Friday, June 22, 2012

CRON Jobs commands in cpanel


WE are going to see how to use CRON Jobs commands in cpanel today, we are using CRON Jobs here to run some command / files to generate report  or update database or send email or crawl automatically, we can run the cron jobs command in cpanel or linux command line, or in unix.

here the screenshot of the cron job in cpanel , its will be different for each CPanel versions. also its will be different for plesk control panel.  just  click on the icon and its will show you a simple page to add CRON Commands.

CRON Job Icon in CPanel | WeAreWebDevelopers

CRON Job Icon in CPanel 

lets say your php file located in your host like this
http://www.yourdomain.com/folder/file.php . this file contain the script that generate something when you open in the browser,  so we are going to put this in CRON Jobs to be generate / run automatically

firstly you must know your web host php path and your file actual path , you can get it from your hosting provider or you can find out your self if you are using VPS host ,
your php path will be like this /usr/local/bin/php  its will be same for all the host and your actuall php file path will be like this /home/username/public_html/folder/file.php
here we go , just key in the below line in to your command text box
/usr/local/bin/php[space]-q[space]/home/username/public_html/folder/file.php and set the time (frequent) for the file to be run and key in your email (so that you will receive the executed report once the file run successfully) , then clcik Add New Cron, its should run automatically, you may try at-least 5 minutes to test the CRON whether its working or not. if you didn't receive emails , there's some thing wrong,  
CRON Jobs Screen in CPANEL | WeAreWebDevelopers

CRON Jobs Screen in CPANEL 

there is another method that run the file using CURL , if CURL installed in your host , its another solution to run CRON commands . same applies here, you must know your CRUL path and you no need to worry about your  file path in your host because its going run from your URL , its similar to this .  on this case this is the CURL path : /usr/bin/curl 
 and this is the file URL : http://www.yourdomain.com/folder/file.php
just add this line in to CRON JOB command text box and set your time and add your email address to get the report
you may try at-least 5 minutes to test the CRON whether its working or not. if you didn't receive emails , there's some thing wrong,


now we are going to see some thing with security, what if your file having security authentication to run? yes, we have solution for this ,the above CURL works without username and password , we can store the user name and password  in the particular php page session  even  here the solution for secure the CRON Jobs with username and password  .
we use this command line to run the same php file in the CRON with username and password,
here username and password should be your form text box name to read the username and password from the CRON URL (form action and $_GET) . .


we have tested both CRON Jobs with PHP path and CURL path. its works fine on our side and we did received email ever day , just try your side and comment here , we are happy to assist you guys.

Tuesday, June 19, 2012

All in one Search Engine Optimization Guide

SEO is means for Search Engine Optimization , We are going to learn this big deal today  with below tips and PDF files from Leading Search Engine SEO Guides.

All in One Search Engine Optimization Guide from WeAreWebDevelopers
All in One Search Engine Optimization Guide from WeAreWebDevelopers
there are so much tutorials , books , tips and tricks out there to learn and improve your website Search Engine Optimization , well we know they are.  what is the special here . All in One SEO this is the special here. we are going to list down most wanted and useful Search Engine Optimization Starter Guide to teach you
We follow Google First .
Google already released a Search Engine Optimization Starter Guide for web masters to improve their web site indexing perfectly on Google , here the link to Download , there sre so many useful tools in Google developers network , Google web master tools and WebMaster Blog .  this Google SEO Guide will guide you perfectly to improve your website to Google optimize . we are requesting you to read the blog and Google SEO guide clearly to understand how Google crawlers working and indexing pages.
Now we Move to BingMicrosoft also provide a bing webmaster tool and resource center to learn and improve your website to Bing Optimize . they have released a PDF Guide to teach us more about their search engine works. here the link to Download Bing SEO Guide , there is a community blog on bing to talk about Bing Search Engine Optimization , here the link for Bing SEO Community Blog , and this is the link for Bing WebMaster tools .
there is a feature that Google disabled and Bing Still Provide that website Submission to Bing its here : https://ssl.bing.com/webmaster/legacy/submitsitepage.aspx . we have to register our self to submit our site to Google now but previously they allowed any one to submit their site with out registering ,now they disabled, we have to register Google Web Master Account to Submit Our Site .
Next. Yahoo , they are together with Bing to Giving more accurate Search Result . once we register in Bing Web Master its will submit to Yahoo , once we submit our URL to bing also its will submit to Yahoo. still yahoo have their own Web Master Tools and Submissions , yahoo haven't released any PDF versions to teach webmasters how to improve site SEO for Yahoo Indexing , but they have a page to study about it, we have perepared the page in PDF for our iserd to learn about Yahoo Search Engine Optimization , here the link to download Yahoo SEO Basics Giude . 
Finally We have Another Search Engine Optimization Guide will teach you something advance tips and tricks with analyses results.

