What Makes You Worried About MySQL?

Today everyone want their website to be implemented in dynamic programming language such as PHP, ASP, Etc that requires the use of MySQL databse to store user information ,passwords, senitive data. More the database entries, the bigger is your database. Sometimes MySQL server can act as your server enemy and takes much of your server resources which you can also see using top command or if you have cpanel/WHM you can directly check by clicking on top right corner link which looks like Load Averages: 0.01 0.05 0.07 upon logging in.

If you see MySQL taking high cpu load then you should worry. Try finding which database is causing trouble by running mysqladmin proc stat and some other random linux commands. If you successfully find it tell your developer to optimizie the website because poorly written code may be it’s cause and upon rectification you may also see the difference in the load.

Finally try to tune and optimize MySQL server using MySQLTuner. MySQLTuner is a perl script which overview web server and pop out some recommendations about improvements and stability for MySQL. I will not elaborate more about this tool as you can easily get more infomation on its own website (https://github.com/rackerhacker/MySQLTuner-perl#readme).

Read More

Are You Taking Advantage Of Security Questions In Cpanel/WHM?

Now a days due to immense of hacking attempts, webmasters have to take extra security measures to protect their server from anonymous attacks. A hacker can get your password by brute forcing your account, by infecting your pc and Etc. Are you worried they have your cpanel/WHM password? Choosing cpanel can make you feel safe about your server security.

Cpanel/WHM gives an advantage to rule over even if the attacker have your root password. Their security Questions feature adds a protecting layer between your cpanel login and GUI enterface of your server, if there is cpanel access from unauthorised ip. Whenever an ip which is not whitelisted access cpanel/WHM account then there is a popup of 4 security Questions and upon successfull answer only user will be able to enter Administrator panel or will be directly thrown out of web server. Isnt that great?

Cpanel have more stunning security features which makes it first choice of Web Administrator’s. I will be exploring more features in next post. For more information related to Security Questions see the link below:

http://docs.cpanel.net/twiki/bin/view/AllDocumentation/WHMDocs/SecurityQuestions

Read More

Installing HAProxy For Anonymous Attacks And Load Balancing


HAProxy is a free, very fast and reliable solution offering high availability, load balancing, and proxying for TCP and HTTP-based applications. It is particularly suited for web sites crawling under very high loads while needing persistence or Layer7 processing. Supporting tens of thousands of connections is clearly realistic with today’s hardware. Its mode of operation makes its integration into existing architectures very easy and risk less, while still offering the possibility not to expose fragile web servers to the Net

You can read more here:- http://haproxy.1wt.eu/#desc

Installing HAProxy:-

You can check for the latest version here:- http://haproxy.1wt.eu/#down
At present 1.5 is in development phase 7 and we are going to use that

Note: The configuration file we have used is for single server Protection not for multiple server and made by its owner Willy Tarreau

First:-

wget http://haproxy.1wt.eu/download/1.5/src/devel/haproxy-1.5-dev7.tar.gz
tar xvfz haproxy-1.5-dev7.tar.gz
$ cd haproxy-1.5-dev7

Second:-
Now we have to compile the installation file, we are taking example of centost OS

make install

Third:-
Now make a new directory and copy haproxy configuration file there

mkdir /etc/haproxy
cd /etc/haproxy
vi haproxy.cfg

change the ip address below and copy it to haproxy.cfg
—————————————————————–

global
daemon
maxconn 20000 # count about 1 GB per 20000 connections
pidfile /var/run/haproxy.pid
stats socket /var/run/haproxy.stat mode 600

defaults
mode http
maxconn 19500 # Should be slightly smaller than global.maxconn.
timeout client 60s # Client and server timeout must match the longest
timeout server 60s # time we may wait for a response from the server.
timeout queue 60s # Don’t queue requests too long if saturated.
timeout connect 4s # There’s no reason to change this one.
timeout http-request 5s # A complete request may never take that long.
# Uncomment the following one to protect against nkiller2. But warning!
# some slow clients might sometimes receive truncated data if last
# segment is lost and never retransmitted :
# option nolinger
option http-server-close
option abortonclose
balance roundrobin
option forwardfor # set the client’s IP in X-Forwarded-For.
option tcp-smart-accept
option tcp-smart-connect
retries 2

frontend public
bind 192.168.1.1:80
bind 192.168.1.2:80
bind 192.168.1.3:80
bind 192.168.1.4:80

