1,000 Clients in Web Hosting

Total Page:16

File Type:pdf, Size:1020Kb

1,000 Clients in Web Hosting GETTING & MANAGING YOUR FIRST 1,000 CLIENTS IN WEB HOSTING FEATURING: Web Host Manager (WHM)/cPanel WHM Complete Solution (WHMCS) Brought To You By: www.hostgator.com ii – Book brought to you by HostGator.com Getting & Managing Your First 1,000 Clients in Web Hosting Abrahim Ikasud Copyright © 2009 Ichthys Media LLC Published by: Ichthys Media LLC 39380 Civic Center Dr #307 Fremont, CA 94538 Distributed by: HostGator.Com LLC 11251 Northwest Freeway, Suite 400 Houston, TX 77092 All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 First Printing July 2009 Warning and Disclaimer This book is designed to provide guide and information to start and manage your own web hosting business. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author and Ichthys Media LLC shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the application and software that may accompany it. The opinions expressed in this book belong to the author and not necessarily those of Ichthys Media LLC. Book brought to you by HostGator.com - iii Trademark Acknowledgements All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Ichthys Media LLC cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark of service mark. Corporate Sales / Resellers Ichthys Media LLC offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales. For more information please go to http://webhostingbusinessbook.com/resellers iv – Book brought to you by HostGator.com ABOUT THE AUTHOR The author has over 12 years experience in starting, growing, managing, and selling his own web hosting businesses. The author started his first web hosting company at the age of 21 and has successfully grown the business into a multimillion dollar web hosting company. Together with his wife, the author manages to grow his first company from a literally a one man show to a staff of over 50 people with offices both in his home country and in the United States where he currently resides. Under his management the company grew from utilizing a single reseller account to owning over 130 servers which are being collocated in a data center residing in the heart of Silicon Valley. He then sold his first web hosting company through a well known merger & acquisition deal in late 2007. Today the author is currently running his second web hosting company and has successfully acquired a substantial amount of market share in today’s highly competitive web hosting market. The author currently resides in the Silicon Valley area, California with his wife and three children. Book brought to you by HostGator.com - v DEDICATIONS To my Lord and Savior, Jesus Christ, for saving my life and my family. To my wife Siao We for having such a passion for God, thank you for hooking me up with The Lord. You’re the best thing that ever happened in my life. To my three children, Ashley, Darryl, and Jeremy, you’re the apple of God’s eye, the lights and salts of this world. May God’s fire will always burn you with an everlasting passion to do His work. To my late father, my mom, and my brother Mario, thank you for loving me the way you do, only God can return the love you have given me. vi – Book brought to you by HostGator.com ACKNOWLEDGEMENTS First and foremost, thank you for my teammates – past and present – on Host Department LLC, PT. Global Hosting Management, and Ichthys Media LLC: Chai Siao We, Antonius Mario Tanzil, Chai Siau Fung, Iskak Agus Rahmat Utomo, Linus J. Erlando, Ifan Artha W., Sudirman Hung, Pius Didimus, Ferry Wahyudi, Christine Djaja ,Muhammad Iswahyudi Adnan, Muhammad Elizar, Bimo Sakti Wijoyo, Ravelino Bongkal, Ridwan Karsadarma, Dipo Firdyansyah, Afifah Shihab, Teddy Kristanto, Andreas Sunarso, Arya Pratama, and Bun Sentoso. I feel privileged to know and work with such talented and resourceful people personally. I wish you all the best. I would also like to thank my former employers and managers who have given me the privilege of working with them: Mr. Sachin Gopalan, Mr. Kristanto Darwin, Mr. Jonathan Morris, and Mr. Martin Entwistle. Thank you for giving me an opportunity to work for your company. Finally, thank you to my wonderful wife who has endlessly given her full support for me to write and publish this book the right way and to put my best effort into this book. I am sure this book will end up helping a lot of people to have their own journey that they will never forget, just like us. Book brought to you by HostGator.com - vii TESTIMONIALS “The Web Hosting Business Book is an invaluable guide and resource for anyone looking to create their own web hosting business and maintain it — from start to finish. Even established Web Hosting companies can learn a great deal from the author’s extensive industry experience.” -Chad Bean, Chief Marketing Officer, HostGator (hostgator.com) “This book is an ideal companion for the newcomer to the business side of web hosting. It’s an easy read & contains lots of good advice and ideas for how to grow your business when getting started. It’s clear the author has a wealth of experience and is able to cover a wide range of topics that face the web hosts of today. The WHMCS chapter in particular has a great step-by-step guide to get you started quickly & easily with WHMCS, and thereby empower you to make your business a successful one.” -Matthew Pugh, CEO WHMCS Ltd (www.whmcs.com) viii – Book brought to you by HostGator.com TABLE OF CONTENTS Getting & Managing Your First 1,000 Clients In Web Hosting ............................................................................................................. i About The Author .......................................................................................................................................................................... iv Dedications ..................................................................................................................................................................................... v Acknowledgements ....................................................................................................................................................................... vi Testimonials.................................................................................................................................................................................. vii Introduction ..................................................................................................................................................................................... xiv I Am On A Mission ................................................................................................................................................................... xiv Intended Audience ....................................................................................................................................................................... xv What Is Covered In This Book ...................................................................................................................................................... xvi Before We Begin .........................................................................................................................................................................xviii Chapter 1 – Getting Started ................................................................................................................................................................ 2 A Good Name For Your Business .................................................................................................................................................... 2 Your Hosting Platform .................................................................................................................................................................... 3 Your Domain Reseller Provider ....................................................................................................................................................... 6 Your Client Management And Billing System ................................................................................................................................. 7 Your Payment Gateway .................................................................................................................................................................. 8 When And How To Get A Merchant Account ............................................................................................................................ 8 Your Ssl Reseller Provider ............................................................................................................................................................... 9 Conclusion ...................................................................................................................................................................................