Thursday, June 14, 2012

the Best Ways to Secure Your WordPress with these Security Plugins to Make Your WordPress Bulletproof

WordPress is the most popular blogging platform today. It's being used by thousands of people all around the world. But because of the popularity, it's getting more attention by hackers and spammers too. WordPress is very secure by itself, but there's never too much ascertainable.
For simple users,who don't code a lot, plugins is the best way to secure your blog. They're free, easily usable and safe. This post assembles 35 best plugins to make your blog bulletproof. They're each devised for different purposes, so you will get the best protection from each field

Secure Your Login

1. Semisecure Login Reimagined

Semisecure Login Reimagined increases the security of the login process by using a combination of public and secret-key encryption to encrypt the password on the client-side when a user logs in. JavaScript is required to enable encryption. It is most useful for situations where SSL is not available, but the administrator wishes to have some additional security measures in place without sacrificing convenience.
Semisecure-login-reimagined-wordpress-security-tools-tips-plugins

2. Stealth Login

This plugin allows you to create custom URLs for logging in, logging out, administration and registering for your WordPress blog. Instead of advertising your login URL on your homepage, you can create a URL of your choice that can be easier to remember than wp-login.php, for example you could set your login URL tohttp://www.myblog.com/login for an easy way to login to your website.
Stealth-login-wordpress-security-tools-tips-plugins

3. Login LockDown

Login LockDown records the IP address and timestamp of every failed login attempt. If more than a certain number of attempts are detected within a short period of time from the same IP range, then the login function is disabled for all requests from that range. This helps to prevent brute force password discovery.
Lockdown-login-wordpress-security-tools-tips-plugins

4. Chap Secure Login

Whenever you try to login into your website, you can use this plugin to transmit your password encrypted. The encryption process is done by the Chap protocol. By activating the Chap Secure Login plugin, the only information transmitted unencrypted is the username, password is hidden with a random number (nonce) generated by the session – and opportunely transformed by the MD5 algorithm. In the first login there will be an error, but don't worry is only a technical error. Indeed in the next login's operation, if the values are correct, there will not be errors.
Chap-secure-login-wordpress-security-tools-tips-plugins

Admin Area

1. Admin SSL

Admin SSL secures login page, admin area, posts, pages – whatever you want – using Private or Shared SSL. Once you have activated the plugin, you have to go to the Admin SSL config page to enable SSL.
Admin-ssl-wordpress-security-tools-tips-plugins

Database

1. WP-DB-Backup

WP-DB-Backup allows you easily to back up your core WordPress database tables. You may also backup other tables in the same database.
Databse-backup-wordpress-security-tools-tips-plugins

2. Remote Database Backup

This plugin creates SQL dumps of your WordPress database. It is based on the WordPress Database Backup plugin (http://www.ilfilosofo.com/blog/wp-db-backup) – but it removes some of the security restrictions in the plugin to enable automated remote backups. You still need the admin user name and password to do a remote backup.
Remote-databse-backup-wordpress-security-tools-tips-plugins

