compromised is very minimal due to the lack of a public exploit at the time of the disclosure. However, if you do decide you would like to have your certificate reissued, contact your certificate issuing authority.  Once you have obtained a new private key, certificate, and CA bundle, our Bluehost support team will be happy to assist you.  Alternatively, you are welcome to purchase a new SSL certificate through your control panel and we will handle any similar vulnerabilities in the future on your behalf, without need for your direct involvement. Was my security, password or privacy compromised? There was a period when anyone relying on OpenSSL was vulnerable. Upon disclosure of the vulnerability, we immediately patched our entire platform. The likelihood that your private keys were compromised is minimal due to the lack of a public exploit at the time of the disclosure.  If you are concerned, you are welcome to use our Change Password tool to select a new password.  If you do change your password, consider that this vulnerability existed across the majority of the Internet and password changes should be done anywhere you store sensitive information. To check potential vulnerability on the Bluehost service or with any other provider, use the tool at http://heartbleedcheck.com/. Where can I learn more about Heartbleed? For more details about the Heartbleed bug, please visit heartbleed.com. The post Bluehost Update: The Heartbleed Bug and What You Need To Know appeared first on Official Bluehost Blog.

What is Heartbleed? Is Justhost Vulnerable?

Justhost Blog -

Yesterday, an Internet-wide security threat emerged called the Heartbleed bug. Online security is a topic that we take very seriously and once we learned about this issue we began addressing it immediately and we’ve compiled this list of questions and answers to help you understand the Heartbleed bug, let you know what we’ve done to address it and let you know what you can do to protect your private information. What is the Heartbleed bug? The Heartbleed bug is a serious vulnerability in the popular OpenSSL cryptographic software library used to secure information traffic across much of the Internet. Because the vulnerability itself could leak/bleed information and it involved the Heartbeat function of OpenSSL, the vulnerability was nicknamed “Heartbleed.” This weakness allows hackers to steal information normally protected by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging and some virtual private networks. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content which allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. What is being done? This vulnerability was assigned an identifier of CVE-2014-0160 and was quickly patched by the maintainers of OpenSSL.  That patch was made publicly available and service providers across the globe, including Justhost, have already patched, tested, and verified all systems are secured. The security of our customers is a top priority. We began addressing this issue immediately upon disclosure and have successfully applied patches to all of our platforms. The likelihood that private information was compromised is very minimal due to the lack of a public exploit at the time of the disclosure. As always, we will continue to work to protect the security of our customers and their data. Is my server vulnerable? There was a period when anyone relying on OpenSSL was vulnerable. Upon disclosure of the vulnerability, we immediately patched our entire platform. At this time, our servers are not vulnerable and information is secure. Has Justhost replaced their SSLs? Yes. Upon the disclosure of the vulnerability we immediately reached out to our SSL providers and began the process of having all of our internal and external SSLs reissued. Will the SSL I purchased through Justhost be updated? Yes.  While the likelihood of exploitation is extremely low, we are working with our SSL providers to reissue all certificates that were purchased through the Justhost platform.  This process will be both secured and automated, with individual customer contact as/if needed to ensure all certificates are updated. Should I replace the SSL I purchased through a third party service? That is a personal choice. If you feel it’s worth the time, or if you are dealing with sensitive data, then it’s a good idea to have your cert reissued. The likelihood that your private keys were compromised is very minimal due to the lack of a public exploit at the time of the disclosure. However, if you do decide you would like to have your certificate reissued, contact your certificate issuing authority.  Once you have obtained a new private key, certificate, and CA bundle, our Justhost support team will be happy to assist you.  Alternatively, you are welcome to purchase a new SSL certificate through your control panel and we will handle any similar vulnerabilities in the future on your behalf, without need for your direct involvement. Was my security, password or privacy compromised? There was a period when anyone relying on OpenSSL was vulnerable. Upon disclosure of the vulnerability, we immediately patched our entire platform. The likelihood that your private keys were compromised is minimal due to the lack of a public exploit at the time of the disclosure.  If you are concerned, you are welcome to use our Change Password tool to select a new password.  If you do change your password, consider that this vulnerability existed across the majority of the Internet and password changes should be done anywhere you store sensitive information. To check potential vulnerability on the Justhost service or with any other provider, use the tool at http://heartbleedcheck.com/. Where can I learn more about Heartbleed? For more details about the Heartbleed bug, please visit heartbleed.com.