Recommended publications
  • Web Hosting Service Operating Procedures and Processes
    WEB HOSTING SERVICE OPERATING PROCEDURES AND PROCESSES UNIVERSITY COMPUTER CENTER UNIVERSITY OF THE PHILIPPINES DILIMAN Document Control Document Properties Title Web Hosting Service Operating Procedures and Processes Author Gerardo Maria Roxas Document Type Administrative Document Filename Web Hosting SOP.gdoc File location UPCC/IT Security Version History Version Number Version Date Author/Modified By Description 0.01 October 15, 2018 Gerardo Maria Roxas Initial Version University Computer Center Page 1 of 9 Web Hosting Service Operating Procedures and Processes Table of Contents Document Control 1 Document Properties 1 Version History 1 Table of Contents 2 Overview 3 Web Hosting Application Procedures 3 Responsibilities of Requesting Unit on Web Sites: 4 Active Threat Scanning and Remediation Plan 4 Incident Management 5 Credential Retrieval by Existing Users 8 Additional Information 8 University Computer Center Page 2 of 9 Web Hosting Service Operating Procedures and Processes Overview The Computer Center maintains a basic web hosting service that is available for UP Diliman academic and administrative units free of charge. The hosting service has the following technical characteristics: 1. Runs either Apache 2.2 or Nginx 2. Runs PHP 5.4, with newer servers running PHP 7.2 3. Runs MySQL, with 1 database available upon request. 4. The Computer Center can pre-install CMS sites such as Wordpress upon request. 5. The hosting service is shared, meaning multiple sites can be hosted in a single server. 6. End users normally have access only through FTP. 7. FTP and Database access is available only within the Diliman Network (DilNet) 8. Web ports 80 (HTTP) and 443 (HTTPS) are the only ports exposed publicly.
    [Show full text]
  • OECD‘S Directorate for Science Technology and Industry
    THE ECONOMIC AND SOCIAL ROLE OF INTERNET INTERMEDIARIES APRIL 2010 2 FOREWORD FOREWORD This report is Part I of the larger project on Internet intermediaries. It develops a common definition and understanding of what Internet intermediaries are, of their economic function and economic models, of recent market developments, and discusses the economic and social uses that these actors satisfy. The overall goal of the horizontal report of the Committee for Information, Computer and Communications Policy (ICCP) is to obtain a comprehensive view of Internet intermediaries, their economic and social function, development and prospects, benefits and costs, and responsibilities. It corresponds to the item on 'Forging Partnerships for Advancing Policy Objectives for the Internet Economy' in the Committee‘s work programme. This report was prepared by Ms. Karine Perset of the OECD‘s Directorate for Science Technology and Industry. It was declassified by the ICCP Committee at its 59th Session in March 2010. It was originally issued under the code DSTI/ICCP(2009)9/FINAL. Issued under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the OECD member countries. ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of 30 democracies work together to address the economic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments and concerns, such as corporate governance, the information economy and the challenges of an ageing population.
