Hosting News

WordPress Hosting Now Live on ResellerClub!

We promised to bring WordPress hosting to you by the end of March and we’ve delivered! Yes, one of our most awaited launches, WordPress hosting is now live on the ResellerClub platform. WordPress thrived owing to its impeccable user-experience and is considered to be one of the most well-known and widely used comntent management systems for hosting websites. Let’s run you through why our WordPress hosting can help you deliver excellence to your customers.

Why choose WordPress Hosting?

Our WordPress hosting provides you with all the essentials to build resilient websites – speed, reduced load time, auto back-ups and security. WordPress, much like any other CMS or software could be vulnerable to attacks if not upgraded regularly and the same applies to its plugins and core. Don’t worry about frequently updating your WordPress sites, let us take care of that to ensure that you and your customers stay worry-free.

1) Pre-Installed WordPress

You can start building your website immediately and manage all your installations from one place.

2) Automated backups + CodeGuard & SSL

We promised to bring WordPress hosting to you by the end of March and we WordPress Hosting Now Live on ResellerClub!

Our WordPress Hosting comes with regular pre-integrated cloud backups powered by CodeGuard. With CodeGuard, even the smallest of changes on your website will be monitored and a ChangeAlert email is sent to notify you regarding any modifications or deletions with a timestamp.

You can restore your website or database to any previous backup version as well as download a zip of contents at any time. You have the option to choose whether you want to restore your files automatically or restore individual files and folders. If CodeGuard’s monitoring process detects any changes to the website source code, the files that changed or were added are transmitted to the CodeGuard repository

3) SiteLock

We promised to bring WordPress hosting to you by the end of March and we WordPress Hosting Now Live on ResellerClub!

Give your WordPress websites world-class protection with daily malware scans, FTP scans & vulnerability removal with SiteLock! Sit back, relax, and keep those security threats at bay! Did you know that SiteLock has protected more than 1,000,000 online businesses around the globe? That’s more than any other website security or virus scan provider. Get 360° Website Security.

SiteLock’s technology combines patent pending scans with automatic malware removal tools and enterprise-grade firewalls to protect your website. After your website is scanned and secure, you can proudly display the SiteLock Trust Seal which is proven to increase sales. What’s a better way to fortify your websites for your customers!

3) Fully Managed Services

Now spend less time managing and more time doing what you love – building websites. Leave the technical stuff to us!

4) Scalable resources

Planning to start small? No problem. Scale up once your website expands. The best thing about WordPress is that it grows with you. Our WordPress hosting is built on cloud technology and is highly scalable. You can add up to 8 CPU cores and 8GB RAM to boost your site on the fly

5) Intuitive Dashboard

We promised to bring WordPress hosting to you by the end of March and we WordPress Hosting Now Live on ResellerClub!

ResellerClub WordPress Hosting gives you a feature-rich control panel to manage your WordPress Websites, Email, SSL & more as well as monitor usage of CPU Cores and RAM on.your package. You also have the convenience of managing custom WordPress panels for easy SSL installations. You can:

  • Monitor resource utilization
  • Install & Manage WordPress instances
  • Access Email, Backups & Security
  • Login to WordPress Dashboard

Now that you’re well-versed with what we have to offer, you can have a look at plans in the table below.

Standard Business Pro Elite
Max Sites 1 2 3 5
CPU Cores 2 4 6 6
RAM 2 GB 4 GB 6 GB 6 GB
Storage 5 GB 20 GB 50 GB 80 GB
SiteLock Pro Pro Pre Pre
CodeGuard 1 GB 5 GB 10 GB 25 GB
Email Accounts Unlimited Unlimited Unlimited Unlimited
Pricing (per month) $7.00 $12.00 $16.00 $29.00
Pricing (promos 1st month) $3.99 $7.99 $9.99 $19.99


We promised to bring WordPress hosting to you by the end of March and we WordPress Hosting Now Live on ResellerClub!

Did you know that a 2-second delay in page load time causes 87% abandonment of websites (according to Aberdeen Group,, We offer a complete solution that takes care of speed, security and makes WordPress extremely simple. If you have any questions regarding WordPress Hosting, you can refer to our FAQs here. Feel free to share your thoughts in the comments section below.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


KVM vs Virtuozzo? Which one should I choose?