Video: How to create a Twitter content strategy

The Twitter Small Business Blog -

Last month, we released a video that illustrates how small and medium-sized businesses can unlock measurable business results on Twitter. To help you drive these results, we’ve made a new video to help you master the art of tweeting. To get started, keep in mind that conversations on Twitter are just like the face-to-face encounters you have with customers each day. Strive for an approachable style in your communication, and tweet information that your followers will not only find interesting, but will want to share in turn with their followers. Compelling content will help you establish an ongoing dialogue that can attract new followers and generate sales over time. Create a Tweet calendarA Tweet calendar can be the foundation of your content strategy. As highlighted in our video, your business can create a content calendar to fill with engaging Tweets that spark conversations and meaningful interactions with customers. As you plan new marketing initiatives like seasonal sales or the opening of a new location, add those Tweets to your calendar. To make it easier for you to create your Tweet calendar, we’ve updated our #mktgkickstart tool kit. This free tool kit is filled with ideas for the next four months to get you organized and in the habit of engaging with followers on a consistent basis. We’ve even included sample Tweet templates to help you easily develop your own content. Sign in to Twitter today to start a conversation with your followers, and stay tuned for our next video. We’ll cover how you can build your Twitter community and drive awareness for all of the great content you are creating.

Video: How to create a Twitter content strategy

The Twitter Small Business Blog -

Last month, we released a video that illustrates how small and medium-sized businesses can unlock measurable business results on Twitter. To help you drive these results, we’ve made a new video to help you master the art of tweeting. To get started, keep in mind that conversations on Twitter are just like the face-to-face encounters you have with customers each day. Strive for an approachable style in your communication, and tweet information that your followers will not only find interesting, but will want to share in turn with their followers. Compelling content will help you establish an ongoing dialogue that can attract new followers and generate sales over time. Create a Tweet calendarA Tweet calendar can be the foundation of your content strategy. As highlighted in our video, your business can create a content calendar to fill with engaging Tweets that spark conversations and meaningful interactions with customers. As you plan new marketing initiatives like seasonal sales or the opening of a new location, add those Tweets to your calendar. To make it easier for you to create your Tweet calendar, we’ve updated our #mktgkickstart tool kit. This free tool kit is filled with ideas for the next four months to get you organized and in the habit of engaging with followers on a consistent basis. We’ve even included sample Tweet templates to help you easily develop your own content. Sign in to Twitter today to start a conversation with your followers, and stay tuned for our next video. We’ll cover how you can build your Twitter community and drive awareness for all of the great content you are creating.

Good News: Typepad is Not Vulnerable to the Heartbleed Bug

Everything Typepad -

An encryption flaw called the Heartbleed bug has exposed a collection of popular websites, posing a potential security threat to credit card information and passwords. We want to assure you that Typepad is not one of the websites affected, and your information is safe. The security of our bloggers is a top priority. We were able to confirm that Typepad was not vulnerable to the Heartbleed bug as soon as the bug itself was discovered, and we worked diligently to ensure that none of our bloggers' personal information was compromised. As always, we will continue to work to protect the security of Typepad users and their data. Your Community and Support team is always here to help, so please reach out if you have any lingering concerns about the Heartbleed bug.

Early Access to New Domains from Name.com for the Week of April 9th

Name.com Blog -

The New Domains offer an interesting quandary: you find just the right domain name for your website but it’s not available to the public…yet you don’t want to wait and lose it to another person. That’s why we offer our Early Access Program (EAP) for New Domain names (insert heroic, orchestral music.) You won’t miss out on registering your name because EAP lets you register–and actually use!–various New Domains before the rest of the Internet. Who’s down with the EAP?* When you register a domain during EAP you get to start using your domain name immediately. That means no preordering and no waiting… it’s your name to use the second after you checkout. Also, because you have first dibs on the domain names that you want, the Early Access Program gives you the opportunity to secure even better names than when general availability begins. This week’s Early Access batch is for the New Domains .MARKETING and .HOLIDAY. You can start searching for domains in EAP this week below: Check out the availability dates of other New Domains on our Availability Dates page: *Inspired by the musical stylings of Naughty by Nature.

