blog.hyperfive.com
HyperFive Hosting Blog: November 2014
http://blog.hyperfive.com/2014_11_01_archive.html
Wednesday, November 5, 2014. The Easy Button for SSL Management. IIS Crypto is a free tool that gives administrators the ability to enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows Server 2003, 2008 and 2012. It also lets you reorder SSL/TLS cipher suites offered by IIS, implement best practices with a single click and test your website. Nartac Software - IIS Crypto. Qualys SSL Labs - SSL Server Test. Posted by HyperFive Web Hosting. Subscribe to: Posts (Atom).
blog.hyperfive.com
HyperFive Hosting Blog: July 2012
http://blog.hyperfive.com/2012_07_01_archive.html
Monday, July 30, 2012. Need for Speed: Why Page Load Times Are Important. We all know how frustrating it is when we have to wait even a second for a page to load. Consider your own surfing behavior: if a site is too slow, it's not long before you are back on the search results page choosing another link. We don’t have much patience, if any at all, when it comes to waiting for a page to load. In fact, users want a site to load in a matter of milliseconds. That is less time than the blink of an eye. At Goo...
blog.hyperfive.com
HyperFive Hosting Blog: May 2013
http://blog.hyperfive.com/2013_05_01_archive.html
Monday, May 13, 2013. Using the X-Forwarded-For HTTP Module For IIS7. Are you having problems with logging client IP addresses in server logs because your web servers are using proxies or load balancing? This is a common issue with proxies and fortunately there is a solution. The standard for forwarding client information is the HTTP X-Forwarded-For header, which is handled by most proxies. How to Setup the Module. Download the X-Forwarded-For HTTP Module binaries. Implement both the x64 version and x86 ...
blog.hyperfive.com
HyperFive Hosting Blog: June 2011
http://blog.hyperfive.com/2011_06_01_archive.html
Tuesday, June 7, 2011. The Benefits of VPS Hosting. Between shared and dedicated hosting is virtual private server (VPS) hosting, which is significantly less expensive than a dedicated server and provides many more options for growing online businesses than shared hosting. Although they are sharing hardware, each VPS hosting account is assigned their own operating system so users can individually configure their server without disrupting the others. Shared hosting is difficult to completely secure. I...
blog.hyperfive.com
HyperFive Hosting Blog: September 2011
http://blog.hyperfive.com/2011_09_01_archive.html
Tuesday, September 27, 2011. A Guide to PCI Compliance. Most of you have heard the term “PCI Compliance” or “PCI DSS,” but what does this mean for you and your business? What are the steps necessary to obtain and maintain compliance? Divide your front-end and back-end servers into independent solutions. Remove all public access to your database server. After the necessary firewall policies are implemented, you will connect to your public web server via a secure SSL/VPN connection. To connect to your ...
blog.hyperfive.com
HyperFive Hosting Blog: January 2013
http://blog.hyperfive.com/2013_01_01_archive.html
Wednesday, January 9, 2013. SQL Server 2012 : Edition and Licensing Information. Microsoft’s new SQL Server 2012 release, code-named Denali, marks some significant changes in the SQL Server product lineup. Taking steps to simplify the platform's licensing options, Microsoft has retired the Datacenter Edition, Workgroup Edition and Small Business Edition previously available for SQL Server 2008 and 2008 R2. SQL Server 2012 Express Edition. SQL Server 2012 Web Edition. SQL Server 2012 Standard Edition.
blog.hyperfive.com
HyperFive Hosting Blog: August 2014
http://blog.hyperfive.com/2014_08_01_archive.html
Friday, August 29, 2014. During the course of a day we sideline lots of bad guys. Some countries are more active than others, and not in a good way. Sign into the Dashboard. To see the Top Threats to your server and the countries where they live. Posted by HyperFive Web Hosting. Subscribe to: Posts (Atom). We provide complete web hosting solutions to handle even the most critical application requirements. Visit our web site. Where Threats Live During the course of a day we .
blog.hyperfive.com
HyperFive Hosting Blog: HyperFive Security Panel
http://blog.hyperfive.com/2015/05/hyperfive-security-panel.html
Monday, May 18, 2015. A View from Above. The HyperFive Security Panel provides an in-depth view into network usage and network security for assigned subnets. Basic network security includes protocol-enforcing firewalls, intrusion prevention, network behavior analytics, advanced persistent threat detection, dynamic reputation analysis, gateway anti-virus and distributed denial of service protection. Sign in to learn more. Https:/ securitypanel.hyperfive.com. Posted by HyperFive Web Hosting.
blog.hyperfive.com
HyperFive Hosting Blog: July 2013
http://blog.hyperfive.com/2013_07_01_archive.html
Thursday, July 25, 2013. How to Setup and Configure the SMTP Service for Windows Server 2012. Many applications depend on the internal Windows SMTP Service to relay email confirmations to visitors browsing their web site. When using Windows Server 2012 the SMTP feature must be installed and configured first. Below are the steps for installing the internal Windows SMTP Service. Install the SMTP Service. Launch the Server Manager. Click on Add Roles and Features. To begin the wizard. Click Next. Launch the...
blog.hyperfive.com
HyperFive Hosting Blog: May 2015
http://blog.hyperfive.com/2015_05_01_archive.html
Monday, May 18, 2015. A View from Above. The HyperFive Security Panel provides an in-depth view into network usage and network security for assigned subnets. Basic network security includes protocol-enforcing firewalls, intrusion prevention, network behavior analytics, advanced persistent threat detection, dynamic reputation analysis, gateway anti-virus and distributed denial of service protection. Sign in to learn more. Https:/ securitypanel.hyperfive.com. Posted by HyperFive Web Hosting.