Webhosting 101 – Reseller Hosting

Have you heard about reseller hosting? It is an easy and efficient method of expanding your hosting business.

What is reseller hosting?

Reseller hosting is the process of buying hosting services from a provider and then reselling them to others.

You sell our products under your own brand and prices while counting on us to give professional support, manage the operation’s technical back-end, and lower costs as you grow.

When is reseller hosting a good option?

It’s the perfect kick-start for companies that are just beginning their hosting business venture as it requires no time to create products from scratch. Reseller hosting implies low investment, fixed costs, easy planning, and a variety of features.

This option also offers a wider range of products in different regions and networks, reaching a broader market.

What do you need for it?

  • A website
  • A web hosting management platform
  • A billing system ( for example WHMCS)
  • A payment system (for example coinpayments.net)
  • A customer support system

Optional: a registered company, if you don’t want to trade as a private person.

Plus points

  • Cost-effective
  • A way of earning extra income
  • A way to expand your hosting business
  • Low investment
  • Customer support offered by the owner company

Minus points

  • Availability for customer support in case it is not offered by the renting company
  • Reliance on third parties  
  • Products flexibility

Is reseller hosting a good option for your hosting business?

For any questions or suggestions please contact us at info@flokinet.is.

Webhosting 101 – Dedicated Servers

Fast, secure and resourceful! This week’s all about dedicated servers! Let’s see if a dedicated server is the right option for you.

What is a dedicated server?

Unlike other services such as Cloud, VPS and shared hosting, a dedicated server is a physically isolated service that does not share computing resources. It is placed in a data center designed for optimal operating conditions and is available to be rented.

In the vast majority of cases, dedicated servers are faster, but that will mostly depend on the specifications of the dedicated server.

When is a dedicated server a good option?

  • High traffic/bandwidth usage is expected.
  • Security is very important to you.
  • You value flexibility (when you need or want higher requirements).
  • You care about stable performance.

What are the advantages of a dedicated server?

  • Complete control of the server (including Remote Console through iLO).
  • The client can choose their own operating system.
  • All server resources are used for the client’s own purposes.
  • Improved performance (compared with shared environment).
  • Faster than other hosting services.

What are the disadvantages of a dedicated server?

  • Increased costs.
  • Technical skills are required in order to control or monitor the server.
  • Not recommended to applications that do not require  resources.
  • Recommended mostly to applications that need more stable and larger resources.

Still not sure if dedicated servers are a good choice for you? E-mail us at info@flokinet.is.

CloudLinux – Shared Hosting Done Safe

Heard about CloudLinux?

Our shared hosting servers are equipped with a Linux distribution named CloudLinux, that improves server stability, density, and security by isolating each tenant and giving them allocated server resources. Some of its main features are:

  • Security (SecureLinks)

SecureLinks is a kernel-level technology that prevents all known symbolic link attacks and enhances the security level of the servers even further, preventing malicious users from creating symbolic link files (where an attacker tricks Apache Web server to read some other user’s PHP config files).

Source

  • CageFS

CageFS is a virtualized, per-user file system that uniquely encapsulates each customer, preventing users from seeing each other and viewing sensitive information. What CageFS does is that it prevents a large number of attacks, including most privilege escalation and information disclosure attacks. With the help of CageFS, users have the following benefits:

  • they only have access to safe files.
  • they cannot see other users and have no way to detect the presence of other users or user names on the server.
  • they cannot see server configuration files, like Apache config files.
  • they have a limited view of their own processing file system, and cannot see other users’ processes.

Source

  • HardenedPHP

Several highly popular versions of PHP, used in nearly 85% of all PHP sites, are unsupported by the PHP.net community. HardenedPHP secures old and unsupported versions of PHP – 4.4.9, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 7.0, 7.1, 7.2.

HardenedPHP secures old and unsupported versions of PHP. In those old versions, including the widely used 7.2, 7.1, 7.0, and 5.6, vulnerabilities, even if discovered, are not patched by the PHP.net community. HardenedPHP takes care of all this.

Source

  • Python Selector

The Python Selector allows end-users to select the specific version of Python they need.

Each customer is different, and each has different needs. The Python Selector allows end users to choose the Python version as an application and install additional modules. Python Selector uses mod_passenger to get the best performance from Python applications.

