Website Visitor Information


A webmaster might be interested in knowing details about visitors.

  • Source: How they enter the website, directly, through a search engine, paid traffic, social media, or email campaign.
  • Pages visited, time spent on each page, navigation
  • Number of visitors, their geographical regions (City, State & Country wise)
  • Website Bounce rate

Analytics Tools

  • Google Analytics
  • Clicky
  • Mint
  • KissMetrics
  • Mosueflow

Make Money Online Using a Website

If your website receives thematic traffic, you can convert it into a cash cow.

  • Advertisements: You can provide the space for text or banner links for advertisements and earn through them.
  • Product review by adding affiliate link: Companies like CJ, & Impact pay for the purchases made through the affiliate link.
  • Sell Digital Products: Sell articles, tutorials, images, reviews, and many more.
  • Sell Hosting & Domains: You can sell domain names i.e., unique names for the website & web hosting services.
  • Web Design and Development Services: Build customized websites for individuals or businesses.
  • Web Design and Development Services: Create and customize a website for individuals and businesses.
  • Search Engine Optimization Services: Help choose the simple, easy-to-remember, attractive, catchy & brand-oriented domain with no trademark violation. Highlight the business by ranking it on a search engine on premium keywords.

Desktop OS Platforms


  • Windows
  • Linux
  • Mac

Linux Operating System

Linux has rapidly gained the market in the desktop systems segment. Software vendors like Red Hat, Deepin, SUSE, and Ubuntu brands are now widely used in government, enterprises, OEM, communities, and other fields.

The low cost, powerful customization features, open-source, and good portability have made it widely used in embedded systems especially mobile phones, tablet computers, routers, TVs, and electronic game consoles. The customized versions of Linux are available in digital video recorders, Stage lighting control systems.

Android world’s most popular smartphone operating system created on top of the Linux kernel. It has taken most of the iOS market and has reached 84.6%, according to the latest statistics from authoritative departments in 2015.

Cisco is using customized Linux in network firewalls and routers.

Windows Operating System

For few decades, Windows has massively dominated the desktop systems market. Mainly in terms of system ease of use, system management, software and hardware compatibility, and software richness.

Mac Operating System

Popular among designers, creative professionals in films, entrepreneurs, management executives, and writers.

Solve Technical Problems


Experts have hands-on practice and skills to resolve system issues. Daily, working and doing regular operations on the system, they get expertise. Even they understand other system processes for which they have theoretical knowledge. The technical staff of most enterprises is involved in configuring application servers, networks, and system security.

Learning each command with all its parameters needs a lot of practice, and no one is a complete master. Most Linux commands we forget as they do not come in use over a while.

When an expert encounters an issue, they start searching for information online and browsing technical forums. For almost 90% of such, they have help documents, instructions, and FAQs. The 10% depends on their ability or by asking others about the resolution process. The technical experts, senior operation and maintenance engineers, or system architects keep themselves updated with highly comprehensive knowledge of programming language and cluster & distributed architecture.

The Linux distros come with minimum requirements, recommended configurations, and installation options (such as a graphical interface or character interface). The organizations may have different setup planning for hosting servers. Administrators use the Kickstart tool for unattended Linux system installation. They create ‘ks.cfg‘ response file through various parameters or settings that need manual intervention in the typical installation process.

CHANGE THE PORT OF THE SERVER

vi /etc/ssh/sshd_config

change #Port 22

to Port 8022

/etc/init.d/sshd restart

CREATING DOMAIN ENTRY

vi /etc/named.conf

cd /var/named/

CHECKING ERROR LOGS


tail -f /usr/local/apache/logs/error_log

Linux Server Security


  • Installation On Demand: Install only the required package for maximum system efficiency and system safety. As excess software packages not only occupy disk space but also bring potential security risks to the server. Do not install any third-party package until verified.
  • Independent Partitions to Applications: Recommended to assign individual partitions to applications. So that even if any partition gets destroyed, it will not affect the data of others and can minimize the loss caused by system crashes.
  • Root Password: The root password must contain a mix of uppercase-lowercase letters, numbers, and special characters. Thus, making it secure against dictionary attacks.
  • Avoid logging into the system directly with the ROOT account.
  • Regularly update the system to fix lags or bugs.

