General


What is GDPR? An easy overview of the General Data Protection Regulation

The EU General Data Protection Regulation (GDPR) law is the most important change in data privacy regulation in 20 years – we’re here to make sure you’re prepared. How’s that for an opening line? If you fire up your web browser right now and head over to the EU’s official GDPR homepage (seriously do it), this bold quote sticks out like a sore thumb, and that’s most likely by design. GDPR is currently among the hottest and controversial tech topics that no one (well, at least us state-side folks) is talking about. Proposed by the European Commission, GDPR is a data protection law that was initially adopted last April and replaces a previous data protection law implemented back in 1995. GDPR goes into effect on May 25, 2018. Although the GDPR regulations are technically in place right now, they’re not enforceable until May 25, 2018. Given that this is the date, we need to roll our sleeves up and get to work!

Familiarize Yourself With The Basics

I’d be the first person to admit that I’m no legal advisor nor am I anywhere close to being a GDPR expert by any means. However, I will do my best to keep you calm and share as much as I understand to help you prepare for doomsday (ignore my awful attempt at humor, swear I’m not trying to scare you!). The aim or objective of GDPR is to put personal data back under the control of the individual. If you’ve done any basic level of research on GDPR, you’ll notice the EU’s documentation use of the words ‘processor’ and ‘controller’ quite frequently. In a layman’s term, the data controller is the organization (aka us business owners) that hence ‘control’ the data, whereas, the data processor is the organization that handles or processes this data (can be your web hosting provider, email marketing provider, etc.).

In principle, the mere timing and action of the legislation shouldn’t be that surprising when you take in account last year’s disastrous Equifax’s data breach and Facebook’s current data scandal. As a self-proclaimed tech-junky, what catches my attention most is not so much the timing or even the formation of the GDPR law (generally speaking) but rather, the requirements of the law and skeptically what is being defined as ‘personal data.’ Be mindful of this as you can overlook personal data.

According to the EU, the term ‘personal data’ is loosely described as any information that can define a human being (name, photo, email addresses, date of birth, etc.). If you think about this, there’s a little bit of a grey area in this regard. For example, from my understanding, comments left on that last kick-ass blog post you created would also be categorized as personal data under the law. Why? Because that person that left you that nice feedback in the comments section probably had to sign in your website. This means that we (the business) have some form of this individual’s data stored on our end (by the web host). Some may find this excessive and abrasive, but unfortunately, it’s out of our control, and we have to accept it. Know that EU citizen’s data are about to be protected to an extent we’ve never seen before.

 

Why Should You Be Concerned?

Although it’s most pivotal for businesses inside the European countries, the GDPR legislation will have an impact on your company if you have any website visitors from European citizens. A little louder for the folks in the back: If you’re a business or website and are collecting any user data from European citizens or residents, you are required by law to comply 100% with GDPR. GDPR applies to ANY company that processes any data on behalf of EU citizens or residents. Don’t feel like complying? You better be ready to fork up some cash. Penalties for non-compliance of the GDPR can result in fines of up to 4% of gross revenue (or up to 20 million Euros).  Under GDPR, your organization only has 72 hours to report a data breach, so time is literally of the essence. Sorry for my language but there’s no ‘half-assing’ this time around my friends. Now that that’s out of the way let’s get down to brass tacks.

Marketers especially will be key players in the rollout of GDPR. Let’s role-play for a moment (not that kind of role-play, get your head out of the gutter) and put on our digital marketing hats. On any given day, we target users and collect their data, and probably don’t think twice about it. For example, on our standard landing page or ‘contact us’ form, we might have three fields: first name, last name, and email address. We then subsequently grab this information from a database to collect or update our current mailing list of subscribers so we can target them using various platforms. With GDPR, we need an extra check mark that requests the consumer’s consent. This text will read along the lines of ‘I consent to company XYZ collecting and storing my data via this form.’ The folks at WPForms wrote an easy starter kit on how to create GDPR compliant forms that I recommended checking out. If you’re not already implementing double opt-ins, the procedure where the person who initially signed up receives a confirmation email to confirm their signup, I highly recommend doing this asap. The great advantage of double-opt ins is that it puts the responsibility on the user to take the next step. One less thing to worry about!

What Immediate Steps Can You Take?