Since the addition of VPS on our platform, we’ve only been providing a specific type of virtualization, Virtuozzo. A month ago, we introduced KVM virtual private servers on our platform. That must have got you thinking, “What’s the difference between the two?” This blog post covers the distinguishable features of KVM and Virtuozzo.  Virtualization has changed the way we compute. We utilize lesser hardware, save energy and costs as well as run various applications and operating systems on that very server.

Why do we need virtualization?

Apart from saving time, money and energy, it:

  • Helps you to manage your resources efficiently
  • Provides a secure remote access and thus increases productivity
  • Helps against data loss prevention

What makes virtualization possible is a software known as a hypervisor or a virtualization manager. The VM sits between the hardware and operating system and basically allocates the amount of access that applications and operating systems have with the processor and other hardware resources.

Choosing the right technology for virtualization is essential. The two main choices when it comes to virtualization are Virtuozzo and KVM. Depending on your needs, either of these could suit your requirements. Here are the pros and cons of both Virtuozzo and KVM.

Virtuozzo at a glance

With Virtuozzo, the resources of your server are efficiently split. However, it’s not free and it’s not an open source program (unlike OpenVZ). It doesn’t use the normal hardware abstraction layer construction. Instead, Virtuozzo comes with a proprietary Kernel Service Abstraction Layer (KSAL) that manages access to the kernel and basically prevents any single VPS from bringing the entire physical server down. It approaches virtualization by running a single OS kernel as its core. The core is then exported to various partitions on the host and each partition becomes an independent entity better known as a virtual private server (VPS).

KVM at a glance

Kernel-based Virtual Machine (KVM) is a virtualization infrastructure for the Linux kernel that turns it into a hypervisor. It only works with the Linux OS but does support Windows, BSD and Solaris as guests.

Virtuozzo is container-based while KVM is a hardware-based virtualization. KVM runs on x86 and x86-64 systems with support for virtualization extensions. It’s an open source choice and consists of a loadable kernel module. This module provides the virtualization infrastructure core and it also provides a processor specific module.

Pros and Cons of Using Virtuozzo

The Pros

  • Independent Platform – You can use Virtuozzo with Windows or Linux without any hassle
  • Web-based GUI panel – The Virtuozzo Power Panel is a GUI based web powered panel, which enables you to handle servers on their own over the web
  • Easy Restoration – Restoring is easy and comes with full root access. You’re also able to restore an individual file or the entire VPS

The Cons

  • RAM is shared – If the server doesn’t have enough RAM, Virtuozzo struggles and usually will fail since the system depends on virtual RAM. Ultimately, it will kill processes when it runs out of RAM
  • Lack of device support – In some cases, Virtuozzo won’t allow custom devices. For example, VPNs
  • Resource sharing isn’t great – The resource sharing of Virtuozzo isn’t that great. If one user is using resources heavily, it can slow things down.

Source – Server Sitters.

Pros and Cons of Using KVM

I’m sure you already know that KVM is one of the top open source choices for virtualization. Then again,

Pros of using KVM

  • Excellent Security – Since the base of KVM is made up of Linux, it uses the SE Linux advanced security system. This helps to ensure security of the virtual machines meets a very high level. KVM has also received awards for meeting the security standards of the government.
  • Available for Anybody to Use – The open environment of KVM means anybody can use it and customize the system to fit specific requirements.

Cons of Using KVM

  • Complex Setup – One of the main disadvantages of using KVM is the complex setup process. It’s actually more complex than other systems
  • Limited Processors – Keep in mind that the system doesn’t work with all processors
  • May Require Built-in CPU Virtualization Support – In some cases, KVM may require built-in CPU virtualization support to ensure the best possible performance

Source – Server Sitters.

