<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ScarabWeb Blog &#187; Cloud</title>
	<atom:link href="https://scarabweb.com/blog/category/cloud/feed/" rel="self" type="application/rss+xml" />
	<link>https://scarabweb.com/blog</link>
	<description>Just another WordPress site</description>
	<lastBuildDate>Mon, 30 Mar 2015 14:54:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Hacking, Phishing and Malware</title>
		<link>https://scarabweb.com/blog/2015/03/hacking-phishing-and-malware/</link>
		<comments>https://scarabweb.com/blog/2015/03/hacking-phishing-and-malware/#comments</comments>
		<pubDate>Sat, 14 Mar 2015 04:22:53 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Dedicated Servers]]></category>
		<category><![CDATA[Webhosting]]></category>

		<guid isPermaLink="false">http://scarabweb.com/blog/?p=83</guid>
		<description><![CDATA[Nowadays developing internet world we have to learn more about some of the most common security risks, including hacking, phishing and malware and how to protect your sites and servers. Thankfully, many of these hazards can be avoided by making &#8230; <a href="https://scarabweb.com/blog/2015/03/hacking-phishing-and-malware/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://scarabweb.com/blog/wp-content/uploads/2015/03/Hacking_Phishing_and_Malware-e1426479443103.png"><img class="size-medium wp-image-84 alignright" alt="Hacking_Phishing_and_Malware" src="http://scarabweb.com/blog/wp-content/uploads/2015/03/Hacking_Phishing_and_Malware-e1426479443103-300x200.png" width="400" height="300" /></a></p>
<p>Nowadays developing internet world we have to learn more about some of the most common security risks, including hacking, phishing and malware and how to protect your sites and servers. Thankfully, many of these hazards can be avoided by making yourself aware of the threats.</p>
<p><strong>Hacking</strong>. Someone from another location breaks into your computer remotely to cause damage or steal information. Often this will include the hacker obtaining your personal information or turning your computer into a “zombie” to further their needs. Different hacking techniques include vulnerability scanners, password cracking, packet sniffers, rootkit, trojan horses, and key loggers.</p>
<p><strong>Phishing</strong>. When a website is made to look like another website for the purpose of gathering personal information from a user. Phishing usually involves fake emails that appear to come from legitimate enterprises, such as your bank or credit union. These emails contain URLs that link to malicious web pages and will ask you to enter in private information, like passwords, bank account information, or credit card numbers. Attackers can then use the entered information to steal your (or your customers’) identity.</p>
<p><strong>Malware</strong> is software designed to infiltrate or damage a computer system without the owner&#8217;s informed consent. Its only there to break stuff. There are several types of malware, including computer viruses, worm viruses, spyware, adware, scareware and crimeware. To spread Malware, perpetrators can create malicious websites of their own, exploit a vulnerability in the applications a website relies on or exploit a vulnerability on the web server or its configuration.<br />
Malware is often download from an email attachment or from a suspicious website. However, malware can also infect servers and upload malicious code or web pages that deliver malware to the site’s visitors.</p>
<p>There are <strong>a few key practices</strong> that can greatly increase your protection from the majority of instances. To protect your sites and servers you should choose strong passwords that can’t be easily guess by computer programs. Additionally, keeping websites up to date with security patches is one of the most important means of protection. Companies often publish patches or security updates that are built to prevent these types of attacks.</p>
]]></content:encoded>
			<wfw:commentRss>https://scarabweb.com/blog/2015/03/hacking-phishing-and-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Which hosting type am I  (Cloud)</title>
		<link>https://scarabweb.com/blog/2015/02/which-hosting-type-am-i-cloud/</link>
		<comments>https://scarabweb.com/blog/2015/02/which-hosting-type-am-i-cloud/#comments</comments>
		<pubDate>Mon, 23 Feb 2015 15:41:13 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Cloud]]></category>

		<guid isPermaLink="false">http://scarabweb.com/blog/?p=53</guid>
		<description><![CDATA[Cloud Hosting is an innovative technology that is revolutionizing the way we do computing. The key concept of cloud is that you don&#8217;t buy the hardware, or even the software, with help of cloud hosting you make your investment smaller &#8230; <a href="https://scarabweb.com/blog/2015/02/which-hosting-type-am-i-cloud/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p style="padding-left: 40px;"><img class="size-medium wp-image-54 alignleft" alt="^4BD4611F8EB461CB8F41543DDF32F85B2D0EB10DC3D70A74DD^pimgpsh_fullsize_distr" src="http://scarabweb.com/blog/wp-content/uploads/2015/02/^4BD4611F8EB461CB8F41543DDF32F85B2D0EB10DC3D70A74DD^pimgpsh_fullsize_distr-300x168.jpg" width="350" height="180" /></p>
<p style="padding-left: 40px; text-align: justify;"><strong>Cloud Hosting</strong> is an innovative technology that is revolutionizing the way we do computing. The key concept of cloud is that you don&#8217;t buy the hardware, or even the software, with help of cloud hosting you make your investment smaller and oriented to operations rather than to assets acquisition.</p>
<p style="padding-left: 40px; text-align: justify;"><strong>Cloud can serve your needs to many different models, the important ones are:</strong></p>
<p style="padding-left: 40px; text-align: justify;">1) <em><strong>Software as a Service</strong></em> (when you don&#8217;t need an entire data center or infrastructure or even your own server you might just need an application to perform a basic task like email, real-time chat, shared document writing, or social networking);</p>
<p style="padding-left: 40px; text-align: justify;">2) <em><strong>Platform as a Service</strong></em> (is a foundation upon which you build your own application. Forget about hardware concerns, low-level configuration, firewalls, backups, and such.The only thing you have to worry about here is the application itself);</p>
<p style="padding-left: 40px; text-align: justify;">3) <em><strong>Infrastructure as a Service</strong></em> (you outsource the hardware completely and build everything from scratch, it is just a combination of computing power and cloud storage made available to you according to precisely how much of each you need).</p>
<p style="padding-left: 40px; text-align: justify;"><strong>The pros to use Cloud Hosting. </strong></p>
<p style="padding-left: 40px; text-align: justify;">First of all, it frees you up to focus on what really matters: your innovative applications, your valuable users, and your crucial content without spending any time or energy on all the necessary infrastructure behind all of that.<br />
Secondly, you can shift investments away from expensive and potentially risky capital expenditures to safer and more focused operational expenditures, where your money pays only for what you absolutely need.<br />
Lastly, you will sleep easy knowing that all your data is safe in the cloud, housed and backed-up securely inside redundant systems, meaning they are virtually disaster-proof.</p>
]]></content:encoded>
			<wfw:commentRss>https://scarabweb.com/blog/2015/02/which-hosting-type-am-i-cloud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
