Latest Articles Archives - Server Gigabit Network https://www.servergigabit.com/blog/category/latest-articles VPS Hosting | Dedicated Server Wed, 15 Jan 2025 09:00:32 +0000 en-US hourly 1 https://wordpress.org/?v=6.8 https://www.servergigabit.com/blog/wp-content/uploads/2022/07/GIGABIT_logo-1-90x90.png Latest Articles Archives - Server Gigabit Network https://www.servergigabit.com/blog/category/latest-articles 32 32 How To Setup Your Own V2Ray on a Virtual Server https://www.servergigabit.com/blog/tips-sharing/how-to-setup-your-own-v2ray-on-a-virtual-server Thu, 25 Aug 2022 16:52:19 +0000 https://www.servergigabit.com/blog/?p=765

What is V2Ray? V2ray or vmess protocol to be precise, is a sophisticated version of the famous Shadowsocks. At the core, v2ray is also based on SOCKS5 proxy. Normally, proxies lack encryption, and that’s what differentiates a VPN and a proxy. Shadowsocks is a SOCKS5 proxy with encryption, and vmess is the next-gen Shadowsocks. V2Ray includes two “protocols” vmess, v2ray’s…

The post How To Setup Your Own V2Ray on a Virtual Server appeared first on Server Gigabit Network.

]]>

What is V2Ray?

V2ray or vmess protocol to be precise, is a sophisticated version of the famous Shadowsocks. At the core, v2ray is also based on SOCKS5 proxy. Normally, proxies lack encryption, and that’s what differentiates a VPN and a proxy. Shadowsocks is a SOCKS5 proxy with encryption, and vmess is the next-gen Shadowsocks.

V2Ray includes two “protocols” vmess, v2ray’s own protocol, and Shadowsocks. In addition, you can choose several tunneling and obfuscation options with vmess.

  1.  TCP – It is the default connection. “TCP (Transmission Control Protocol) is a type of protocol or standard to transfer information over the Internet, such as SSH, FTP, HTTP, etc.“
  2.  Websocket – With WebSocket you can hide your VPS IP address behind a domain name, making it harder for the VPN-blocking firewall to blacklist the IP address.
  3. mKCP – An alternative to TCP, could be faster than TCP. Could be useful if you need a UDP-like protocol.
  4. QUIC – Google’s alternative to TCP and UDP. Based on UDP. Could be faster than TCP.
In addition, you can mask some of the above protocols and make them look like a Wireguard, WeChat video, torrent, VOIP, or DTLS traffic.

Choosing a VPS

I recommend renting a cheap Linux VPS. In case the IP address is blocked, you can open a new server. Find a less popular VPS provider because the firewalls could target the popular ones more often that the smaller ones.
Mainly, you can find two types of VPS, OpenVZ and KVM. Mostly KVM is preferable, because you can use the “Google BBR” command to increase the speed.

There is a way to check whether a VPS service has a working IP address before making a payment. Google “vps looking glass”, and you will find several looking glass pages of VPS services. If you can download the test files without using a VPN, then you can invest your money for the virtual server.

After renting a server, you can test the IP address before installing v2ray. Go to Putty (or an alternative) type in the IP address, if you do not encounter an error, then you are good to go. Alternatively you can ping their IP address using an app.
After ensuring that VPS IPs address is not blocked, you can use a VPN when connecting to your server via Putty or an alternative to prevent the IP address blocking.

Setting up V2Ray

Update:
1) If you are interested in an advanced v2ray configuration websocket(ws)+tls+cdn with a multi-user management panel, please click here to check out the new tutorial. Also, you can check the
trojan GFW tutorial.

2) If this script does not work for you, and you only need simple v2ray TCP, you can install the script described on the v2ray +ws+tls+cdn tutorial. You only need to do Part-1 (install the script), skip Part-2 (SSL, domain, CDN), and choose TCP on the web panel.

Thanks to the one-command script by 233blog.com, you can install v2ray even if you are not familiar with Linux commands.

You need to have at least Ubuntu 16, Debian 8, or CentOS 7.

This guide will be for Ubuntu.

1. First make updates and upgrades

sudo apt-get update

sudo apt-get upgrade

2. Run the v2ray script

bash <(curl -s -L https://git.io/v2ray.sh)

If you run into the error “curl command not found” then run an apt-get update -y && apt-get install curl -y

3. The first question will ask you which version you choose. No major differences between 1 and 2. You can choose 1.

1

v2ray_guide_screenshot1

4. Next you choose the protocol. For the sake of simplicity let’s choose TCP.

1

v2ray_guide_screenshot2

5. Now you choose the port. You can choose the default value or change it. I choose port 23432.

23432

6. Then you choose to install an ad-blocker or not. It is noted that performance may be affected if ad-blocker is activated. I chose not to install it.

