Saturday, June 28, 2008
The Benefits of Multiple Domain Web Hosting
What's soooooo important inside that network?
Hackers also use a technique known as social engineering. They may call up a network administrator, pose as a confused network user and claim that they lost his or her password. This works way too often and many times is the first thing that hackers try.
TROJAN HORSES
The war between the Achaeans and the Trojans continued for 10 long years. After the death of Achilles (known as the greatest warrior among the Greeks), the Achaeans constructed a wooden horse and filled it with warriors and brought it into the city of Troy. Once inside, the warriors exploded from the wooden horse and destroyed the city; or so the legend goes. A trojan horse in computer terms means essentially the same thing, a seemingly harmless computer program infiltrates the computer system, while malicious routines are being executed behind the scenes. One of the first trojan horses was a program that impersonated a login box. Once the user enters his or her password, they are saved in a location that the hacker has access to.
This type of trojan horse is commonly installed on library computers, or an otherwise public computing environment. Trojan horses are often more disguised than a simple login prompt. Windows and Linux system commands, for example, are susceptible to manipulation. Without getting into technicalities, the windows command edit can be compromised and instructed to launch a malignant batch file behind the scenes, deleting or even adding user accounts with administrator privileges. Remember that a trojan horse is an executable file, which can be recognized with the .exe, .vbs, .com, etc extensions. A trojan horse sent through e-mail can often be found by noticing an extension like .txt.vbs.
PACKET SNIFFERS
Network data travels through network media in variable sized packets. These packets, of course, are never seen in their raw form, as a series of network protocol rules convert such packets to data that applications can interpret and display. However, before data packet arrives at the recipient's computer, the packet can be snatched out of the media by packet sniffing software. Because such utilities, like Telnet or SNMP, were designed to send passwords over network media in plaintext, or unencrypted form, passwords can be easily compromised using this method.
Note that packet sniffers are capturing utilities, and cannot be used to actually modify any of the seized data packets. Sniffers can capture data within multiple protocols, like IP (Internet Protocol), UDP (User Datagram Protocol) and TCP (Transmission Control Protocol), allowing a single application to function well within a wide array of computing environments. Passwords are not the only way hackers gain access to networks. Next, we will take a look at buffer overflows, and what it provides to hackers
3 Important factors you must consider before choosing your web hosting provider!
- Bandwidth: (data transfer) is measured in gigabytes. A gigabyte is one billion bytes. Each letter is one byte. Images can take up a big amount of kilobytes (thousands of bytes), and file downloads can be several megabytes (millions of bytes) in size. You must logically think of how much bandwidth your website will need. Unless your website has a lot of downloads, it will be unlikely that you will need many gigabytes of transfer - 10 gigabytes should be very enough. Any more, and you will just be paying extra for something to use. On that note though, you should be careful and make sure you always have some extra bandwidth - many hosting providers charge $3.00 and more for every extra gigabyte of bandwidth you use. That can add up very quickly.
- # Of hosted domains allowed: One of the most important factors which must be taken into account when choosing your hosting provider is the number of websites that allow you to host on a single account, some hosting companies allow only for one domain per account, some other companies will allow you to host an unlimited websites per one account, meanning several aebsites at the expense of one. If you are serious about your business on the Internet then you must be aware of the fact that you will sooner or later will need to launch more websites to expand your business to high levels. Therefore it is important to take this point into consideration where you will remove the burden of purchasing additional webhosting accounts to host the new websites in the future.
- Control Panel: Before you buy a web hosting plan, ask the hosting company show you a demo for the control panel from which you will administrate your hosting account. Control panel is the place where you can check your website visitor statistics, add or erase email accounts, host additional domains on your account, install scripts and make other nominal changes for your website. Control panel should be easy to use with friendly interface and you should take some time to understand what it is all about before purchasing your hosting plan