Overall, using KVM can be beneficial, it could outweigh the disadvantages for some users. But then again, the use case depends on the user. Here are a few highlights that you can have a look at

Virtuozzo KVM
Can only host Linux operating systems Can host Linux, Windows and custom OS options
Most Virtuozzo hosts are oversold Is better isolated even though it can be oversold
More affordable, provides users with speed and scalability Offers private virtualized hardware and is more customizable
Easier to set up Requires more networking knowledge

If you’re looking for full control over your server, KVM is your go-to. On the other hand, Virtuozzo is a great choice if you don’t have any special requirements and is more affordable than KVM. Then again, it’s vital to crosscheck and look at the benefits and how they apply to your situation. If your choice of virtualization boils down to the two of these, make sure you weigh your options before making a decision. What do you prefer using for your customers? Do let us know any other parameters of comparison that you found useful to evaluate.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Why .ONLINE could be the preferred domain for your customers

New gTLDs are on the rise and have gained tremendous momentum with 27 million+ new domains registered. There are around, 500+ new gTLDs out there, but as a reseller, it is extremely important that you cater to your customer’s needs by handpicking extensions that are relevant based on the nature of their business and geography. If you’ve been following our monthly new gTLD reports, you must have noticed the consistency of Radix’s .ONLINE domain extension. It is in our top 10 new gTLDs adds for every month. Here are a few reasons for the success of .ONLINE:

New gTLDs are on the rise and have gained tremendous momentum with  Why .ONLINE could be the preferred domain for your customers

  1. Number one in awareness: .ONLINE ranks 3rd in customer awareness Globally and number one in Europe & countries like Germany, France & Poland vs. all other new domains (based on a survey conducted by ICANN)
  2. Number one in usage: Did you know that .ONLINE has the most number of domains in the global Alexa 1 million most visited sites in the world vs. all other new domain names? It also has the highest number of sites that are SSL enabled vs. every new domain name out there
  3. Rapid growth: The domain extension has consistently been amongst the fastest growing new domains and is the 8th largest new domain with 660,000+ domains registered
  4. Versatile domain extension:

    • Being a generic extension, it has innumerable use cases. It is suitable for all kinds of customers be it businesses, individuals, startups or students.
    • To add to that .online is also an ideal fit as a bundle or add-on for web services of all types
    • Over 45,000 domains, registered in 2016 end in the word ‘online’ which shows customers intuitively chose .ONLINE

Why do you think your customers deserve to get .ONLINE? Feel free to share your thoughts in the comments section below. You can now get .ONLINE at a rock-bottom price of just $30.99 $5.99 this March and it continues for April as well! Click here to know more.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


How To Secure Your Website on the Application Server level

As a brand with an online presence, security is of top priority. Hackers are always looking for loopholes and ways to compromise the security of your site. So, how can you secure your website? So, there are two levels that you can lock-down your website on and those are application and server.

Let’s discuss how you can secure your website on each level.

1. Security on Application level

Update script regularly: One of the first steps to secure your website is to update the script you’ve installed. Additionally, your focus should be on ensuring that any released update is installed to ensure you’ve plugged vulnerabilities. Since many of these tools are created on open software programs, they’re readily available to hackers however, this is not really a problem. Open source also has a huge advantage in that, hundreds and thousands of well-intentioned programmers have the opportunity to test for bugs and vulnerabilities and therefore could point out security issues that you make have overlooked. Ensuring you have the latest script updates minimizes the risk of intruders getting in. If you have third-party softwares on your website like a CMS or a forum, ensure you keep track of security patches through a mailing list or RSS feed detailing security issues. Tools like Composer, npm help manage software dependencies and vulnerabilities. It’s important to have your dependencies up to date. Try tools like Gemnasium to get notifications about vulnerabilities.

Use strong passwords and change passwords often: Yes, this seems basic but it’s important. If your password is easily guessable, you’re in trouble. According to the Telegraph, “123456” was the most commonly used password of 2016 followed by

  1. Password
  2. 12345678
  3. Qwerty
  4. 12345

Ensure your passwords are a combination of letters, both uppercase and lowercase, special characters and numerics. A truly secure password can prevent a security breach.

Delete installation folder: Once you’re done with the installation, ensure you delete the installation folder on your system to prevent hackers from any access or opportunity to get their hands on the folder and run the installer again. This is important because once in, the hacker can erase your database and take control of your website. In the case that you do not want to delete the folder, consider changing the name to avoid easy recognition. We’ve highlighted this in our earlier blog on Fault in the Default: 6 Simple Default Settings Tweaks to Secure Your WordPress site.