N

7. You will be asked whether you also want to install Shadowsocks. If you type Y,  then you will have to choose a Shadowsocks port, a password, and an encryption method. I will keep it simple and choose not to install Shadowsocks.

N

v2ray_guide_screenshot3
8. And lastly, you press Enter to proceed or Ctrl+C to cancel. After a while, the setup will be complete. Now you can get v2ray configuration by typing v2ray qr (for QR code) or v2ray link (for URL).
v2ray_guide_screenshot4
v2ray_guide_screenshot5

 

Managing  V2Ray

V2ray commands

v2ray info – View V2Ray configuration information
v2ray config – Modify V2Ray configuration
v2ray link – Generate V2Ray configuration file link
v2ray infolink – Generate V2Ray configuration information link
v2ray qr – Generate V2Ray configuration QR code link
v2ray ss – Modify Shadowsocks configuration
v2ray ssinfo – View Shadowsocks configuration information
v2ray ssqr – Generate Shadowsocks Configure QR code link
v2ray status – View V2Ray running status
v2ray start – Start V2Ray
v2ray stop – stop V2Ray
v2ray restart – restart V2Ray
v2ray log – View V2Ray Run log
v2ray update – Update V2Ray
v2ray update.sh – update V2Ray management script
v2ray uninstall – Uninstall V2Ray

Adding multiple users on v2ray (Bonus)

The v2ray script adds only one user as a default, you can add multiple users by editing the config file. Normally, you would not need to add multiple users, since multiple users can use the same configuration. I have added this section as a bonus.
1. First, generate multiple UUIDs on the uuidgenerator.net
2. Next, SSH into your VPS and type nano /etc/v2ray/config.json to edit the config file
3. Default configuration of users is given as following:
“users”: [
{
“id”: “b831381d-6324-4d53-ad4f-8cda48b30811”,
“alterId”: 233
}
]
4. You shoud edit the config as given below, note that I add a comma sign (,)  and copy and paste the above user config in brackets and change the uuid:
“users”: [
{
“id”: “b831381d-6324-4d53-ad4f-8cda48b30811”,
“alterId”: 233
},
{
“id”: “z454362o-4324-8b12-gh1l-8zer71r59603”,
“alterId”: 233

}
]
5. You can add as many users as you want following the above guide. Just repeat the process. After adding users press Ctrl+X to exit the config, and press Y to save the changes.
v2ray_guide_screenshot6

Installing V2Ray to Your Devices

V2Ray apps for Android

You can use v2ray on several apps on Android, and all of them are available for free Google Play.

  • v2RayNG
  • Kitsunebi
  • BifrostV
  • V2Ray
  • Clash for Android

V2Ray apps for iOS

You can use v2ray on several apps on your iPhone/iPad as well, most of the v2ray apps are paid apps, except for 91VPN.

  • ShadowRocket
  • Kitsunebi – supports UDP relay
  • Quantumult
  • i2Ray
  • Pepi
  • 91VPN
  • Pharos Pro

V2Ray clients for Windows

For your Windows PC, you can choose one of these three v2ray Windows clients. And here is a download link. There is also a new software called Clash, that requires a 64-bit Windows. You can download it here.

  • V2RayW
  • V2RayN
  • V2RayS
  • Clash

V2Ray clients for MacOS

For your Mac PC, you can choose one of these two v2ray clients. And here is a download link for V2RayX and here for V2RayU.

  • V2RayX
  • V2RayU

The post How To Setup Your Own V2Ray on a Virtual Server appeared first on Server Gigabit Network.

]]>
How Firewalls and Protection defend you from DDoS https://www.servergigabit.com/blog/latest-articles/how-firewalls-and-protection-defend-you-from-ddos Tue, 16 Nov 2021 10:05:54 +0000 https://www.servergigabit.com/blog/?p=421 Knowing the importance of how your Firewall and other protection methods defend you against threats to your servers such as DDoS attacks. It may be a scary thought but your server is prone to attacks such as DDoS which may threaten your online business and its functions. But have no fear for your servers come equipped with their own Firewalls…

The post How Firewalls and Protection defend you from DDoS appeared first on Server Gigabit Network.

]]>
Firewall and Protection against DDoS

Knowing the importance of how your Firewall and other protection methods defend you against threats to your servers such as DDoS attacks. It may be a scary thought but your server is prone to attacks such as DDoS which may threaten your online business and its functions. But have no fear for your servers come equipped with their own Firewalls and protection methods to help prevent your server from any potential threats.

Even though a dedicated server is capable of protecting your server from potential DDoS threats, you may still want to consider some other options to enhance your website or application protection from these potential threats.

