<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.4.0">Jekyll</generator><link href="https://skylineservers.com//blog/feed.xml" rel="self" type="application/atom+xml" /><link href="https://skylineservers.com//blog/" rel="alternate" type="text/html" /><updated>2020-05-05T15:45:18-05:00</updated><id>https://skylineservers.com//blog/feed.xml</id><title type="html">Official Blog</title><subtitle>Skyline Servers Official Blog</subtitle><entry><title type="html">How to modify hosts file</title><link href="https://skylineservers.com//blog/howto/Modify_hosts_file" rel="alternate" type="text/html" title="How to modify hosts file" /><published>2018-08-13T08:20:00-05:00</published><updated>2018-08-13T08:20:00-05:00</updated><id>https://skylineservers.com//blog/howto/Modify_hosts_file</id><content type="html" xml:base="https://skylineservers.com//blog/howto/Modify_hosts_file">&lt;p&gt;Each operating system has a hosts file that allows you to overwrite IP addresses returned for domains/hosts from DNS server or assigning other names or aliases to IP address. Hosts files are widely supported and have been for name resolution prior to DNS servers, hosts files grew to massive sizes and had to be kept somewhat in sync. This comes in very handy if you want to preview your website on a new server after migration before updating your main domain DNS server records or simply lets you work on the website using a domain name that isn’t yet registered or using temporary URL’s. Changes to hosts file only affect the computer on which they are made.&lt;/p&gt;

&lt;p&gt;Hosts file syntax is the same across all platforms. To modify your hosts file simply edit it like so&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;1.2.3.4 domain.com www.domain.com server.domain.com server&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;and save your changes. As a result of which any request made from that computer to any of those names will be sent to the server with IP address 1.2.3.4 regardless of what address is returned for domain.com or www.domain.com or server.domain.com or server by DNS server.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hosts file editing instructions for specific operating systems&lt;/strong&gt;&lt;/p&gt;
&lt;details&gt;
&lt;summary&gt;Windows 8 &amp;amp; 10&lt;/summary&gt;
&lt;br /&gt;
Press the Windows Key, in the search box type Notepad then right click on its icon in the search result and select Run as administrator.
&lt;br /&gt;
When in Notepad click File - &amp;gt; open and hosts file located in C:\Windows\System32\Drivers\etc\hosts
&lt;br /&gt;
Make your changes and click File - &amp;gt;Save for them to take effect.
&lt;br /&gt;&lt;br /&gt;
&lt;/details&gt;
&lt;details&gt;
&lt;summary&gt;Windows Vista &amp;amp; 7&lt;/summary&gt;
&lt;br /&gt;
Click Start -&amp;gt; All Programs -&amp;gt; Accessories then right-click on Notepad icon and select Run as administrator.
&lt;br /&gt;When in Notepad click File -&amp;gt; Open and select C:\Windows\System32\Drivers\etc\hosts.
&lt;br /&gt;
Make your changes and don’t forget to save then File -&amp;gt; Save for them to take effect.
&lt;br /&gt;&lt;br /&gt;
&lt;/details&gt;
&lt;details&gt;
&lt;summary&gt;Linux&lt;/summary&gt;
&lt;br /&gt;
The hosts file is a system file thus requires root privileges to make changes. In a root terminal window using your preferred editor make your changes to /etc/hosts file much like so

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;vim /etc/hosts&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

Save your changes for them to take immediate effect.
&lt;br /&gt;&lt;br /&gt;
&lt;/details&gt;
&lt;details&gt;
&lt;summary&gt;Mac OSX&lt;/summary&gt;
&lt;br /&gt;
Open Applications -&amp;gt; Utilites -&amp;gt; Terminal  in the terminal window edit /private/etc/hosts file like so

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;vi /private/etc/hosts&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

Make your changes and don’t forget to save them. For changes to take effect DNS cache needs to be flushed with command