Linux To Build Cloud Computing

According to the Linux Foundation’s research, almost 86% of enterprises have used Linux to build cloud computing and big data platforms.

Enterprise-level applications require high reliability and high stability on the system platform. Mostly RHEL commercial Linux distribution and non-commercial release Centos are the best choices.

Red Hat provides system technical support and provides free system upgrades. For the same, enterprises purchase commercial authorization and consulting services.

CentOS does not provide commercial support, hence recommended to companies having the corresponding technical strength.

Linux The Backbone Of The Server Operating System

  • Free & open-source software UNIX-like operating system under The GNU/GPL General Public License. Its entire source code is available for free use, modification and redistribution. It occupied maximum market shares in the server operating system market structure. Also, maintained rapid growth in key areas like finance, government, agriculture, transportation, web hosting, IT industry, and telecommunications.
  • It occupies almost 75% market share in the server field.
  • In 1991 Linus Torvalds released the Linux Kernel. After that user-space applications got added like GUI components and many other utilities.
  • Red Hat Linux commercialized its tools to be sold for enterprises looking for a database administration system.
  • In addition, considering the rapid growth of Linux and the support of relevant national policies in different countries, Linux server products are bound to impact the larger server market.

Linux is the topmost choice of business organizations


Linux is authoritative and accessible as it is dependable, reliable, and resilient. It has a vast community which takes ownership to Linux distributions and helps to develop services, and applications and provides remedies to bugs.

Linux Enterprise Distributions

Cent OS (Communication Enterprise Operating System)
https://wiki.centos.org/Download
It’s free and open to use under the terms of the GPL license.


Red Hat, Debian, SUSE Enterprise

Home or Enthusiast-oriented Distributions

Fedora, Open SUSE

Benefits

  • The administrators modify the GRUB menu to make it more secure, furthermore use the command line to debug and repair boot issues.
  • Linux files and directories are just different file types. The BTRFS (Better FS) enterprise file system is blown away with power and ease in comparison to early traditional file system designs like LVM.
  • Administrators can download packages for distribution with no requirement for their installation.
  • Easy to manage processes and control services.
  • Managing users require less time.
  • Nginx – a performance-centric web server, is rapidly taking share market from Apache and has already surpassed IIS.
  • PAM (Pluggable Authentication Module) helps to manage when and how users connect.
  • Administrators can harden the Linux system to gain the best.

Business Web Hosting on Dedicated Servers


Most branded businesses opt for a dedicated server or cloud hosting for their website.

Why dedicated-Server?

  • Host-only the customer’s website who has rented the Server
  • Provides total control of bandwidth, space, and security
  • Dedicated equipment leased from the provider is often reliable
  • Most companies offer excellent customer services

Discounts

Most companies offer attractive discounts when the payment mode is quarterly, half-yearly, or annually. The businesses choose a monthly way, as they don’t want to be stuck for more extended periods.

Dedicated Server Customers

  • Large businesses or websites having substantial traffic
  • The websites collect credit card information, name, address, or other private or confidential details like shopping carts, and forums.
  • Online gaming or casino websites

Benefits Over

Shared Hosting

  • Mostly hosting business starters or personal websites devoted to a celebrity or resume web pages.
  • Limited or otherwise capped space and bandwidth

Free Server

  • Mostly hosting personal web pages.
  • The provider puts ads on web pages to compensate for the cost.

Drawbacks

Costliest: cost runs a couple of hundred dollars

Find the best-dedicated server providers on Ananova, where quality companies are listed with the monthly rate, space, and bandwidth they are offering.

From Personal To Professional


Nowadays, PHP is used for both the ‘Personal Home Page’ and ‘Professional Home Page’ development of website applications and pages.