There are two main principles as to why businesses require a firewall for their websites and applications and those are Prevention and Mitigation. In order to understand how these two principles interact with each other to safeguard your website or web application from an attack such as a DDoS (distributed denial-of-service) attack, this article will provide a more in-depth explanation to both of these concepts.

Mitigation

DDoS mitigation services are operated by using various techniques as listed below:

– Traffic Filtering is your first line of defense against unwanted traffic, based on source and destination addresses, various protocols used, or other packet information that matches with known preset attack signatures.

– Application Layer Gateways are designed specifically to allow legitimate and safe traffic through the firewall but block all malicious traffic that threatens your websites by providing an additional layer of security.

DDoS Mitigation is an advanced technique which is designed to prevent attacks and secure your networks and applications from being overwhelmed by using spoof requests or sending them via authorized servers.

Prevention

Complex DDoS attacks have been occurring more and more frequently, and businesses these days can’t seem to steer clear of them… But fret not for there is a way. First and foremost – identify if you really got hit by a DDoS attack. Then start checking your resources: bandwidth, disk space, memory.

There are various ways to keep your business running despite a DDoS assault, depending on the size of your company: improving your bandwidth, adding more servers, deploying botnets, or purchasing a mitigation tool for this sort of attack.

Businesses and governments are increasingly vulnerable to DDoS assaults. It’s critical for businesses to develop a successful plan by first recognising the many dangers they face and then implementing suitable countermeasures against those threats–determine which form of attack would be most effective for them and protect themselves accordingly!

Conclusion

Businesses and governments are increasingly vulnerable to DDoS assaults. It’s critical for businesses to develop a successful plan by first recognising the many dangers they face and then implementing suitable countermeasures against those threats–determine which form of attack would be most effective for them and protect themselves accordingly!

The post How Firewalls and Protection defend you from DDoS appeared first on Server Gigabit Network.

]]>
What exactly is cloud computing? A Beginner’s Handbook https://www.servergigabit.com/blog/latest-articles/what-exactly-is-cloud-computing-a-beginners-handbook Tue, 04 May 2021 08:59:01 +0000 https://www.servergigabit.com/blog/?p=327

This blog is a beginner’s guide for those interested in learning about cloud computing, its benefit, and the various levels of cloud computing. Before we go some farther, let us first clarify: What exactly is cloud computing? Cloud computing refers to on-demand applications that are provided over the internet. This service is broadly defined as follows: Infrastructure as a Service…

The post What exactly is cloud computing? A Beginner’s Handbook appeared first on Server Gigabit Network.

]]>

This blog is a beginner’s guide for those interested in learning about cloud computing, its benefit, and the various levels of cloud computing.

Before we go some farther, let us first clarify:

What exactly is cloud computing?

Cloud computing refers to on-demand applications that are provided over the internet. This service is broadly defined as follows:

  1. Infrastructure as a Service (IAAS)
  2. Platform as a Service (PAAS)
  3. Software as a Service (SAAS)

Benefits of using Cloud Computing

Flexibility: Companies with fluctuating latency requirements need the flexibility of Cloud Computing. If you need a large amount of bandwidth, you may increase your storage space. When you don’t need a lot of bandwidth, simply scale down. There is no reason to be tethered to a rigidly fixed capacity infrastructure.

Disaster Recovery: Cloud Computing offers comprehensive backup and recovery solutions hosted in the cloud. As a result, there is no need to invest more money on in-house disaster management. It often saves time when it comes to emergency recovery.

Automatic Software Upgrades: The majority of cloud service companies offer automatic software updates. This removes the additional challenge of downloading a new product release and keeping up with the most recent software installs.

Low Capital Expenditure: In cloud storage, the Pay as You Go approach is used. This ensures that there is very little initial capital outlay. A contingent charge is made conditional on use.

Collaboration: Applications can be shared between teams in a cloud environment. This improves team members’ collaboration and communication.

Remote Work: Cloud systems allow for the simplicity of operating from anywhere. There is no job done on-site. Anyone, at any time, will communicate and begin operating.

Security: Cloud hosting systems are more reliable than traditional onsite jobs. Data maintained on local servers and machines is vulnerable to security threats. There are very few loose ends of Cloud Computing. Cloud vendors provide their customers with a safe operating atmosphere.

Document Control: Storing records in a shared archive improves visibility and accountability across businesses and their customers. There are fewer risks of inconsistencies since there is only one shared copy.

Competitive Pricing: Since there are many participants in cloud services, they keep fighting among themselves to have really decent pricing. As opposed to other alternatives, this is significantly less expensive.

Environmentally friendly: Cloud storage conserves valuable natural capital. By not obstructing energy and bandwidth.