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;dscacheutil -flushcache&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;/details&gt;</content><author><name></name></author><summary type="html">Each operating system has a hosts file that allows you to overwrite IP addresses returned for domains/hosts from DNS server or assigning other names or aliases to IP address. Hosts files are widely supported and have been for name resolution prior to DNS servers, hosts files grew to massive sizes and had to be kept somewhat in sync. This comes in very handy if you want to preview your website on a new server after migration before updating your main domain DNS server records or simply lets you work on the website using a domain name that isn’t yet registered or using temporary URL’s. Changes to hosts file only affect the computer on which they are made.</summary></entry><entry><title type="html">How to change default SSH port</title><link href="https://skylineservers.com//blog/howto/Change_default_ssh_port" rel="alternate" type="text/html" title="How to change default SSH port" /><published>2018-08-08T04:47:00-05:00</published><updated>2018-08-08T04:47:00-05:00</updated><id>https://skylineservers.com//blog/howto/Change_default_ssh_port</id><content type="html" xml:base="https://skylineservers.com//blog/howto/Change_default_ssh_port">&lt;p&gt;Secure Shell communication by default takes place over TCP/IP protocol port 22 which doesn’t make it insecure by default.  However, it’s common practice to change the default port to a nonstandard one.  The reasoning for this is simply that while changing the default port doesn’t eliminate any service attack vectors it does limit the noise generated by automated attacks such as possible exploits attempts and very common brute force password guessing attacks made by bots to default service ports when scanning wide network ranges.  SkylineServers recommends only permitting access through the firewall to SSH port to a set of trusted IP address for even better security access controls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Warning: Do not lock yourself out&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before changing SSH port you need to take a couple precautionary steps to make sure you don’t lose access to the server over SSH in the process.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SElinux&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Check if the server has SELinux, AppArmor or other similar system enabled as it will prevent sshd from opening other network port than policy allows, you can check this with&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;getenforce
apparmor_status&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;If the server does, in fact, enforces SELinux policies you will need to adjust it’s policy as well like so:&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;semanage port -a -t ssh_port_t -p tcp 22222&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;where 22222 is our new port.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Firewall&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Double and triple check server firewall rules and adjust them as needed to permit SSH connections to new port as well. Your firewall configuration may vary.
If your server is running firewalld you can make adjustments like so assuming public is the default zone configured in it.&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;firewall-cmd –permanent –zone&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;public –add-port&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;22222/tcp&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;and later (after testing ssh works on a new port you can remove old/default port rule with&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;firewall-cmd –permanent –zone&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;public –remove-service&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;ssh&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;Because we are using –permanent switch firewalld needs to be restarted to apply new rules with&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;service firewalld restart&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;After ensuring the above precautions we can now go on to actually  &lt;strong&gt;change the sshd port&lt;/strong&gt;.
On a Linux server changing ssh service port is a very straightforward process, simply edit SSH server configuration file located in /etc/ssh/sshd_config and with your preferred editor much like so&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;vi /etc/ssh/sshd_config&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;change the default &lt;strong&gt;Port 22&lt;/strong&gt; to &lt;strong&gt;Port 22222&lt;/strong&gt; and save changes. You will need to restart sshd for it to reload configuration with&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;service sshd restart&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;Don’t forget to reflect the new port change on the client end when making a new connection.&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;ssh user@server.domain.com -p 22222
scp -P 22222 file user@server.domain.com:file&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;If you’re using fail2ban or other form or automated brute force protection mechanisms it’s configuration might need to reflect new SSH port as well.&lt;/p&gt;</content><author><name></name></author><category term="howto" /><summary type="html">Secure Shell communication by default takes place over TCP/IP protocol port 22 which doesn’t make it insecure by default. However, it’s common practice to change the default port to a nonstandard one. The reasoning for this is simply that while changing the default port doesn’t eliminate any service attack vectors it does limit the noise generated by automated attacks such as possible exploits attempts and very common brute force password guessing attacks made by bots to default service ports when scanning wide network ranges. SkylineServers recommends only permitting access through the firewall to SSH port to a set of trusted IP address for even better security access controls.</summary></entry><entry><title type="html">Let’s Encrypt free SSL certificates available on all hosting plans</title><link href="https://skylineservers.com//blog/ssl/Lets_Encrypt_free_SSL_certificates_available_on_all_hosting_plans" rel="alternate" type="text/html" title="Let's Encrypt free SSL certificates available on all hosting plans" /><published>2017-04-06T01:00:01-05:00</published><updated>2017-04-06T01:00:01-05:00</updated><id>https://skylineservers.com//blog/ssl/Lets_Encrypt_free_SSL_certificates_available_on_all_hosting_plans</id><content type="html" xml:base="https://skylineservers.com//blog/ssl/Lets_Encrypt_free_SSL_certificates_available_on_all_hosting_plans">&lt;p&gt;&lt;img src=&quot;https://skylineservers.com/images/letsencrypt-logo-horizontal.svg&quot; alt=&quot;Let's Encrypt Logo&quot; /&gt;&lt;/p&gt;