Use security plugins and website security tools: Plugins can boost the functionality of your script. There are tons of plugins that give your website and extra layer of security. Some website security tools that are useful are:

  • Netsparker – for testing SQL injection and XSS
  • OpenVAS – for testing known vulnerabilities
  • – to quickly report security headers a domain has enabled
  • Xenotix XSS – to confirm if your site’s inputs are vulnerable in web browsers

Change database table prefix: A blog or a website has a default database table prefix that every hacker is aware of. For example, WordPress has ‘wp’ as the table prefix which is very well known and therefore an easy entry point for intruders. A bunch of default settings like these on WordPress sites unknowingly expose your website to threats. Our earlier blog post calls each one out.

Limit error message information: The information you share on the error message can often be misused. Ensure you provider minimal information without mentions of the problem, server information like API keys, database passwords as access to this information can make hacking quite easy.

Whitelist cross-site scripting: Cross-site scripting attacks are fairly common. They can occur when intruders have opportunities to slip malicious JavaScript codes onto your pages and infect pages of visitors to your website exposed to the code. Whitelisting cross-site scripting tightens the security around your website.

2. Security on Server level

Anti-Malware: Malware compromises passwords by stealing them when accounts are attacks. Malware can erase passwords used and stored by FTP and other programs. To protect your server against such attacks, ensure you install anti-malware and run scans on all computers which access the account. There are a number of scanners available depending on your operating system. SiteLock is a super simple and a fantastic security solution for scanning and malware removal. At ResellerClub, we’re offering SiteLock starting at just $0.99

Server Hardening: Server hardening is the process of enhancing server security through a number of ways to make the server environment secure. Hardening servers make them more resistant to server issues. Some ways to harden servers include data encryption, disabling unwanted SUID and SGID binaries, using security extensions, minimizing unnecessary software, hardening sysctl.conf, installing Root Kit Hunter and Chrootkit hunter etc.

Port Blocking: Knowing which ports to block is important for security. Here’s a list of ports used by well-known Trojans highlighted by the SANS Intrusion Detection FAQ and some guidelines for shutting down these known vulnerabilities.

Firewall: A firewall prevents all network access to your server. The Plesk firewall is easy and to set it up, requires you to follow these steps: Navigate to server > Firewall > Modules > Firewall. If you have a static IP address, you can create rules so that the server will only allow access from your IP address at your home and/or office.

PHP Upgrades: Most shared hosting providers offer various versions of the open source programming language, PHP butan old version could expose your site to attacks. According to  w3techs, PHP version 5.3 is used by 31.1% and 5.4 is used by 29%. Both versions have reached the end of its life and could pose a big security threat. The latest version of PHP currently is 5.6 which released in August 2014 and is valid till 31st December, 2018. Here’s more on how you can upgrade your website php version.

MySQL Upgrades: While there are many implementations of the SQL database language available on Linux and Unix-like systems, one of the most popular is MySQL. However, if configured incorrectly, this tool can be a security liability. Here’s more on how to secure MySQL.

SSH access: SSH keys are cryptographic keys used to authenticate to an SSH server as an alternative password-based login. This kind of authentication is completely encrypted. They’re a lot more secure than passwords and include significantly more combinations for a hacker to run through. Many SSH key combinations are considered almost impossible to crack mostly by computing hardware because it would require too much time to run through possible matches.

Use Encryption / SSL (HTTPS in links): Since January 2017, Google has begun flagging websites without digital certificates and HTTPS links as ‘Not Secure’. This mandate has been implemented to tighten security across networks. HTTPS guarantees users than the information passed from one network to another is completely encrypted and can be read by no one. This is especially necessary for sites that require credit card and personal information.

Apart from being important for your visitors, it’s critical to secure your site too. A login form will often set a cookie which is sent with every other request to your site that a logged in user makes and is used to authenticate those requests. An intruder would be able to imitate a user and take over your user’s login session and make you vulnerable to attacks. To safeguard against such attacks consider using HTTPS throughout your site.

