One of FlokiNET’s core values is freedom of speech. We promote this through our products and services.
However, in the context of the latest global health crisis, it has become more clear that the line must be drawn between what’s acceptable for FlokiNET and what’s not.
Where are the limits? The legal framework surrounding freedom of speech differs by country. While one might have fewer limitations, like the United States, through the First Amendment, other countries might be more restrictive about the expression of speech in certain ways.
Even under the protection of the First Amendment, there are certain categories that are not considered free speech: obscenity, fighting words, defamation (including libel and slander), child pornography, perjury, blackmail, incitement to imminent lawless action, true threats, and solicitations to commit crimes. So certain speech would be illegal under most speech laws.
For us, the guidelines we use when it comes to freedom of speech are dictated by law. More specifically, Icelandic law. The Icelandic constitution protects and aims to be a haven for freedom of speech; however, there are certain limits (for example, hate speech. See the case of Lilliendahl V. Iceland )
Covid and the worldwide pandemic
Since the start of the pandemic, we have often received requests to host websites that spread false information and make unsupported claims such as COVID-19 being a hoax, vaccines not working or endangering people, and so on. As a result, we refused all similar offers or suspended any websites that tried to proceed to create such content without our consent.
As much as we do love free speech, we have the responsibility to host content that doesn’t violate the EU’s best practices in the context of a global pandemic. Every client who signs up with FlokiNET should carefully read our terms and conditions regarding disinformation in order to avoid any misunderstandings and issues.
As the European Union Council cites: “Disinformation is hazardous to your health. While disinformation is always used with destructive or divisive intent, it can turn into a lethal weapon when it concerns public health.” Having this in mind, we have not and will not support any type of content that uses disinformation regarding the global pandemic.
We believe in free speech. We believe in science.
For any questions or suggestions please contact us at firstname.lastname@example.org.
Have you heard about reseller hosting? It is an easy and efficient method of expanding your hosting business.
What is reseller hosting?
Reseller hosting is the process of buying hosting services from a provider and then reselling them to others.
You sell our products under your own brand and prices while counting on us to give professional support, manage the operation’s technical back-end, and lower costs as you grow.
When is reseller hosting a good option?
It’s the perfect kick-start for companies that are just beginning their hosting business venture as it requires no time to create products from scratch. Reseller hosting implies low investment, fixed costs, easy planning, and a variety of features.
This option also offers a wider range of products in different regions and networks, reaching a broader market.
What do you need for it?
A web hosting management platform
A billing system ( for example WHMCS)
A payment system (for example coinpayments.net)
A customer support system
Optional: a registered company, if you don’t want to trade as a private person.
A way of earning extra income
A way to expand your hosting business
Customer support offered by the owner company
Availability for customer support in case it is not offered by the renting company
Reliance on third parties
Is reseller hosting a good option for your hosting business?
For any questions or suggestions please contact us at email@example.com.
Fast, secure and resourceful! This week’s all about dedicated servers! Let’s see if a dedicated server is the right option for you.
What is a dedicated server?
Unlike other services such as Cloud, VPS and shared hosting, a dedicated server is a physically isolated service that does not share computing resources. It is placed in a data center designed for optimal operating conditions and is available to be rented.
In the vast majority of cases, dedicated servers are faster, but that will mostly depend on the specifications of the dedicated server.
When is a dedicated server a good option?
High traffic/bandwidth usage is expected.
Security is very important to you.
You value flexibility (when you need or want higher requirements).
You care about stable performance.
What are the advantages of a dedicated server?
Complete control of the server (including Remote Console through iLO).
The client can choose their own operating system.
All server resources are used for the client’s own purposes.
Improved performance (compared with shared environment).
Faster than other hosting services.
What are the disadvantages of a dedicated server?
Technical skills are required in order to control or monitor the server.
Not recommended to applications that do not require resources.
Recommended mostly to applications that need more stable and larger resources.
Still not sure if dedicated servers are a good choice for you? E-mail us at firstname.lastname@example.org.
Our shared hosting servers are equipped with a Linux distribution named CloudLinux, that improves server stability, density, and security by isolating each tenant and giving them allocated server resources. Some of its main features are:
SecureLinks is a kernel-level technology that prevents all known symbolic link attacks and enhances the security level of the servers even further, preventing malicious users from creating symbolic link files (where an attacker tricks Apache Web server to read some other user’s PHP config files).