&lt;p&gt;We’re excited to announce that Free SSL certificates from &lt;a href=&quot;https://letsencrypt.org/&quot;&gt;Let’s Encrypt&lt;/a&gt; are now available on all of our hosting plans. Let’s Encrypt is a free, automated, open Certificate Authority (CA) offering free domain validated SSL certificates to the public benefit in an effort to make web browsing more secure. Web site running over SSL is not only more secure  and trustworthy but also gets higher &lt;a href=&quot;https://webmasters.googleblog.com/2014/08/https-as-ranking-signal.html&quot;&gt;search engines ranking&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Key Features of Let’s Encrypt SSL Certificates are:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;it’s absolutely free&lt;/li&gt;
  &lt;li&gt;no validation emails to click through&lt;/li&gt;
  &lt;li&gt;no dedicated IP addresses required&lt;/li&gt;
  &lt;li&gt;trusted by all major browsers&lt;/li&gt;
  &lt;li&gt;autorenewal&lt;/li&gt;
  &lt;li&gt;easy to setup&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To take advantage of Free SSL certificate simply navigate to your cPanel server interface SSL/TLS section or contact our support department for assistance.&lt;/p&gt;

&lt;p&gt;Let’s Encrypt!&lt;/p&gt;</content><author><name></name></author><summary type="html"></summary></entry><entry><title type="html">Simple offsite FTP/SFTP backups script</title><link href="https://skylineservers.com//blog/backups/Simple-offsite-FTP-SFTP-backups-script" rel="alternate" type="text/html" title="Simple offsite FTP/SFTP backups script" /><published>2017-03-09T01:34:00-06:00</published><updated>2017-03-09T01:34:00-06:00</updated><id>https://skylineservers.com//blog/backups/Simple-offsite-FTP-SFTP-backups-script</id><content type="html" xml:base="https://skylineservers.com//blog/backups/Simple-offsite-FTP-SFTP-backups-script">&lt;p&gt;Data backup and restore policies are critical to any business operations. Some hosting providers offer complementary emergency backup service for their clients or offer backup storage at additional cost. This is great to have in case of emergency as those can be restored usually in the least amount time needed. However often (but not always) being in same physical location as servers not providing any needed physical redundancy. Sometimes complementary backups do require additional configuration so don’t assume because web host offer says they’re included on our invoice you have all the backups you need. Hosting companies emergency backups are usually done less frequently, once a week seems to be a norm which can be a problem when latest backup for restore is 6 days old. Many times those emergency backups work on large data sets/entire virtual disk images thus making it harder to get a consistent point in time backup without causing service disruption to server thus posing a challenge in their consistency and reliability if its restore is even possible in the first place. If your server is terminated because of some billing or abuse issue chances are backups is as well, if a fire or natural disaster strikes the data center, hosting account or company is compromised and all your server data and backups gone or is hit with ransomware are you going to be able to recover and bring things back online? Do you think relying on hosting provider backup is sufficient?&lt;/p&gt;