Different layers of Cloud computing

Infrastructure as a Service (IAAS): Operators of IAAS offer low-level abstractions of physical hardware. IAAS is exemplified by Amazon Web Services (AWS). AWS offers EC2 for computation, S3 buckets for storage, among other services. This layer’s resources primarily consist of hardware such as power, processing power, network bandwidth, and so on.

An IAAS provider may have real, interactive, or a combination of the two types of services. These assets are used to build a cloud.

For these facilities, the IAAS vendor often performs authentication and backup recovery. Servers, storage, routers, switches, and other associated hardware are the primary tools in IAAS.

Platform as a Service (PAAS): PAAS companies have controlled resources such as Rails, Django, etc. Google App Engineer is a clear example of PAAS. These are the worlds in which developers can easily create complex applications.

PAAS providers manage scaling and efficiency, while developers concentrate solely on designing applications.

A PaaS provider provides a framework from which clients can create, operate, and maintain software without having to instal the infrastructure themselves.

Clients save time with PAAS by not creating and managing infrastructure environments aligned with the app they choose to build.

Software as a Service (SAAS): A SAAS company provides customers with a fully functional software framework. SAAS examples include Salesforce and Github. They conceal the underlying details of the programme and only include a user experience for working with the machine. The version of the software can be quickly updated behind the scenes.

The most significant advantage of SaaS is that a client may introduce new users on the fly depending on their existing requirements. Furthermore, the customer is not required to install or retain any device on its premises in order to utilise this software.

Different deployment models in Cloud computing

Private Cloud: Several businesses create their private cloud. A private cloud is an entirely functional database managed, controlled, and utilised by a single company.

The main argument for using a private cloud is for convenience. Many businesses feel secure in a private cloud. Other explanations for constructing a private cloud include business decisions or operational leverage.

There is also the idea of a Virtual Private Cloud (VPC). A hosting firm builds and manages a private cloud in VPC.

However, it is only used by one company.

Public Cloud: Several organisations have cloud services available for usage and distribution by the general public and large corporations. For example, Google Apps, Amazon Web Services, and so on.

Public cloud services concentrate on layers and technologies such as cloud application, infrastructure management, and so on. Resources are exchanged among various organisations in this model.

Hybrid Cloud: The Hybrid cloud is a mix of public and private clouds. This method combines the advantages of both private and public cloud computing. As a result, it is a rather strong forum.

A customer has access to the functionalities and capabilities of all cloud systems. A company may use a hybrid cloud to build its own cloud and transfer ownership of its cloud to a third party.

The post What exactly is cloud computing? A Beginner’s Handbook appeared first on Server Gigabit Network.

]]>
Google’s Big Plan to Get Rid of Cookies Is Failing https://www.servergigabit.com/blog/latest-articles/googles-big-plan-to-get-rid-of-cookies-is-failing Mon, 03 May 2021 09:28:38 +0000 https://www.servergigabit.com/blog/?p=315

Millions of people are part of a worldwide experiment to eliminate cookies forever. Google has been testing innovative browser-based technology in Chrome since last month, and it has the potential to transform the global advertising market completely. The majority of those interested in the trial are presumably unaware of it, but critical voices are voicing concerns as the project progresses.…

The post Google’s Big Plan to Get Rid of Cookies Is Failing appeared first on Server Gigabit Network.

]]>

Millions of people are part of a worldwide experiment to eliminate cookies forever. Google has been testing innovative browser-based technology in Chrome since last month, and it has the potential to transform the global advertising market completely. The majority of those interested in the trial are presumably unaware of it, but critical voices are voicing concerns as the project progresses.

German, French, and Belgian regulators are also scrutinising Google’s plans. Simultaneously, several of the world’s more famous websites have chosen to bypass Google’s trials altogether, with a host of businesses finding ways for users to circumvent the framework.

The Federated Learning of Cohorts (FLoC) scheme is part of Google’s larger Privacy Sandbox programme, which would see the end of third-party targeting cookies in early 2022. Websites choose which advertisements to display you in one of three forms. You may see an ad for a pair of shoes because you placed them in your shopping cart last week; whether you’re reading an article about cars, the advertisements you see might also be about automobiles; or the ads you see might be dependent on your preferences. FLoC, like third-party cookies, is concerned with ads depending on your preferences.

Cookies currently enable marketers to send you advertisements tailored to you because they are dependent on your unique browsing history. FLoC is intended to eliminate this person targeting by broadening the net. If you use FLoC, Chrome can collect your web background and link it to other people’s patterns. You would then be assigned to a squad, or cohort, of thousands of other people who are similar to you. Advertisers would also advertise whole populations of people rather than actual people.

It’s not only the magnitude of the transition but also who’s behind it. Google, whose holding firm Alphabet made a staggering $55 billion in sales in the previous three months, controls the worldwide advertising market. Regulators are rightly concerned.

