<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Oxxus Java Hosting techblog - Just about something for everyone</title>
	<atom:link href="http://www.oxxus.net/techblog/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.oxxus.net/techblog</link>
	<description>News, reviews, tutorials brought to you by web hosting tech support</description>
	<lastBuildDate>Fri, 01 Jul 2011 21:21:14 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1.4</generator>
		<item>
		<title>Features in Tomcat 7 – Updates and improvements</title>
		<link>http://www.oxxus.net/techblog/2011/07/features-in-tomcat-7-%e2%80%93-updates-and-improvements/</link>
		<comments>http://www.oxxus.net/techblog/2011/07/features-in-tomcat-7-%e2%80%93-updates-and-improvements/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 20:32:00 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Tomcat]]></category>

		<guid isPermaLink="false">http://www.oxxus.net/techblog/?p=28</guid>
		<description><![CDATA[With new version of Tomcat, 7.0.12, several new features were introduced while other enhanced. Overall service improvement is significant toward prior versions so through some working examples they'll be described in review below. &#160; So, let's see which features are introduced as new ones and which ones been enhanced and improved from last version. &#160; [...]]]></description>
			<content:encoded><![CDATA[<p><a href="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/Apache-Tomcat-7-Beta-erhaeltlich-1022347-b74e7ddb0065f545.png"><img class="alignleft size-full wp-image-31" title="Apache Tomcat" src="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/Apache-Tomcat-7-Beta-erhaeltlich-1022347-b74e7ddb0065f545.png" alt="" width="100" height="100" /></a>With new version of Tomcat, 7.0.12, several new features were introduced while other enhanced.</p>
<p>Overall service improvement is significant toward prior versions so through some working examples they'll be described in review below.</p>
<p>&nbsp;</p>
<p>So, let's see which features are introduced as new ones and which ones been enhanced and improved from last version.</p>
<p>&nbsp;</p>
<p><strong>New features</strong></p>
<p>1.Preventing cross-site request forgery (CSRF) attacks with use of <em>nonce</em></p>
<p>2.Changing the <em>jsessionid</em> on authentication to prevent session fixation attacks altogether</p>
<p>3.Memory leak detection and prevention</p>
<p>4.Storage of static content outside the <em>war</em> file with use of <em>aliases</em></p>
<p>&nbsp;</p>
<p><strong>Enhanced features</strong></p>
<p>5.Servlet 3.0, JSP 2.2 and JSP-EL 2.2 support</p>
<p>6.Tomcat embedding improvement</p>
<p>7.Asynchronous logging</p>
<p>&nbsp;</p>
<p><strong>Preventing cross-site request forgery (CSRF) attacks with use of <em>nonce</em></strong></p>
<p><strong> </strong></p>
<p>Defined as an type of malicious attack that affects Web-based applications,  CSRF, typically forces users to execute unwanted actions while they are logged into a trusted Web site.<strong> </strong>To prevent this tomcat developed nonce as an method of "a <a href="http://en.wikipedia.org/wiki/Cryptographic_nonce">random or pseudo-random number issued in an authentication protocol</a> to ensure that old communications cannot be reused in replay attacks."</p>
<p>With servlet filter implemented in Tomcat 7, nonce is stored in the user's session after every request has been processed. It has to be added as a request parameter for each subsequent request. The servlet filter then checks whether the nonce in the request parameter is the same as the nonce stored in the user session. If they are the same, the request could have come only from the given site. If they are different, the request is from some other site and is rejected.</p>
<p>For example, in email spam, which cannot have nonce, session will be rejected. Even if the user clicks on a malicious link or posts a malicious form, the request will be denied because the nonce will not be there. The nonce will be present only in Web pages returned by this Web app. Nonce is required as a request parameter for <em>all</em> URLs.</p>
<p>By default, filter configuration is stored in applications web.xml.</p>
<p>&nbsp;</p>
<p><strong>Changing the <em>jsessionid</em> on authentication to prevent session fixation attacks altogether</strong></p>
<p>&nbsp;</p>
<p>The solution, implemented by the Tomcat team as an patch, changes the jsessionid after authentication. Patch is implemented in version 7 of Tomcat but has been back-ported to version below.</p>
<p>&nbsp;</p>
<p><strong>Memory leak detection and prevention</strong></p>
<p><strong> </strong></p>