Server side validation / form validation: It is best to do validation on both the browser and server side. The browser can catch failures like mandatory fields that are empty and numerics in text fields. While these can be bypassed, deeper validation on the server side and failure to do so could lead to malicious code being inserted in your database. To prevent this and secure your server, a validation is necessary.

 Hackers are always looking for loopholes and ways to compromise the security of your site How To Secure Your Website on the Application  Server level

A confirmation field is a good practice to allow the user to input additional confirmation for things like passwords. This ensures that the customer puts in the right information.

 Hackers are always looking for loopholes and ways to compromise the security of your site How To Secure Your Website on the Application  Server level


The key to securing your website is to regularly audit your site – both on the application as well as server end. A well managed website is a secure website. By putting it into practice to do regular checks, you can be certain you’re doing your very best to lockdown your site. CodeGuard is a great solution for automatic backups in the cloud with full website resortation and to monitor daily changes so you never have to lose data in case of a security compromise. We at ResellerClub offer CodeGuard starting at just $0.98. Check it out!

Got more tips on how to tighten website security? We’d love to read about it in the comments section below.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Make your Website even more Secure with EV SSL Certificates!

With a range of products that have launched and are yet to launch, we’ve finally added that extra ‘oomph’ to our website security products. That’s right, the most widely requested variant of SSL Certificates is finally live on ResellerClub! Extended Validation SSL (EV SSL) certificate, the highest available level of trust and authentication for a website is now on the ResellerClub platform.

What is EV SSL?

It’s the highest class of SSL available. Extended Validation provides the highest encryption level available and enables the organization behind a website to present its own verified identity to website visitors. Obtaining an EV certificate requires verification of the requesting entity’s identity by a certificate authority (CA). A distinctive color, usually green, in the address bar indicates that the website has a valid EV certificate and instills confidence in the customer to complete the transaction.

  • An EV SSL Certificate provides the strongest encryption level available
  • It enables the website to present its own verified identity to the visitors
  • The green address bar provides immediate trust and helps customer conversion

With a range of products that have launched and are yet to launch Make your Website even more Secure with EV SSL Certificates!

Why Comodo EV SSL

  • 2048-bit, High Assurance SSL Certificate, with 99.9% Browser Recognition
  • Priority Phone Support
  • Free Comodo Trust Logo for unlimited server licenses
  • $1,750,000 relying party warranty

Websites that require identity assurance, online payment provisions (let’s take a major bank or a financial institution as an example) will surely need high level data encryption since they highly targeted by phishing attacks.

With the ResellerClub advantage, you get:

  1. A 30-day money back guarantee – We offer a 30 day money back guarantee on all shared hosting accounts. If you’re unsatisfied for any reason, we’ll give you a full refund
  2. 24/7 support – All plans include our true round-the-clock support. It doesn’t matter if it’s 3AM or the middle of your business day
  3. 99.9% uptime – Fully backed by our SLA, we promise you at least 99.9% uptime as part of our service guarantee


With a range of products that have launched and are yet to launch Make your Website even more Secure with EV SSL Certificates!

A Comodo EV SSL certificate will enhance the trust between your customers and their visitors by showing a visible secure sign, the green browser address bar as mentioned above. The green bar, exclusive to EV SSL certificates, assures website visitors that they are transacting business on a highly secured, trustworthy domain.  Thus, combining EV SSL certificates with your clients’ websites will not only fortify their online presence but also rake in higher conversions and repeat business!

With a range of products that have launched and are yet to launch Make your Website even more Secure with EV SSL Certificates!

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Como a Trademark Clearinghouse pode proteger sua empresa contra infrações

Nos últimos tempos, vimos uma grande mudança na indústria de domínios. Com os nomes de .COM se tornando escassos, os novos gTLDs ganharam muita popularidade. .XYZ tomou o mercado rapidamente, outros nTLDs como .ONLINE e .TECH fizeram um número recorde de registros. Como Reseller, você provavelmente está muito familiarizado com os gTLDs e com a ascensão. Mas a ascensão destes 1.800 novos TLDs abriu o risco de violação de marca registrada. Como uma marca protege seu nome nas extensões mais recentes?

Entre na Trademark Clearinghouse.