Getting To Know CSS: Getting Started

Everything Typepad -

Welcome to our special series on getting to know CSS! Every other week, we'll debut a new article full of valuable tips and tricks that will help you to understand how CSS works and how to apply it to your blog. We'll cover everything from the very basics, to fancy tricks, to the best way to find the code you need for your very own blog. Get ready to advance your skill set! Now that we're all HTML experts (thanks to our Back To Basics To HTML series), it's time to move ahead and learn how to apply CSS to what we have built on our blogs.   Today we'll be going over what CSS is, and how and when to use it. What is CSS? CSS stands for Cascading Style Sheets and is used to style the markup language you've created on your site.  CSS gives you more control and flexibility over your layout than what HTML can offer.  HTML provides the foundation and content where CSS will enhance the presentation of the HTML.  It is best to not mix CSS with HTML together which is why a stylesheet is saved separately. Where can I add CSS on my blog? On Typepad for Unlimited users and higher, we've made it easy to add custom CSS to your layout by going to Design > Custom CSS, there is no need to set up Advanced Templates.   Some examples of element changes you can make are fonts, colors, column widths, background images, advanced positions and more. CSS minimizes the amount of coding needed for your site which will save on loading time.  For instance, if you have H2 sized headers throughout your blog but you wish to have them appear as bold, with HTML you will have to insert the bold HTML code <b></b> on every header which can be time consuming and clunky code-wise. With CSS, you can just set up all header elements to appear as bold at once. How is CSS formatted? The written format for CSS code is broken into two areas: the selector, which can be an Element, Class or ID; and then the property and property value. The selector and property info is grouped together within a curly brackets set.   An Element selector specifies HTML tags (e.g. p, img, a), which can be as general as applying to all instances of the tag selected, or can be a child of a specific class or ID p { property: value; } .entry-body p { property: value; } A Class is denoted by a period prefixed to the selector name. Classes are used for items that often appear in multiples (e.g. modules, list items, posts). CSS classes are coded as: .element { property: value; } IDs are used for when you want to specify one section of your layout (e.g. banner, navigation bar) and are denoted by prefixing the selector name with a hash or "#": #element { property: value; } When can I use CSS? CSS comes into play when you want to change or tweak your design and format.  It is not used to add additional content like advertisements and third-party widgets. Need CSS? Yes No Position your Navigation Links or Banner? X   Inserting Javascript?   X Changing the size of your columns? X   Change the font of your blog post titles? X   Add an image as your background? X   Hide post footer links like tags, comments, permalink? X   Add to a blog post or comment?    X Change default post font? X   Add banner to pre-defined theme? X   Add buttons, badges, widgets?    X Ready to level up? You're in luck! Over the course of our Getting to Know CSS series, we will be going over other features and functions of CSS, teaching you about editing and adding elements to your stylesheets, and finding which classes will work best with your specific Typepad theme. Stay tuned!

#Pinspiration Chat: rise and sweat with Happy Fit Mama

Oh, How Pinteresting! -

More of us at Pinterest are embracing Spring with early morning runs and fresh ingredients from the garden to cook healthier recipes. But often, coordinating a workout or planning meals with a packed schedule can be a challenge. It’s why we asked expert blogger behind Happy Fit Mama, mother of twins, and Certified Clinical Exercise Specialist, Angela to help us with our fitness and lifestyle goals for our next Twitter #Pinspiration chat. This week’s theme is all about staying active and healthy eating. Tweet us your #Pinspiration to @Pinterest this Friday, April 11th, between 9-10am PST. Need some ideas on how to stay fit and healthy? Just add the hashtag #Pinspiration to your tweet and ask away. Here’s a few topics to keep your gears in motion: how to start a running routine, maintaining motivation, joining a running group, setting goals for your first marathon, and foods that fuel your body before and after a workout. We sat down with Angela to see how she started her active routine: Hi Angela! Can you share a little bit about yourself and how you started your website, Happy Fit Mama? Hello everyone! My name is Angela and I’m an ACSM Certified Clinical Exercise Specialist living in New Hampshire with my husband, 2 children and chocolate lab, Cooper. I have always had a love of all things running, yoga and healthy living. I started to get serious about running after the birth of my boy/girl twins in 2010. I used training for a half marathon as a way to lose the baby weight but more so for the quiet time to be alone with my thoughts and the road. Since then, I’ve found that running is WAY more than exercise. It’s a way of life. I’ve run numerous half marathons and other races of varying distance. Last year, I ran my first marathon and will be running another in the Fall of 2014. I started my blog, Happy Fit Mama, as a way to connect with like-minded lovers of running and fitness. My family needed a break from hearing me talk nonstop about it! On the blog, I share workouts, life stories of a working mama and healthy recipes from my kitchen. As an experienced marathon runner, tell us about the get-up-and-go-plan you use to accomplish your goals? I love a good training plan. If it’s on paper, I follow it. I try to map out my workout plans for the week so I know what I need to do for mileage in running on any given day. I also make sure to schedule in cross training, strength and yoga sessions throughout the week. Of course, a rest day (or two!) is always in the plan as well. I’m also a firm believer in working out first thing in the morning. There really is nothing that will get in the way of a 5 a.m. workout. No one will schedule a meeting. No one will want to meet up for drinks. There are no after school sports to get to. Get it done and go about your day. Rise and sweat is my motto! How do you use Pinterest in your day-to-day to discover health and fitness inspiration? I use Pinterest all the time for health and fitness inspiration. There are so many fantastic workouts for everybody, no matter where you are in your fitness journey. I especially love the no equipment workouts since I haven’t belonged to a gym in four years. Pinterest is also my go to for healthy recipes. Every Sunday, I meal plan for the week and Pinterest is my first stop for inspiration. On any given week, I’ll make at least 3 recipes I found from Pinterest or that I pinned to one of my boards. Who needs a cookbook these days? Thanks for the advice, Angela! Don’t forget to join us on Twitter this Friday and share your #Pinspiration with the Pinterest team. Also, be sure to check out her blog and Pinterest boards for inspiration. See you Friday morning!