3. WP-DB Manager

This plugin allows you to optimize database, repair database, backup database, restore database, delete backup database , drop/empty tables and run selected queries. It supports automatic scheduling of backing up and optimizing of database.
Databse-manager-wordpress-security-tools-tips-plugins

4. BackUpWordPress

BackUpWordPress is a backup & recovery suite for your WordPress website. This plugin allows you to back up database tables as well as files and comes with a rich set of options.
Backup-wordpress-security-tools-tips-plugins

5. WordPress 1 Click EZ Backup

EZ Backup has been turned into a simple one click operation. Click the button and watch your files and database backup be created. You can create a backup of all your webspace files or backup just your wp-content folder all from this one plugin. Unlike the Full EZ Backup plugin this one does not require any special information such as usernames or passwords etc. This plugin costs $5.

6. myEASYbackup

This plugin allows you to back up, restore, migrate your WordPress installation, both files and mySQL tables with a single click. When performing a backup, myEASYbackup creates a compressed data set file that can be stored outside the WordPress installation directory. A list of all data sets on the server is also logged in the admin area.
My-easy-backup-wordpress-security-tools-tips-plugins

Spam

1. Antispam Bee

AntispamBee protects blogs from digital rubbish. It is made up of sophisticated techniques and analyzes comments including pings. Also, for reasons of data privacy, the use of AntispamBee is a safe solution, as it is anonymous and registration-free.
Antispam-bee-wordpress-security-tools-tips-plugins

2. NoSpamNX

NoSpamNX is the successor of Yawasp (Yet Another WordPress antispam plugin) and is a plugin to protect against automated comment spam (spambots). While Yawasp changed the names of the form fields in the comment template, NoSpamNX works without these modifications, but is equally effective. By eliminating the need for modifications the form field need maximum compatibility with other WordPress plugins or browser is ensured.
No-spam-nx-wordpress-security-tools-tips-plugins

3. Akismet

Automattic Kismet (Akismet for short) is a collaborative effort to make comment and trackback spam a non-issue and restore innocence to blogging, so you never have to worry about spam again.
Akismet-wordpress-security-tools-tips-plugins

4. Math Comment Spam Protection

Asks the visitor making the comment to answer a simple math question. This is intended to prove that the visitor is a human being and not a spam robot. Example of such question: What is the sum of 2 and 9?
Math-comment-spam-protection-wordpress-security-tools-tips-plugins

5. Defensio Anti-Spam

Defensio is an advanced spam filtering web service that learns and adapts to your behaviors and those of your readers. Advanced features such as support for OpenID, detailed statistics, charts, RSS feed of our comments (innocent and spam) and counter widget are also available.
Defensio-anti-spam-wordpress-security-tools-tips-plugins



6. SI CAPTCHA Anti-Spam

Adds CAPTCHA anti-spam methods to WordPress on the comment form, registration form, login, or all. In order to post comments or register, users will have to type in the code shown on the image. This prevents spam from automated bots. Adds security. Works great with Akismet. Also is fully WP, WPMU, and BuddyPress compatible.
Captcha-anti-spam-wordpress-security-tools-tips-plugins

7. reCAPTCHA

reCAPTCHA is an anti-spam method originating from Carnegie Mellon University which uses CAPTCHAs in a genius way. Instead of randomly generating useless characters which users grow tired of continuously typing in, risking the possibility that spammers will eventually write sophisticated spam bots which use OCR libraries to read the characters, reCAPTCHA uses a different approach.
Recaptcha-wordpress-security-tools-tips-plugins

8. Blackhole

Blackhole is a trap for bad bots. The concept is simple: include a hidden link to a robots.txt-forbidden directory somewhere on your pages. Bots that ignore or disobey your robots rules will crawl the link and fall into the trap, which then performs a WHOIS Lookup and records the event in the blackhole data file. Once added to the blacklist data file, bad bots immediately are denied access to your site.
Blackhole-wordpress-security-tools-tips-plugins

9. Invisible Defender

This plugin protects registration, login and comment forms from spambots by adding two extra fields hidden by CSS. This approach gave me 100% anti-spam protection on one of my sites.