# table used to store behaviour of source IPs
stick-table type ip size 200k expire 5m store gpc0,conn_rate(10s)

# IPs that have gpc0 > 0 are blocked until the go away for at least 5 minutes
acl source_is_abuser src_get_gpc0 gt 0
tcp-request connection reject if source_is_abuser

# connection rate abuses get blocked
acl conn_rate_abuse sc1_conn_rate gt 30
acl mark_as_abuser sc1_inc_gpc0 gt 0
tcp-request connection track-sc1 src
tcp-request connection reject if conn_rate_abuse mark_as_abuser

default_backend apache

backend apache
# set the maxconn parameter below to match Apache’s MaxClients minus
# one or two connections so that you can still directly connect to it.
stats uri /haproxy?stats
server srv 0.0.0.0:8181 maxconn 254

# Enable the stats page on a dedicated port (8888). Monitoring request errors
# on the frontend will tell us how many potential attacks were blocked.
listen stats
# Uncomment “disabled” below to disable the stats page :
# disabled
bind :8811
stats uri /

——————————————————————

In the above file replace 192.168.1.1 to 192.168.1.4 with your server ip address.

Fourth:
Change your Apache port to 8181 as in configuration file we are using that server srv 0.0.0.0:8181 maxconn 254.In WHM goto Tweak Settings and find Apache non-SSL IP/port and change it to 8181.

Fifth:
Restart apache

/etc/init.d/apache2 restart

Last:
Start haproxy

haproxy -f /etc/haproxy/haproxy.cfg

Now we have to check if its working. Go to your stats page to see
serverip:8811

Replace serverip with your server ip used in configuration file and you will see full result generated by haproxy

If you are facing any issue then feel free to contact us

Read More

How to find the right web hosting company?

There are millions of websites and everyday some or the other website gets online to mark a niche for them. There are all sorts of websites ranging from personal to business related and each of them has one motive – get as many as visitors possible and become popular. To achieve this, they use various marketing initiatives and spend thousands or even millions of dollars! They may do the right thing, but the foremost concern should be the availability i.e. accessibility of their website.

Imagine a scenario when there are thousands of daily visitors to your website but your site is down for some or the other reason! Will it leave a good impression in the minds of your visitors? Will they come back? What if you had made some important change or announcement on your website but people can’t access it?Imagine all the efforts you put in to develop the website  and due to a minor mistake in decision making your work attracts a negative impression.

In order to avoid such circumstances, it is imperative to first have the best web hosting service because without it, no website can reach its audience. There are number of hosting solution providers all over the world and this domain is so competitive that with some research and proper information you too can avail the best service. Some of the features that you should definitely check are:

  • Website Availability – No matter what, the website should be accessible to people all over the world 24×7, 365 days. Every provider highlights this feature that they are always available and their server never goes down. Don’t go by their words. Do check the websites hosted on their servers and if possible, interact with their customers to get the real picture.
  • Communication – it is very necessary that the service provider is within reach and that too always. Check out the communication tool they use to interact with their customers and the turn around time. Also, make sure they provide best-in-class communication options to you as well like web mail, multiple accounts, auto-responders and so on.
  • Protection Against Hacking –Hacking is the biggest threat to any and every web property. Make sure that the hosting provider is well equipped with tools and security options to deal with hacking, virus and Trojan attacks. Further, do check to see if they are hosting some porn, gambling or illegal sites. These are the hub of Trojans and may affect you as well.
  • Web Software – What if you plan to extend your business offering by utilizing the benefits of e-commerce? It requires additional support of software and is the responsibility of hosting provider to make it available. Some providers offer it within the package while some charge extra. Do check the package options.
  • Website Building – Nowadays creating a website within no time and making it online is a rage. Almost every hosting solution provider gives this feature (either free of cost or for extra charge). Usually it is for the assistance of webmaster to create customized websites and making it online in no time. If your hosting provider is not equipped with this feature, time to look for someone else.

