
Reading Time: 4 minutes Rats have always had a bad rap, and among all the many negative things associated with the rodents is the fact that ‘rat’ is no longer only a noun in the English language. It’s now also a verb. To ‘rat’ out someone or something is to make someone in position of power or authority aware of what that thing or person is doing when they shouldn’t be doing it. An example could be when you were kids and telling the school principal the names of the students you saw scratching their names into the side of the gymnasium. They’re sure to be punished for it, but only you and the principal will ever know who exactly ‘ratted them out.’ Here at 4GoodHosting, we’re like any quality Canadian web hosting provider in that we don’t need to be prompted to stay on top of interesting developments in the digital world. We do it quite naturally, and we also have an at-least somewhat vested interest in maintaining a functional integrity for the World Wide Web. All of which makes this recent news entirely newsworthy for our blog here. Introducing the Suspicious Site Reporter Google this week started requesting help in identifying suspicious websites, and to that end is making an add-on that lets them ‘rat out’ suspicious URLs through their Chrome browser. They can add the Suspicious Site Reporter, and what they’ll then see is a new flag-style icon on the top bar of the browser. When they come across a URL that’s fishy looking, all they have to do is click on the icon to report unsafe sites to Safe Browsing for further evaluation by the overlords at Google. Safe Browsing is a ubiquitous term between Chrome, Mozilla's Firefox, Apple's Safari, and Android when users are steered away from sites that contain malicious or deceptive content. Google uses robots to scan the web and compile lists of websites that host malware, harmful downloads or deceptive ads and pages. Software developers then have the option of plugging into an API to integrate this list into their own applications. In honesty, rival browser makers have done this for years, but it’s a fact...
You may find this interesting too.

Reading Time: 5 minutes It’s not as easy as saying that it’s only those looking to make money who will put a major premium on having good search engine rankings. Being high up on SERPs - or search engine results pages if you’re not familiar with that acronym – will be important for anyone who needs to have reliable visibility for their interests in being online, whatever those interests may be. If you’re one of them then you’re likely putting the bulk of your focus into keyword optimization. That’s the way it should be, and that should continue to be one of your priorities. Many people aren’t aware of the fact that their domain name also plays a role in how well their website ranks in SERPs. Here at 4GoodHosting, we’re like every quality Canadian web hosting provider in that we know that the success of people with their online ventures is directly beneficial to us as well. It’s for this reason that sharing information on SEO-bosting domains is something we know might well be good for the both of us. So that’s what we’ll look at here today, and hopefully the information is ideal for anyone who’s about to register a domain name or for others who might want to reconsider their current one based on what they learn here. Factors Determining a Domain Name’s SEO Value Everyone’s familiar with Google’s authority when it comes to anything related to the World Wide Web. They’ve stated that there are some 200 different factors that come into play for SEO, and it turns out that domain name is one of the important of them. Choosing the right SEO-Friendly domain name should be one of the crucial decision for your business. So, without anything more in the way of fluff talk, let’s get right to them. Make it a Brandable Domain Name if Possible This one will apply more to companies operating an ecommerce website or one that promotes your business more generally. If you can incorporate your company brand into your domain name, it’s definitely beneficial. That needs to be mentioned, because some businesses avoid using their company name in the domain name of their...
You may find this interesting too.