Source

  • Ruby selector

The Ruby Selector allows end-users to select the specific version of Ruby they need.

Each of your customers is different, and each has different needs. The Ruby Selector allows end-users to choose the Ruby version for applications and install additional modules (gems) to the application environment. Ruby Selector uses mod_passenger for optimum performance.

Source

Have any questions about CloudLinux? E-mail us at info@flokinet.is.

Web Hosting 101 – Shared Hosting

Next on the list of our weekly Web Hosting 101 series is shared hosting.

What is shared hosting?

Shared hosting is a type of web hosting in which a single physical server, a cluster or a cloud hosts multiple websites. The fact that many users access the resources of a server, helps to keep the service at a low cost. 

A shared hosting server can host hundreds of user accounts.

Who uses shared hosting?

Shared hosting can be mainly used by blog or small business owners with light or medium traffic on their websites.

This type of hosting is suitable for those mentioned as it does not require advanced configurations or high bandwidth.

Advantages of shared hosting

  • Because the resources are shared by users, shared hosting is a very cost-effective option.
  • It is a great option for less experienced people in the web hosting industry.
  • Easy to keep maintenance.
  • It is managed professionally. 
  • FlokiNET offers CloudLinux, a feature that will offer server stability, density, and security by isolating each tenant and giving them allocated server resources. To find out more about CloudLinux, stay tuned for tomorrow’s post.

Disadvantages of shared hosting

  • Sharing resources with other users, which may cause in rare occasions unbalanced performance.
  • It is less flexible with applications compared to VPS or dedicated servers.
  • If you suspect your website will receive a considerable amount of traffic, shared hosting might not be a good option for you.

Have you decided yet if shared hosting is a good option for you? Got any questions? Contact us at info@flokinet.is.

WEB HOSTING 101

Starting last week we decided to launch a series of posts, here and on social media, regarding the basics of web hosting. We understand how confusing it might be, especially for the folks out there with limited technical understanding, to try and figure out what type of hosting they need for their website or what are the advantages and disadvantages.

Today’s topic is… VPS!

What is a VPS?

Short for Virtual Private Server, a VPS could be defined as a space on a server that has the characteristics of an entire server. A virtual hosting server holds it’s personal operating system, applications, resources and configurations, all of these contained in a single powerful server. Each server can have multiple VPS accounts on it.

Who uses VPS?

This type of hosting is generally used by people who have more traffic on their websites and shared hosting doesn’t suit them anymore. 

Also useful if you require to host your own services, such as: VoIP, XMPP or other services.

Advantages of VPS

It is a cost-effective option, compared to a dedicated server, for example.

You get to run your own configuration and services that might not work on shared hosting.

Fully managed services.

Good security, since your VPS is separated from other users, located on the same server.

Disadvantages of VPS

Configuring the server requires more technical experience.

Maintenance of services has to be done by yourself.

More expensive than shared hosting.

*A pro tip

Preboot encryption on a VPS is pointless as the RAM that contains your encryption key can be easily read.

If you want increased security we suggest a dedicated server.

So what do you think? Is a VPS the right choice for you?

Check out our VPS options at: https://billing.flokinet.is/index.php?rp=/store/virtual-private-server-iceland

A reached NEW STAGE: ICELAND

Our location in Iceland is how we always wanted a hosting location to be. Green energy, free natural cooling and great laws when it comes to privacy. But we always missed one thing that has become so important in the recent years: DDoS protection.

No DDoS protection was available and the setups we did for our customers could only be archived by expensive solutions only large budgets could afford. Not ideal, of course. Then, the following question arose: what if a customer with a small budget would be looking for a green hosting provider while also having privacy and security (like fridaysforfuture.org, for example) ?

As our Iceland location was growing we were searching for options to solve the problem. In the third quarter of 2020 we started to perform tests with filter options of traffic from one of our POPs in Amsterdam to avoid a delay in traffic routing and in the forth quarter we finished all major setups.

We think it should not be a matter of your budget to have DDoS protection. No one should be able to take down your project with a DDoS attack because you lack the resources to fight it.

That is why we include now free DDoS protection at our Iceland location.

With this update, more hardware options are coming. The specifications are the same as in Romania but come with an improved L7 filter (Beta). 

