<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ScarabWeb Blog &#187; Dedicated Servers</title>
	<atom:link href="https://scarabweb.com/blog/category/dedicated-servers/feed/" rel="self" type="application/rss+xml" />
	<link>https://scarabweb.com/blog</link>
	<description>Just another WordPress site</description>
	<lastBuildDate>Mon, 30 Mar 2015 14:54:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Hacking, Phishing and Malware</title>
		<link>https://scarabweb.com/blog/2015/03/hacking-phishing-and-malware/</link>
		<comments>https://scarabweb.com/blog/2015/03/hacking-phishing-and-malware/#comments</comments>
		<pubDate>Sat, 14 Mar 2015 04:22:53 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Dedicated Servers]]></category>
		<category><![CDATA[Webhosting]]></category>

		<guid isPermaLink="false">http://scarabweb.com/blog/?p=83</guid>
		<description><![CDATA[Nowadays developing internet world we have to learn more about some of the most common security risks, including hacking, phishing and malware and how to protect your sites and servers. Thankfully, many of these hazards can be avoided by making &#8230; <a href="https://scarabweb.com/blog/2015/03/hacking-phishing-and-malware/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://scarabweb.com/blog/wp-content/uploads/2015/03/Hacking_Phishing_and_Malware-e1426479443103.png"><img class="size-medium wp-image-84 alignright" alt="Hacking_Phishing_and_Malware" src="http://scarabweb.com/blog/wp-content/uploads/2015/03/Hacking_Phishing_and_Malware-e1426479443103-300x200.png" width="400" height="300" /></a></p>
<p>Nowadays developing internet world we have to learn more about some of the most common security risks, including hacking, phishing and malware and how to protect your sites and servers. Thankfully, many of these hazards can be avoided by making yourself aware of the threats.</p>
<p><strong>Hacking</strong>. Someone from another location breaks into your computer remotely to cause damage or steal information. Often this will include the hacker obtaining your personal information or turning your computer into a “zombie” to further their needs. Different hacking techniques include vulnerability scanners, password cracking, packet sniffers, rootkit, trojan horses, and key loggers.</p>
<p><strong>Phishing</strong>. When a website is made to look like another website for the purpose of gathering personal information from a user. Phishing usually involves fake emails that appear to come from legitimate enterprises, such as your bank or credit union. These emails contain URLs that link to malicious web pages and will ask you to enter in private information, like passwords, bank account information, or credit card numbers. Attackers can then use the entered information to steal your (or your customers’) identity.</p>
<p><strong>Malware</strong> is software designed to infiltrate or damage a computer system without the owner&#8217;s informed consent. Its only there to break stuff. There are several types of malware, including computer viruses, worm viruses, spyware, adware, scareware and crimeware. To spread Malware, perpetrators can create malicious websites of their own, exploit a vulnerability in the applications a website relies on or exploit a vulnerability on the web server or its configuration.<br />
Malware is often download from an email attachment or from a suspicious website. However, malware can also infect servers and upload malicious code or web pages that deliver malware to the site’s visitors.</p>
<p>There are <strong>a few key practices</strong> that can greatly increase your protection from the majority of instances. To protect your sites and servers you should choose strong passwords that can’t be easily guess by computer programs. Additionally, keeping websites up to date with security patches is one of the most important means of protection. Companies often publish patches or security updates that are built to prevent these types of attacks.</p>
]]></content:encoded>
			<wfw:commentRss>https://scarabweb.com/blog/2015/03/hacking-phishing-and-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to effectively manage your server?</title>
		<link>https://scarabweb.com/blog/2015/02/how-to-effectively-manage-your-server/</link>
		<comments>https://scarabweb.com/blog/2015/02/how-to-effectively-manage-your-server/#comments</comments>
		<pubDate>Fri, 20 Feb 2015 10:31:09 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Dedicated Servers]]></category>