<p>An most common problem with redeploying web applications is <em>Permgen space: OutOfMemoryError caused by memory leaks. It's because the classes from a previous deployment are not completely garbage collected. Developers work around this by increasing the amount of PermGen memory or restarting Tomcat.</em></p>
<p><em>Tomcat 7 has implemented feature that fixes this issue but not completely as it cannot be predicted which action would trigger this error. Several scenarios are covered with this fix like JDBC driver registration, Some logging frameworks, Storing objects in ThreadLocals and not removing them and Starting threads and not stopping them.</em></p>
<p>&nbsp;</p>
<p><em><strong>Storage of static content outside the war file with use of aliases</strong></em></p>
<p>&nbsp;</p>
<p><em>Static resources such as CSS, JavaScript, and video and image files, if needed, are usually bundled within war archive which leads to it's size growing. This is avoided by another feature introduced in Tomcat 7.</em></p>
<p><em>Tomcat 7 allows a new </em>aliases<em> attribute in the </em>context<em> element. This attribute can point to a static resource. You can now access it using </em>Classloader.getResourceAsStream('/static/...')<em> or embed a link to it and let Tomcat resolve the absolute path.</em></p>
<p><em>The advantages of using aliases instead of Apache aliases in </em><em>httpd.conf</em><em> is that the mapped resources can be accessed from within a servlet, and the aliases can be used for applications that don't have Apache at the front.</em></p>
<p>&nbsp;</p>
<p><em><strong>According to Mark Thomas, Release Manager and Committer for Tomcat 7, the </strong></em><a href="http://www.tomcatexpert.com/blog/2010/08/02/interview-mark-thomas-tomcat-7-committer-release-manager">three most compelling features of Tomcat 7</a><em><strong> are Servlet 3.0, memory leak prevention and detection, and improved security.</strong></em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.oxxus.net/techblog/2011/07/features-in-tomcat-7-%e2%80%93-updates-and-improvements/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Analyzing xferlog file</title>
		<link>http://www.oxxus.net/techblog/2011/07/analyzing-xferlog-file/</link>
		<comments>http://www.oxxus.net/techblog/2011/07/analyzing-xferlog-file/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 20:30:45 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Linux]]></category>

		<guid isPermaLink="false">http://www.oxxus.net/techblog/?p=26</guid>
		<description><![CDATA[I wanted to write a few sentences on the xferlog, since I know that not many people pay attention to it, but it really can be useful. &#160; For example, you have an ftp user who does some actions, deletes files, writes file, reads, etc. All these actions are stored with timestamp in xferlog. &#160; [...]]]></description>
			<content:encoded><![CDATA[<p><a href="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/image012.gif"><img class="aligncenter size-medium wp-image-43" title="xferlog" src="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/image012-300x86.gif" alt="" width="300" height="86" /></a></p>
<p>I wanted to write a few sentences on the xferlog, since I know that not many people pay attention to it, but it really can be useful.</p>
<p>&nbsp;</p>
<p>For example, you have an ftp user who does some actions, deletes files, writes file, reads, etc. All these actions are stored with timestamp in xferlog.</p>
<p>&nbsp;</p>
<p>System administrator can find out specifically what happened with the files, that are stored or delete, who deleted them, and when.</p>
<p>&nbsp;</p>
<p>It is usually located in /var/log/xferlog</p>
<p>It stores a format that will give you as follows, current-time, transfer-time, remote-host, full-size, file-name, transfer-type (binary/ascii), special-action-flag (compressed/uncompressed), direction (outgoing/incoming), access-mode, username, service-name, authentication method and completion-status (complete/incomplete).</p>
<p>&nbsp;</p>
<p>So basically, all the information is there for the system admin who wants to analyze the ftp actions.</p>
<p>&nbsp;</p>
<p>My current use was to find successfully uploaded files. One command:</p>
<p>awk '($12 ~ /^i$/ &amp;&amp; $NF ~ /^c$/){print $9}' xferlog</p>
<p>and I got them all.</p>
<p>&nbsp;</p>
<p>So I wanted to share this with you as you might find it useful in some situation. Drop a comment if you want to ask me something, or if you have a problem with an investigation of a specific case.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.oxxus.net/techblog/2011/07/analyzing-xferlog-file/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>yum vs apt-get differences</title>
		<link>http://www.oxxus.net/techblog/2011/07/yum-vs-apt-get-differences/</link>