O que é a Trademark Clearinghouse?

Para resolver a questão que acabamos de mencionar, a ICANN, órgão governante da Internet, criou um sistema centralizado para verificar os direitos de marca existentes para todos os novos gTLDs.

Benefícios do registro no âmbito da TMCH:

Marcas ou marcas comerciais com seus registros na TMCH:

  1. Pode registrar nomes de domínio idênticos durante o Período Sunrise
  2. Será notificado em caso de violação de seu nome de marca registrada em um novo gTLD
  3. Será notificado se o nome idêntico estiver registado

Em um artigo que escrevemos em 2015, mencionamos o que era a TMCH, os termos associados a ele e os casos icônicos como o CANYON.BIKE e SPEEDTEST.ORG. Neste artigo, quero dar mais ênfase sobre a sua importância e as disputas de domínio mais recentes envolvendo os novos gTLDs.

Por que isso é importante?

Como mencionado anteriormente, os novos gTLDs abriram marcas para a violação. Não há dúvida sobre isso. De acordo com a WIPO, os novos gTLDs representaram 10% do número de casos da UDRP da WIPO em 2015, o que incluiu um total de 4364 nomes de domínio! .CLUB,. EMAIL e .XYZ foram os mais comuns. Os TLDs com código de países representaram 13,7% de todos os depósitos junto à WIPO em 2017.

Em 2015, as três principais indústrias apresentaram queixas por ciberespeculação: fashion, banking & finance & Internet & IT. Você pode ver o infográfico completo aqui.

 Como uma marca protege seu nome nas extens Como a Trademark Clearinghouse pode proteger sua empresa contra infrações

O registro Trademark Clearinghouse dá aos proprietários de marcas um registro verificado no banco de dados global. Porque o benefício deste é três vezes como mencionado acima, é uma oportunidade para as marcas protegerem-se (economizando tempo e dinheiro), bem como tomar medidas apropriadas contra violadores.

Casos de ciberespeculação


Em 2015, a empresa de automóveis, BMW ganhou os direitos de MW sendo um ccTLD para o Malawi. BMW lutou o caso com base na crença de que o domínio foi registrado deliberadamente de má-fé. Especialmente desde que o registrante vendeu o domínio por $1 milhão!

O réu não respondeu às alegações. Ele, de fato, também possui um, e poderia ter talvez ganhado o caso, uma vez que não era um registro autônomo.

Hugo Boss

Marca de luxo alemã, Hugo Boss ganhou o caso e os direitos de em junho do ano passado. A marca de moda argumentou que o nome de domínio poderia causar confusão com a marca registrada de Hugo Boss e que o proprietário estava usando de má-fé. O registrante do domínio não respondeu à queixa.

A Hugo Boss registrou sua marca como marca internacional em abril de 1987. O painel da OMPI, Ian Lowe, disse que a marca tinha “direitos indubitáveis ​​e incontestáveis” para o domínio devido à marca “Hugo Boss”.


LEGO apresentou 236 casos sob a Política Uniforme de Resolução de Disputas desde 2006 e nunca teria perdido um único caso! A empresa ou ganha o caso ou o caso é encerrado antes da investigação.

Estratégia para Proteger a sua marca da ciberespeculação

  • Verifique as suas marcas: A sua prioridade número 1 como marca é registar a sua marca comercial na TMCH. Certifique-se de que o seu portfólio de marcas está atualizado.
  • Investigar: Se você encontrar sua marca sendo violada em um nome de domínio, verifique se o domínio é resolvido. Se o fizer, certifique-se de tirar screenshots como evidência. Verifique os arquivos na Internet para obter registros do proprietário, data, status atual do site, data de expiração, informações de contato, servidores de nomes, etc. e reter cópias dos registros Whois.
  • Procure por intenção ou “má-fé”: Se a finalidade do nome de domínio é vender, faça uma oferta (você saberá isso se o registrante oferece vender o domínio a um preço muito maior do que o preço de registro) ou apenas para interromper o negócio do titular da marca, você tem uma boa chance de ganhar o caso.
  • Perseguir ciberespeculadores: Enquanto você tem que escolher suas batalhas (se houver muitos) a forma menos dispendiosa de apresentar uma queixa é através de uma Suspensão Rápida Uniforme (uma versão mais rápida da Política de Resolução de Disputas de Nomes de Domínio). Os registros da TMCH podem ser usados ​​como prova para verificar a violação de marca registrada no âmbito do URS.