Another topic of importance regarding our upgrade in Iceland was the request for hardware at a lower price. While Iceland is, in general, not a low budget location, we wanted to explore options to lower the price for dedicated servers. For this we set up several blade centers so you can now get in Iceland the G7 and G8 blades that we usually offer in Romania.

More security was also one of our goals when the update was thought out. Our KVM network in Iceland is now secured behind a VPN to ensure an extra layer of security and that all data you enter is transmitted securely.

A short FAQ for you:

Q: Do I have to do anything to activate the protection?

A: There is nothing you need to do from your side, our DDoS sensor will detect any attack and filter the traffic before it reaches your server. Please keep in mind that such protection will just cover 99% and you still have to make sure your website and server is optimized to withstand attacks.

Q: Is Layer 7 protection included?

A: Yes, it is included. However, you will have to provide us your one year valid SSL certificate so we can install it into the filter. In our Beta setup, this is no longer required but it is not available yet for all customers.

Q: Can I have a personalized setup with optimized rules for my application?

A: Yes this is possible, please contact our support team for an offer.

Safer Internet Day

Let’s celebrate Safer Internet Day by… staying safe on the Internet! Here’s how you can protect yourself and your data in today’s digital times. 

1. Keep your device up to date. Don’t delay updates, install them as soon as possible. Your device is only secured once an update is installed and, if required, the device is restarted. The same for software that you have installed on your device: check regularly if you still need it and if not, remove it; also, it is important to keep in mind that you shouldn’t use software which is no longer updated.

2. Before you buy a device check for how long you will still receive updates. Older devices might not get any new security updates or a low budget provider might not even provide updates at all.

Your device doesn’t support the new version of Windows or Android or iOS? You can still use your old PC by installing Linux which requires less resources than Windows. For example, use Linux Mint on your old laptop and consider exchanging your old hard drive to a SSD.

As for mobile devices, you can install the LineageOS Android Distribution operating system (https://lineageos.org/) on older Android devices to still receive updates.

3. Use strong passwords. Many online users still use easy to guess passwords like “123456“,or  „password“ and this could seriously put their data at risk. For references and a laugh, see the following link: (https://www.pcmag.com/news/2020s-most-common-passwords-are-laughably-insecure)

Use a password manager like KeePass (https://keepass.info) for Windows or KeePass for Linux (https://www.keepassx.org/) so you can create a strong, unguessable password with a single click. Also, remember not to use a password twice.

4. Use two-factor authentication. You can enable on most services two-factor authentication. For example, with the help of a yubikey (a hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services) or by using any software based tool like OTP for Android or SAASPASS for Iphone.

5. Check if one of the websites you are using got hacked and your data got leaked online on https://haveibeenpwned.com/

6. Backups. Imagine now, in this moment, that your hard drive breaks. Do you have a backup? Windows, Linux and also Mac have build in backup software to backup your device. You can also use a FlokiNET VPS or dedicated server to install Nextcloud and backup your data in your own secure cloud.

7. Safe browsing. You can use UBlock Origin to block ads in Firefox (https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/) and Chrome based browser (https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en).

You like Chrome but don’t want to use Google Chrome for privacy reasons? Then move to Brave (https://brave.com) with built in Adblocker (downside: not as strong as Ublock Origin) and Tor browser. For real privacy we suggest to use the Tor browser (https://www.torproject.org/download/).

You can also block ads in your whole network by using Pi-Hole, a Linux advertisement and Internet tracker blocking application (https://pi-hole.net/).

8. Hide your identity and IP. Anonymity can protect you and your family from online threats. The Tor browser is a good way to stay anonymous (https://www.torproject.org/download/) or using a VPN like https://vpn.ac which can be easily installed on your router to tunnel all traffic through a VPN. This includes the option to filter ads and malware by DNS blocking (https://vpn.ac/announcements/60/Introducing-new-feature-DNS-filtering.html).

Stay safe on the Internet!

Penetration Testing with FlokiNET

What’s penetration testing?

Penetration testing is all about evaluating your application’s security before malicious attackers do.

Understood, but why do I need that?

Well, it sucks to get hacked. Nobody likes losing revenue because somebody leaks your customer data on pastebin.com. Such an attack doesn’t only destroy the trust relationship to your clients but could also lead to serious GDPR fines.