		<comments>http://www.oxxus.net/techblog/2011/07/yum-vs-apt-get-differences/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 20:29:54 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[apt-get]]></category>
		<category><![CDATA[RPM]]></category>
		<category><![CDATA[yum]]></category>

		<guid isPermaLink="false">http://www.oxxus.net/techblog/?p=24</guid>
		<description><![CDATA[Hope you all, readers, had a great day so far. I want today to present yum vs apt-get differences. I'm sure a lot of users use Fedora Core, and are thinking about switching to Ubuntu or Debian. The major difference between these systems is your ultimate application for installing, updating and managing packages for the [...]]]></description>
			<content:encoded><![CDATA[<p><a href="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/yum1.png"><img class="alignleft size-full wp-image-48" style="margin: 5px;" title="yum" src="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/yum1.png" alt="" width="185" height="70" /></a>Hope you all, readers, had a great day so far.</p>
<p>I want today to present yum vs apt-get differences. I'm sure a lot of users use Fedora Core, and are thinking about switching to Ubuntu or Debian.</p>
<p>The major difference between these systems is your ultimate application for installing, updating and managing packages for the distribution.</p>
<p>&nbsp;</p>
<p>For those users who are switching from Fedora to Ubuntu, the yum tool is replaced with another great tool apt-get.</p>
<p>&nbsp;</p>
<p>Installing is basically the same, you do 'yum install package' or 'apt-get install package' you get the same result.</p>
<p>Yum automatically refreshes the list of packages, whilst with apt-get you must execute a command 'apt-get update' to get the fresh packages.</p>
<p>Another difference is upgrading all the packages. With yum you did 'yum upgrade' and with apt-get you get a new option 'apt-get dist-upgrade' which will hopefully upgrade your whole distribution.</p>
<p>&nbsp;</p>
<p>There are a few more tips for apt-get which I will name briefly here:</p>
<p>dpkg --list (to get the list of packages), apt-cache search [package_name], apt-get clean (to get packages removed from the local cache directory), etc.</p>
<p>&nbsp;</p>
<p>Finally, I wanted to mention that apt-get mostly works with .deb packages, though the tool can be installed on Fedora distribution to serve .rpm as well.</p>
<p>Its configuration is served from /etc/apt/ and there you will find sources.list with respective repositories for packages needed for user's proffered distribution.</p>
<p>&nbsp;</p>
<p>I probably forgot to mention some other important differences, so feel free to correct me and drop a comment.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.oxxus.net/techblog/2011/07/yum-vs-apt-get-differences/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Viruses, Trojans, how to protect your website</title>
		<link>http://www.oxxus.net/techblog/2011/07/viruses-trojans-how-to-protect-your-website/</link>
		<comments>http://www.oxxus.net/techblog/2011/07/viruses-trojans-how-to-protect-your-website/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 20:28:21 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Web hosting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[Virus]]></category>

		<guid isPermaLink="false">http://www.oxxus.net/techblog/?p=21</guid>
		<description><![CDATA[In the past, viruses have only attacted personal computers that shared the same external memories like diskettes, cds, etc. A while then, they started spreading over the network. &#160; Today, viruses are being spread to your website. Now, how do they do that ? &#160; First of all, it's quite simple. The viruses that you [...]]]></description>
			<content:encoded><![CDATA[<p><a href="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/virus.jpg"><img class="alignleft size-medium wp-image-50" style="margin: 5px;" title="virus" src="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/virus-300x255.jpg" alt="" width="300" height="255" /></a>In the past, viruses have only attacted personal computers that shared the same external memories like diskettes, cds, etc.</p>
<p>A while then, they started spreading over the network.</p>
<p>&nbsp;</p>
<p>Today, viruses are being spread to your website. Now, how do they do that ?</p>
<p>&nbsp;</p>
<p>First of all, it's quite simple. The viruses that you pick up downloading files from some suspicies websites are installed on your computer. Then, they search for your ftp details on your computer. Usually, you save your details with your ftp client.  They connect to your ftp service, search for index-like files (index.html, index.php, ...) and when found they modify it with their own code at the header or footer of the file.  They usually put the code for promoting other websites, or in some case put a link to a file to infect your visitors. Naturally, your visitors trust your website, and they will download the software which will get their computer infected.</p>