Sua identidade online é extremamente importante. Uma ameaça de violação tem que ser tratada com muita atenção, pois pode manchar a imagem de marca. A Clearinghouse de Marcas Registradas foi especificamente lançada para configurar suporte para os novos gTLDs e é uma obrigação para uma marca que deseja se proteger. Como a ICANN descreve a TMCH, é “A única solução para proteger sua marca na era dos novos gTLDs

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


VPS KVM LINUX – Agora disponível no Brasil!

Anteriormente, tínhamos servidores virtuais Virtuozzo na plataforma ResellerClub. Pensando em vocês estamos trazendo novos produtos para o portfólio da ResellerClub Brasil em 2017. O VPS KVM agora está disponível! Estamos ansiosos para anunciar a Virtual Machine VPS baseado em Kernel com uma nova adição à plataforma da ResellerClub. Se você está a procura de servidores Virtuozzo, eles ainda existem. Você pode consultar planos e preços aqui!

O que é o KVW ?

Kernel-based Virtual machine (KVM) é uma infraestrutura virtualizada para Kernel Linux que o transforma em um Hypervisor. Ele foi mesclado na linha principal do Kernel Linux na versão 2.6.20 que foi lançado em 5 de fevereiro de 2007.

Por que KVM ?

CPainel Atualizado – Você obtém a mais poderosa ‘interface cPainel aprimorada’ que vem com cada configuração VPS. O hypervisor mencionado acima é basicamente um programa que permite que vários sistemas operacionais compartilhem um único host de hardware. Com o KVM, oferecemos um VPS que é poderoso e fácil de usar, com a construção de nossos servidores com componentes de última geração.

Tecnologia Cloud – Nosso KVM VPS é construído em tecnologia Cloud testada para oferecer maior potência, flexibilidade e controle. Possuímos uma infra-estrutura de ponta apoiada por arquitetura robusta e escalável.

Acesso Root – Se você é um usuário avançado, nosso painel de controle cPainel aprimorado oferece acesso total ao CentOS, o que lhe dá controle completo do seu servidor.

Conclusão Instantânea – Você vai ter o seu servidor em funcionamento em segundos! Considerando que a maioria das soluções VPS levam horas ou dias para ser ativado, nossos servidores VPS são projetados para funcionarem imediatamente. Desta forma, o servidor sempre estará pronto quando você precisar dele.

Serviço Gerenciado e de Suporte – Oferecemos suporte de classe mundial para questões relativas à inicialização de contêiner, rede, hardware, implantação de VPS. Também oferecemos suporte para instalação e reinstalação de VPS, atualizações e patches do SO Core, instalação DNS reversa, instalação inicial e configuração básica do firewall.

Qual é a diferença entre o KVM eo Virtuozzo?

Um KVM é uma virtualização verdadeira onde o VPS opera como seu próprio servidor, independentemente do host node. O Virtuozzo é uma virtualização baseada em contêiner que depende do kernel no node host. Com o KVM, você pode definir valores máximos e mínimos para seus recursos, fornecendo a você usar apenas os recursos de que suas aplicações precisam. Embora o Virtuozzo seja mais acessível, o KVM vem com hardware virtual privatizado, incluindo placa de rede, adaptador gráfico, disco e recursos garantidos para confiabilidade e para ser customizável.

A infraestrutura e a rápida ativação da KVM a tornam extremamente confiável.

Já usou o KVM? Deixe nos comentários a sua experiencia com essa maravilha!

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Grande promoção de Carnaval e Aniversário

A ResellerClub está completando 11 anos e gostaríamos  de agradecer a vocês por toda compreensão e apoio. Cada comemoração de aniversário, procuramos agradecer com valores promocionais ainda melhores. Decidimos transformar os preços em cada produto a valores únicos e jamais vistos! Para essa comemoração, estamos oferecendo até 80% de desconto em hospedagem e domínios.