&lt;p&gt;We strongly encourage setting up and test proper backup and recovery policies in place. One of the simplest solutions to ensure reliable automated backup with redundancy anyone can implement them selfs in minutes is to periodically perform backup and sync to FTP/SFTP account in a separate location for redundant storage. A low budget option could be using another server you already have elsewhere with some extra space or &lt;a href=&quot;https://skylineservers.com/FTP-backups&quot;&gt;purchase&lt;/a&gt; FTP backup storage space from one of many providers out there. The advantage of this solution is its simplicity and availability that you can access your data from anywhere anytime and don’t need a client software/agent software/license like many incremental backups solutions do in order to access the data in case the need of restore on a new server. The disadvantage of FTP backups is that it consumes more network bandwidth over incremental backups solutions thus SFTP option is recommended to maximize bandwidth efficiency with this method through more efficient synchronization process with rsync. Many servers hosting control panel like cPanel for example run on servers already have built-in intuitive options for enabling automated FTP/SFTP backups on the servers all you need to do is enabled them set credentials and server for remote backup storage schedule and what to back up and be done in seconds. If you’re not running any control panels it’s just as quick to setup as well with the little help of the simple and configurable FTP backup shell script we include below. It stores backup locally on the server (for fastest restore if still possible in some cases) and syncs it to the offsite storage location, it can be easily tuned to only do one of the two. other budget storage options could also be used instead of FTP/SFTP like S3, Dropbox for example. Script relays on OS packages to perform database backups, compression and FTP or SFTP sync thus we need to ensure we have those installed for it to work correctly, this can be simply done with following with keeping in mind lftp is only needed for FTP storage type and sshpass and rsync for SFTP storage type. The script will run on any major Linux/BSD distributions.&lt;/p&gt;

&lt;p&gt;CentOS/RedHat&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;yum install -y sshpass rsync mysql-client&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;Debian/Ubuntu&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;apt-get install sshpass rsync mysql-client lftp&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;Backups script needs to be placed on the server with correct permissions first and configured for operations, it contains sensitive information like user credentials and needs root level access to run to ensure all access to files thus /root/bin/backup.sh might be a good choice.&lt;/p&gt;

&lt;p&gt;backup.sh - Offsite FTP/SFTP backup script&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;&lt;span class=&quot;c&quot;&gt;#!/bin/bash&lt;/span&gt;
&lt;span class=&quot;c&quot;&gt;# https://skylineservers.com&lt;/span&gt;
  
&lt;span class=&quot;c&quot;&gt;# CONFIGURATION START&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;RETENTION&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;7 &lt;span class=&quot;c&quot;&gt;# how many days back to store the backup for&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;WHAT_TO_BACKUP&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;/home /etc /root&quot;&lt;/span&gt; &lt;span class=&quot;c&quot;&gt;# directories on the server to be included in backup archive&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;MYSQLBACKUP&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;1 &lt;span class=&quot;c&quot;&gt;# 0/1 disable/enable mysql backup for all databases&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;DBUSER&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;username&quot;&lt;/span&gt; &lt;span class=&quot;c&quot;&gt;# mysql username used for bacup&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;DBPASSWORD&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;password&quot;&lt;/span&gt; &lt;span class=&quot;c&quot;&gt;# mysql user password used for backup&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;DBSERVER&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;127.0.0.1&quot;&lt;/span&gt; &lt;span class=&quot;c&quot;&gt;# mysql server ip/hostname&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;TYPE&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;SFTP &lt;span class=&quot;c&quot;&gt;# offsite backup type possible options are FTP and recomended SFTP&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;SERVER&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;server.com&quot;&lt;/span&gt; &lt;span class=&quot;c&quot;&gt;# offsite storage server hostname/ip&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;USERNAME&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;username&quot;&lt;/span&gt; &lt;span class=&quot;c&quot;&gt;# offsite storage server username&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;PASSWORD&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;password&quot;&lt;/span&gt; &lt;span class=&quot;c&quot;&gt;# offsite storage server user password&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;SFTPD_PORT&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;22&quot;&lt;/span&gt; &lt;span class=&quot;c&quot;&gt;# option for specyfing custom port for SSH on the offsite servver&lt;/span&gt;
&lt;span class=&quot;nv&quot;&gt;BACKUPDIR&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;/backup &lt;span class=&quot;c&quot;&gt;# local server directory to keep local backups in for fast restore&lt;/span&gt;
&lt;span class=&quot;c&quot;&gt;# CONFIGURATION STOP&lt;/span&gt;
   