Under GDPR, there are several action items that we have to fulfill as WordPress administrators. If you can begin by doing some simple house cleaning, the lowest hanging fruit is to wipe out any plugins you’re not utilizing. This is already a best practice for ensuring website performance and optimization, so you’re killing two birds with one stone. From a provider standpoint, any plugins that you use will also need to comply with the GDPR rules as well. Putting that marketing hat back on for a moment, think about plugins you’ve integrated with your WordPress site. I would bet that you’re probably using a web analytics tool. You’ll want to pay attention to these tools because their sole reason for existing is to track users and their user behaviors on your behalf.

On a side note, GDPR can spell some tough times for some of the most popular plugins out there. Solution providers such as Jetpack, a very popular marketing & design WordPress plugin, collect a whole lot of data by nature. However, as a site admin or owner, it’s still our responsibility to make sure that the plugins, active or inactive, are complying with GDPR regulations themselves. Perfor an audit of your plugins and make sure that the third-party providers are on their A-Game when it comes to GDPR compliance. Familiarize yourself with plugins as you’ve never done before. Also, I realize it’s common for a lot of businesses to outsource their website management to third parties. Unfortunately, this causes a disconnection between the owner(s) and the third party admins who hold personal data. Reach out to them on twitter or go old-school and give them a ring (people do this still right) to make sure stakeholders are all on the same page.

Website cookies also store and collect data to help marketers retarget users with ads, analytics tracking, and storing your session dat) Going forward, you should make your messaging crystal clear for individuals ahead of placing any cookies on their machine. One action you can take is to launch a pop-up window or place text somewhere that’s extremely visible to the user. We can no longer be vague with our messaging. People need to know what they are signing up for, so investigate and find out what the plugins and other third-party tools are collecting on your behalf. Remember, the burden of proof lies with us, the business owners and organizations.

Some larger organizations who have the budget, have already decided to appoint or hire a Chief Data Officer. This expert would be responsible for all things GDPR related and would relieve companywide anxiety for sure. Whoever you put in charge, he or she needs to fully grasp what information is being collected, how it’s being collected and why it’s being collected. If your budget doesn’t allow for a fancy Chief Data Officer, that’s okay. Another route you can take is to have your legal team work together with your in-house or IT hosting company. This creates a synergy, and it’s less likely things will fall through the cracks. On a larger scale, ensure every single employee in your organization has a basic understanding of GDPR and why it’s important to stay mindful of. Make a company event out of it, or get on a quick all hands call to get the ball rolling. However you decide to move forward, the key is to create awareness as soon as possible and start getting into good habits!


The importance of a Web Application Firewall for WordPress Sites

Before we dive in and get down to the nitty-gritty, let’s begin with some basic background information on firewalls (feel free to bypass this part if you’ve already done your homework). At the most basic level, A Firewall is a software and/or hardware feature that acts as a shield or ‘wall’ between your website and all incoming traffic. Think of it as the space between your home router and the internet. In a typical home internet setup, the wireless router serves as the hardware firewall while your computer’s and/or device’s standard operating system (Windows, Mac OSX, etc.) serves as the software component of the firewall.

Firewalls protect you from the bad guys by using customized filters. These filters are a basic set of rules that are defined in order of prioritization. This is important because as a company, you only want authorized and safe traffic accessing your website. On top of utilizing best practices such as using secure passwords and frequently changing them, you also need to learn about the general importance and the necessity of a firewall. (I wrote a recent blog post about a similar security topic called ‘Two-Factor Authentication’ that you can read about if you’re intrigued). So, in a nutshell, a firewall is that extra important security layer that your website and computer needs. For this blog entry, I’ll be focusing on what is known as ‘web application firewalls’ or WAF’s for short.

WAF’s are more of a recent introduction to the WordPress ecosystem. WAF’s work hard to counter cyber attacks from malicious hackers who are seeking to steal highly sensitive information. To keep things easy peasy, all you need to remember is that WAF’s exist to protect your WordPress website! 

Why Do I Need a Web Application Firewall For My WordPress Site?