Other

1. Secure WordPress

Little help to secure your WordPress installation. This plugin removes error information on login page, adds index.html to plugin directory, removes the wp-version, except in admin area.
Secure-wordpress-security-tools-tips-plugins

2. WP Security Scan

This plugin will scan your WordPress installation for security vulnerabilities and it will suggest some corrective actions.
Security-scan-wordpress-security-tools-tips-plugins

3. AskApache Password Protect

This plugin doesn't control WordPress or mess with your database, instead it utilizes fast, tried-and-true built-in Security features to add multiple layers of security to your blog. This plugin is specifically designed and regularly updated specifically to stop automated and unskilled attackers attempts to exploit vulnerabilities on your blog resulting in a hacked site.
Ask-apache-password-protect-wordpress-security-tools-tips-plugins

4. TAC (Theme Authenticity Checker)

TAC stands for Theme Authenticity Checker. Currently, TAC searches the source files of every installed theme for signs of malicious code. If such code is found, TAC displays the path to the theme file, the line number, and a small snippet of the suspect code. As of v1.3  TAC also searches for and displays static links.
Theme-authenticity-checker-wordpress-security-tools-tips-plugins

5. HTTP Authentication

The HTTP Authentication plugin allows you to use existing means of authenticating people to WordPress. This includes Apache's basic HTTP authentication module and many others.

6. AntiVirus

Viruses, worms and malware exist for WordPress and could easily attack your WordPress installation. AntiVirus for WordPress monitors malicious injections and warns you of any possible attacks. It also has multilingual support.
Antivirus-wordpress-security-tools-tips-plugins

7. Secure Files

This plugin allows you to upload and download files from outside of your web document root for security purposes. It can be used to can restrict file downloads to users that are logged in, or have a certain user level.

8. Replace WP-Version

Security your WordPress-Installation and eliminate or replace your wp-version and database-version on easy way with a small plugin. If you're running an older version of WordPress, anyone can view source to see what attacks might work against your blog. This plugin replaces the WP-version with a random string < WP 2.4 and eliminate WP-version > WP 2.4.

9. WP Email Guard

WP Email Guard protects your email addresses included on any post or page from being crawled by spammers. It converts every email written within your post body into a JavaScript code, so the emails is readable and can be clicked by humans only. Spammers can't crawl JavaScript.

10. WordPress File Monitor

Monitors your WordPress installation for added/deleted/changed files. When a change is detected an email alert can be sent to a specified address.
File-monitor-wordpress-security-tools-tips-plugins

11. WP Dephorm

WP-Dephorm protects your users from the prying eyes of phorm. This is achieved by setting a cookie to opt out of the phorm information mining. Your blog viewers will not have their information stored and used in marketing campaigns whilst viewing your site.

12. WordPress Firewall

This WordPress plugin investigates web requests with simple WordPress-specific heuristics to identify and stop most obvious attacks. There exist a few powerful generic modules that do this; but they're not always installed on web servers, and difficult to configure.
Firewall-wordpress-security-tools-tips-plugins

13. Secure Contact

SecureContact is a drop in form for users to contact you, based on the WP Contact Form plugin by Ryan Duff. It offers enhanced security by using captcha images.

14. Fast and Secure Contact Form

Fast and secure contact form for WordPress. This contact form lets your visitors send you a quick E-mail message. Blocks all common spammer tactics. Spam is no longer a problem. Includes a CAPTCHA and Akismet support. Additionally, the plugin has a multi-form feature, optional extra fields, and an option to redirect visitors to any URL after the message is sent. Super customizable.
Fast-secure-contact-form-wordpress-security-tools-tips-plugins

15. Ultimate Security Check

The Ultimate Security Check plugin helps you identify security problems with your WordPress installation. It scans your blog for hundreds of known threats, then give you a security "grade" based on how well you have protected yourself.