Reading Time: 4 minutes Many people lament the fact that the Internet can’t be an unimpeded digital information source and not have commercial interests to the extent it does. It would be nice if it was a fountain of knowledge that exists for everyone’s own information gathering exclusively, but living in the world we do when there’s a buck to be made somewhere the opportunity will be taken. It’s especially frustrating for people who aren’t big consumers and have never clicked on a link or purchased very little online. Google has recently moved to limit Chrome’s ad-blocking capabilities, and no doubt many of you using an ad-blocker will have already noticed this. Google also announced that this feature will not apply for Google’s paid G Suite Enterprise subscribers. Here at 4GoodHosting, we’re a Canadian web hosting provider who keeps our thumbs on the pulse of the digital world and the prospect of ad-free internet browsing only via paid web browsers would be a pretty big deal for nearly all of us who source information online. According to a recent study, as many as 40% of people browsing the web from laptops use an ad blocker. That’s a big group of people that aren’t viewing Google’s ads. So why’s this happening, and what’s the underlying current here? Beyond Blocked Blockers It’s been reported in the news how Chrome users - and developers of Chrome-friendly, ad-blocker extensions - are none too pleased with Google’s proposed changes to the Chrome Extensions platform. We have to go back to when Google announced Manifest V3, which constituted a set of proposed changes to Google Chrome’s Extensions platform. In it, specific changes to Chrome’s webRequest API were proposed with an eye to limiting the blocking version of it and this potentially would remove blocking options from most events and creating them as observational only. Content blockers would now use a different API instead, known as a ‘declarativeNetRequest.’ The Manifest concluded that this new API is “more performant and offers better privacy guarantees to users.” The reality is though that Google’s Manifest V3 changes will prevent Chrome’s ad-blocker extensions from using the webRequest API as it normally, but it will also...
You may find this interesting too.

Reading Time: 5 minutes Just a few weeks back we were sharing with you how WhatsApp was recommending users reinstall their app because of it being hacked. Hopefully those of you that use it have already done so, and if you have then you’re probably good to go with instant messaging for the foreseeable future. It turns out however that the problem of hacks, infection, malware and more is a lot more extensive than just one app and one operating system. A quality Canadian web hosting provider is going to be one that appreciates the full extent of just how much digital connectiveness is important to people, and here at 4GoodHosting we have a front row seat to see the way mobile web browsing has pulled away from desktop in as far as being the means of choice for people. It all points to one well-understood reality; we’re turning to our mobile devices for more and more of everything that we do during the day. A good many of us (myself included) have Android phones, and that’s why recent news from Quick Heal Security Labs is really undeniable when it comes to highlighting the extent of the cyber-attack problem for Android users in nor. And that is that apparently over 3 million malware were detected on Android OS in 2018. Big Number, Big Problem We can paint a picture of the severity of this best by sharing some numbers: 3,059 malware infections per day, working out to 2 every minute across the country for Android devices 1,786 adware infections per day, equally 1 per minute 4,670 PUAs per day, and that’s 3 per minute Yes, there’s an awful lot of smartphones out there, and a good many of them are going to have an Android OS. Those numbers are still fairly staggering though, and it really does put the problem in some perspective. And what’s interesting is that despite the rapid rise in cyberattacks on mobile devices, cyber security experts say device owners aren’t taking this as seriously as they should be. Serious Business Experts state that there will be a significant rise in mobile-focused malware and banking trojans, and another major mobile-based threat...
You may find this interesting too.

Reading Time: 7 minutes No doubt the Internet of Things needs no introduction here given how the latest big wrinkle in the application of World Wide Web-based technology has become so integrally involved in both our private and working lives. As it stands currently, working with IoT applies to some businesses more than others, but it’s fair to say that any of them that put a premium on customer accessibility and control will need to be adhering to IoT realities. Here at 4GoodHosting, we’re a good Canadian web hosting provider like any other in that we prefer to keep our thumbs on the pulse of certain trends in the greater industry more so than others. IoT is definitely one of them, and it continues to be interesting to watch how it reaches further into our digital world every day. Consumers are going to expect more and more ‘smartness’ from their ‘things’ going forward, and businesses of course need to be receptive to that. This makes choosing the right IoT platform a complex endeavor. The landscape can be confusing for IoT hobbyists, experienced developers, and senior executives alike. Today we’ll give you a quick overview of the IoT platform landscape and how you should evaluate IoT platforms based on your needs. Defining an IoT Platform Quite simply, an IoT platform is an integrated service offering what’s needed to bring physical objects online. Supporting millions of simultaneous device connections is the challenge, and your platform needs to allow you to configure your devices for optimized communication between machines. The consensus among developers is that it’s really quite difficult to build a well-functioning IoT product. IoT Platform Types End-to-end IoT Platforms End-to-end IoT platforms provide hardware, software, connectivity, security, and device management tools to handle the massive numbers of concurrent device connections. They also provide all managed integrations needed, which can include OTA firmware updates, device management, cloud connection, cellular modem and more, all of which connect and monitor a fleet of devices online. Connectivity Management Platforms These platforms offer low-power and low-cost connectivity management solutions via Wi-Fi and cellular technologies. Connectivity hardware, cellular networks, and data routing features are all part of connectivity management platforms in...
You may find this interesting too.