<p>The key for your protection in general would be:</p>
<p>&nbsp;</p>
<p>-not to keep your password saved in the ftp client (Don't mind typing it every time you connect, as it will save you time in case virus infected you, or somebody hacks your computer)</p>
<p>- keep the backup of your website, so if you get infected, you can easily re-upload your website with clean code</p>
<p>- keep the antivirus updated. Antivirus is a good prevention, as the latest updates usually can reckognize and detect the viruses being downloaded from the web, thus prevent infection of your computer.</p>
<p>&nbsp;</p>
<p>These types of attacks are just starting to appear. I have personally seen just a few of them, so it's not that common. If you had an experience with it, and would like to share a method for prevention, please feel free to post a comment.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.oxxus.net/techblog/2011/07/viruses-trojans-how-to-protect-your-website/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Network speed and how it effects your website</title>
		<link>http://www.oxxus.net/techblog/2011/07/network-speed-and-how-it-effects-your-website/</link>
		<comments>http://www.oxxus.net/techblog/2011/07/network-speed-and-how-it-effects-your-website/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 20:26:37 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Web hosting]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Network]]></category>

		<guid isPermaLink="false">http://www.oxxus.net/techblog/?p=19</guid>
		<description><![CDATA[Often people associate offered bandwidth with network capability. Those are in fact, two different terms.Bandwidth is associated with amount of data you can transfer (both up to your server + and down from your server) in a period of time. Network capability, on the other hand will have a direct impact on the speed of your website and quality [...]]]></description>
			<content:encoded><![CDATA[<p><em><a href="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/cat5_network_cable.png"><img class="alignleft size-thumbnail wp-image-35" style="margin: 5px;" title="Network Cable" src="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/cat5_network_cable-150x150.png" alt="" width="150" height="150" /></a>Often people associate offered bandwidth with network capability. Those are in fact, two different terms.Bandwidth is associated with amount of data you can transfer (both up to your server + and down from your server) in a period of time. Network capability, on the other hand will have a direct impact on the speed of your website and quality of one enjoying your content and online media.Your search engine ranking is also affected by your network uptime and network speed. Your visitors will return if they enjoyed your website's response.</em></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>Let us look at number of factors that affect your network capabilities.</strong></p>
<p><strong>Provider is actually routing your traffic !</strong></p>
<p><strong> </strong><br />
Network data is like a car in the traffic jam. You will take a shortcut if there's a shortcut available.If not, you just might get late for an appoitment !So, what do providers of your internet service like hosting companies and "last mile" internet providers have to offer ?Larger companies will have an psychical connections to other larger networks. They will invest in optical infrastructure to have their network connected to other larger network, and that's called peering. For example, if you have a website on one network, and your users mostly use large network like telia.com, your provider of service will route the traffic through that particular peer, and users will get response in no time.If your provider doesn't have a connectivity to telia.com, then it will route to another network that has the closes route to the desired destination, and of course, that will cause some delay.Nowadays, network providers do have a lot of "direct routes" to their fellow networks, and that will ultimately affect their quality of service, since the delay between responses will be much lower.Your provider of choice would actually be the provider that has a full redudant network, which basicly means that he has one or more routes towards an another larger network, and will offer 100% of network uptime to your website.<br />
<strong>Your server's country can matter ! But then again ...</strong></p>