There are thousands of web hosting companies in this domain but all of them are not equal. Number of factors governs the quality of their service but most importantly is the knowledge level of the person managing the server. If a person is doing it just for the sake of earning money then he may be the wrong choice. Make sure to check the expertise of the person by firing volley of questions and observe if he is guiding you in the right path or not.

Read More

SSL Certificates Will Be Available Soon

Hello All,

Bullten Web Hosting Solutions will start selling SSL certification as its new service right from 30th November. As per the management team the starting price for the SSL certificate will start from 20$/yr.

There will be four type of license Domain , Wildcard, Business and Extended and will be sold at varying cost.

For more information please send us your inquiry at sales@bullten.com

Read More

Installing BDF To protect Your Linux Server From Brutefore Attack


BFD is a modular shell script for parsing application logs and checking for authentication failures. It does this using a rules system where application specific options are stored including regular expressions for each unique auth format. The regular expressions are parsed against logs using the ‘sed’ tool (stream editor) which allows for excellent performance in all environments. In addition to the benefits of parsing logs in a single stream with sed, BFD also uses a log tracking system so logs are only parsed from the point which they were last read. This greatly assists in extending the performance of BFD even further as we are not constantly reading the same log data. The log tracking system is compatible with syslog/logrotate style log rotations which allows it to detect when rotations have happened and grab log tails from both the new log file and the rotated log file.

You can leverage BFD to block attackers using any number of tools such as APF, Shorewall, raw iptables, ip route or execute any custom command. There is also a fully customizable e-mail alerting system with an e-mail template that is well suited for every day use or you can open it up and modify it. The attacker tracking in BFD is handled using simple flat text files that are size-controlled to prevent space constraints over time, ideal for diskless devices. There is also an attack pool where trending data is stored on all hosts that have been blocked including which rule the block was triggered by.

In the execution process, there is simply a cron job that executes BFD once every 3 minutes by default. The cronjob can be run more frequently for those that desire it and doing so will not cause any performance issues (no less than once a minute). Although cron execution does not permit BFD to act in real time, the log tracking system ensures it never misses a beat in authentication failures. Further, using cron provides a reliable frame work for consistent execution of BFD in a very simplified fashion across all *nix platforms.

Installation:-

wget http://www.rfxn.com/downloads/bfd-current.tar.gz
tar zxvf bfd-current.tar.gz
cd bfd-1.4
sh install.sh

The included install.sh will install bfd to the ‘/usr/local/bfd’ path and place a 3-minute cronjob in ‘/etc/cron.d/bfd’. The setup script will also execute an included ‘importconf’ script if you have a
previous version of bfd installed, which will import your previous settings.

Configuration:-
The configuration file for BFD is located at ‘/usr/local/bfd/conf.bfd’. The most important option is the TRIG=”” value in conf.bfd as this check number of failed logins before an address is blocked.

Read More

Free Website Builder As Add-on Feature


Bullten web hosting solutions launches a new addon feature for web hosting as Website Builder.
Now don’t pay heave amount for web development and designing, use our free service without any programming knowledge.

Features:
1) 1000 and more professional templates
3) 5 min website ready
2) No coding knowledge needed
3) Separate Management panel
4) Free for our clients
5) Unlimited pages creation & much more

This new exciting addon have lots of feature which you wont understand until you use it. Contact our sales department for more info.

Read More

Mod_Security A Protection For Apache


What is Mod_Security?

ModSecurity is an embeddable web application firewall. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with no changes to existing infrastructure.

It is an open source project that aims to make the web application firewall technology available to everyone.

