4GoodHosting
Live Help
24/7 Support
4GoodHosting Canada 1 866 708 4678
Blog Menu G
Search
Categories
m
m

Category: Domain Related

adobestock 41044150 e1537795815496
reading time Reading Time: 6 minutes

‘Cloud’ is definitely the biggest buzzword in the computing world these days, and while those who are tech savvy will know all about it, even the best of them may not know all of its potential applications. Cloud hosting, for example, is an alternative to having websites hosted on shared hosting or dedicated servers. Often times it’s not easy to determine what type of server is the best fit, choosing from the three main options - Shared Hosting / Dedicated Server Hosting / Cloud or Virtual Private Server (VPS) Hosting. Shared hosting is by far the most common option for small businesses and individuals, and here at 4GoodHosting we’re like most Canadian web hosting providers in that most of our customers get by just fine with shared hosting plans. They consist of many websites hosted on a single server, and they offer extremely good value for money. A website on shared hosting can handle up to 30,000 visitors per month, and that’s usually no more than most sites will need. Shared hosting also has the advantage of being very simple to set up, making it ideal for the beginner or non-technical user. The packages typically will come with unlimited bandwidth as well. Dedicated server hosting is quite different, with a single server hosting the website(s) or application(s) of a single user. The dedicated server’s advantage is that the entire server is geared for optimum performance because you have the entirety of it to yourself. Yes, dedicated hosting can be expensive, but that vast amount of processing power means it’s worth the expense if fast page-load times, a dedicated IP, and the ability to handle a lot of traffic – as many as 100,000 visitors per month - are important to you. In addition, dedicated servers are very secure and will allow multiple IPs for services that need to be kept separate. Moving on to cloud hosting, also known as virtual private server (VPS) hosting, we can say it’s probably the most difficult to describe of the three. To summarize it, it’s like having access to nearly unlimited resources and you access as many or as few of them as you...

You may find this interesting too.
adobestock 78712002 e1537189951784
reading time Reading Time: 5 minutes

The thing about cyber threats is that as computing technology advances, the scope and capability of malicious software advances too. There’s not much to be done about that, and the fact that the two will likely always keep pace with each other in this way will likely continue forever. What never changes is that the best defence against malware is to be proactive in keeping your ecosystem free of invaders or infections. That, and being suspicious pretty much any chance you have to be that way. Being on top of our security needs like a guard sentry on watch is pretty much the norm for any Canadian web hosting provider, and here at 4GoodHosting we’re all over ours pretty much all the time. Running data centres put a whole new scope on defending against malware, but here today we’ll discuss what it is the average individual can do with a look at our take on the 5 best malware removal tools. We shouldn’t straight off the hop assume everyone out there’s familiar with what exactly malware is, so let’s give a brief overview of that. Malware is a condensed term built out of malicious and software. What malware does is that it tricks its way into your system - or tricks you into allowing it access - and hacks data. Common types of malware include names you’ve probably heard before like virus, spyware, worm, and trojan. You don’t have to be tech knowledgeable to know when you’ve got one. Common symptoms include PC crashes, restarts or freezes, pop-ups, and warning messages being displayed, or unresponsive systems or similar issues. In worst cases scenarios the person suffering the malware attack may have their data or system held for ransom, with the malware attacker demanding money to release or disinfect your system. However, in most cases the hackers that will go to this type of trouble will be looking to fry bigger fish rather than an individual person. Next, let’s look at common types of malware. Common Types of Malware Virus Viruses appear as an executable file that - once permitted to run - corrupts the files and damages a system’s core...