PHP – Hypertext Pre-Processor

Features

  • Simple: easy-to-use
  • Open Source: free
  • Server-side scripting language: Applications run on a server. The code contains HTML and PHP code placed between ‘<?PHP’ and end ‘?>’ tags.
  • Programming Style: Procedural or Object-Oriented Programming (OOP)
  • Powerful: fast to implement, logic and commands similar to C language
  • Development Environment: Linux, UNIX (HP UX, Open BSD, Solaris) Windows, Mac OS, RISC OS
  • Supported Web Servers: Apache, IIS, FastCGI (Lighttpd & Nginx)
  • Secured
  • Flexible: Almost 75% of websites are designed using PHP which includes Facebook, Yahoo
  • Web Development Features: dynamic content, sending & receiving cookies.
  • Database Support: Supports a wide range of databases and their functions like MySQL to retrieve, edit, delete, and many more operations. Supports Abstraction layer such as PDO or database connect using Open Database connection via ODBC. Connect to other databases via cURL or sockets like CouchDB.
  • Support connections with other servers to create raw network connections using protocols like HTTP, LDAP, IMAP, NNTP, PoP3
  • Writing desktop applications using a graphical interface
  • Word Processing or Text Processing which includes regular expressions, XML document interpretation, and access. Generate and display text from XHMTL or XML files.
  • Advanced Features: Can work as a web-server module or CGI interpreter, executing code using Cron-tables in Linux or Task Scheduler on Windows (such scripts run from the command line using PHP interpreter), creating image & PDF files, make video adjustments. 

Improve WP Security Disable Comments and Hotlinking


(Ananova News) January 20, 2023.

Often spammers leave malicious links in comments or use someone’s else image without permission (hotlinking). Miscreants very conveniently steal images and use the image URL directly on the website, which is served from the original location. Most images have licensing restrictions attached to them like no commercial use under any circumstances. Without paying for the license, the hotlinking allows them to use the image. Digital assets need proper attribution to the original creator.

To disable comments and hotlinking, log in to your WordPress dashboard and navigate to the “Settings” section.

  • From there, click on the “Discussion” tab and scroll down to the “Other Comment Settings” section.
  • Uncheck the box next to the “Allow people to post comments on new articles” option and click on the “Save Changes” button.

To disable hotlinking, you will need to add a few lines of code to your website’s .htaccess file.
WordPress.com uses CDN to speed up the delivery of your assets with hotlink protection.
Technical experts always suggest keeping software (theme, plugins, third-party add-ons, and WordPress Core) updated and up-to-date with the latest fixes. Always use strong and unique logins and passwords to secure accounts. Hence, it is always suggested to have managed WordPress hosting, as the provider monitors website security, takes regular backups, and keeps them up.

Companies like WordPress.com have the expertise to protect hosted websites from cyber attacks, breaches, hacking, identity and access management (IAM), malware and vulnerabilities, and phishing. They take care of updating WordPress core, themes, plugins, and PHP, disabling external URL requests, and implementing SSL. They keep regular backups, which ensure business continuity. A secured website has a good online reputation, so businesses prioritise security. Every eCommerce store and business website needs protection against cyberattacks, malware, and viruses. Businesses want to protect data as well as sensitive information and thus want to ensure website functionality and online reputation. Hence, it asks for crucial security measures. Google penalises or blacklists malicious or phishing websites.

Disable PHP Error Reporting


(Ananova News) January 20, 2023.

PHP error reporting feature displays errors and warnings on the website when something goes wrong. For debugging purpose, it is very useful, but pose a security threat, when reveals sensitive information. Furthermore, looks unprofessional if errors or warning messages displays on the website.

Thus, the feature is disabled, by inserting the following code in the wp-confifg.php file.


ini_set('display_errors','Off');
ini_set('error_reporting', E_ALL );
define('WP_DEBUG', false);
define('WP_DEBUG_DISPLAY', false);

Technical experts always suggest keeping software (theme, plugins, third-party add-ons, and WordPress Core) updated and up-to-date with the latest fixes. Always use strong and unique logins and passwords to secure accounts. Hence, it is always suggested to have managed WordPress hosting, as the provider monitors website security, takes regular backups, and keeps them up.