Historically speaking, 2017 holds the RECORD for the total number of cyber attacks in terms of security breaches, ransomware, and exploits according to an annual global security report issued by AppRiver. You very well may have heard about the infamous Equifax nightmare that resulted in possibly 143 million people having their highly sensitive personal data (social security and driver’s license numbers) compromised. Ok, Idean, that all sounds fine and dandy but do I really need a web application firewall for my WordPress site? I mean, nothing has happened so far and all this is just so companies can make an extra buck right? Well, my friend, do I have some interesting and frankly scary data to share with you. Did you know that among all CMS (content management system) platforms, WordPress gets hacked the most? Furthermore, there are up to 90,000 attacks per minute on WordPress sites according to Wordfence, the creator of a popular WordPress plugin. Unfortunately, this is naturally the price we consumers pay for the ‘user-friendly’ WordPress CMS.

How A Web Application Firewall Works and What We Offer

WAF’s are configured to either (or in some hybrid cases both) a) allow certain traffic or to b) block traffic. Whitelisting, or allowing certain data from a pool of accepted IP addresses ensures that the incoming traffic to your website is deemed ‘safe.’ On the other hand, blacklisting certain IP addresses will ensure that malicious data will not access your website and is designed to thwart anything that can slightly resemble a cyber attack. In regards to WAF’s, all these configurations are carefully executed and set at the software level for WordPress sites.

At HD, we understand how important security is for your WordPress site. No different than a 24-hour state of the art home security system that protects your property, our highly skilled security experts strive to go above and beyond to ensure stability and thwart attacks before they happen. Just how a home burglary happens approximately every 13 seconds, hackers across the world are hard at work attempting to steal your precious information and data. These days, you need more than a full-grown Rottweiler on the premises to protect your valuable belongings! At an age where we’ve seen notorious attacks like the Equifax breach, a hosting provider that provides 24/7 security over your website is a must and not just a ‘nice to have.’ At HD, we offer a standard WAF that we use for all clients out of the box as well as a highly advanced WAF for our premium plans (in partnership with the good folks at Sucuri). HD’s state of the art DuplexGuard™ security will keep you safe and protect you from 99% of attacks while also preventing them from happening. As always, we’re here to answer any of your questions so please, don’t be a stranger!


HD is beyond thrilled to announce that we’ll be joining an incredible group of sponsors for this year’s WordCamp conference in Sunny San Diego! For those who haven’t attended in the past, WordCamp is a yearly conference covering all things WordPress related. WordCamp SD will be held at San Diego City College on April 14-15th. (Don’t stress though, the venue is conveniently located near the San Diego Airport with there’s ample parking in the area). 

This year’s speakers include an outstanding lineup of WordPress developers, designers, and business leaders alike. WordPress topics from the event schedule that caught our eyes include; ‘The Hidden Features of WordPress’ and ‘Making Security Make Sense to Users & Clients.” The HD crew is particularly looking forward to all things security/privacy related, along with networking with the WordCamp community…but who isn’t right?! 

You can follow the conversation on social media by using the official WordCamp San Diego 2018 Hashtag #WCSD and be sure to reach out or tag us on Twitter (@HostDuplex) during the conference.

Purchase your tickets today, book your hotel and come nerd out with us in San Diego!


This tutorial describes how to install the Dell OMSA (OpenManage Server Administrator) on Citrix XenServer 6.5.

Note: Citrix has spent long hours quality testing their packages.  The method below downloads packages directly from the CentOS-Base repository. While the following method has worked just fine in our lab, we ask you to proceed with caution.


Step 1:
Temporarily disable the Citrix yum repository.  As of this post, Citrix’s repo does not seem to be working properly.

To do so, let’s temporarily move the Citrix.repo file out of the /etc/yum.repos.d folder.
Alternatively, you can also disable the repo within the file itself.

mv /etc/yum.repos.d/Citrix.repo /root/Citrix.repo


Step 2:
Run the following:

yum clean all


Step 3:
Install the Dell OMSA Repository:

wget -q -O – http://linux.dell.com/repo/hardware/Linux_Repository_14.12.00/bootstrap.cgi | bash


Step 4:
Install Dell OpenManage Server Administrator

yum –enablerepo=base install srvadmin-all


Step 5:
Open port 1311 in iptables

nano /etc/sysconfig/iptables

Now add the following line above the second-to-last line that mentions icmp-host-prohibited:

-A RH-Firewall-1-INPUT -m state –state NEW -m tcp -p tcp –dport 1311 -j ACCEPT


Step 6:
Restart iptables

service iptables restart


Step 7:
Start Dell OpenManage Server Administrator

/opt/dell/srvadmin/sbin/srvadmin-services.sh start


Step 8:
Move the Citrix.repo file back to the original location:

mv /root/Citrix.repo /etc/yum.repos.d


Step 9:
You can now access OMSA via your browser: https://Your.IP.Address.Here:1311

 


If you’ve tried to change the DNS Nameservers on your XenServer machine and are wondering why it keeps reverting back to its previous setting, you’re not alone.  In this blog we lay out the steps on how to properly change your DNS settings in XenServer.

You’ll want to log onto your machine via XenCenter or via console and go to the Local Command Shell:

Local Command Shell

2.  Now you’ll want to run xe pif-list
Take note of the uuid of your management interface.
3.  Now you’ll want to run the xe pif-reconfigure-ip uuid=youruuid mode=static IP=ipaddresshere netmask=subnetmask gateway=yourgateway DNS=dnsserver1,dnsserver2
Press enter and you’re set 🙂

Reconfigure XenServer DNS Nameservers


To begin installation of XenServer you’ll want download the latest Citrix XenServer Install CD, any supplemental packs, and XenCenter.  You may have to login to download the ISO files.  We recommend using PowerISO or any other burning utility that can verify your disc.

To install Citrix XenServer, there are a few requirements that must be met.  Your server must include at least 2GB of RAM.  The processor must be a minimum of 1.5GHz, and support virtualization (Intel® VT or AMD-V™ required for support of Windows guests).    You may want to review the XenServer System Requirements.  Our test machine for this how-to is a Dell PowerEdge 1950.  Before installation begins, you should enable virtualization within your BIOS.

1.  Begin by booting your computer and entering BIOS.  On our machine that is the F2 key:Dell PowerEdge 1950 XenServer Install

2.  Move to the applicable category, CPU Information in our case:Dell PowerEdge 1950 CPU Information

3.  Enable Virtualization Technology:Enable Virtualization Technology

4.  Save and Reboot.  Ensure your disc in the drive and make sure you boot from your CD drive.  If your server doesn’t have a cd/dvd drive, you may have to use an external drive.

When you boot from the CD, you should reach the XenServer installation screen. Press Enter once you reach the screen below to continue with installation.XenServer Installation Screen
5.  You should reach the screen asking you to choose your keymap.  Choose your keyboard layout and continue… in our case, [qwerty] us

6.  The next screen will ask if you need to load a device driver.  Since we are using a Dell PERC card, it isn’t required in our case. Click OK and continue.

7. Read the EULA and continue

8.  Choose the disk you would like to use for your Virtual Machine Storage and click OK to continue.

NOTE:  If your drive/volume is larger than 2TB, then you will have to create a partition that is less than 2TB for the XenServer hypervisor.  If you are using RAID 10 and a PERC card (as we have before), Dell’s PERC Configuration tool does not allow for 2 separate RAID 10 partitions.  Since Dell’s PERC Card is a rebranded LSI card, you can create the 2 separate partitions using LSI’s MegaRAID software.  If you are using a PERC 5/i or 6/i you can download it under the LSI MegaRAID SAS 8408E Adapter.  or here: LSI MegaRAID Storage Manager for Windows XenServer Install Virtual Machine Storage

9.  Choose your Installation Source.  In our case, we are using a CD so we choose Local Media.XenServer Installation Source

10.  It will now ask you if you would like to install any supplemental packs.  If you plan on installing any Linux VMs, it is a good idea to install the Linux Supplemental Packs.  There are also other supplemental packs that you can install.  For example, Dell has OpenManage software that can be and installed easily using the OpenManage supplemental pack. We will choose Yes at this screen since we are installing the Linux Supplemental Pack.XenServer Supplemental Packs

11.  It now asks us to verify the installation source.  This is highly recommended to ensure a proper install.Verify Installation Source

It will begin by verifying your XenServer installation disc:
Verifying XenServer Installation SourceThe next page will display if there were any issues with verification.  If verification was successful you may continue, otherwise you may to try burning your disc again.