    [Show full text]
  • Spamexperts Incoming Email Filter a Powerful Solution to Safeguard Networks from Inbound Spam and Malware, Helping Web Hosts Save Time and Money
    DATASHEET SpamExperts Incoming Email Filter A powerful solution to safeguard networks from inbound spam and malware, helping web hosts save time and money. Inbound spam, ransomware, and phishing attempts can put any internet service provider at risk. N-able™ SpamExperts helps web hosts and ISPs/telcos strengthen email protection. Services include affordable inbound filtering driven by a continuously updated Intelligent Protection & Filtering Engine to meet emerging threats. The solution can be deployed in a redundant cloud environment or on premises. How it works: N-able SpamExperts incoming spam filter is an email gateway solution. Activation is done with a simple DNS adjustment. Once the MX records are changed, all inbound email goes to our system first, where it is filtered and then relayed to the unchanged destination mail servers of your clients. It provides first-level defense running in front of your mail infrastructure and separates legitimate from unsolicited email with the help of advanced filtering algorithms and spam pattern detection methods. It offers full inbox protection with a nearly 100% accuracy rate. Potentially harmful messages are queued in quarantine and can be managed by end users. Helps save resources and money • Protects networks against the latest email-based threats. • Saves network resources with an efficient first-level incoming filter defense. • Helps save money with competitive and affordable licenses. Offers dual deployment options and integrates with a broad range of tools • Cloud or on-premises deployment. • Free add-ons to integrate with the most popular control panels and other email collaboration tools. • Multiple branding options available. Global statistics Gives customers and users visibility and control over their email flows • Empowers users to manage their email flows and gain real-time visibility into threats.
    [Show full text]
  • Understanding and Analyzing Malicious Domain Take-Downs
    Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs Eihal Alowaisheq1,2, Peng Wang1, Sumayah Alrwais2, Xiaojing Liao1, XiaoFeng Wang1, Tasneem Alowaisheq1,2, Xianghang Mi1, Siyuan Tang1, and Baojun Liu3 1Indiana University, Bloomington. fealowais, pw7, xliao, xw7, talowais, xm, [email protected] 2King Saud University, Riyadh, Saudi Arabia. [email protected] 3Tsinghua University, [email protected] Abstract—Take-down operations aim to disrupt cybercrime “clean”, i.e., no longer involved in any malicious activities. involving malicious domains. In the past decade, many successful Challenges in understanding domain take-downs. Although take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. domain seizures are addressed in ICANN guidelines [55] Although it plays an important role in fighting cybercrime, the and in other public articles [14, 31, 38], there is a lack of domain take-down procedure is still surprisingly opaque. There prominent and comprehensive understanding of the process. seems to be no in-depth understanding about how the take-down In-depth exploration is of critical importance for combating operation works and whether there is due diligence to ensure its cybercrime but is by no means trivial. The domain take-down security and reliability. process is rather opaque and quite complicated. In particular, In this paper, we report the first systematic study on domain it involves several steps (complaint submission, take-down takedown. Our study was made possible via a large collection execution, and release, see SectionII). It also involves multiple of data, including various sinkhole feeds and blacklists, passive parties (authorities, registries, and registrars), and multiple DNS data spanning six years, and historical WHOIS informa- domain management elements (DNS, WHOIS, and registry tion.
    [Show full text]
  • Enom Plug-In Configuration Guide Parallels Plesk Automation Billing Revision 1.1
    eNom Plug-in Configuration Guide Parallels Plesk Automation Billing Revision 1.1 Copyright © 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH. Vordergasse 59 CH8200 Schaffhausen Switzerland Tel: + 41 526320 411 Fax: + 41 52672 2010 www.parallels.com Copyright © 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at http://www.parallels.com/trademarks Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. Mac is a registered trademark of Apple, Inc. All other marks and names mentioned herein may be trademarks of their respective owners. Contents Preface ....................................................................................................................... 4 Documentation Conventions ............................................................................................. 4 Typographical Conventions ............................................................................................... 4 Feedback .......................................................................................................................... 5 About Domain Registrars .......................................................................................... 6 Domain Registrar Configuration
    [Show full text]
  • Installing Using an Auto-Installer
    Installing using an auto- installer Softaculous, Fantastico, etc If your web provider offers Softaculous, Fantastico or other similar software installers, then you may choose to use the. These installers do the bulk of the work for you and can be faster than installing phpList manually. Log on to your web space, (cPanel/Plesk etc) and click on Softaculous/Fantastico then find the phpList installation and choose the Install option. Please note, for this example I have used Softaculous installer. On the Install page you can choose your settings. In the order shown in the image: Protocol http:// is the norm Domain if you have more than one domain on your hosting/web space, choose that here Directory you should set the directory that you wish your phpList installation to be placed in. This should usually be left blank however in this example we are using test/phplist1. Any variations will become part of the URL to your phpList install, so it is best to keep it simple A database name is suggested next. You may change it within limits to a name that makes more sense to you if you wish. 8 characters are usually the maximum here as it will be prefixed to your hosting username (eg:user234_phplst1 in my example). Important! If you have only one database available to all your websites, then it is very important to use a unique identifier here, one that makes sense to you as belonging to this phpList installation. If you have access to a number of databases, then it's an advantage to use one per installation.