Companies like WordPress.com have the expertise to protect hosted websites from cyber attacks, breaches, hacking, identity and access management (IAM), malware and vulnerabilities, and phishing. They take care of updating WordPress core, themes, plugins, and PHP, disabling external URL requests, and implementing SSL. They keep regular backups, which ensure business continuity. A secured website has a good online reputation, so businesses prioritise security. Every eCommerce store and business website needs protection against cyberattacks, malware, and viruses. Businesses want to protect data as well as sensitive information and thus want to ensure website functionality and online reputation. Hence, it asks for crucial security measures. Google penalises or blacklists malicious or phishing websites.

Disable External URL Requests


(Ananova News) January 19, 2023.

External URL requests are requests made by your website to external websites or servers. For some functionality and a better experience, there may be a need to tap into other sites or services. While these requests can be useful, they can also present a security risk if they are not properly configured or may respond slower than intended. If external sources respond slowly they might affect the website’s performance. The website is being held back by the external resources it’s trying to load.

To better enhance the security of your website, you may want to consider disabling external URL requests.

To disable external URL requests, you will need to edit your website’s wp-config.php file. Insert the following code into the file:

define(‘WP_HTTP_BLOCK_EXTERNAL’, true);

  • This will block external URL requests on your website.
public function block_request( $uri ) {
	// We don't need to block requests, because nothing is blocked.
	if ( ! defined( 'WP_HTTP_BLOCK_EXTERNAL' ) || ! WP_HTTP_BLOCK_EXTERNAL ) {
		return false;
	}

	$check = parse_url( $uri );
	if ( ! $check ) {
		return true;
	}

	$home = parse_url( get_option( 'siteurl' ) );

	// Don't block requests back to ourselves by default.
	if ( 'localhost' === $check['host'] || ( isset( $home['host'] ) && $home['host'] === $check['host'] ) ) {
		/**
		 * Filters whether to block local HTTP API requests.
		 *
		 * A local request is one to `localhost` or to the same host as the site itself.
		 *
		 * @since 2.8.0
		 *
		 * @param bool $block Whether to block local requests. Default false.
		 */
		return apply_filters( 'block_local_requests', false );
	}

	if ( ! defined( 'WP_ACCESSIBLE_HOSTS' ) ) {
		return true;
	}

	static $accessible_hosts = null;
	static $wildcard_regex   = array();
	if ( null === $accessible_hosts ) {
		$accessible_hosts = preg_split( '|,\s*|', WP_ACCESSIBLE_HOSTS );

		if ( false !== strpos( WP_ACCESSIBLE_HOSTS, '*' ) ) {
			$wildcard_regex = array();
			foreach ( $accessible_hosts as $host ) {
				$wildcard_regex[] = str_replace( '\*', '.+', preg_quote( $host, '/' ) );
			}
			$wildcard_regex = '/^(' . implode( '|', $wildcard_regex ) . ')$/i';
		}
	}

	if ( ! empty( $wildcard_regex ) ) {
		return ! preg_match( $wildcard_regex, $check['host'] );
	} else {
		return ! in_array( $check['host'], $accessible_hosts, true ); // Inverse logic, if it's in the array, then don't block it.
	}

Courtesy: https://developer.wordpress.org/reference/classes/wp_http/block_request/

Technical experts always suggest keeping software (theme, plugins, third-party add-ons, and WordPress Core) updated and up-to-date with the latest fixes. Always use strong and unique logins and passwords to secure accounts. Hence, it is always suggested to have managed WordPress hosting, as the provider monitors website security, takes regular backups, and keeps them up.

Companies like WordPress.com have the expertise to protect hosted websites from cyber attacks, breaches, hacking, identity and access management (IAM), malware and vulnerabilities, and phishing. They take care of updating WordPress core, themes, plugins, and PHP, disabling external URL requests, and implementing SSL. They keep regular backups, which ensure business continuity. A secured website has a good online reputation, so businesses prioritise security. Every eCommerce store and business website needs protection against cyberattacks, malware, and viruses. Businesses want to protect data as well as sensitive information and thus want to ensure website functionality and online reputation. Hence, it asks for crucial security measures. Google penalises or blacklists malicious or phishing websites.