		<guid isPermaLink="false">http://scarabweb.com/blog/?p=34</guid>
		<description><![CDATA[If you decide to purchase a dedicated server you need to manage it really effectively not to miss out on some of the most important benefits. In some cases, poor management results in security loopholes that cost businesses and individuals huge &#8230; <a href="https://scarabweb.com/blog/2015/02/how-to-effectively-manage-your-server/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify; padding-left: 60px;"><a href="http://scarabweb.com/blog/wp-content/uploads/2015/02/Howtoeffectivelymanageyourserver.jpg"><img class="alignnone size-medium wp-image-38" alt="Howtoeffectivelymanageyourserver" src="http://scarabweb.com/blog/wp-content/uploads/2015/02/Howtoeffectivelymanageyourserver-300x168.jpg" width="300" height="168" /></a></p>
<p style="text-align: justify; padding-left: 60px;">If you decide to purchase a dedicated server you need to manage it really effectively not to miss out on some of the most important benefits. In some cases, poor management results in security loopholes that cost businesses and individuals huge amounts of time and money. By keeping a few basic tips in mind, you can effectively manage your dedicated server and make the most of it at all times.<br />
Scarabweb Company offers 3 types of OS to install on dedicated server. No matter whether you buy Linux OS, Windows OS or Virtualization OS you need to be familiar with the most effective tools for managing your dedicated server, you will be able to avoid the most common pitfalls.</p>
<h3 style="padding-left: 60px;"><strong>Monitor your server.</strong></h3>
<p style="padding-left: 60px;">First of all you need monitor your server. Effective monitoring can help you avoid a variety of serious issues. For Windows OS we have Task Manager or Event Viewer tool,  for Linux OS – Top command. It can be used to verify and monitor the performance of many server resources, including things like CPU and memory usage, cache size, buffer size, commands and much more. It’s also a good tools for monitoring and managing users because it lets you see the processes and applications that they’re using and gives you the ability to disconnect users when needed. This is a far more practical and effective way to monitor your server.</p>
<h3 style="padding-left: 60px;"><strong>Manage processes and services.</strong></h3>
<p style="padding-left: 60px;">Second tip is you should manage processes and services while monitoring your server. Different tools can be used to stay on top of various processes to ensure of easier detecting any problems and could be addressed promptly.</p>
<h3 style="padding-left: 60px;"><strong>Manage remotely.</strong></h3>
<p style="padding-left: 60px;">Thirdly, to prevent unauthorized access to your server you need to implement a change management processes and manage remotely.  There are many remote connection tools as Remote Desktop Connection tool, SSH connection or other which could warn your dedicated server to be vulnerable to attack. Try a few different options to pinpoint the one that’s right for you. By having the ability to access your server remotely, you will be better able to manage and monitor it.</p>
<h3 style="padding-left: 60px;"><strong> Set up a firewall.</strong></h3>
<p style="padding-left: 60px;">To protect your dedicated server you also need to set up a firewall and configure it properly. It will help to prevent unknown users from accessing the server so that the server can only be accessed by trusted IP addresses. You can also choose an external firewall from various vendors like Cisco, Juniper, Watchguard, etc. Continually stay on top of the latest technologies to ensure that you have the best tools at your disposal.</p>
<p style="padding-left: 60px;">
]]></content:encoded>
			<wfw:commentRss>https://scarabweb.com/blog/2015/02/how-to-effectively-manage-your-server/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to best manage your own dedicated server?</title>
		<link>https://scarabweb.com/blog/2015/02/how-to-best-manage-your-own-dedicated-serve/</link>
		<comments>https://scarabweb.com/blog/2015/02/how-to-best-manage-your-own-dedicated-serve/#comments</comments>
		<pubDate>Tue, 17 Feb 2015 17:19:47 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Dedicated Servers]]></category>
		<category><![CDATA[Latest News]]></category>

		<guid isPermaLink="false">http://scarabweb.com/blog/?p=16</guid>
		<description><![CDATA[Rapid development and implementation of new technologies in the world provides society with a wide range of opportunities for running different business ideas. This is why it’s very important to consider the basis needed for that in details. Widespread of e-commerce allows &#8230; <a href="https://scarabweb.com/blog/2015/02/how-to-best-manage-your-own-dedicated-serve/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Rapid development and implementation of new<img class="alignright size-medium wp-image-29" style="font-size: 12px;" alt="ManageServer-IMG" src="http://scarabweb.com/blog/wp-content/uploads/2015/02/ManageServer-IMG-300x168.jpg" width="350" height="180" /> technologies in the world provides society with a wide range of opportunities for running different business ideas. This is why <strong>it’s very important to consider the basis</strong> needed for that <strong>in details</strong>. Widespread of e-commerce allows thinking about a place for hosting company’s resources. A purchase of a dedicated server becomes an attractive solution in such terms, especially when traffic associated with the business has risen sharply and downloading data takes too much time. But the purchase itself is just an initial step in such a delicate matter as the more important question of what is the best way to manage this dedicated server.</p>
<p>Choosing between <strong>managed or unmanaged dedicated server</strong> is an important step to evaluate own capabilities to manage it personally or trust with a qualified team in this question. Most of people might say it’d be better to go with an unmanaged dedicated server, especially those who prefer saving as it wouldn’t require spending additional funds on someone’s efforts to administrate the server properly. However, further pitfalls may appear soon like protection of the data from malicious activity, grant of the back-ups in case of force majeure, as well as spend money and time to be sure the server runs reliably, etc. In these terms, managed dedicated servers appear in a winning solution as they don’t require much maintenance from the owner of the server. A managed dedicated server doesn’t require hiring additional employees to support it while it’s more easier to rely on the hosting provider that will be dedicated to this server and will do all the best to run it reliably. Another benefit of an unmanaged server is that 24/7 support is always ready to assist in issues with operating systems, software licenses, updates for said software licenses, storage maintenance of the server and others. With an unmanaged dedicated server, the owner will have to deal with all this personally, which requires not only additional investments but time also.</p>
<p>Uncovering <strong> the only minimum of cons and pros </strong> discussed above makes thinking about the advantages of getting a managed dedicated server, which are:</p>
<p><strong>1. Removal of almost all the physical costs associated with the server.<br />
2. Better server reliability and performance.<br />
3. Efficient technical support and emergency.</strong></p>
]]></content:encoded>
			<wfw:commentRss>https://scarabweb.com/blog/2015/02/how-to-best-manage-your-own-dedicated-serve/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