Okay, but how are you testing then?

It depends on your environment, our international team can provide you with:

Do you’ve a testing methodology?

Yep! Our web application and API penetration tests focus on the OWASP Top 10 and the OWASP Application Security Verification Standard (ASVS), a detailed methodology can be provided on request.

Sounds good, but I heard hiring penetration testers is damn expensive?

That’s the reason why we’re doing it differently, you only pay if we find something. Furthermore existing FlokiNET clients get a 10% discount! Better get in touch soon, our capacity is limited! Contact us on info@flokinet.is or create a ticket.

New look with new services!

As you might have noticed already, we’ve redesigned our website & services! Now we’re not only offering state of the art hosting with great deals but also a lot more:

  • Tor hosting – host your website as a hidden service on the Tor network!
  • Penetration Testing – nobody likes to get hacked, test the security of your online shop, cryptocurrency exchange or company infrastructure!
  • Operational Security Consulting – train your staff to prevent social engineering attacks, install secure communication systems for your company or get your hidden service tested.
  • AutoScan – you’re running a popular CMS like WordPress, Drupal, Joomla? We’ll be running continuous scans to check if you’re vulnerable!
  • Web Design – Tired of looking at your boring website? Let’s build a new one with a fancy responsive design and SEO optimizing!

Don’t forget, you can reach us anytime at info@flokinet.is or open a ticket, if you’ve questions!

 

Bitcoin and other Cryptocurrencies

Bitcoin is a form of digital currency, created and held electronically. No one controls it. Bitcoins aren’t printed, like dollars or euros – they’re produced by people, and increasingly businesses, running computers all around the world, using software that solves mathematical problems.

 

Why i should use Bitcoin?

Bitcoin enables to option to pay fast and secure and without beeing limited by your bank or payment provider. Keep in mind that often payment provider doesent like Freedom of Speech and anonymity and block these kind of services from there network.

Some Payment Provider for example do not allow to pay for anonymous services or block the usage of VPN or Tor. These limits are not existing with Bitcoin.

1. It’s decentralized

The bitcoin network isn’t controlled by one central authority. Every machine that mines bitcoin and processes transactions makes up a part of the network, and the machines work together.

2. It’s easy to set up

Conventional banks make you jump through hoops simply to open a bank account. A Bitcoin Wallet can be created within 1 minute, no papers needed.

3. It’s anonymous

Well, kind of. Users can hold multiple bitcoin addresses, and they aren’t linked to names, addresses, or other personally identifying information. However…

4. It’s completely transparent

…bitcoin stores details of every single transaction that ever happened in the network in a huge version of a general ledger, called the blockchain.

If you have a publicly used bitcoin address, anyone can tell how many bitcoins are stored at that address. They just don’t know that it’s yours.

There are measures that people can take to make their activities more opaque on the bitcoin network, though, such as not using the same bitcoin addresses consistently, and not transferring lots of bitcoin to a single address. You can also use so called Bitcoin Mixer services.

5. Transaction fees are small

Your bank may charge you a 10 Euro fee for transfers.

Bitcoin doesn’t. There is a so called mining fee but this is most not more then a few cents (depending on the size of your transaction)

6. It’s fast

You can send money anywhere and it will arrive minutes later, as soon as the bitcoin network processes the payment.

The Bitcoin.org info page gives a short overview what you need to know.

For a short overview how it works you should look here

 

Wallets

The first thing you need is a wallet. You can get the standard Bitcoin Core or other wallets from the offical bitcoin.org website.

Besides that you can use online wallets:

Blockchain

A overview you can find here and here

Keep in mind that online walllets are never under your full control so you should not store large sums there for a longer time online.

Always backup your wallet in case you use a local Bitcoin wallet!

 

There are also hardware wallets existing, for example:

ledgerwallet.com

trezor.io

Exchanger:

To load your wallet with coins you need to buy them.

We list some exchangers per group so you can easy find a fitting exchanger.  A complete overview you can find here

Europe and US

Bitstamp

Bitcoin.de

Cex.io

BTC-E (also Russia and China)

Coinbase

Kraken

Bitbargain

South America:

mercadobitcoin.com.br

Foxbit

 

How to use Bitcoin anonymously:

We recommend this Blogpost