CageFS is a virtualized, per-user file system that uniquely encapsulates each customer, preventing users from seeing each other and viewing sensitive information. What CageFS does is that it prevents a large number of attacks, including most privilege escalation and information disclosure attacks. With the help of CageFS, users have the following benefits:
they only have access to safe files.
they cannot see other users and have no way to detect the presence of other users or user names on the server.
they cannot see server configuration files, like Apache config files.
they have a limited view of their own processing file system, and cannot see other users’ processes.
Several highly popular versions of PHP, used in nearly 85% of all PHP sites, are unsupported by the PHP.net community. HardenedPHP secures old and unsupported versions of PHP – 4.4.9, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 7.0, 7.1, 7.2.
HardenedPHP secures old and unsupported versions of PHP. In those old versions, including the widely used 7.2, 7.1, 7.0, and 5.6, vulnerabilities, even if discovered, are not patched by the PHP.net community. HardenedPHP takes care of all this.
The Python Selector allows end-users to select the specific version of Python they need.
Each customer is different, and each has different needs. The Python Selector allows end users to choose the Python version as an application and install additional modules. Python Selector uses mod_passenger to get the best performance from Python applications.
The Ruby Selector allows end-users to select the specific version of Ruby they need.
Each of your customers is different, and each has different needs. The Ruby Selector allows end-users to choose the Ruby version for applications and install additional modules (gems) to the application environment. Ruby Selector uses mod_passenger for optimum performance.
Next on the list of our weekly Web Hosting 101 series is shared hosting.
What is shared hosting?
Shared hosting is a type of web hosting in which a single physical server, a cluster or a cloud hosts multiple websites. The fact that many users access the resources of a server, helps to keep the service at a low cost.
A shared hosting server can host hundreds of user accounts.
Who uses shared hosting?
Shared hosting can be mainly used by blog or small business owners with light or medium traffic on their websites.
This type of hosting is suitable for those mentioned as it does not require advanced configurations or high bandwidth.
Advantages of shared hosting
Because the resources are shared by users, shared hosting is a very cost-effective option.
It is a great option for less experienced people in the web hosting industry.
Easy to keep maintenance.
It is managed professionally.
FlokiNET offers CloudLinux, a feature that will offer server stability, density, and security by isolating each tenant and giving them allocated server resources. To find out more about CloudLinux, stay tuned for tomorrow’s post.
Disadvantages of shared hosting
Sharing resources with other users, which may cause in rare occasions unbalanced performance.
It is less flexible with applications compared to VPS or dedicated servers.
If you suspect your website will receive a considerable amount of traffic, shared hosting might not be a good option for you.
Have you decided yet if shared hosting is a good option for you? Got any questions? Contact us at email@example.com.
Starting last week we decided to launch a series of posts, here and on social media, regarding the basics of web hosting. We understand how confusing it might be, especially for the folks out there with limited technical understanding, to try and figure out what type of hosting they need for their website or what are the advantages and disadvantages.
Today’s topic is… VPS!
What is a VPS?
Short for Virtual Private Server, a VPS could be defined as a space on a server that has the characteristics of an entire server. A virtual hosting server holds it’s personal operating system, applications, resources and configurations, all of these contained in a single powerful server. Each server can have multiple VPS accounts on it.
Who uses VPS?
This type of hosting is generally used by people who have more traffic on their websites and shared hosting doesn’t suit them anymore.
Also useful if you require to host your own services, such as: VoIP, XMPP or other services.
Advantages of VPS
It is a cost-effective option, compared to a dedicated server, for example.
You get to run your own configuration and services that might not work on shared hosting.
Fully managed services.
Good security, since your VPS is separated from other users, located on the same server.
Disadvantages of VPS
Configuring the server requires more technical experience.
Maintenance of services has to be done by yourself.
More expensive than shared hosting.
*A pro tip
Preboot encryption on a VPS is pointless as the RAM that contains your encryption key can be easily read.
If you want increased security we suggest a dedicated server.
So what do you think? Is a VPS the right choice for you?
Our location in Iceland is how we always wanted a hosting location to be. Green energy, free natural cooling and great laws when it comes to privacy. But we always missed one thing that has become so important in the recent years: DDoS protection.
No DDoS protection was available and the setups we did for our customers could only be archived by expensive solutions only large budgets could afford. Not ideal, of course. Then, the following question arose: what if a customer with a small budget would be looking for a green hosting provider while also having privacy and security (like fridaysforfuture.org, for example) ?
