Cloud Hosting

The Internet of Things: A Cloud Frontier That’s Being Settled Today (Part 2 of 2)

Sam Guiliano July 19, 2016 by under Cloud Hosting 0 Comments

Go to Part 1

  • Let’s Make Some Magic with the IoT (continued)
  • Internet of Things Too Powerful for Cloud?
  • The Ability to Process Data in All its Diversity
  • Different Types of Standards
  • Security in the IoT
  • The Automation of Things
  • Cloud Hosting to Fuel Your IoT Transition

Let’s Make Some Magic with the IoT (continued)

Cloud technology was designed for an Internet of Things world, argues Jamie Carter of TechRadar. The structural approach to computing makes it much easier to achieve interoperability between many different devices and systems, a feature that becomes increasingly complex but nonetheless fundamental as the IoT expands.

Cloud has been growing incredibly as businesses have shifted from entirely Windows environments to Mac and mobile, according to CSID chief innovation officer Adam Tyler. He adds that the technology will become even more prevalent as the Internet of Things continues to build.

Read More


How to Install Plesk on Windows Server 2012

Ariel Beltre July 16, 2016 by under Cloud Hosting 0 Comments
Verified and Tested 7/16/2016

Introduction

Plesk is a commercial web hosting platform released under Plesk Inc. Plesk is a cross-platform control panel compatible with both Windows and Linux operating systems. In this article, we will be going over how to install Plesk on your Windows 2012 server.

Prerequisites

A Server with Windows Server 2012. If you do not have a server already, why not spin up a Windows cloud server from Atlantic.Net in under 30 seconds.

A Plesk license. For more information on purchasing a Plesk license please visit http://www.odin.com/products/plesk-automation/how-to-buy/

Alternatively, you can complete this article with the 14 day trial license.

Read More


How to Use OpenSSH to Connect to Your Linux Server

Angel Leon-Glass July 1, 2016 by under Cloud Hosting 0 Comments

Introduction

This how-to will show how to use the OpenSSH program to connect one Linux server to another via command line. It’s a very simple process that requires little know-how, but can be useful for many projects. Normally, on Windows, you would just use the software PuTTY to connect through SSH, but this isn’t available for Linux devices.

Prerequisites

  • Root/administrative access to your server. If you do not have a server and need one, Atlantic.Net offers reliable cloud hosting options.

Installing OpenSSH

With most versions of Linux, OpenSSH already comes installed for client and server side. To make sure it’s installed on both ends, we will first run an install on both sides. Run the following commands to install the server and client software needed:

Ubuntu/Debian:

sudo apt-get install -y openssh-server openssh-client

CentOS/Fedora (Fedora uses ‘dnf’ now, but will still install with ‘yum’):

sudo yum install -y openssh-server openssh-client

FreeBSD:

sudo pkg install openssh-server openssh-client

ArchLinux:

sudo pacman -S openssh

Once OpenSSH is installed, make sure the service is running. You can check if it’s running with the following:

CentOS/Fedora/FreeBSD/Ubuntu/Debian:

service sshd status

ArchLinux:

systemctl status sshd

Connecting to an External Server

At this point, you’re ready to connect! Normal syntax for connecting with OpenSSH is as follows:

ssh <[email protected] or [email protected]>

Once you connect to your external device, you’ll see the following which is the RSA negotiation between both devices to ensure you’re connecting to the right host:

The authenticity of host '69.28.xx.xx (69.28.xx.xx)' can't be established.
RSA key fingerprint is 75:98:a9:3d:f8:e7:48:bf:05:c9:1b:ea:xx:xx:xx:xx.
Are you sure you want to continue connecting (yes/no)? yes

You can choose to add this RSA key permanently to your SSH configuration so this external host is permanently stored with this key. This is normally seen as fine unless you’ll be modifying the SSH configuration of the external host frequently. This will prevent people with malicious intent from impersonating the server you’re connecting to or from performing ‘man-in-the-middle’ attacks.

Warning: Permanently added '69.28.xx.xx' (RSA) to the list of known hosts.

Afterwards, you will be prompted for the password of the user you logged in as. If you didn’t specify a user, it will automatically log in as ‘root’.

[email protected]'s password:
Last login: Mon Apr 25 06:25:43 2016 from 209.208.xx.xx

Enter the password for your user and you’re good to go!

Thank you for following along with this how to on connecting to your Linux server with OpenSSH. Learn more about our affordable cloud hosting solutions and be sure to check back with us again for updates and further tutorials, like How to SSH to Server via Linux.


The Internet of Things: A Cloud Frontier That’s Being Settled Today (Part 1 of 2)

Sam Guiliano June 22, 2016 by under Cloud Hosting 0 Comments

The cloud and Internet of Things are often referenced in conjunction. The IoT is considered an application of cloud computing by many. While the Internet of Things does require the cloud to operate, its scope and power will have a major impact on how cloud computing develops.