<p>Your website can target a specific country more then others. So, you would normally guess that hosting your website in your country is the right choice for you. Well, you are right more or less.Having a close peer to an end-user is a good choice, and it will provide a fast response. Issue with local hosting providers is that they can have a good connectivity localy, but the amount of data transfer is somehow always limited. That's due to infrastructure that most countries don't invest in building large networks, simply because there's no primary need for that investment.On the other hand, there are a quite few professional datacenters, even though you are not in US, or maybe not in Europe, that will offer a few milliseconds delay, unnoticable to your end-users, and at the same time offer redudance (having an alternative if one route fails, which most local networks don't have), and capability to have a large amount of data transfered (again bandwidth) at low cost.<br />
<strong> </strong></p>
<p><strong>Unmetered bandwidth is so cool, but my website is slow ?!</strong></p>
<p>Some providers do offer unmetered bandwdith. They are maybe slightly more expensive, or even cheaper, but in any case that sounds very good.There, of course, is a catch. Look at it as a one way street, with no semaphors, and cars trying to drive into the major highway.You can have there thousends of cars, and they will all enter the highway. Well, eventually ... though.Providers that are offering unmetered bandwidth are basicly giving false information. They are telling you that they will not measure your data. But they are mostly not telling you that you that:- you cannot use media streaming- if your website is using too much, you will get disconnected- you and hunderts of others are all having 10mbitps, but you are all sharing it.<br />
That's basicly the story. And sometimes cheaper is costing more, costing you your website's quality, as it's directly connected with end-users pleasure enjoying all your hard work you did put in your website.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.oxxus.net/techblog/2011/07/network-speed-and-how-it-effects-your-website/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>MC intro</title>
		<link>http://www.oxxus.net/techblog/2011/07/mc-intro/</link>
		<comments>http://www.oxxus.net/techblog/2011/07/mc-intro/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 20:24:54 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Linux]]></category>

		<guid isPermaLink="false">http://www.oxxus.net/techblog/?p=17</guid>
		<description><![CDATA[I wanted to write a couple of sentences about my linux enviroment.When I work on the shell, I often make use of GNU MC commander, which I discovered quite recently.I guess, that habit I inherited from my Windows enviroment, as I'm used to Windows Commander. I noticed that not so many professionals working on the [...]]]></description>
			<content:encoded><![CDATA[<p><a href="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/300px-Heckert_GNU_white.png"><img class="alignleft size-thumbnail wp-image-45" style="margin: 5px;" title="GNU" src="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/300px-Heckert_GNU_white-150x150.png" alt="" width="150" height="150" /></a>I wanted to write a couple of sentences about my linux enviroment.When I work on the shell, I often make use of GNU MC commander, which I discovered quite recently.I guess, that habit I inherited from my Windows enviroment, as I'm used to Windows Commander.<br />
I noticed that not so many professionals working on the shell use MC on daily bases, like I do. It's not necessery for a professional System Administrator to use it, but I think you will get the idea why I'm introducing it to you.<br />
MC (GNU Midnight Commander) is a console file manager, it's free and open source.It can be used remotely in the console or any graphical enviroment.It's main interface consists of two panels, just like in Windows Commander.User can use arrow keys, shortcuts etc. and he can make use of any tool, that you would normally use in console (copy/rename/remove/make directory/etc).User can also rename a group of files, which is particulary handy, knowning that it's a little complicated thing to do in shell enviroment.<br />
Anyhow, for full feature list, get the rpm package, install it, and press F4 for help <img src='http://www.oxxus.net/techblog/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>If you already use this tool, drop a command to join the hood. If you don't, feel free to ask any questions or add something to my introduction.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.oxxus.net/techblog/2011/07/mc-intro/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Shared vs. VPS (advantages/disadvantages)</title>