16. Content Security Policy

Content Security Policy prevents content injection attacks by allowing admins to specify which sites they trust to serve JavaScript and other types of content in their site. Any content which is not explicitly allowed by the policy will be blocked from loading.
Content-security-policy-wordpress-security-tools-tips-plugins

Types of WebHosting

From w3schools.com

Free Hosting

Some ISPs offer free web hosting.
Free web hosting is best suited for small sites with low traffic, like personal sites. It is not recommended for high traffic or for real business. Technical support is often limited, and technical options are few.
Very often you cannot use your own domain name at a free site. You have to use a name provided by your host like http://www.freesite.com/users/~yoursite.htm. This is hard to type, hard to remember, and not very professional.
Good:Bad:
Low cost. It's free.No domain names.
Good for family, hobby or personal sites.Few, limited, or no software options.
Free email is often an option. Limited security options.
Limited or no database support.
Limited technical support.


Shared (Virtual) Hosting

Shared hosting is very cost effective.
With shared hosting, your web site gets its own domain name, and is hosted on a powerful server along with maybe 100 other web sites.
Shared solutions often offer multiple software solutions like e-mail, database, and different editing options. Technical support tends to be good.
Good:Bad:
Low cost. Cost is shared with others.Reduced security due to many sites on one server.
Good for small business and average traffic. Restrictions on traffic volume.
Multiple software options.Restricted database support.
Own domain name.Restricted software support.
Good support


Dedicated Hosting

With dedicated hosting, your web site is hosted on a dedicated server.
Dedicated hosting is the most expensive option. This option is best suited for large web sites with high traffic, and web sites that use special software.
You should expect dedicated hosting to be very powerful and secure, with almost unlimited software solutions.
Good:Bad:
Good for large business.Expensive.
Good for high traffic.Requires higher skills.
Multiple domain names.
Powerful email solutions.
Powerful database support.
Strong (unlimited) software support.


Collocated Hosting

Collocation means "co-location". Collocated hosting lets you place your own web server on the premises (locations) of a service provider.
This is pretty much the same as running your own server in your own office, only that it is located at a place better designed for it.
Most likely an ISP will have dedicated resources like high-security against fire and vandalism, regulated backup power, dedicated Internet connections and more.
Good:Bad:
High bandwidth.Expensive.
High up-time.Requires higher skills.
High security.Harder to configure and debug.
Unlimited software options.


Your Checklist

Before you choose your web host, make sure that:
  • The hosting type suits your needs
  • The hosting type is cost effective
  • Upgrading to a better server is possible
  • If needed, upgrading to a dedicated server is possible
Before you sign up with an ISP, surf some other web sites on their servers, and try to get a good feeling about their network speed. Also compare the other sites against yours, to see if it looks like you have the same needs. Contacting some of the other customers is also a valuable option.

From About.com
Deciding where you're going to host your Web site is almost more important than decidingwhat HTML editor to use to build your site. But there are so many different types of Web hosting options, it can be overwhelming making the choice. If you know what the different types of hosting options are, you can make a more informed choice about what you need.

Free Web Hosting

Free Web hosting is free. Many free hosting providers support the hosting costs through advertising added automatically to Web pages through pop-ups, frames, and scripts. Free Web hosting is typically limited in some way compared to paid hosting. For example, you may not get as much space, bandwidth, or software.
Free Web hosting can be done through a hosting service like GeoCities or through your ISP. There are many free Web hosts to choose from.

Standard Web Hosting

This is the most common form of paid Web hosting. You pay for a specific amount of server space on a Web hosting system, and they provide you with high-speed servers, software, and other amenities. Most standard Web hosting providers use a shared system where you are granted say 5GB of space on a 100GB server. Your files are hosted there along with 15-20 other Web sites. You may or may not have your own domain name.
Some things to look for in a standard Web hosting package:
  1. Bandwidth charges - if you expect your site to get a lot of page views, make sure that there aren't limits or extra charges.
  2. Server software - most paid hosting services offer some types of software for you to use including CGI, PHP, and Weblogs.
  3. Administrative access - some hosts provide you with a Web-based console, and others allow you to telnet in to the server. Both work fine, but make sure if you want one style in particular that your host provides it.
  4. Operating system - the OS your Web site is on can affect what software can run. It's a good idea to know what you're on and learn the difference between Windows and Linux hosting.
Standard Web hosting is good for most businesses and personal sites that are behind a domain name. Paying for the service gives you more features and security than a free service, and you can find standard Web hosts for as little as $1 per month or less.