12. Choose a root password for your server.  This is the password used when connecting to the XenServer host from XenCenter.

13.  Choose which ethernet card you would like to designate for managing your server.  Since our ethernet cord is plugged into the first ethernet port on our Dell server we will choose eth0.  Eth1 shows no link because there is nothing connected to the second ethernet port on the server.  Your server may only show one interface if you have only one card.Host Management Interface

14.  Choose DHCP or enter your Static IP information:
XenServer IP Address

15.  Continue by choosing a hostname.  Unless you chose DHCP, you will also be asked to enter to your DNS Nameservers.

16.  Choose the geographical area your server is in, and then select the City.

17. Next you will be asked to enter the time or choose an NTP server.  I recommend using NTP. I recommend the following NTP servers:
time.nist.gov
time-b.nist.gov
time.windows.com

18.  Install XenServer:Install XenServer
19.  Now that the installation has completed, it asks for any supplemental packs. Now would be a good time to insert your Linux Supplemental pack and press OK:
Insert Supplemental Pack

20.  We recommend verifying your installation source in order to test the media. (It will provide the MD5 hashes once you click verify, go ahead and continue)
Verify Linux Pack

21.  Once verification has completed, go ahead and Use the pack and install.

22.  Once install has completed, you can choose to install more supplemental packs or select Skip and it will complete installation:XenServer Install Complete

23.  Once your server has booted you should reach the following screen:

XenServer Configuration Screen

24.  Open XenCenter on your desktop and Add your new server.  Type in your server’s IP, Username: root and the password you chose.

Add Server to XenCenter


If you’re reading this blog, there’s a good chance that you’re either an internet marketer, or part of a dev team.  The problem with these two people, is that usually, they don’t know each other’s jobs.

Situation: John Marketer goes to Susan Developer about a technical issue.  Susan Developer spits out tech mumbo jumbo and John Marketer is confused and frustrated.

or

Susan Developer needs to tell John Marketer about a potential problem with SEO, but John Marketer has no idea and writes a blog post full of Google red flags.

This happens more than you think because of a simple disconnect between the two teams.  Well to fix this problem, I have created a big glossary for you guys to clear up confusion.  Trust me, you’ll need this, I still refer back to this everyday.  You’re welcome

1. Anchor text , anchor link – When a word is clickable thus containing a link.

2. Backlink, back-link – a link from an outside website (outside source) that redirects to the original website.  (i.e. the links that point back to your blog)

3. Broken link – a link that fails to connect to it’s intended destination

4. Cloaking – When a website shows one version to the user and a separate falsified version to a  search engine.  For example,  showing your users the normal page, and then having the search engines see a keyword stuffed splash page thus boosting your ranking.  DO NOT DO THIS.  If a search engine finds out you are employing this black hat SEO practice, you will be severely penalized and potentially banned from Google (i.e. BMW Germany and Google)

5. Contextual marketing – Based on what a user searches and which pages he visits, how an advertiser takes that information and markets specifically to that individual.

6. Conversion ratio – This is the number of sales or leads generated divided by the number of visitors to your site.  Conversion ratio could be applied to any number of business goals.

7. CSS – Cascading Style Sheet – Used for programming, this document will tell the browser how to display websites.

8. Domain Name – website name – Domain name is or URL (Universal Resource Locator) is a unique  alphanumeric name and attached to a certain IP address. While every address has an IP address they also have domain names for simplicity.  (i.e. www.google.com, www.cnn.com)

9. Duplicate Content – This is when there is similar content on one site and another. Basically I posted this gollsary on another blog, so I have created completely new content here for best practice SEO.

10. Email marketing – business promotion and brand recognition/management through the use of email contacting.  While this has worked from some marketers, this has gained a bad reputation because of spammers.

11. External links – any links that point to a website

12. High quality links – links from highly ranked and relevant websites

13. Hit – a single visit to a website from a person or automated program

14. Host / webhost / hosting server – The host or webhost is the company you choose to put your website online. If you need to know more, check our about us.

15. HTML– Hyper Text Markup Language.  It is a language of programming used to display websites elements which the browser reads and shows the viewer.