“The FLoC technology raises some concerns about the GDPR’s legal requirements,” says Johannes Caspar, Hamburg’s data protection commissioner. “Integrating users into FLoCs could be seen as a processing of personal details. And this necessitates voluntarily granted permission as well as direct and open facts regarding these operations.” In brief, Google must ensure that users actually want to use FLoC rather than getting the system enabled by default in Chrome. Caspar continues that there are risks in how cohorts will be used to “draw assumptions” on people’s browsing habits and how specific FLoC cohorts would be.

FLoC is confusing more than just German regulators. A spokesperson for France’s data regulator, the Commission Nationale de l’Informatique et des Libertés, or CNIL, says the country is “especially attentive” to technology that may substitute cookies because it could need access to details already stored on people’s computers. According to the CNIL, such a scheme will necessitate “specific, knowledgeable, and unambiguous approval.” If Google fails to do so, the consequences may be serious. The French regulator fined Google $120 million in December 2020 for not seeking people’s consent when using cookies.

Other officials are more concerned about competition issues. Officials in Belgium are eager to learn how future competitive programmes can be and how they can conform to data privacy laws. Since January, the UK’s Competition and Markets Authority and data privacy agency, the Information Commissioner’s Office, have been looking at Google’s plans. And the Irish Data Protection Commission, which is in charge of many big technology firms with European headquarters in Dublin, claims it has been working with Google on the plans.

Google is fully conscious of the possible pitfalls of FLoC. For example, the technology is yet to be tested in the European Union. “EU privacy legislation establishes strong expectations for interface accountability and regulation, which is what we plan for FLoC,” says Marshall Vale, a Chrome product manager at Google. “We understand that the involvement of data privacy agencies is critical to making this correct, which is why we have started early stage discussions regarding the technology and our plans.” Google has also stated that it intends to launch software that would enable users to opt-out of being assigned to FLoC cohorts.

The post Google’s Big Plan to Get Rid of Cookies Is Failing appeared first on Server Gigabit Network.

]]>
Difference Between Free SSL Certificate & Paid SSL Certificate https://www.servergigabit.com/blog/ssl-certificate/difference-between-free-ssl-certificate-paid-ssl-certificate Sat, 22 Aug 2020 15:40:23 +0000 https://www.servergigabit.com/blog/?p=257

At a moment when the number of hacking attempts and fraudulent activities is rising with each passing day, website owners and online users are becoming much more concerned about their security. Having built an SSL certificate has therefore become a requirement for every website. As you probably know, two types of SSL certificates exist. The first is ‘Free SSL Certificate’…

The post Difference Between Free SSL Certificate & Paid SSL Certificate appeared first on Server Gigabit Network.

]]>

At a moment when the number of hacking attempts and fraudulent activities is rising with each passing day, website owners and online users are becoming much more concerned about their security. Having built an SSL certificate has therefore become a requirement for every website.

As you probably know, two types of SSL certificates exist. The first is ‘Free SSL Certificate’ which is available for free as the name implies. The other paying one is commonly referred to as the ‘SSL Certificate.’

how to choose an SSL certificate

FREE SSL Validation

Domain Validated (DV) SSL certificates are quick and easy to get because all you need to do is prove the ownership of the domain that you wish to secure.

Paid SSL Validation

Domain Validated (DV) SSL certificates are quick and easy to get because all you need to do is prove the ownership of the domain that you wish to secure.

Organization Validated (OV) SSL certificates provide validation and higher assurance to web visitors that the website belongs to a legitimate business.

Extended Validation (EV) SSL certificates are the ultimate solution to provide the highest levels of encryption, security, and trust to your customers.

Key Differences Between Free SSL and Paid SSL

Type of SSL Certificate

Free SSL certificates only come with a Domain Validation (DV) option. DV certificates are used only for providing a basic level of authentication. Usually, they are used for platforms such as small websites and blogs. Free SSL certificates don’t have the provision for Organization Validation (OV) and Extended Validation (EV) certificates. Whereas the paid SSL certificates do come with OV & EV options, which are absolutely necessary for protecting business websites.

Level of Validation 

When it comes to verifying a website owner’s business details before issuing a free certificate, CA does not validate anything apart from the identity of the website owner. While in the case of paid SSL certificates, verification of the identity of the website owner is a must before issuing the certificate to the site owner and in the case of OV & EV certificates, in-depth verification of the business is carried out by the certificate authority (CA).

Validity Period

Free SSL certificates provided by popular CAs are issued for 30-90 days. As a result, the website proprietor must renew the certificate every 30-90 days. In the case of paid certificates, they can be issued for a period of 1-2 years.