.COFFEE and More New Top-Level Domains Available for Immediate Registration Starting Today

1&1 Online Success Center -

Every week, 1&1 Internet releases more new generic top-level domains (gTLDs) for immediate registration. Starting today, users can register the following new gTLDs: .COFFEE .FLORIST .HOUSE .INTERNATIONAL .SOLAR Business owners have more opportunities than ever to secure a memorable and relevant domain name for their industry. These five new gTLDs join the list of more than 50 domain extensions recently made available. After registering any of the new gTLDs, users can simply link an existing website to the new domain via the 1&1 control panel. .INTERNATIONAL can be registered for just $14.99 for the first year, and .COFFEE, .FLORIST, .HOUSE and .SOLAR can be registered for $19.99. To register your new domain name, visit http://www.1and1.com/new-top-level-domains. Photo Credit: ©iStockphoto.com/derkien

How to Create an Awesome Facebook Cover Photo in 5 Minutes or Less

Post Planner -

Are fans tired of your outdated Facebook cover photo? Does it need a makeover? Let me guess — you’re not a graphic designer, right? Yep, me neither. But today I’m going to show you an awesome FREE tool that ALMOST makes me one. Then let’s see if we can use it to make your next cover photo something special! How to Create an Awesome Facebook Cover Photo in 5 Minutes or Less Start the 5 minute timer… NOW! Start with a goal Before you design your cover photo, set some goals for the final product. What is the purpose of your cover photo? Businesses are using cover photos to enhance their marketing campaigns in various ways. Here are some examples: 17 Wicked Ways to Use Your Facebook Cover Photo I’d suggest using your cover photo to: brand yourself feature benefits of your product build an email list announce Facebook contests provide social proof showcase reviews & customer testimonials Design Process Now that you have a clear idea of how you want to use your cover photo, it’s time to start designing the image. Are you ready? For this example, I’ll create a testimonial cover image for Post Planner. I asked Ravi Shukle to provide a testimonial & photo. Here are the steps: 1. Sign Up Sign up for Canva, finish the tutorial & click Facebook cover. This opens a new tab in your browser. With Canva, you don’t have to worry about dimensions or specifications for a Facebook cover photo. The program does the work for you. >> Click to Tweet << 2. Pick a Template Next, choose a template for your cover photo. I’m using a plain template for this example. And I’ve deleted everything from inside. 3. Find a Background You just need a background image & you’re good to go. Upload whatever image you choose. I’m using the photo Ravi provided. You can use your own photo or choose from Canva’s collection of backgrounds. Some are free while others cost $1. >> Click to Tweet << 4. Fine Tune Your Image You’ve chosen your layout & uploaded your background photo — now click the image you just created. Your photo will look something like the example above. Resize your image by dragging the corners. Here’s what mine looked like when finished: Damn, Ravi! Looking good, my man. Now I’m going to use a text bubble to bring his words to life. Click the image to preview the design. I liked this one: When adding Ravi’s testimonial, Canva makes it easy by automatically resizing the text for me. And voila!… here’s the final product: See how easy that was?! And took all of 5 minutes! I mean, I haven’t even started sipping my coffee. 5. Download & Publish The last step is to click the link & publish. Click “Image” to download your new Facebook cover photo: And you’re done! There is no doubt about it — Canva is the easiest way to design a stunning Facebook cover photo. Imagine if you spent more time exploring everything the FREE tool has to offer! Post Planner partnered with Canva to provide anyone reading this article immediate access to the app & a $10 credit for paid images. Click this link & you’re in:  GET CANVA VIP ACCESS FROM POST PLANNER >> Click to Tweet << FREE Images from Canva Remember those $1 images I told you about earlier? You can get 10 for FREE by participating in this awesome promotion.  So what are you waiting for??! The post How to Create an Awesome Facebook Cover Photo in 5 Minutes or Less appeared first on Post Planner.