    [Show full text]
  • Directadmin As a Viable Alternative to Cpanel
    DirectAdmin as a viable alternative to cPanel It’s well recognized that cPanel is the most popular control panel in the web hosting industry, but DirectAdmin is a viable alternative for any number of reasons, including: It’s easy to use When we talk about user interface, what most clients look for is efficiency that addresses everyone from noobies to the more advanced. With DirectAdmin, you get three levels of access; reseller, admin and user, and those can be easily managed under one login. Not happy with the interface? Skins (design layouts) can be swiftly interchanged with one click. Efficiency as it relates to speed Again, efficiency is at the forefront here because DirectAdmin utilizes very little resources on the system side of things, which makes it a viable solution for everything from very complex dedicated servers to the lowest of low VPS servers. This translates into increased speed, and who doesn’t want that? How DirectAdmin deals with downtime Here’s something you’ll love about DirectAdmin. It automatically recovers from crashes and sends sysadmins notifications so they can take corrective measures. In addition, it’s entirely stand-alone, so admins can easily change up libraries and services without apprehension. DirectAdmin features an in-depth knowledgebase Looking for a tutorial or answer to a question about DirectAdmin? Their knowledgebase is full of highly informative tutorials and answers. Check out their Community Forum If you’re looking to integrate DirectAdmin with other software help not supported by the DirectAdmin team, their forum is the right place to pose your query.
    [Show full text]
  • Comodo Web Application Firewall Administartor Guide
    2 Comodo Web Application Firewall Software Version 2.17 Administrator Guide Guide Version 2.17.061118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Web Application Firewall - Admin Guide Table of Contents 1. Comodo Free ModSecurity Rules - Introduction...................................................................................................3 1.1.System Requirements.........................................................................................................................................4 1.2.Sign up for Free ModSecurity Rules...................................................................................................................4 1.3.Login to the Administration Console...................................................................................................................9 1.4.The Administration Console - The Main Interface.............................................................................................11 2. Deploy CWAF Rules On Server ............................................................................................................................13 2.1.Linux - Install the Agent and Control Panel Plugin............................................................................................13 2.2.Linux - Install the Agent in Standalone Mode ...................................................................................................16 2.3.Windows - Install the Ruleset on Windows IIS ................................................................................................17
    [Show full text]
  • My Account Was Hacked
    My Account Was Hacked If your account has been hacked or compromised in some way - don't worry, we may be able to help. We offer a Managed Security Clean Up Service - for more information see our website or contact Technical Support by phone, chat, or ticket. How was my account hacked? How do I recover? Helpful Links How was my account hacked? There are two common ways account are compromised: 1) The hacker successfully authenticated and accessed your account like a regular user. The attacker already knew your password (e.g., because your home computer has a virus or other program logging your keystrokes) or was able to guess your password (e.g., using a brute force or dictionary attack). 2) The attacker exploited a security vulnerability in a script or application installed on your account. This is most likely the case if you are running old or outdated software that has known security vulnerabilities (e.g., Joomla 1.0). This type of vulnerability can also occur in the database through a MySQL injection, as such your database integrity is also most likely compromised. How do I recover? To help mitigate future attacks, we recommend performing all of the following: – Before doing anything else, run a complete computer scan for viruses and malware. Ensure that your system is running up-to-date anti-virus and anti- malware software. – Login to your cPanel and change your main cPanel, e-mail, FTP users, and MySQL users passwords. Make sure the new passwords are secure; they should contain a mix of upper- and lowercase letters and numbers.