  • Deep Connection between Cloud and IoT
  • Big Data of Things will Empower the Cloud
  • Let’s Make Some Magic with the IoT
  • Harnessing the Internet of Things with Cloud Servers

Deep Connection between Cloud and IoT

Every January, one of the biggest tech events in the country is held in Las Vegas: the Consumer Electronics Show. As expected for the 2016 event, there was an increasing amount of cloud discussion among companies and attendees. The majority of new electronic products, ranging from vehicles to kitchen appliances, are integrated with the cloud. Gradually the technology is becoming more ingrained throughout industry and, in turn, throughout our lives.

Read More


Like Marty McFly, You Can Future-Proof Your Business Using Cloud and Other Tools (Part 2 of 2)

Adnan Raja June 10, 2016 by under Cloud Hosting 0 Comments

<<< Go to Part 1

  • Improve Your Mobile Stance
  • Bring Your IT Abreast of Time
  • Cloud: It’s Not as Ambiguous a Choice as it May Seem
  • Human Future-Proofing
  • Ready for the Future?

Improve Your Mobile Stance

You need your business to be empowered, or you won’t get very far – and in some ways, you won’t even be functional. Just look at Marty McFly. Realizing he didn’t have any plutonium in 1955, he and Doc Brown had to connect a lightning rod to the flux capacitor in order to get back to 1985. For all Marty’s future-proofing, getting his father to win the affection of his mother, the progress he needed was impossible without a new solution for an old time-travel problem.

Just like Marty needed lightning (and hurry to deliver it, Doc Brown!), you need mobile. Yes, of course mobile is hardware rather than a basic resource, but this part of your business is so increasingly important that focusing on it really will fuel your business’s success.

Read More


Like Marty McFly, You Can Future-Proof Your Business Using Cloud and Other Tools (Part 1 of 2)

Adnan Raja June 9, 2016 by under Cloud Hosting 0 Comments

Marty McFly showed us how to future-proof our own lives when we use time machines. Now it’s up to us to future-proof our businesses through cloud and other new technologies.

  • What is “Future-Proofing” a Business?
  • Beyond Tech: Future-Proofing as a Business Ultimatum
  • Looking at the Future More Broadly
  • Updating Your IT
  • Tip #1: Simplify
  • Tip #2: Purchase Assuming that You Will Grow
  • Adopting a Cloud Server to Embrace the Future

What is “Future-Proofing” a Business?

Suffice it to say that Marty McFly ran into some problems in 1955. The character, played by Michael J. Fox, accidentally drew the attention of his mother and distracted her from his father. Before he went Back to the Future, McFly was in danger of overwriting his own existence! The only answer for him was to rapidly future-proof the world of 1955 so that when he returned to 1985, he would still be alive and well.

Read More


The Benefits of Cloud Based Applications: Should I Put My App in the Cloud?

Adnan Raja March 17, 2016 by under Cloud Hosting 0 Comments

More and more companies are migrating their apps to cloud infrastructure-as-a-service providers. Here’s why.

  • Cloud as the New Standard
  • 3 Reasons You’ll Choose Cloud
  • 5 Ways Cloud Saves Money
  • SSD Cloud Hosting

Cloud as the New Standard

According to the 2016 State of the Cloud report, more than nine in ten companies (93%) are using some type of infrastructure-as-a-service – basically, a cloud server hosting provider for at least one of their applications. The vast majority of large companies (82%) use a hybrid cloud, integrating public and private components.

Public cloud is incredibly popular among organizations of all sizes. Seven out of every eight firms (88%) run apps on a public cloud, while well over half (63%) run systems on a private cloud.

These statistics are obviously compelling on their own, but why is this trend toward cloud occurring? Let’s look at three basic reasons and five financial reasons.

Read More


What is DROWN: A Vulnerability That Can Imperil Your Encrypted Traffic

Mason Moody March 3, 2016 by under Cloud Hosting 0 Comments

On 1 March 2016, security researchers announced a new vulnerability exploit involving an old security protocol, SSLv2, that affects up to 33% of web servers. Even web servers that do not allow SSLv2 connections might be vulnerable if the RSA private key used on the server is reused on other servers. And, as seems to be de rigueur for major vulnerabilities nowadays, it comes with a simple and foreboding name: DROWN (which is admittedly much easier to remember and reference than its official designation of CVE-2016-0800).
.

How DROWN Works

DROWN imageDROWN (Decrypting RSA using Obsolete and Weakened eNcryption) requires an attacker only have access or ability to sniff network traffic and the ability to query a vulnerable server.

An example scenario would involve an attacker in a Man in the Middle (MitM) position and able to see a client initiate a TLS connection to a web server to establish a secure HTTPS session. The attacker copies this encrypted session, including the encryption negotiation that starts it. The attacker then takes the initial key negotiation and runs a variant of an old attack on SSLv2 connections known as the Bleichenbacher attack (or, the million message attack) on another server that is willing to use SSLv2 and which uses the same RSA private key as the original server. Because of the way that SSLv2 handles session key generation, this attack could allow an attacker to exploit the weaknesses of SSLv2 (which has been considered obsolete and insecure for almost 20 years now) to gain the keys negotiated over the more secure TLS connection.