15 ways to secure your LAMP based VPS and Dedicated Web Servers

Reseller Club Blog -

The Internet has given us the power to buy goods, make payments etc instantly from the comfort of our own homes. However along with these benefits, there is an underlying cyber security threat at hand. It was recently revealed that more than 360 million stolen credit card accounts were up for sale on the cyber black market. With several similar incidents like this coming to the fore in the past, it is essential to ensure that you keep critical information about your customers’ secure and save yourself millions of dollars in consumer lawsuits. We’ve put together a little guide to help you reduce the risk of your your LAMP based servers from getting hacked. LAMP is one of the most popularly used Application Stacks. It stands for Linux, Apache, PHP and MySQL. Mitigate the risks of your servers being attacked The Apache Web Server is one of the most commonly used Web Servers. However like most other software, it requires appropriate settings, monitoring and maintenance to guard against vulnerabilities.  In this post, we will cover both General guidelines that you can follow to secure your server, as well as certain specific steps that you should address to mitigate the damage caused by such attacks. General Security Guidelines to be followed for securing your Web Server Sign up for updates and announcements from the Web Server Mailing List. Upgrade to the latest version whenever there is an update. Install only the modules you require and disable unnecessary ones. Make sure you log all admin level accesses with date, times and usernames Do not display your server version or OS version in error messages. For Servers with Apache: 1.   Hide the Apache Version number, and other sensitive information It is essential to hide the Apache Version Number your server is running, as well as other sensitive information. You can do this by following the simple steps listed below. Add or Edit the following two directives in your httpd.conf file ServerSignature Off ServerTokens Prod The ServerSignature appears on the bottom of pages generated by apache such as 404 pages, directory listings, etc. The ServerTokens directive is used to determine what Apache will put in the Server HTTP response header. By setting it to Prod it sets the HTTP response header as follows: Server: Apache 2.   Make sure apache is running under its own user account and group When Apache is installed, the default user is set as “nobody”. However if there other applications that also run as the user nobody on your system, then a compromise of apache can also compromise other installations. It is best to add a separate user “apache” and then modify the following directives in httpd.conf to run apache as it own user. User apache Group apache 3.   Ensure that files outside the web root directory are not accessed. It is always good practice to restrict access for files outside the web root directory to maintain security and ensure that these files are only accessed by people who need to access them. <Directory /> Order Deny,Allow Deny from all Options None AllowOverride None </Directory> <Directory /html> Order Allow,Deny Allow from all </Directory> Note that because we set “Options None” and “AllowOverride None “this will turn off all options and overrides for the server. You now have to add them explicitly for each directory that requires an Option or Override. 4.   Turn off directory browsing, Follow symbolic links and CGI execution You can do this with an Options directive inside a Directory tag. If you want to turn off all Options simply use: Options None If you only want to turn off some, separate each option with a space in your Options directive: Options -ExecCGI -FollowSymLinks -Indexes 5.  Install modsecurity ModSecurity is an Apache add on module which can detect and prevent http attacks.  It can come in really handy in preventing SQL injections in case your developers forget to add input validation or identify and block information disclosure issues such as leaking detailed error messages, Social Security Numbers or Credit Card Numbers. Follow these steps to install mod-security On CentOS: yum install mod_security On Ubuntu: apt-get install mod_security. service httpd restart 6.  Disable any unnecessary modules There are several modules that are enabled on your Apache Web Server that you may not need. To search for modules installed run: grep LoadModule httpd.conf Here are some modules that are typically enabled but often not needed: mod_imap mod_include mod_info mod_userdir mod_status mod_cgi mod_autoindex. To disable them add a # sign in front of them. You can also go through the Apache module documentation and disable or enable any that you need. 7.  Lower the Timeout value The default Timeout directive is set to 300 seconds. Decreasing this value help’s mitigating the potential effects of a denial of service attack. Timeout 45 8.  Limit large requests In order to mitigate the effects of a denial of service attack, limit the amount of body that can be sent in an http request.  If you do not have large uploads then you can limit this to 1Mb via the below directive. LimitRequestBody 1048576 Application and Database Security SQL injection is another common way of extracting data from poorly coded websites. Here is how you can prevent it and other such attacks. Ensure your Applications like Joomla, WordPress, Drupal etc are upto date. Subscribe to Bug updates and Vulnerability reports. Try and avoid world writable 777 permissions your files or folders. Regularly check for viruses or infections by scanning your web package. If you are using MySQL or MariaDB run the mysql secure installation script. If your application requires you to store confidential information like username, passwords, credit card data etc. then ensure that all communication is encrypted by using a Digital Certificate. For servers with PHP: 1.  Run PHP as a separate User It is recommended to Install php as a separate user than as an Apache Module. If you install php as an Apache Module then php will run with the apache user permission and any compromise of a vulnerable php script can lead to a server wide compromise. A better way to install php would be with php-fpm a fastcgi process manager which lets you run and manage php scripts as a separate user. 2.  Use the POST method to pass important parameters like credit card information Many developers already know this. PHP has two methods to pass variable information via a form the GET method and the POST method. The most important difference between these methods is that the GET method makes your pass information visible to everyone via a URL while POST method does not. Hence sensitive information like usernames, passwords should always be passed via the POST method. 3.  Always Validate Form and Text Input Cross site scripting and SQL injection can both be prevented if form or file input is validated. Cross site scripting allows a hacker to run malicious code on your server by simply uploading a file with malicious code in it to be run on the server and SQL injection allows a hacker to get access to your database by injecting malicious queries in your form to get database information like table name. A simple way to validate php code can be found at http://www.w3schools.com/php/php_form_validation.asp 4 . Hide the PHP version Open php.ini and add the following Vim /etc/php.ini expose_php = Off 5.Log all php errors to a file and not on the website display_errors = Off log_errors = On error_log = /var/log/httpd/php_error.log For servers with MySQL or MariaDB: 1.      Run MySQL Secure Install After installing MySQL run the mysql_secure_installation script. sudo   /usr/bin/mysql_secure_installation This script will prompt you to add a mysql root password, lock root access to localhost and remove any unwanted databases like the test database. 2.     Secure MySQL users and Database Log into your MySQL Server and ensure that all MySQL users have a password and delete any unwanted user. Grant access to only those databases that the respective users would use. Following the steps detailed above, you can go a long way in ensuring that your customer’s data remains secure.  In the next article I will add detail steps on Linux OS and Firewall Security. Let us know if these techniques were helpful by leaving a comment below