Features:-

Detect requests by malicious automated programs such as robots, crawlers and security scanners
Protects against SQL injection and Blind SQL injection.
Blocks Cross Site Scripting (XSS).
OS Command Injection and remote command access.
File name injection.
ColdFusion, PHP and ASP injection.
E-Mail Injection
HTTP Response Splitting.
Universal PDF XSS.
Trojans & Backdoors Detection

How To Install:-

1. Login to your server as a root user.

2. Now, get the full download of the latest version of mod_security by following command

wget http://www.modsecurity.org/download/modsecurity-apache_2.6.2.tar.gz

3. Next we unzip the archive and navigate into the directory

tar zxvf modsecurity-apache_2.6.2.tar.gz

cd modsecurity-apache_2.6.2/

4. Now you need to determine which version of Apache you use:
APACHE 1.3.x users

cd apache1/

APACHE 2.x users

cd apache2/

5. Lets Compile the module now:

/usr/local/apache/bin/apxs -cia mod_security.c

6. Ok, now its time to edit the httpd conf file.

But then, First we will make a backup just in case something goes wrong (“PRECAUTION” is better than “CURE”). And also get the assistance of senior admins in case if you are not confident while setting the various parameters for server.

cp /usr/local/apache/conf/httpd.conf /usr/local/apache/conf/httpd.conf.backup

7. Now that we have backed it all up, we can edit the httpd.conf. Replace pico with nano depending on what you have by below mentioned command

ln -s /usr/bin/nano /usr/bin/pico

so that you can edit the file by pico
Or else you can go with vi editor

vi /usr/local/apache/conf/httpd.conf

8. Lets look for something in the config, do this by holding control and pressing W and you are going to search for

(although any of the IfModules would work fine)

9. Now add this

# Turn the filtering engine On or Off
SecFilterEngine On

# Change Server: string
SecServerSignature ” ”

# Make sure that URL encoding is valid
SecFilterCheckURLEncoding On

# This setting should be set to On only if the Web site is
# using the Unicode encoding. Otherwise it may interfere with
# the normal Web site operation.
SecFilterCheckUnicodeEncoding Off

# Only allow bytes from this range
SecFilterForceByteRange 1 255

# The audit engine works independently and
# can be turned On of Off on the per-server or
# on the per-directory basis. “On” will log everything,
# “DynamicOrRelevant” will log dynamic requests or violations,
# and “RelevantOnly” will only log policy violations
SecAuditEngine RelevantOnly

# The name of the audit log file
SecAuditLog /var/log/httpd/audit_log

# Should mod_security inspect POST payloads
SecFilterScanPOST On

# Action to take by default
SecFilterDefaultAction “deny,log,status:500″

# Require HTTP_USER_AGENT and HTTP_HOST in all requests
SecFilterSelective “HTTP_USER_AGENT|HTTP_HOST” “^$”

# Prevent path traversal (..) attacks
SecFilter “../”

# Weaker XSS protection but allows common HTML tags
SecFilter “<[[:space:]]*script” # Prevent XSS atacks (HTML/Javascript injection) SecFilter “<(.|n)+>”

# Very crude filters to prevent SQL injection attacks
SecFilter “delete[[:space:]]+from”
SecFilter “insert[[:space:]]+into”
SecFilter “select.+from”

# Protecting from XSS attacks through the PHP session cookie
SecFilterSelective ARG_PHPSESSID “!^[0-9a-z]*$”
SecFilterSelective COOKIE_PHPSESSID “!^[0-9a-z]*$”

10. Save the file.
Nevertheless to say For Pico editors Ctrl + X then Y and “Esc” :wq! for Vi editors.

11. Restart Apache.

/etc/rc.d/init.d/httpd stop
/etc/rc.d/init.d/httpd start

Additionally you can get mod_security rules here:-

http://www.gotroot.com/downloads/ftp/mod_security/rules.conf

Read More

Launching Of Reseller Account


Well this is a good opportunity for those who want to open their small web hosting business. Now you can buy our Reseller plan and run your own web hosting business or company at affordable prices. We are giving fully managed service to all our reseller and if any problem occurs in between then bullten web hosting solutions will be liable to manage it.

To know more about it have live chat with our sales representative and to see the price details follow the link below:-
http://www.bullten.com/web-hosting-plans/reseller-hosting/

Read More