&lt;span class=&quot;nv&quot;&gt;DATESTAMP&lt;/span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;sb&quot;&gt;`&lt;/span&gt;date +%d%m%y&lt;span class=&quot;sb&quot;&gt;`&lt;/span&gt;
 
&lt;span class=&quot;c&quot;&gt;# create directory structure&lt;/span&gt;
/bin/mkdir -p &lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;BACKUPDIR&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;/&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;DATESTAMP&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;&amp;amp;&amp;amp;&lt;/span&gt;
  
&lt;span class=&quot;k&quot;&gt;if&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;[&lt;/span&gt; &lt;span class=&quot;nv&quot;&gt;$MYSQLBACKUP&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;/span&gt; 1 &lt;span class=&quot;o&quot;&gt;]&lt;/span&gt;;&lt;span class=&quot;k&quot;&gt;then
 for &lt;/span&gt;i &lt;span class=&quot;k&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;k&quot;&gt;$(&lt;/span&gt;mysql -u &lt;span class=&quot;nv&quot;&gt;$DBUSER&lt;/span&gt; -p&lt;span class=&quot;nv&quot;&gt;$DBPASSWORD&lt;/span&gt; -h &lt;span class=&quot;nv&quot;&gt;$DBSERVER&lt;/span&gt; -Bse &lt;span class=&quot;s1&quot;&gt;'show databases;'&lt;/span&gt; | grep -v _schema&lt;span class=&quot;k&quot;&gt;)&lt;/span&gt; ; &lt;span class=&quot;k&quot;&gt;do
  &lt;/span&gt;mysqldump -u &lt;span class=&quot;nv&quot;&gt;$DBUSER&lt;/span&gt; -p&lt;span class=&quot;nv&quot;&gt;$DBPASSWORD&lt;/span&gt; -h &lt;span class=&quot;nv&quot;&gt;$DBSERVER&lt;/span&gt; &lt;span class=&quot;nv&quot;&gt;$i&lt;/span&gt; | gzip -c &amp;gt; &lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;BACKUPDIR&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;/&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;DATESTAMP&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;/&lt;span class=&quot;nv&quot;&gt;$i&lt;/span&gt;-&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;DATESTAMP&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;.sql.gz
 &lt;span class=&quot;k&quot;&gt;done&lt;/span&gt; ;
&lt;span class=&quot;k&quot;&gt;fi
  
if&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;[&lt;/span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;$WHAT_TO_BACKUP&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;]&lt;/span&gt;; &lt;span class=&quot;k&quot;&gt;then
    &lt;/span&gt;tar -zcf &lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;BACKUPDIR&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;/&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;DATESTAMP&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;/backup-&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;DATESTAMP&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;.tgz &lt;span class=&quot;nv&quot;&gt;$WHAT_TO_BACKUP&lt;/span&gt;;
&lt;span class=&quot;k&quot;&gt;fi
  