16. Impression – a single view of the web page or an advertisement by the Internet user.

17. Internal links – links in a website connect the user to other elements or pages within the same website.

18. Internet Marketing – a broad term, internet marketing refers to the business promotion and brand management of a company through the use of various avenues via the internet.

19. Internet Traffic – The number of visitors a website receives

20. IP address – Internet Protocol is a unique numeric address identifying any device connected to the Internet.

21. Delivery – The use of IP addresses search engines use to show the user local search engine results.  I.e. when you type in dry cleaners, Oleg’s cleaners in Moscow doesn’t appear.   This method is being used not only by Google but by many internet marketers.

22. Keyword – Popular words employed by search engines to find relevant websites in organic searches.

23. Keyword Phrase – Combination of keywords

24. Keyword stuffing – Another blackhat SEO practice, this is the overuse of keywords in a page.  This practice will actually penalize your ranking from the search engines.

25. Landing Page – a landing page is a web page designed to be highly relevant to an advertisement or query.  These are very useful for pay per click advertising.
26. Link bait – Any compelling article or content that brings attention to a website.  (i.e. lolcats)

27. Link building – an essential SEO practice, to  create links to a page and in and around a page to increase conversion ratio and page rank for a search engine results page (SERP).

28. Link juice – this refers to the authority of th links that link to your page.  Different SEO practices are utilized to maximize the ‘link juice’ your page obtains.  For instance, if there is duplicate content, then the 2 pages will share the juice unless you tell the search engine to give one site all of the authority.

29. Long tail keyword –similar to keyword phrase, this is multiples permutations of keywords to create a search query.  T

30. Low quality link – Links from low-ranked or irrelevant websites.  Cnn.com is a high quality link, jimbobsblog.com is not

31. Market analysis – A broad term, Market Analysis is tthe researching of a market.  This includes who the potential consumers are, and all aspects of their commercial interests.

32. Market value – this expression refers to the expected price obtained for sold goods or services in a given time period.

33. Meta Description– This is the short description beneath a title tag in a search engine results page.  There is no need to stuff this with keywords as it does not carry much SEO weight.  However, with a captivating meta description it can bring more users, which does affect SEO.

34. Meta tag – Information enveloped in the head portion of an HTML document.  Meta tags provide various information about the website to the search engine allowing for better indexing and cataloging.

35. Nofollow link – This can be a bit confusing, allow me to clarify.  This is a meta tag that tells a search engine not to follow (click on) a certain link.  There’s certain pages that have duplicate content that need to link juice, like the archives page on your blog.  You can tell the search engines to not go to these parts of your blog, thus preserving all link authority where it belongs.

36. Off-page SEO –  These are the SEO practices you employ off your page to increase page rank and visibility.  This includes external link building, link baiting, being active in online communities, and many more.

37. On-page SEO – In contrast to off-page SEO, on-page are the SEO practices you employ directly on your own website.  This includes title tag optimization, meta description optimization, keyword phrase strategies, internal link building etc.

38. Organic Search Results – These are the results that show up through a search.  For example, Google search ‘webhosting’, and those results were found organically.

39. Page Rank – a hypothetical value of a web page.  In an organic search which entry you are on that page.  This is very dynamic, and hundreds of factors can determine your rank.

40. PPC – Pay-Per-Click – PPC is an online marketing strategy where a businesses pay based on the traffic they receive.  Examples of PPC are the advertisements on the right hand side of a SERP in a Google search, or the advertisements you see on facebook.

41. Redirecting – This is an instruction telling a search engine to go into another page. This is a crucial technique when it comes to fixing duplicate content issues.  Instead of always creating unique content (which is the best SEO practice), there are times when duplicate content is unavoidable.  Therefore, by redirecting search engines, you avoid penalties and preserve all link juice.

42. RSS – Rich Site Summary- This allows subscribers to get laters updates from a specific website.

43. Search Engine – A  computer program which searches internet documents for certain keywords.  They then index those documents and display those documents in a certain order of results.  The big three search engines are: Google, Yahoo, and Bing.

44. Search Engine Marketing – SEM –SEM is a branch of internet marketing that deals with business promotion through the use of search engines.   SEM deals with very closely with SEO to maximize exposure using search engines.

45. Search Engine Optimization – SEO – This is the practice of using different techniques to increase exposure and to ultimately increase page rank for websites.