Reading Time: 4 minutes WhatsApp is one of the most ubiquitous and popular instant messenger apps these days, and it’s fair to say that there’s likely hundreds of thousands of people who have it installed on their smartphone and make frequent use of it. Well, no one’s about to tell you should stop doing so if you’re one of them, but it turns out that you may want to update it manually now - or perhaps even better delete and re-install it - due to recent developments that have just now gotten out into the media. Part of being a good Canadian web hosting provider is giving clients a heads up on such developments, and that describes 4GoodHosting to a tee if we may say so ourselves. Often times these sorts of things aren’t quite ‘newsworthy’ in that sense, but again considering how common WhatsApp is these days we decided to make it our topic for the week. Right then. So, despite encrypting every conversation and following best security practices, WhatsApp (which is owned by Facebook for those of you who care about those things) it seems has been the victim of a cyber attack. It recently announced that it found a vulnerability that was allowing shady types to infect WhatsApp users with spyware when they made - or even attempted to make - a call using the app. No Answer - No Problem Now most people aren’t ones to take notes of character and number chains, but it would seem this this WhatsApp vulnerability is going by CVE-2019-3568. What makes it especially noteworthy is that it allows attackers to infect the device, and have success doing so even if the user at the other end receiving the call didn’t answer it. The means by which these nefarious individuals did this was by exploiting a buffer overflow weakness in the app, one that enables them to hack into WhatsApp before doing the same on the device running the app. When asked about it, the security team at WhatsApp chose to refer to it as an ‘advanced cyber actor’ - a rare but very dangerous type of cyberattack. It is different from other malware attacks...
You may find this interesting too.

Reading Time: 6 minutes Windows continues to be the most popular and ubiquitous of operating systems for desktops and notebooks around the world, and while there are those who will have nothing to do with it (see Mac devotees) that fact is a testament to the enduring popularity of what is ‘old faithful’ for the most part when it comes to computer operating systems. Here at 4GoodHosting, we’re a Canadian web hosting provider that’s in the position to see the value of both Mac and PC operating systems, and it’s true that both have their strengths and weaknesses – which is of course true of pretty much everything. One thing that Microsoft has benefited from for decades now is that it was first to the party, and that’s meant that many people will always choose a Windows OS device because it’s especially familiar for them. And so it is that the next version of Windows 10 — scheduled for a May 2019 update release— is now just around the corner. This is not going to be a massive overhaul of the OS by any means, but there are as it approaches its 4-year anniversary there are some nice tweaks to make it fresher and more well-suited to determined user preferences. Foremost among these are a new light theme and changes to the search experience, Cortana, and more. Let’s have a look at the most recent update to Windows 10 here today. On the House We’ll start by stating for anyone who might be unaware that Windows 10 updates are always free. The May 2019 Update via Windows Update will be provided at no charge for existing Windows 10 users on any device deemed compatible with the update. The noteworthy difference here, however, is with the rollout method - it is no longer automatically downloaded to your PC. What you’ll get instead is a notification in Windows Update that the May 2019 update is available. From there you’ll have the option of downloading or installing it. However, only those running a version of Windows 10 that is close to end of support will receive the update automatically. Just as with prior releases, rollouts of major...
You may find this interesting too.