The researchers were able to “decrypt a TLS 1.2 handshake using 2048-bit RSA in under 8 hours using Amazon EC2, at a cost of $440.” By exploiting a recently patched (in March 2015) vulnerability in OpenSSL, they duplicated similar results “in one minute on a single CPU”.
.

Am I Affected?

The researchers who discovered this exploitation have an online tool that can let you know if your domain or IP is vulnerable. This tool presents positive results culled from scans they performed over February 2016, so it doesn’t represent real-time data. If you’ve recently updated your OpenSSL version or recently made changes that could address vulnerability to DROWN, you could use the scanner utility they have put together to help you verify your exposure.
.

Mitigating Exposure to DROWN

Since SSLv2 is the primary vector for this attack, removing that protocol as an option during any secure connection negotiation is the first step. Consult with the documentation for your applications that use SSL/TLS for the specific configuration settings that disable SSLv2 (and SSLv3, for that matter). Affected applications can include web servers (Apache, Nginx, etc.), mail servers (Postfix, e.g.), and any connection-oriented services, especially anything using the OpenSSL library.

In addition, OpenSSL users should upgrade their OpenSSL to version 1.0.2g or 1.0.1s, depending on whether you are using version 1.0.2 or 1.0.1, respectively. Some earlier versions of OpenSSL may still allow for exploitation of this attack via the use of weak export ciphers even if they are explicitly disabled, so where possible, upgrade is your best option–these versions also contain patches that address other vulnerabilities unrelated to DROWN.

Finally, a more reliable fix would be to use a unique private key on each server that needs to run TLS. With certain certificates, particularly OV and EV certificates, this option does incur additional cost and may be viable to all deployments or situations.
.
.


How to Enable MySQLi in cPanel/WHM with EasyApache 3

Jason Mazzota January 25, 2016 by under Cloud Hosting 0 Comments
Verified and Tested 1/11/16

Introduction

In this tutorial we will walk you through enabling MySQLi in cPanel/WHM by using EasyApache. MySQLi is an extension used for PHP coding so PHP can interface directly to MySQL.

Prerequisites

A server with cPanel/WHM installed and using EasyApache 3.  If you do not have a server and need one, Atlantic.Net offers reliable cloud server hosting options.

Note: EasyApache 4 is still listed as a Technology Preview. Because of this, not all features or security updates are available should you replace the EasyApache 3. It is not recommended that you enable EasyApache 4 at this time.

Enabling MySQLi in cPanel/WHM with EasyApache 3

Installing the MySQLi extension is a simple process in cPanel/WHM. The first thing you will want to do is log into WHM and in WHM’s search bar, enter “EasyApache.” From here you will need to select EasyApache 3. If you do not have the latest cPanel/WHM update, your option may just say “EasyApache.”

Read More


What is the cPanel TSR-2016-0001 Announcement?

Atlantic.Net NOC January 21, 2016 by under Cloud Hosting 0 Comments

Introduction

On January 18th, 2016, cPanel announced a patch to address security concerns with cPanel and WHM (TSR-2016-0001).  This patch addresses 20 vulnerabilities in cPanel & WHM cloud hosting software versions 11.54, 11.52, 11.50, and 11.48.

cPanel has rated these updates as having CVSSv2 scores ranging from 2.1 to 10.0.  Security level definitions can be located here.

At this time, additional information regarding the security vulnerabilities has not been made available.  This information is currently set to be released on January 25th, 2016.  You can check the cPanel Announcement page here for updates.

So what does this mean?

cPanel is suggesting that all cPanel/WHM servers that are not set to automatically update perform manual updates to the policies.  This will fix the vulnerabilities before they become an issue.

The Fix for the cPanel TSR-2016-0001 Announcement

Start by logging into your WHM management page.  In the options on the left, almost all the way at the bottom is a section named “cPanel” and under that section is “Upgrade to Latest Version”.  By clicking on Upgrade… option, it will take you to a page allowing our to “Click to Upgrade.”

cpanelupdate

After clicking on the blue “Click to Upgrade” button, an installation window will appear and run.  This may take a few minutes, but be assured that the process is running.  Once this is completed, the completion bar will state 100%, and the text box will turn green.  This means all your cPanel accounts have been updated to the current version and are safe from the potential vulnerabilities.

cpanelupdate2


New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Ashburn, VA

1807 Michael Faraday Ct,

Reston, VA 20190

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Resources

We use cookies for advertising, social media and analytics purposes. Read about how we use cookies in our updated Privacy Policy. If you continue to use this site, you consent to our use of cookies and our Privacy Policy.