Dedicated, Virtual, and Shared Hosting

Dedicated Web hosting is where you get your own server machine for your site's exclusive use. In most dedicated hosting situations, the site owner will get root access to the server to make changes and control the site, but that depends upon the host. Some hosts provide an admin console or access through their helpdesk technicians.
Technically, unless you're paying for a "dedicated" connection or colocation, your Web site is almost certainly stored on a shared server. But, in the hosting business, most companies refer to "Shared" and "Virtual" hosting as a form of dedicated hosting where the site is on a server machine with only 1 or 2 other Web sites.
Dedicated Web hosting is good for businesses that need more space or more control over the Web site. When you're on a machine that isn't being used by any other Web site, you know what is happening on the machine - standard hosts run the risk of having one site get hacked which provides access to all the other sites on that server.

Colocation

Colocation is the next step up from dedicated hosting. It is just like dedicated where the server machine is dedicated to your site's exclusive use. But in this case, you own the hardware - not the hosting company. Instead, what you are renting is the physical space in their facility and the high-speed Internet connection.
Colocation comes in two flavors: managed and unmanaged. With managed colocation, you pay for the server space and a team from your hosting company to manage your server for you. This is great for companies that want the control of colocation but don't have an IT department to manage the server. Unmanaged is where you handle all the administration and management of the server yourself, including software updates, the Web server, and the site itself.
Colocation is perfect for companies who want something unusual in their Web software configuration or need the extra security that total control provides.

Ecommerce Web Hosting

Ecommerce Web hosting can be any of the above types of Web hosting, but it adds in another dimension: SSL or secure socket layer. If you're going to sell something on the Web you'll need to have a secure server to protect your customers.
Many hosting providers will authorize your domains to use their SSL certificates for an additional fee. Ecommerce hosting often includes shopping carts and other additional features useful to online stores. Ecommerce hosting is important for any business selling goods on the Web.

Other Web Hosting Alternatives

There are a couple of other Web hosting alternatives that you might come across:
  • Reseller Web Hosting - this is for companies that wish to set up Web hosting businesses of their own.
  • Clustered Web Hosting - multiple servers hosting the same content that are then load-balanced to provide better access. This is for companies that have extremely popular sites.
  • File and Image Hosting - some hosting services offer file and image storage, but not Web sites. These are great for file access and image storage, but you can't put a Web site up on them.
  • Weblog Hosting - Many companies offer Weblogs and blog hosting rather than a Web site specifically. These are typically less expensive than Standard Web hosting, but you're limited to a Web site that can be built with their blog software.

What is Cloud Computing?

You may have heard the term cloud computing or 'the Cloud,' but could you describe what it is? There are so many definitions flying around that you wouldn't be alone if you struggled to define it. Cloud computing is simply a set of pooled computing resources and services delivered over the web. When you diagram the relationships between all the elements it resembles a cloud.

Cloud computing—not to be confused with grid computing, utility computing, or autonomic computing—involves the interaction of several virtualized resources. Cloud Servers™ connect and share information based on the level of website traffic across the entire network. Cloud computing is often provided "as a service" over the Internet, typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS).

Cloud computing customers don't have to raise the capital to purchase, manage, maintain, and scale the physical infrastructure required to handle drastic traffic fluctuations. Instead of having to invest time and money to keep their sites afloat, cloud computing customers simply pay for the resources they use, as they use them. This particular characteristic of cloud computing—its elasticity—means that customers no longer need to predict traffic, but can promote their sites aggressively and spontaneously. Engineering for peak traffic becomes a thing of the past.


How Cloud Computing Works