Reading Time: 6 minutes One thing that certainly hasn’t changed from previous years as we move towards the quarter pole for 2019 is that hackers are keeping IT security teams on their toes as much as ever. That shouldn’t come as much of a surprise given the cat and mouse game that’s been going on in cyberspace between the two sides for a long time now. Cyber threats are as sophisticated as ever now, and for everyday individuals they biggest concern is always that the privacy of sensitive data will be compromised. One of the most common responses to enhanced and more enabled threats is to go with a Virtual Private Network and all the enhanced security features that come with them. Here at 4GoodHosting, we’ve been promoting them for our customers very actively in likely what same way every other Canadian web hosting provider has. There’s merit to the suggestion, as VPN connections protect online privacy by creating a secure tunnel between the client - who is typically uses a personal computing device to connect to the internet - and the Internet. Nowadays, however, VPN networks aren’t as automatic as they were when it comes to trusting in secure connections and understanding that there won’t be data leaks. The good news is that even people with the most average levels of digital understanding can be proactive in protecting their VPN from data leaks. Let’s look at how that’d done here today. Workings of VPN A reliable VPN connection disguises the user’s geographical location by giving it a different IP address. There is also architecture in place to encrypt data transmitted during sessions and provide a form of anonymous browsing. As it is with almost all internet tools, however, VPN connections can also face certain vulnerabilities that weaken their reliability. Data leaks are a concern amongst information security researchers who focus on VPN technology, and it’s these issues that are most commonly front and centre among them: WebRTC Leaks Web Real-Time Communication (WebRTC) is an evolution of the VOIP (Voice over Internet Protocol) for online communications. VoIP is the technology behind popular mobile apps such as Skype and WhatsAppp, and it’s been the leading...
You may find this interesting too.

Reading Time: 6 minutes We don’t know about you, but for those of us here it doesn’t seem like it was that long ago that 3G Internet speeds were being revelled in as the latest and greatest. Things obviously change fast, as 3G has been in the rear view mirror for a long time now, and the reality is that the newest latest and greatest – 4G – is about to join it there. Here at 4GoodHosting, the fact we’re a leading Canadian web host makes us as keen to learn more about what the new 5G networks have in store for us as anyone else who’s in the digital space day in and out. It appears that we’re in for quite a treat, although there are some who suggest tempering expectations. That’s to be expected anytime wholesale changes to infrastructure key to big-picture operations are forthcoming. Nonetheless, we’re supposed to be immersed in the 5G world before the end of next year. Mobile 5G is expected to start making appearances in cities around North America this year, with much more extensive rollouts expected in 2020 so a discussion of what we can all expect from 5G is definitely in order. Let’s do it. What is 5G, and How’s It Going to Work? To cut right to it, 5G is the next generation of mobile broadband that will augment 4G LTE connections for now before eventually replacing them. 5G is promising to deliver exponentially faster download and upload speeds along with drastically reduced latency - the time it takes devices to communicate with each other across wireless networks. Right, that alone is worthy of some serious fanfare, but fortunately there’s even more to this. But before getting into additional benefits expected to be seen with 5G networks, let’s have a look at what makes them different from 4G ones and how exactly these new super networks are predicted to function. Spectrum-Specific Band Function It’s important to start with an understanding of the fact that unlike LTE, 5G is going to operate on three different spectrum brands. The lowest one will be the sub-1GHz spectrum bands like GSMA / ITU. They are what’s known as...
You may find this interesting too.

Reading Time: 7 minutes \ Most people are perfectly fine with prompting their desktop or notebook to ‘nod off’ at the end of a day, and especially for those who work on their device and will be back in front of the screen first thing tomorrow morning. It’s true that they can go into a low-power mode and there’ll be no light coming from the screen and illuminating the room once you tell your computer to go to sleep. Others who aren’t going to be using theirs as regularly may instead choose to shut those down and be perfectly all right with the time it takes to get it booted up and running again once they do want to use it again. The majority won’t really give it much more than that, and here at 4GoodHosting we’re like any other good Canadian web hosting provider with a good reputation in that we’ve got our minds on much more detailed and relevant aspects of what’s going in the digital world. But like any of you we’ve got desktops and notebooks at home too. That’s why we found a certain article on this topic to be informative in just the type of way we aim to offer our weekly blog content, and so here it is for you too! Let’s have a look at this, and try to come to a consensus on what’s the best choice for you when you’re doing using your computer – put it to sleep, have it hibernate, or shut it down entirely. Popular Thinking The standard belief is that choosing not to turn your computer off at night is preferable, because shut downs and start ups tax the computer and lead to some of its components wearing out more quickly. Alternately, leaving it on does the same for other ones that never get to rest when the computer is still running, and even if it’s long since asleep. There’s some truth to each of them, so the question then becomes which is the better of the two choices. Here’s the skinny on all of that. The Issue It’s easy to understand why believing that cutting the...
You may find this interesting too.