		<link>http://www.oxxus.net/techblog/2011/07/shared-vs-vps-advantagesdisadvantages/</link>
		<comments>http://www.oxxus.net/techblog/2011/07/shared-vs-vps-advantagesdisadvantages/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 20:24:09 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Web hosting]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[VPS]]></category>

		<guid isPermaLink="false">http://www.oxxus.net/techblog/?p=15</guid>
		<description><![CDATA[Shared hosting is a service where hosting provider sells accounts on one server where can multiply websites be hosted. It is a very popular way of hosting the website, as it can be quite cheap and useful for small websites not spending alot of resources. The main disadvantage of the shared hosting is that you [...]]]></description>
			<content:encoded><![CDATA[<p><a href="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/vps-server-image-w360.jpg"><img class="alignleft size-thumbnail wp-image-37" style="margin: 5px;" title="VPS server" src="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/vps-server-image-w360-150x150.jpg" alt="" width="150" height="150" /></a>Shared hosting is a service where hosting provider sells accounts on one server where can multiply websites be hosted.</p>
<p>It is a very popular way of hosting the website, as it can be quite cheap and useful for small websites not spending alot of resources.</p>
<p>The main disadvantage of the shared hosting is that you are basily living in the same enviroment as other websites.</p>
<p>That can put a question of theoretical risk for your data security, for your emails going through (You all are sending it from one ip address, if one is spamming, all are considered spammers), resource measurment, etc...</p>
<p>If you would need a special software installed for your application, some hosting companies will install it for you on the shared hosting, but majority will not. The solution can be found in one more profound technology that is fastly growing in popularity.</p>
<p>&nbsp;</p>
<p><strong>So, what's VPS ?</strong></p>
<p>&nbsp;</p>
<p>VPS stands for Virtual Private Server. It's basicly shared as well, but in terms of resources. On the shared hosting you will share the enviroment, services, etc., but on the VPS you will share the memory and CPU.</p>
<p>&nbsp;</p>
<p>You will have "root" access to the machine, and will be able to install and configure your virtual server as you like.</p>
<p><strong>Some of advantages of the VPS are:</strong></p>
<p>- Server performance: All resources are equaily shared. One user cannot overtake the whole server with resources, so you are on the safe side there.</p>
<p>- Private mail server: You don't have to bother with the risk of being blacklisted because of other shared users</p>
<p>- Your distribution of choice: Basicly, there are quite a few hosting providers who allow you to choose between different Operating Systems. So you can continue to work on the distribution that you are used to working at home.</p>
<p>- Security: No one, except you, has access to your VPS server, and that minimizes the risk that your data will be stolen. You are practicly isolated in the enviroment with your own services and resources.</p>
<p>- Custom applications: You can install any application that you would like to be installed on your VPS, as long as it doesn't use more resources then you have.</p>
<p>&nbsp;</p>
<p>There are number of advantages over Shared hosting, these mentioned are only a few.</p>
<p>If you are a user who is ex-shared hosting user, I would love to hear your opinion and experience with VPS enviroment.</p>
<p>Please feel free to comment.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.oxxus.net/techblog/2011/07/shared-vs-vps-advantagesdisadvantages/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google optimization</title>
		<link>http://www.oxxus.net/techblog/2011/07/google-optimization/</link>
		<comments>http://www.oxxus.net/techblog/2011/07/google-optimization/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 20:21:37 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Web hosting]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[HTML]]></category>

		<guid isPermaLink="false">http://www.oxxus.net/techblog/?p=12</guid>
		<description><![CDATA[During the weekend I was researching some papers and online forums for google optimization. I was doing it mainly for my own website though, but I wanted to share with the world what I have learned so far. &#160; Google is fastly modifying it's algorithm. It is looking at more and more things to "harvest" [...]]]></description>