Support

The certificate authorities (CAs) and resellers of paid certificates are dedicated to helping their customers round the clock. Those customers get to choose whichever type of support they want, be whether its chat, email or call. On the other hand, free CA’s don’t assist their customers with such remarkable support because they can’t afford to. If you need help with an issue regarding free SSL, you’re going to have sifted through a bunch of old forum posts to find it.

Level of Trust

As mentioned earlier, the free certificates assist with domain level validation only. If one wants to get OV and EV certificates, he/she has no option but to go with paid SSL certificates. With OV & EV certificates comes visual indicators such as the business name in URL and Certificate information and better site seals. Whereas, free SSL certificates don’t deliver such privileges.

Warranty

With a free SSL certificate, if anything goes wrong on the CA’s end – like, a catastrophic failure of their PKI for instance – you are completely out of luck. Paid SSL certificates don’t have this issue, because they come backed by warranties that payout anywhere between 10 grand and 1.75 mils.

The post Difference Between Free SSL Certificate & Paid SSL Certificate appeared first on Server Gigabit Network.

]]>
How to Add FREE SSL to WordPress Websites? https://www.servergigabit.com/blog/ssl-certificate/how-to-add-free-ssl-to-wordpress-websites Sat, 22 Aug 2020 13:22:06 +0000 https://www.servergigabit.com/blog/?p=250

  In this article, we will show you how to easily get a free SSL certificate for your WordPress website and set it up all by yourself. With an SSL Certificate, your website URL will start with “https://” instead of “http://”. In addition, your website visitors/potential customers will notice a green [Secure] word in the website address bar. Steps to…

The post How to Add FREE SSL to WordPress Websites? appeared first on Server Gigabit Network.

]]>

 

In this article, we will show you how to easily get a free SSL certificate for your WordPress website and set it up all by yourself. With an SSL Certificate, your website URL will start with “https://” instead of “http://”. In addition, your website visitors/potential customers will notice a green [Secure] word in the website address bar.

Steps to Claim a FREE SSL Certificate for your WordPress website:

Step 1: First,  login to your WordPress Dashboard.

Step 2: After that, access your “Setting” menu on left side

wordpress ssl

Step 3: Replace the current URL http://your-website.com with https://your-website.com

http to https

Step 4: Next, click on the “Save Changes” button below to proceed and refresh your website. You’ve successfully switched to a “Secure” website.

NOTE: If the green [Secure] word still does not show in the browser address bar when you browse your website, proceed to step 5.

Step 5: Go to “Plugin – > Installed plugin

Wordpress plugin install

Step 6: “Add New” Plugins. Search for “Really Simple SSL”.

SSL Plugin

Step 7: Install the plugin, and proceed to click on the button “Go ahead, activate SSL!”

SSL plugin install

Step 8: Lastly, Refresh your website. Your are now ready to go with “Secure SSL”

If you experience any issue while performing this setup, please feel free to contact our tech team at:
PS: Remember to Update your Google Analytic setup to “https://”

Besides, many hosting providers and registrars provide SSL certificates as a bundled package or an add-on product. It is a very convenient and easy way. There are different brands of certificate authorities, such as GeoTrust, RapidSSL, and Symantec.

The post How to Add FREE SSL to WordPress Websites? appeared first on Server Gigabit Network.

]]>
3 Types of SSL Certificate | Does your website need? https://www.servergigabit.com/blog/tips-sharing/3-types-of-ssl-certificate-does-your-website-need Fri, 31 Jul 2020 08:19:32 +0000 https://www.servergigabit.com/blog/?p=198

Business owners also have the same questions in mind:Which types of SSL certificate do I need? Know the difference and pick the right one! SSL Certificate are not only providing strong security for your website visitors’ data. Besides, it also help to boostyour users’ trust and getting SEO benefits ! KEEP reading to get a clear understanding of the types…

The post 3 Types of SSL Certificate | Does your website need? appeared first on Server Gigabit Network.

]]>

Business owners also have the same questions in mind:Which types of SSL certificate do I need? Know the difference and pick the right one!

SSL Certificate are not only providing strong security for your website visitors’ data. Besides, it also help to boostyour users’ trust and getting SEO benefits !

KEEP reading to get a clear understanding of the types of SSL certificates that are available and which type will help your business!

What is an SSL Certificate?

SSL stands for Secure Sockets Layer. It is a security technology that establishes an encrypted link between a server and a client to prevent criminals from getting and modifying any information transferred, including potential personal details or any other sensitive data. Other than that, SSL certificates help to protect sensitive data such as credit card numbers, username, passwords, IC numbers, social security numbers and more.

Types

3 types of SSL certificates categorized based on their SSL validation process.

