Since 2004 there have been only 22 common generic top-level domains (gTLDs) for use on the Internet. One of the side effects of this is the proliferation of startups with weird mishmashes of letters for names. In the coming months, there will be over 1000 new gTLDs made available to the public. Over 100 are already out there, including .wiki, .support and even .ninja.
gTLDs are issued by ICANN after an application process, and once approved they are added to what’s called the global DNS. In 2012, ICANN closed the application process on new gTLDs to add to that pool. You can see the list of what’s been issued and how many domains have been bought here.
As a responsible web hosting provider, we need to prepare for anything that might break or change as a result of the new gTLD process. And indeed, there’s an issue that might cause things to break as a result of new gTLDs being issued. It’s called “domain collision.” Read more
Have you upgraded into a “professional” hosting package only to find that your new VPS lacks the performance you were promised?
Lackluster server performance has been a thorn in the side of VPS hosting customers for some time. Many buyers have learned to pay attention to server specs — getting as much RAM, as many CPU cores and as much disk space as possible for their money. But others have realized that spec shopping alone won’t guarantee performance.
But why not? Why can’t VPS customers simply buy a server with more RAM, CPU and disk and trust that they will get the boost in server performance they require?
The problem most often comes down to something called the “noisy neighbor.” Read more
Ensuring application Quality of Service (QoS) is an essential part of hosting in the cloud. Legacy spinning disk storage is not designed to handle the performance variability of multi-tenant cloud workloads. Many cloud hosting providers have made the switch from mechanical spinning disks to a full flash-based solid-state drive (SSD) architecture.
SSD offers much faster read/writes (IO per second, or IOPS) than legacy spinning disks, but those speeds can only take cloud server hardware to a certain level of performance. Guaranteeing a predictable cloud hosting experience requires a storage architecture built for it from the beginning, starting with three key components: Read more
Editor’s note: Tech Bench Advanced Topics posts assume a level of knowledge that some readers may not yet have attained. If you have any questions, don’t hesitate to open a ticket in your customer portal.
Protecting directories using .htaccess is typically a straight-forward and painless process. Create a .htpasswd file, set up some authentication rules in .htaccess and you’re good to go!
But what happens when you want to password protect sub-directories on a site that uses a CMS such as WordPress, and all of a sudden, every time you try to access your password protected sub-directories, you get a 404 Error? Don’t worry, the solution to this problem is much easier than you may think. Read more
Frankly, as some of you read this you might be wondering why we didn’t post this article last October. Well, last October the blog was chock full of great content on how to speed up your website, how to install Minecraft on a VPS, how to troubleshoot RAM usage, our free RAM upgrade and much more.
A simple message on updating your WordPress software didn’t seem to warrant a blog post. But it turns out that a lot of WordPress users still have not updated their software to 3.7 (and now to 3.8). Here’s why you should.
We’ve talked before about the importance of keeping your server software up to date as an essential part of server/software security. Software updates frequently deal with vulnerabilities and bugs that let those with less than honorable intentions break into your server. This is true of all software, but with WordPress being one of the most popular CMSes out there, keeping your software up to date is extra important. The more widespread the software, the larger the incentive for bad actors to find an exploit. Read more
New Relic is a resource monitoring tool gaining popularity in the hosting community. It is not uncommon for our customers to ask for help installing this software. In my last article, I explained how to install New Relic’s application performance monitoring. In this post, we’ll look at installing their server performance monitoring.
New Relic has a free tier for their service. A free account allows you to monitor cpu, memory, disk, and network traffic for your server. The following directions will guide you through the installation of New Relic on a CentOS server. Other Linux OS servers will be similar, but not exactly the same. Please note that these directions require you to log in to your server on the command line and execute commands as root. Read more
Accessing SSH for the first time can be fairly daunting, but it doesn’t have to be. Command line access via SSH is the single most powerful tool you have for administering your server. Not only can you do everything on the command line of your linux server if you wish, there are certain tasks you can only accomplish through SSH command line access.
After learning how to check for permissions to access SSH, configure a client and log in to your server via SSH in part 1 of our SSH Basics series, you’re ready to execute your first commands. Let’s dive right in.
A user’s guide to SSH Read more
In a previous article, SSH Key Authentication, I explained how to generate an SSH key so you could automatically log into your server instead of using a password. This is convenient for you (no more typing the password) and very inconvenient for potential hackers. If you turn off password authentication (because you’ll no longer need it), no amount of password guessing will let a hacker in.
The previous article showed you how to add the key to your cPanel server, but what if you’re not running cPanel? Don’t worry, the process is just as easy for no-panel servers. I’ll show you how.
Adding the Key Read more
A great way to keep potential threats at bay and make your server more secure is to employ TCP Wrappers. TCP Wrappers are a form of access control you can use – in conjunction with a firewall – to lock out unwanted users and increase your server security.
TCP Wrappers are similar to a firewall, in that you can allow and deny IPs or hosts, but different as they provide some additional options as well. TCP Wrappers use access rules in the hosts.allow file to allow or deny connections to network services that use the tcp_wrappers library, libwrap.
For example, you may want to allow someone access to FTP files to your server, but not want to allow them SSH, WHM, or any other kind of access. TCP Wrappers allow you to grant them access to FTP, or another specific feature, while denying them access to everything else. Read more
So you want to build your own Minecraft server? Minecraft can be a pretty easy game to set up on a VPS. It just requires a few quick commands before you’re on your way to survival/adventure/creativity!
Note: This guide is specific to CentOS cPanel servers, but can be followed for a non-cPanel server as well. Also, this tutorial assumes you are familiar with working on the command line on your server via SSH. If you’re not, you might want to check out this article first to get your feet wet.
Also note: This tutorial does not include purchasing and installing the Minecraft stand-alone launcher. If you are new to Minecraft, download the launcher here to connect to your Minecraft server installation.
Without further ado, here are the steps to install Minecraft on a cPanel VPS: Read more