    [Show full text]
  • Servers Prior to Use
    TECANA AMERICAN UNIVERSITY BACHELOR OF SCIENCE – Information System Engineering Trabajo Especial de Grado Internet Service Provider – Hosting Automation Software Presentado por: Bhamidipati Venkata Gopala Anirudha Sharma Como requisito para optar al titulo: Bachelor of Science in Information System Engineering Por Academic Dirección: Dr. Jesús Reinaldo Rivas Zabaleta, Ph.D. Por Academic Staff: Dr. Raúl Roldán, Ph.D. Caracas, 15 de Agosto de 2005 1 TECANA AMERICAN UNIVERSITY BACHELOR OF SCIENCE – Information System Engineering Trabajo Especial de Grado Internet Service Provider – Hosting Automation Software Presentado por: Bhamidipati Venkata Gopala Anirudha Sharma Como requisito para optar al titulo: Bachelor of Science in Information System Engineering Por Academic Dirección: Dr. Jesús Reinaldo Rivas Zabaleta, Ph.D. Por Academic Staff: Dr. Raúl Roldán, Ph.D. Caracas, 15 de Agosto de 2005 “Por la presente juro y doy fe que soy el único autor del presente trabajo especial de grado y que su contenido es consecuencia de mi trabajo, experiencia e investigación académica” _______________________________________________ Autor: Bhamidipati Venkata Gopala Anirudha Sharma Fecha:14-Aug-2005 Ciudad: Caracas, Venezuela. 2 About the Industry Technical Reviewer: Ing. Oswaldo José Inojosa Moya: Ex – CTO, Dayco Telecom C.A. He is one of the founder members of the original team who lead the formation of the 1st Data Center in Venezuela, and was instrumental in the formation of high availability services in the country. He came to lead a multi-disciplinary task force of operations at Daycohost, from a large transnational ATM Solution Provider called Newbridge which later was absorbed Alcatel. He has graduated from the prestigious Simon Bolivar University in Caracas, Venezuela as “Electronics Engineer “and later on specialized in “Business Finance” from the same university.
    [Show full text]
  • All in One Nice Package
    Protects Linux Web Servers against any kind of malware, known and unknown. All in one nice package. Defends against viruses, adware, spyware, Trojans, and worms. PROBLEMS § Multiple security solutions are required to protect against different types of attacks § Web servers are susceptible to specific types of attacks not solved with most security solutions built for the Enterprise § Even if hosting companies keep servers protected, customers often run outdated and insecure CMS and extensions § Zero-day attacks are impossible to identify with anti-virus solutions Protects against known SOLUTION and unknown vulnerabilities The most complete automated security solution for Linux web § Dedicated / VPS; Shared Servers servers § cPanel / DirectAdmin / Plesk § No control panel - coming soon An all-in-one solution powered by a sophisticated technology, yet simple to use CENTRALIZED INCIDENT MANAGEMENT Advanced IDS / IPS Malware Detection Proactive Patch Reputation Firewall & Removal Defense Management Management Powerful technology delivers 360° defense in one cohesive application § Takes advantage of herd protection and all related information to detect attacks § Uses heuristics and machine learning to correlate information § Minimizes human involvement and decision making § Incorporates multiple layers to detect and defend against the attacker Attack Attack Attack Malware Scanner Firewall / WAF Proactive Defense Web PHP File System Server WAF and IDS/IPS Proactive Defense Malware Scanner (anti- (protection against remote § Unknown -- zero-day -- attacks virus) prevention exploits) § Detects infected files in file systems § Checks PHP scripts for dangerous § § Protection against brute force attacks, DoS behaviors and stops them Recognizes based on signatures attacks, and port scans § Checks https requests and matches against known attacks Security must be effective, and Imunify360 with Proactive Defense is.
    [Show full text]
  • Web Hosting Service Participants Meeting
    1/13/11 Web Hosting Service" Participants meeting http://oit.ncsu.edu/web-hosting-service Presented by: Office of Information Technology January 13, 2011 Introduction to Web Hosting Service Over a year ago, OIT began investigating how to deliver web services in a manner similar to those in the commercial sector. Our current web service, while stable and robust, is unable to provide campus users with the flexibility of more packages/applications and economy of scale that many of us desire to use for our web presence. OIT has been piloting a model of this service with 5 participating units, all who have used the service to varying degrees. OIT is now ready to expand this pilot into a beta by increasing our customer base and monitoring the administrative, technical and support load as we prepare to go into production mode. 1 1/13/11! What makes up the service? Service is running on the OIT production blade farm and the Linux-based operating environment is running atop a VMware infrastructure. Customers have access to cPanel and Fantastico to manage their site(s). WRAP-authentication, InForm availability; two levels of service: Lite and Full. We have tested the service on external machines (hosted by a commercial provider) and are now testing running internally. What’s different about web hosting? • Initial account comes with 10 GB of space w/option to purchase more in 10 GB increments • cPanel control panel to administer your site(s) • Fantastico system that makes installing scripts easier • Unlimited databases (mySQL) • More features and applications for your web presence • Two levels of service (Lite and Full) We continue to offer • NC State hosted URLs • Nightly back-ups • Unlimited bandwidth 2! 1/13/11! Full vs.
    [Show full text]