  1. Domain Validation(DV)
  2. Organization Validation(OV)
  3. Extended validated (EV) categories

Level 1: Domain Validation (DV) SSL

DV SSLs are the basic SSL certificates which have a light verification process.This certificate is issued easily as no company information is checked or displayed on the certificate. Besides that, the Certificate Authority (CA) will issue this certificate to anyone who is listed in the domain name admin contact record.

  • DV SSLs are the cheapest, easiest to get and can be process in minutes to a few hours
  • For instance, Suitable for personal websites, blogs, and informational websites which don’t take clients’ personal or financial information via any forms or checkout process.

Level 2: Organization Validated (OV) SSL

Organization Validation has stricter vetting process than DV SSL. You have to prove your organizational details and local presence, then go through telephone verification, domain authentication, and a final verification call.

  •  It takes 1-3 days to complete the verification process.
  • Suitable for – Any businesses or companies that involved less sensitive data transaction.

Level 3: Extended Validated (EV) SSL

EV certificate has the highest level of security than the previous two.  Firstly, CA will confirming their documents with government records of  organisation or individual that apply this certificate. A green padlock will be shown on your web browser bar along with the name of the legal website owner and the Certificate Authority issuing the certificate. Thus, it will help increase trust of customers and conversions.

  • It takes A few days to a few weeks
  • Highly recommended for All e-commerce sites or websites that are dealing with customers’ financial information (credit card numbers, bank account details, SSN, tax-related details) like websites offering eCommerce facilities, paid subscriptions, fundraisers for charity, paid memberships, etc.

 

Lastly, many hosting providers and registrars provide SSL certificates as a bundled package or an add-on product. It is a very convenient and easy way. There are different brands of certificate authorities, such as GeoTrust, RapidSSL, and Symantec.

 

The post 3 Types of SSL Certificate | Does your website need? appeared first on Server Gigabit Network.

]]>
How to Speed Up Website | Gain Traffic https://www.servergigabit.com/blog/tips-sharing/how-to-speed-up-website-gain-traffic Fri, 31 Jul 2020 06:18:16 +0000 https://www.servergigabit.com/blog/?p=186

Accelerate your website and increase your revenue. Follow these tips to improve your page speed and raise your traffic. Today, page speed is a key factor in digital marketing. It has a huge influence on: How long the users are staying on your website. How many of them turn to a paying customer. Where you are ranked in the organic…

The post How to Speed Up Website | Gain Traffic appeared first on Server Gigabit Network.

]]>

Accelerate your website and increase your revenue. Follow these tips to improve your page speed and raise your traffic.

Today, page speed is a key factor in digital marketing. It has a huge influence on:

  1. How long the users are staying on your website.
  2. How many of them turn to a paying customer.
  3. Where you are ranked in the organic search.

It becoming a more important factor when it comes to search engine rankings. Unfortunately, most websites do not perform well when it comes to page speed, and this has a direct negative impact on their revenue.

How to speed up your website

Minimize HTTP requests

The first step to minimizing your requests is to figure out how many your site currently makes, to use as a benchmark.If you use Google Chrome, you can use the browser’s Developer Tools to see how many HTTP requests your site makes.

Right-click on the page you want to analyze, and click “Inspect,” then click the “Network” tab. (If you don’t see the “Network” tab, you may need to expand the Developer Tools sidebar by dragging the left border to the left.)

speed up your website

The “Name” column shows all of the files on the page, the “Size” column shows the size of each file, and the “Time” column shows how long it takes to load each file.

 

Minify and Combine files

You can reduce this amount by “mining” and combining your files. This reduces the file size and the total number of files. Instead of accessing 3 files, the website actually only has access to 1 file. Since any unnecessary piece of code adds to the size of your website, it’s important to eliminate extra space, line breaks, and indentation. This ensures that your pages are as lean as you can.

There are several ways to minify and combine files, and if your site runs on WordPress, plugins like WP Rocket make the process fairly simple.

 

Avoid bad requests

Difference between optimized page and bad request page

Broken ties result in an error of 404/410. Those are creating unnecessary demands. Fix the broken URLs (pay particular attention to the images). Using a broken link checker online or use a free WordPress link checker. You can also read about Xenu Link Sleuth and Screaming Frog tools from SEOmoz that can be really helpful.

 

Reduce DNS lookups

DNS lookups take a meaningful amount of time to look up the IP address for a hostname. The browser cannot do anything until the lookup is complete. Reducing the number of unique hostnames may increase response times. Just look at how a DNS lookup can take about 3 seconds of load time in SEOmoz. You can measure yours, by using Pingdom Tools. I do want to mention that when I re-tested the homepage of SEOmoz.org from a server in Dallas, it showed better results than it did before I started writing this article.