if&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;[&lt;/span&gt; &lt;span class=&quot;nv&quot;&gt;$TYPE&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;==&lt;/span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;FTP&quot;&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;]&lt;/span&gt;;&lt;span class=&quot;k&quot;&gt;then
    &lt;/span&gt;lftp -q -u &lt;span class=&quot;s2&quot;&gt;&quot;&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;USERNAME&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;,&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;PASSWORD&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;&lt;/span&gt; &lt;span class=&quot;nv&quot;&gt;$SERVER&lt;/span&gt; -e &lt;span class=&quot;s2&quot;&gt;&quot;set ftp:ssl-protect-data true; mkdir -p &lt;/span&gt;&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;BACKUPDIR&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;/&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;DATESTAMP&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;; mirror --parallel=3 -n -R &lt;/span&gt;&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;BACKUPDIR&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;/ &lt;/span&gt;&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;BACKUPDIR&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;/; exit&quot;&lt;/span&gt; 2&amp;gt;&amp;gt;/var/log/backupscript.log
&lt;span class=&quot;k&quot;&gt;elif&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;[&lt;/span&gt; &lt;span class=&quot;nv&quot;&gt;$TYPE&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;==&lt;/span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;SFTP&quot;&lt;/span&gt; &lt;span class=&quot;o&quot;&gt;]&lt;/span&gt;; &lt;span class=&quot;k&quot;&gt;then
    &lt;/span&gt;rsync --rsh&lt;span class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;sshpass -p &lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;$PASSWORD&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt; ssh -p &lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;$SFTPD_PORT&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt; -o StrictHostKeyChecking=no -l &lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;$USERNAME&lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;&lt;/span&gt; -r --delete &lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;BACKUPDIR&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;/ &lt;span class=&quot;nv&quot;&gt;$SERVER&lt;/span&gt;:~&lt;span class=&quot;k&quot;&gt;${&lt;/span&gt;&lt;span class=&quot;nv&quot;&gt;BACKUPDIR&lt;/span&gt;&lt;span class=&quot;k&quot;&gt;}&lt;/span&gt;/
&lt;span class=&quot;k&quot;&gt;fi
  
&lt;/span&gt;find &lt;span class=&quot;nv&quot;&gt;$BACKUPDIR&lt;/span&gt;/&lt;span class=&quot;k&quot;&gt;*&lt;/span&gt; -type d -mtime +&lt;span class=&quot;nv&quot;&gt;$RETENTION&lt;/span&gt; -exec sh -c &lt;span class=&quot;s1&quot;&gt;'echo rm -rf &quot;$1&quot; | sh'&lt;/span&gt; -- &lt;span class=&quot;o&quot;&gt;{}&lt;/span&gt; &lt;span class=&quot;se&quot;&gt;\;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;Configuration is straightforward and limits to changing the configuration variables in the script as explained in comments. Script contains sensitive information thus it’s critical to ensure correct permissions for it.&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;chmod 700 backup.sh&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;This would be a good time to run the script by hand and check everything is being backed up and uploaded to remote location correctly.&lt;/p&gt;

&lt;p&gt;To ensure automatic execution server needs a cron job added as well, below is a daily backup at 3:30 AM example:&lt;/p&gt;

&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;crontab -e
30 3 &lt;span class=&quot;k&quot;&gt;*&lt;/span&gt; &lt;span class=&quot;k&quot;&gt;*&lt;/span&gt; &lt;span class=&quot;k&quot;&gt;*&lt;/span&gt; /root/bin/backup.sh&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;