You may find this interesting too.
adobestock 69434903

Many people will have a domain name they once owned that eventually lost its value and was discarded. Most of those folks won’t have given much thought to it after declining to renew it with their web hosting provider, and 9 times out of 10 it’s true that nothing more will come of it. However, cyber security experts are now letting people know that an abandoned domain name can allow cybercriminals to gain access to email addresses of the company or individual that previously owned it. Here at 4GoodHosting, we’re not unlike any other Canadian web hosting provider in the way we claim domain names for clients across hundreds of different industries. Many of whom will have that same domain name for themselves to this day, but some will have abandoned one or more because they found something better or simply because the domain name wasn’t required anymore for whatever reason. Here’s what happens when a domain name expires. It goes into a reserved state for a certain time, during which time the the recent owner has the ability to reclaim it. If and when that time expires, it becomes available for re-registration for whomever at no additional costs, identity or ownership verification. Now while it is true that SEO professionals and spam trap operators are good at keeping track of abandoned domain names for various purposes, many of them will not know they are a potential security risk. So let’s discuss this here today. Insider Access Information Look no further for a pressing concern than the fact that the new owner of the domain name can take control of the email addresses of the former owner. The email services can then be configured to receive any number of email correspondences that are sensitive in nature. These accounts can then be used to reset passwords to online services requiring sensitive info like personal details, financial details, client-legal privileged information, and a lot more. Recently this has been more in the new because of research performed on domain names abandoned by law-firms in Australia that were cast off as a result of different mergers and acquisitions between companies. These law firms...

You may find this interesting too.
adobestock 140603787 2 e1535989893193
reading time Reading Time: 6 minutes

Hearing the world ‘duplicate content penalty’ strikes fear in the hearts of most marketers. However, understand that it’s only people with no SEO experience that use this phrase with any frequency. Most have never read Google’s guidelines on duplicate content, and they just somehow conclude that there’s going to be heck to pay if something appears twice online. Here at 4GoodHosting, part of what makes us a good Canadian web hosting provider is the way in which we’re frank with our customers about exactly how it is the in the world of digital marketing. Is publishing duplicate content advisable? No, it’s certainly not. Is it going to be catastrophic for my visibility online as someone with a real interest in successful digital marketing. Very unlikely, and that’s going against what many of you have likely heard. Let’s bust some duplicate content myths today. Myth #1: Non-Original Content on a Site Will Mean Lower Rankings Across Your Domain There has yet to be any evidence that non-original content hurts a site’s ranking, except for in one truly extreme and rare instance. The same day a new website went live, a very lazy PR firm copied the home page text and pasted it into a press release. By putting it on various wire services they immediately created hundreds of versions of the same homepage content plastered all over the web. Google took note, and not in a good way, and the domain was manually blacklisted. Why was this so much of a problem, when similar instances - albeit on a lesser scale - occur every day? For starters, let’s consider volume. There were hundreds of instances of the same text. Next, timing; All the content appeared at the same time. Next, Context; It was identical homepage copy on a brand new domain. There’s a lot to be tolerated, but laziness isn’t going to be. However, this isn’t what people are talking about when they offer the phrase ‘duplicate content.’ It takes more than simply same word-for-word copy from one well-known site copied to another lesser known one to make red lights go off at Google. It’s a fact that many sites -...

You may find this interesting too.
adobestock 88793037 2
reading time Reading Time: 8 minutes

For the very few who might not been aware of its existence, a simple Google search of ‘web hosting’ will make it quickly apparent that there is the possibility of having your website hosted for free. That’s right, no so much as a penny will be required of you to have your site up and open on the World Wide Web for visitors to stop by and have a look over what you’ve chosen to display about yourself. However, as is the case with nearly every consumer service where you’ve got paid and unpaid alternatives you need to ask yourself the question; if the free option was every bit the equal of the paid ones, why would anyone choose to part ways with their money each month? That’s a legitimate question 10 times out of 10 in such a scenario, and when it comes to web hosting the answer is the same as it in almost any other - ‘Free’ hosting may be appealing, but don’t be surprised if you quickly come to find it’s not meeting your expectations and / or needs with what you have to have out of your website. The old expression ‘you get what you pay for’ comes to be true yet again it seems. We’ll say briefly that the best way to save your budget while building a website is to save on its development. Web design can be outsourced to anywhere in the world and it’s quite common to get quality work for a very competitive price. But enough about that, let’s get back on subject here. Fact is, choosing free web hosting is one of the most common mistakes many businesses make when beginning to develop their online presence. Why Hosting Matters Finding a reliable web hosting company is an important step in delivering the best user experience to your customers. 95% of the time (and that might be conservative) free web hosting isn’t going to be reliable, either partially or at all. Here at 4GoodHosting, we’re a Canadian web hosting provider like several others who have made a name for ourselves based in large part on our ability to offer real...