 

Optimize images

Images can contain extra comments and use useless colors. Keeping image sizes to a minimum is a big help for users on slow connections. Try to save in JPEG format.JPEG Format is samller than PNG format.

Example Compression Tools To Use : Adobe Photoshop,TinyPNG,JPEG Mini

 

Choose The Right Hosting Plan

Most people choose the cheapest hosting for their website. If your website is serving few visitors, its okay but serving up to thousands of visitors per days we suggest choose premium business hosting for better response and smoother for visitors. Plan the content you wish to host before choosing a web hosting because if the content is heavy with images, video, heavy css, it will slow down your website load time too.

You can still upgrade later on, find for the hosting plans that sufficient for your need or above your need if you have more budget. There are reasons why you need a better hosting plan for your business.A good web hosting plan can help to block malicious activities.

We can giving help for your best hosting plan Click Here.

The post How to Speed Up Website | Gain Traffic appeared first on Server Gigabit Network.

]]>
Difference between SSL Certificates vs. SiteLock https://www.servergigabit.com/blog/tips-sharing/difference-between-ssl-certificates-vs-sitelock Fri, 31 Jul 2020 05:49:15 +0000 https://www.servergigabit.com/blog/?p=183

What are SSL certificates and SiteLock? Site Lock – SiteLock is a web protection tool that checks the site for malware and vulnerabilities. SiteLock not only detects threats but can also address issues or security problems that can occur in your web space. SSL certificate – It is also called “SSL” although it was actually replaced by the TLS (Transport Layer…

The post Difference between SSL Certificates vs. SiteLock appeared first on Server Gigabit Network.

]]>

What are SSL certificates and SiteLock?

Site Lock – SiteLock is a web protection tool that checks the site for malware and vulnerabilities. SiteLock not only detects threats but can also address issues or security problems that can occur in your web space.

SSL certificate – It is also called “SSL” although it was actually replaced by the TLS (Transport Layer Security protocol) SSL Certificate’s purpose is to authenticate the website’s owner and ensure an encrypted connection, and can not be intercepted by hackers

Both are crucial to the security of your website. They both do a great job of protecting the confidential and valuable data of your customers. Besides, ensuring maximum online security of your customer can help to boost consumer confidence and increase your website sales.

In order to give our customers a clearer picture of how the powerful duo works in their own way to help you maximize the security of your website, we have created an infographic that indicates their different functions.

ssl vs sitelock

 

 

Above all, SSL Certificate and SiteLock are essential to the protection of your website. Both increase customer confidence and increase your website sales by ensuring maximum online security for your customers. SiteLock and SSL Certificates work hand-in-hand to give your website the highest degree of security and trust to your customers. Please feel free to visit our SSL & SiteLock to find out more.

Let us know if there’s anything I can do today to help with your web security needs. We’re always happy to help, so feel free to have a live chat with our helpful sales team.

 

 

The post Difference between SSL Certificates vs. SiteLock appeared first on Server Gigabit Network.

]]>
How Do I addon My ID Protection? https://www.servergigabit.com/blog/tips-sharing/how-do-i-addon-my-id-protection Fri, 31 Jul 2020 05:18:37 +0000 https://www.servergigabit.com/blog/?p=178

6 Steps to Addon My ID Protection in Client Area:   Step 1:  Login in your Client area. Step 2:  Click on your registered domain.   Step 3: After that, Click on the “Settings” button aligned to the domain you wish to add ID Protection. Step 4: Find the “Addons” button on your left, under Manage Category to addon the ID Protection.…

The post How Do I addon My ID Protection? appeared first on Server Gigabit Network.

]]>

6 Steps to Addon My ID Protection in Client Area:

 

Step 1:  Login in your Client area.

Step 2:  Click on your registered domain.

id protection - domain select

 

Step 3: After that, Click on the “Settings” button aligned to the domain you wish to add ID Protection.

ID protection - domain list

Step 4: Find the “Addons” button on your left, under Manage Category to addon the ID Protection.

Addon ID Protection

Step 5: Then, Click the green ID Protection “Buy Now” button.

Step 6:  Lastly, Proceed to payment to keep your information secure.

 

Finally, You’re sucessfully to addon your ID protection for your Domain!

PS: Please be informed that Whois ID Protection’s validity is based on your domain expiry date. We suggest you to get you domain and ID Protection in a single bundle to enjoy earlier protection and saving.

 

Example:

Domain Purchase date: 26 June 2020
Domain Expiry date: 26 June 2020

D Protection Purchase date: 25 December 2019.

*ID Protection will expire on 26 June 2020

 

You may not realise the importance of Whois ID Protection till you see the post “What is ID protection of Domain”.

The post How Do I addon My ID Protection? appeared first on Server Gigabit Network.

]]>