			<content:encoded><![CDATA[<p><a href="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/google-birthday-doodles.png"><img class="alignleft size-thumbnail wp-image-40" style="margin: 5px;" title="google" src="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/google-birthday-doodles-150x150.png" alt="" width="150" height="150" /></a>During the weekend I was researching some papers and online forums for google optimization. I was doing it mainly for my own website though, but I wanted to share with the world what I have learned so far.</p>
<p>&nbsp;</p>
<p>Google is fastly modifying it's algorithm. It is looking at more and more things to "harvest" the right websites with matched phrases and keywords.</p>
<p>&nbsp;</p>
<p>So here we go:</p>
<p>- the name of the page should contain a phrase or topic of the page.</p>
<p>That way search engine will known for certain it's about “that” in page.</p>
<p>(ex. Travelling-around-the-world.html)</p>
<p>- meta titles should always be describing the article to a certain level. Not too much though, should be kept lower then 150 characters</p>
<p>- making a list of tags (common words that are used on the website)</p>
<p>"Tag" the pages and internally link them, so one can get a list of pages containing a certain tag.</p>
<p>It’s also useful to link a word (tag) on the article itself to a tagpage.</p>
<p>Also it’s good to use tags that appear on that page in meta keywords and description as well. It can save time if it’s done automatically.</p>
<p>-       When writing an article, one should use bold, italic, underline, and paragraphs. Search engines pay special attention to these html-tags and they will for sure add a certain point for the ranking for specific keyword of phrase if they found it bolded or such.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Well, these are a few tips that I learned this weekend. If you want to add, correct, or remove some of these tips, please don’t be shy to comment.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.oxxus.net/techblog/2011/07/google-optimization/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>APF as a firewall tool</title>
		<link>http://www.oxxus.net/techblog/2011/07/apf-as-a-firewall-tool/</link>
		<comments>http://www.oxxus.net/techblog/2011/07/apf-as-a-firewall-tool/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 20:14:20 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[APF]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spam]]></category>

		<guid isPermaLink="false">http://www.oxxus.net/techblog/?p=6</guid>
		<description><![CDATA[Working in a hosting company brought some standards of use. Personally, I always have a handy premade set of "iptables" rules in one file which I copy and modify at need for my servers, like I suppose majority of system administrators do. Although I do manage APF tool on my work, just recently I have [...]]]></description>
			<content:encoded><![CDATA[<p><a href="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/firewall.gif"><img class="alignleft size-medium wp-image-7" title="firewall" src="http://www.oxxus.net/techblog/wp-content/uploads/2011/07/firewall-300x300.gif" alt="" width="300" height="300" /></a>Working in a hosting company brought some standards of use. Personally, I always have a handy premade set of "iptables" rules in one file which I copy and modify at need for my servers, like I suppose majority of system administrators do.</p>
<p>Although I do manage APF tool on my work, just recently I have put it in my personal use.<br />
APF is netfilter (iptables based) firewall system designed to cover all advanced needs of your workstation for net filtering.I will just mention a few of its features that are most interesting to me and maybe will draw your attention:<br />
- Detailed and well commented configuration file (very easy to modify and adjust to user's personal needs)</p>
<p>- Reactive address blocking (RAB), next generation in-line intrusion prevention</p>
<p>- Fast load feature that allows for 1000+ rules to load in under 1 second</p>
<p>- Spamhaus don't route or Peer List support to ban known ìhijacked zombie IP blocks</p>
<p>- Intelligent route verification to prevent embarrassing configuration errors</p>
<p>Those are just a few, they have on their website a lot more, that or more or less useful. Overall, I think it's a good practice to introduce APF to your workstation, and let the filtering go at ease.Anyhow, if you feel curious about it, google "APF firewall" and it'll bring you right to their website.<br />
For you who have experience with APF or maybe even better project, please feel welcome to comment.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.oxxus.net/techblog/2011/07/apf-as-a-firewall-tool/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