As our Iceland location was growing we were searching for options to solve the problem. In the third quarter of 2020 we started to perform tests with filter options of traffic from one of our POPs in Amsterdam to avoid a delay in traffic routing and in the forth quarter we finished all major setups.
We think it should not be a matter of your budget to have DDoS protection. No one should be able to take down your project with a DDoS attack because you lack the resources to fight it.
That is why we include now free DDoS protection at our Iceland location.
With this update, more hardware options are coming. The specifications are the same as in Romania but come with an improved L7 filter (Beta).
Another topic of importance regarding our upgrade in Iceland was the request for hardware at a lower price. While Iceland is, in general, not a low budget location, we wanted to explore options to lower the price for dedicated servers. For this we set up several blade centers so you can now get in Iceland the G7 and G8 blades that we usually offer in Romania.
More security was also one of our goals when the update was thought out. Our KVM network in Iceland is now secured behind a VPN to ensure an extra layer of security and that all data you enter is transmitted securely.
A short FAQ for you:
Q: Do I have to do anything to activate the protection?
A: There is nothing you need to do from your side, our DDoS sensor will detect any attack and filter the traffic before it reaches your server. Please keep in mind that such protection will just cover 99% and you still have to make sure your website and server is optimized to withstand attacks.
Q: Is Layer 7 protection included?
A: Yes, it is included. However, you will have to provide us your one year valid SSL certificate so we can install it into the filter. In our Beta setup, this is no longer required but it is not available yet for all customers.
Q: Can I have a personalized setup with optimized rules for my application?
A: Yes this is possible, please contact our support team for an offer.
Let’s celebrate Safer Internet Day by… staying safe on the Internet! Here’s how you can protect yourself and your data in today’s digital times.
1. Keep your device up to date. Don’t delay updates, install them as soon as possible. Your device is only secured once an update is installed and, if required, the device is restarted. The same for software that you have installed on your device: check regularly if you still need it and if not, remove it; also, it is important to keep in mind that you shouldn’t use software which is no longer updated.
2. Before you buy a device check for how long you will still receive updates. Older devices might not get any new security updates or a low budget provider might not even provide updates at all.
Your device doesn’t support the new version of Windows or Android or iOS? You can still use your old PC by installing Linux which requires less resources than Windows. For example, use Linux Mint on your old laptop and consider exchanging your old hard drive to a SSD.
As for mobile devices, you can install the LineageOS Android Distribution operating system (https://lineageos.org/) on older Android devices to still receive updates.
Use a password manager like KeePass (https://keepass.info) for Windows or KeePass for Linux (https://www.keepassx.org/) so you can create a strong, unguessable password with a single click. Also, remember not to use a password twice.
4. Use two-factor authentication. You can enable on most services two-factor authentication. For example, with the help of a yubikey (a hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services) or by using any software based tool like OTP for Android or SAASPASS for Iphone.
6. Backups. Imagine now, in this moment, that your hard drive breaks. Do you have a backup? Windows, Linux and also Mac have build in backup software to backup your device. You can also use a FlokiNET VPS or dedicated server to install Nextcloud and backup your data in your own secure cloud.
You like Chrome but don’t want to use Google Chrome for privacy reasons? Then move to Brave (https://brave.com) with built in Adblocker (downside: not as strong as Ublock Origin) and Tor browser. For real privacy we suggest to use the Tor browser (https://www.torproject.org/download/).
You can also block ads in your whole network by using Pi-Hole, a Linux advertisement and Internet tracker blocking application (https://pi-hole.net/).
Penetration testing is all about evaluating your application’s security before malicious attackers do.
Understood, but why do I need that?
Well, it sucks to get hacked. Nobody likes losing revenue because somebody leaks your customer data on pastebin.com. Such an attack doesn’t only destroy the trust relationship to your clients but could also lead to serious GDPR fines.
Okay, but how are you testing then?
It depends on your environment, our international team can provide you with:
penetration tests for your online services and internal networks.
Sounds good, but I heard hiring penetration testers is damn expensive?
That’s the reason why we’re doing it differently, you only pay if we find something. Furthermore existing FlokiNET clients get a 10% discount! Better get in touch soon, our capacity is limited! Contact us on firstname.lastname@example.org or create a ticket.