You may find this interesting too.
adobestock 17543162
reading time Reading Time: 4 minutes

It’s July 9th and two weeks from today the web is officially going with full HTTPS as requisite, and that’s a development that’s been a long time in the making. Securing traffic on the internet is an obvious priority, but of course there are people who are strongly opposed to having a secure web. Two weeks today Google will be uniformly labeling any site loaded in Chrome without HTTPS to be not secure. Most webmasters will be on top of this and accordingly usage of HTTPS is exploding right now. In the 6 months up to a recent report, 32% growth in the use of HTTPS was seen in the top 1 million sites. Mozilla tracks anonymous telemetry via Firefox browser and recorded big growth (75% page loads) in the rate of pages being loaded over HTTPS. Chrome too, at around the same 75 percent. We’re a Canadian web hosting provider who’s always got our thumb on the pulse of the industry, so it’s important to relate that quite a few popular sites on the web still don’t support HTTPS (or fail to redirect insecure requests) and will soon be flagged by Google. Plus, let’s clear up a few emerging myths about HTTPS: It’s a Hassle I Don’t Need It It’s Gonna be Slow It’s A Hassle No, it’s pretty darn simple. You can protect your site with HTTPS in a matter of seconds for FREE. Sign up for Cloudflare or using a CA such as Let’s Encrypt. We can assist you with any other web security and accessibility concerns you may have beyond https encryption of your website. I Don’t Need It Well it turns out, you do - particularly as it relates to the safety and privacy of those visiting your site. Without HTTPS, anyone in the path between your visitor’s browser and your site or API can peer in on (or make modifications to) your content without you needing to be made aware of it. Governments, employers, and even especially internet service providers can and have been overseeing content without user consent. If having your users receiving content unmodified and safe from maliciously injected advertisements or malware...

You may find this interesting too.
adobestock 109000309 e1530625483220
reading time Reading Time: 5 minutes

WordPress continues to be the most popular choice when choosing a vehicle for building a basic website. Those of you who are a single individual running such a website likely haven’t given much thought to WordPress user roles. In the event that you ever want to allow someone else access to your site then it’s helpful to know how to use these user roles. With them you can give people access to certain areas of your site, but only to certain areas of the site where they’ll be doing what you’ve requested them to do. Enabling everyday folks to be more in command of their digital presence is a part of what’s made 4GoodHosting a leading Canadian web hosting provider and, while we prefer websites that are much more dynamic, we understand that WordPress is intuitive to use and works perfectly well for a good many of you. So, today we’ll discuss what WordPress user roles are, have a look a their importance, and share some tips on how to use them the right way to improve overall site security. Defining WordPress User Roles WordPress features a role management system that enables you to specify what actions users can or can’t undertake on your site. As your site expands, knowing how to use these roles is a very valuable bit of knowledge. Each role can be specified based on certain capacities, and one example would be enabling one use to publish a post while allowing another to update plugins and themes. Here are 6 default user roles that can be taken on separately to improve security for the website. The Administrator Role This is almost certainly one you’re already very familiar with, given the fact it’s the role you’re assigned when you create your site. There is commonly only one administrator role and it gives access to everything related to your site. Given this role is all powerful, you should be very leery of giving anyone this high-level access to your site. The Super Admin Role Note as well that there is one user role that’s technically a step higher than the admin role - the super admin role. The...

You may find this interesting too.
adobestock 83968068
reading time Reading Time: 7 minutes

The Internet of Things or IoT as it’s come to be abbreviated has changed the role of the objects around us and the means by which we interact with them and that’s because the focus has shifted to enhancing customer experience for IoT and enabled devices. Data is now collected with the help of smart components, and businesses then probe it for insights to make smarter decisions about their products. The majority of these smart components are sensors, microprocessors, niche software, data storage techniques and tailor-made operating systems. They work collectively to leverage information derived from the data, and the way that’s done is causing that technology to be adapted by everyday people making everyday things. A new phase of user experience, Smart User Experience, has grown out of this and it has made the customer experience within IoT increasingly important. Here at 4GoodHosting, part of what makes us a top Canadian web hosting provider is the way we’ve got our ears to the ground with developments of this sort that carry weight in the digital world and will be of interest to our customers accordingly. Today, we’ll look at 6 ways you can enhance customer experience with IoT devices. Smartest Users Customer experience is playing an extremely vital role for connected devices, and more specifically smart user experience is front and centre with smart technologies pushing it forward. Being aware of their surroundings and sensing changes in their circumstances allows these IoT devices to take on measures that can be implemented to enhance their functionality. A quality smart user experience via the right interface enables companies to offer product iterations that consistently drive up the engagement factor and enhance the customer experience when using IoT devices. So those of you planning to provide a phenomenal customer experience for IoT products will want to take a detailed and deeply introspective look at how you design an IoT device. It will without a doubt dictate the way in which users interact with your products. Exercise Clean Design Introducing a UX-based functionality that fails to comply with the core values that the product aims to provide is going to put you in...