&lt;p&gt;There are better, more advanced systems that include features like incremental backup, data deduplication, encryption, bare metal restore and much more. Most backup solutions are reasonably priced depending on the end user needs. Main factors to consider when choosing offsite backup provider are the amount of data to be stored, how long will it be kept for, what’s the acceptable recovery time? We advise against completely relying on hosting provider for backups. those are nice to have however to provide sufficient level of redundancy allowing to recover from data loss prompts for multiple backups in separate physical locations. Keeping a local copy of data on a separate computer also might be acceptable for some as well. Never the less always ensure sufficient backup of critical data so that you have access to it at all times.&lt;/p&gt;</content><author><name></name></author><summary type="html">Data backup and restore policies are critical to any business operations. Some hosting providers offer complementary emergency backup service for their clients or offer backup storage at additional cost. This is great to have in case of emergency as those can be restored usually in the least amount time needed. However often (but not always) being in same physical location as servers not providing any needed physical redundancy. Sometimes complementary backups do require additional configuration so don’t assume because web host offer says they’re included on our invoice you have all the backups you need. Hosting companies emergency backups are usually done less frequently, once a week seems to be a norm which can be a problem when latest backup for restore is 6 days old. Many times those emergency backups work on large data sets/entire virtual disk images thus making it harder to get a consistent point in time backup without causing service disruption to server thus posing a challenge in their consistency and reliability if its restore is even possible in the first place. If your server is terminated because of some billing or abuse issue chances are backups is as well, if a fire or natural disaster strikes the data center, hosting account or company is compromised and all your server data and backups gone or is hit with ransomware are you going to be able to recover and bring things back online? Do you think relying on hosting provider backup is sufficient?</summary></entry><entry><title type="html">Is your SSL certificate still compatible with the browsers your clients are using?</title><link href="https://skylineservers.com//blog/ssl/Is-your-SSL-certificate-still-compatibile-with-the-browsers-your-clients-are-using" rel="alternate" type="text/html" title="Is your SSL certificate still compatible with the browsers your clients are using?" /><published>2015-10-14T10:00:00-05:00</published><updated>2015-10-14T10:00:00-05:00</updated><id>https://skylineservers.com//blog/ssl/Is-your-SSL-certificate-still-compatibile-with-the-browsers-your-clients-are-using-</id><content type="html" xml:base="https://skylineservers.com//blog/ssl/Is-your-SSL-certificate-still-compatibile-with-the-browsers-your-clients-are-using">&lt;p&gt;With the busy on-line shopping season coming up slowly ensure you’re not missing out on sales opportunities with SSL certificate that guarantees 99,9% browser compatibility, a lot has been going on in the SSL world last year. For example Google and other removed support for old SHA-1 certificates. Also last year Google changed their ranking system for organic searches slightly improving positioning of sites served over SSL. Nowadays SSL certificate not just improves your trust but also helps bring in more traffic to your site. If you’re still using smaller 1024 bit keys you should replace them with stronger versions and re-sign your certificates as soon as possible. We recommend using large key sizes at least 2048 bit RSA or 256bit ECDSA keys. We still see a lot of servers running weak ciphers or running SSLv3 for example leaving them vulnerable to a famous poodle or other attacks.&lt;/p&gt;

&lt;p&gt;SSL certificates imply a lot more trust from the client that the transmission of personal information to your site is encrypted and secure. If you run an online store perhaps you want to consider going the extra step with Extended Validation certificate for the well-known web browser green bar instantly boosting user trust helping your store conversion rates.&lt;/p&gt;

&lt;p&gt;We’re being asked a lot won’t SSL slow down my website? To answer this concern we’ll simply put it this way, SSL does generate extra overhead on the server CPU and can affect server overall load by few percent under traffic compared to unencrypted traffic. The benefits of encrypted private transmission between the site and the client web browser, and trust it builds generally outwit slightly higher resource requirements.&lt;/p&gt;

&lt;p&gt;With those revolutions mentioned Skyline Servers would like to offer SSL certificate installation/update service on all Linux/BSD based servers for any applications. We are pairing that with an additional 10% OFF it and all SSL certificates with promo code “SSLFORALL”. This offer will expire on December 24th.&lt;/p&gt;</content><author><name></name></author><summary type="html">With the busy on-line shopping season coming up slowly ensure you’re not missing out on sales opportunities with SSL certificate that guarantees 99,9% browser compatibility, a lot has been going on in the SSL world last year. For example Google and other removed support for old SHA-1 certificates. Also last year Google changed their ranking system for organic searches slightly improving positioning of sites served over SSL. Nowadays SSL certificate not just improves your trust but also helps bring in more traffic to your site. If you’re still using smaller 1024 bit keys you should replace them with stronger versions and re-sign your certificates as soon as possible. We recommend using large key sizes at least 2048 bit RSA or 256bit ECDSA keys. We still see a lot of servers running weak ciphers or running SSLv3 for example leaving them vulnerable to a famous poodle or other attacks.</summary></entry></feed>