SSL HeartBleed Vulnerability Patched

SiteGround Blog -

As some of you already know, a major vulnerability in some versions of the OpenSSL software libraries was announced two days ago. It got the fancy name “HeartBleed” and in short, allows anyone on the Internet to read the server memory protected by the vulnerable versions of the OpenSSL software and hijack your SSL’s private key. The interesting information is that not all old versions of the software are affected and there are some older and some newer ones that have it. As you should expect from SiteGround, we did not lose any time taking the proper actions under these circumstances and we immediately started patching the vulnerability. On the day the bug was announced, we reviewed how many and which of our servers were affected. Luckily, that weren’t so many servers. As of yesterday, the OpenSSL libraries on those servers are updated to the newest version, which was released with a patch for the HeartBleed vulnerability. However, as we like to be extra cautious, we decided to take some extra steps to guarantee your comfort and security. It turns out that the updated OpenSSL software will not protect you if, for example, your certificate’s private key was already stolen by hackers. We are NOT aware of any such cases on our servers, however, as we take security very seriously, we decided to re-issue with new private keys all certificates that were installed on the servers with previously vulnerable OpenSSL libraries versions. We waited for our SSL provider to confirm that they have also patched their software against the same vulnerability so we could begin the reissuance. That was confirmed today and we have now started reissuing the SSLs. No actions are expected from our customers as the reissuance will be done automatically on a server level and will not affect your website in any way. We will send an email to all customers whose certificates were reissued once we complete the process. Thank you for trusting us on this matter!

Pages

Recommended Content

Subscribe to Complete Hosting Guide aggregator