You may find this interesting too.
adobestock 47290328
reading time Reading Time: 5 minutes

We imagine a good many of you will have heard the term ‘proxy server’ more than a few times but not have a clue what it means. Think of all those times you’ve seen someone visit your LinkedIn profile in anonymous mode. A proxy server is a computer that is used as an intermediary, of sorts, between your computer and the websites you are visiting. The purpose of its function in doing so is so that you can surf anonymously or bypass an blocking capability of the websites you’re visiting. More simply, proxy servers hide your home IP address from websites that would otherwise be able to take note of it. Here at 4GoodHosting, it’s been a long road to becoming one of the best Canadian web hosting providers, but we like to think that a good part of our reputability is in the fact that we have a more value-added proposition than many of our competitors, and being informative and helpful regarding everything in the web world is definitely something that’s helped us out. So let’s look at proxy servers in greater detail this week, and see what makes them so appealing in certain instances or scenarios when you’re making your stops along the information superhighway. Anonymity One of the primary appeal of these servers is that they allow you to leave an anonymous comment on a website. The website’s owner may choose to block the proxy’s IP address, but it won’t be blocking your home IP address. Trying to track the IP address wouldn’t have any ability to track back to your genuine home IP address. You won’t care much if the proxy server’s ID is blocked, and that’s kind of the idea. Proxy servers used to be the only way anyone could access the world wide web, but times have certainly changed. Hackers now often use proxies to get behind network firewalls. Say a building’s computer is being used as a proxy to get behind the network firewall of that building because the IP address of that computer would be allowed there. A proxy server is a hacking tool most commonly, despite the fact it was up...

You may find this interesting too.
adobestock 87909563
reading time Reading Time: 3 minutes

Having coaxial fibre optic cables crossing oceans underneath the sea floor has been commonplace for years now, but it would seem as if we’ve moved into new and definitely uncharted territory when it comes to having a part of the world’s digital connectivity found beneath the surface of the sea. This past month saw Microsoft deploy - or more shall we say sunk - a shipping container-sized datacenter to the bottom of the sea near the Orkney Islands in Scotland as a part of its ambitious ‘Project Natick.’ This 40’ long datacenter is loaded up with 12 racks of 864 servers and 27.6 petabytes of disk. What’s most impressive, however, is the way Microsoft claims it can hold data and process information for up to 5 years without maintenance. Here at 4GoodHosting, we’re not unlike any other first-rate Canadian web hosting provider in the way we’re super keen to be right on top of groundbreaking developments in both technology AND the way it’s deployed as it relates to the online world. This is definitely one such example that’s worthy of mention and then some, so let’s take a long look at it this week. Microsoft’s capsule-shaped is called the Northern Isles datacenter, and it is the working equivalent of thousands of high-end personal computers. It will use the low temperatures of the surrounding sea water to cool the datacenter externally, contributing to the biggest benefit of this datacenter - dramatic reduction in cooling costs and electricity consumption. The Northern Isles datacenter will use specialized radiators that leverage technology from submarines to cool the internal hardware, while also using artificial intelligence (AI) to detect any signs of failure in servers or any other equipment. All in all, it will operate like any standard data center deployed on land. Electrical operating power will be supplied by the Orkney power grid, with renewable energy being generated via sea waves, tide, windmills and solar plants. Working towards eco-friendly sustainable solutions is admirable on Microsoft’s part, and Project Natick is a step towards their vision of data centres with their own sustainable power supply. It also expands upon the environmental promises the company has made,...

You may find this interesting too.
On This Page G
Explore 4GOODHOSTING
Copyright © 2025 4GoodHosting. All Rights Reserved.
+1 866 708 4678