46. Search Engine Spider – A computer program deployed by the search engines to travel the internet and gather data from websites and index them for the search engines.

47. Search engine submission – An online request to a search engine to catalog your website or a web page.

48. Search term  or search query– Words or phrases input into search engies to bring up search results.

49. SERP – A Search Engine Result Page – The indexed results that appear when you search in a search engine.

50. Social media marketing – Specific marketing strategies based on the utilization of online social media sites i.e. Twitter, Facebook, YouTube, Reddit, etc.

51. Unique Visitor – Unique visitor is a new person who visits a website once in a certain period of time.


52. Web Analytics – This is the analysis of a given website that tell the webmaster number of visitors, conversion rates, and other performance factors intended to understand and optimize web usage

53. Website Traffic – The number of total visitors a website receives in a given period of time.

I’m sure there are some I have left out.  Leave a comment if you think I should add to the glossary!


For almost three decades now, the conventional wisdom about Macs and viruses has been simple: They don’t get them. Viruses are made for PCs, they say, which means Macs aren’t vulnerable to them. And whenever the latest virus scare goes cycling through the PC world, my fellow Mac users and I can relax, if not outright throw our heads back and laugh.

That may be about to change.

If Macs don’t get many viruses, it’s not because they’re magically or systemically immune; it’s because virus coders usually target the bullseye, the most vulnerable, most populous demographic, in order to give their viruses the widest spread. Historically, that’s meant targeting Windows, which in the past, has had not only many more vulnerabilities, but a much wider audience.

However, two key trends are on the move right now. One, PC users are migrating to Windows 7, which is intrinsically much stronger than its predecessors. Two, OS X is starting to capture a wider and wider market share. Those two factors combined may, very soon, make OS X a more appealing target for coders who want to do harm.

Of course, in no way does that mean “jump ship.” What it means is “be proactive, and be ready.” Outfit your Mac with a professional-caliber virus security program, if you haven’t already, and surf the Web carefully and responsibly. All the usual rules of thumb for minimizing risk still apply; stay away from the Internet’s bad neighborhoods, don’t open spam (especially not attachments), block pop-ups except from sites you trust, and so on.

PC users have dealt with virus threats since the days of floppy disks and dial-up. Should the need arise, Mac users can too.


Ryan Graff

Host Duplex would like to welcome its newest blog contributor, Ryan Graff.

Since earning his degree in film studies, with a minor in writing, Ryan has spent the last ten years working as an editor, writer, filmmaker, video game designer, and, briefly, mental ward receptionist. He has written several screenplays, including the award-winning fantasy Skyhammer, and recently worked as original writer and designer on Konami’s Vandal Hearts: Flames of Judgment. When not at his day job, where he edits text for a game publisher, he works freelance as a script doctor and video editor.

As a member of the Host Duplex blog team, Ryan will work closely together with the core staff to help explore and explain a variety of topics in the web hosting industry. More to come soon!


We talked earlier about the importance of redundancy. Naturally, an equally critical concern is security, both of the data itself and the servers that host it. After all, if you choose the wrong web hosting provider, your e-commerce site might end up stored in their basement or garage.

Host Duplex spares no expense when it comes to protection. Steadfast‘s Chicago data center houses the majority of our servers in the Equinix building, renowned throughout the industry as a fortress to be reckoned with. (Just getting into the building requires a background check, for starters.) There, each server has two power supplies, each with its own feed, battery backup, and diesel generator capable of running each machine for hours. Beyond even that, Steadfast has a contract with a local fuel provider to bring in extra diesel fuel immediately should any major outage ever occur. Not to be outdone, we have our own large stock of parts stored at our facility, ready to remedy any hardware issues at a moment’s notice.

On the software side of the occasion, our automated monitoring system keeps a constant watch for exploits, vulnerabilities, and any suspicious behavior, keeping our live staff alert around the clock. Our management service, should a client choose to make use of it, also installs and configures the client’s firewalls, while at the same time optimizing server performance, running updates, and performing weekly checks across all systems. (Clients always have the option of installing and configuring their own firewalls, of course.)

Together with some of the industry’s brightest minds and strongest facilities, Host Duplex ensures that your data is as safe and rock-solid as it possibly can be.


Page 1 of 212