Confira aqui os detalhes dos descontos que os revendedores podem desfrutar em nossa comemoração de aniversário:

Hospedagem Multi-domínio – Até 80% de desconto

Cloud Hosting – Até 70% de desconto

Servidores Dedicados – Até 50% de desconto

Revenda de Hospedagem – até 75% de desconto

Dê uma olhada no infográfico abaixo para mais detalhes.

* Apenas para o seu primeiro mês

Shridhar Luthria, que coordena as operações da ResellerClub disse “Web Designers e Desenvolvedores têm sido uma grande fonte de inovação e suporte para levar a internet para muitos lugares. Gostaríamos de agradecer a cada um de vocês e recebê-los para se juntarem à nossa plataforma em nossa comemoração de aniversário! É a nossa maior promoção do ano com descontos que são inigualáveis. Lançamos o VPS KVM Linux na ResellerClub na semana passada e com esta promoção agora, estamos programados para um ano emocionante e cheio de ação. Nossa promessa aos nossos revendedores continua sendo a mesma – vamos capacitá-lo – profissionais da web em todo o mundo, com tudo o que suas empresas precisam ao seu alcance na sua conta ResellerClub!

Compre Agora

Dê uma olhada em nossa promoção de Domínios neste grande aniversário da ResellerClub!

Adquira .ORG por R$ 17,50 em março!

Agora você pode comprar .SPACE por apenas R$ 5,90 em março!

.INFO está funcionando a um preço único de apenas R$ 10,50 em março!

Compartilhe e deixe todos sabendo desta grade festa.

Confira esta e outras promoções Aqui!

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


New gTLD Report: February 2017

Hey guys, the new gTLD adds for the month are out and for the first time ever, .GDN has taken the top spot! .ACCOUNTANT which was our number 1 for the last month, has moved to the 11th position for February. .XYZ continues at position 2 while the Radix TLDs continue to be a part of our top 15 monthly new gTLD adds across all markets. We have new entrants for February as well, .SCIENCE, .CRICKET and .REVIEW. Let’s have a look at the infograph below for more information.

*Registration Numbers facilitated by ResellerClub

1) .GDN – .XYZ and .TOP are the usual top 2 for our reports, but .GDN has managed to take first place this February taking a total of 29% of our new gTLD adds. ‘Global Domain Name’ or .GDN was at number 6 for the month of January and was priced at $0.79 for the last 2 months. As you know, .TOP is running at a higher price of $1.99 (as compared to $0.99 in 2016) this year. This has definitely contributed to .GDN going up the charts. Have a look at this video on how .GDN can help your customer’s business

2) .XYZ – The world’s most famous new gTLD continues to stick to its position for this month as well. .XYZ continues to run at the same promo price of $0.99

3) .TOP – The domain extension has moved from position 5 to position 3 in February and continues at a price of $1.99 as mentioned above. Globally, .TOP has a total of 4,527,579  registered (according to ntldstats)

4) .SPACE – As usual, we have at least one Radix TLD in the top 5 for our new gTLD reports. .SPACE is running at a promo price of just $1.69. Why do your customers need .SPACE? Have a look at this video for more information

5) .WIN – The domain extension took the number 9 position for January and is now at number 5 this month. Did you know that, .WIN is ranked number 4 and has a total of 1,203,512 domains registered globally (according to ntldstats)

Say hello to our new entrants for the month, .SCIENCE, .CRICKET & .REVIEW! It’s nearly been a year since .SCIENCE showed up in our monthly new gTLD reports. .SCIENCE and .CRICKET were running at a special promo price of just $1.99.

Here are our promos lined up for March:

  • .TOP is running at a special price of just $0.89!
  • You can now get .GLOBAL for just $12.99
  • Get .DESI for a mere $14.99 $1.49
  • .FASHION is running at 65% discount and is priced at just $8.49

Looking for a wider range of new gTLDs? Do have a look at our promos here.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Segurança e Vulnerabilidade na Internet – IoT

O IoT termo em inglês que traduzido ao pé da letra significa coisas de internet, neste texto vem com um sentido de que segurança e vulnerabilidade estão em todos esses sistemas de internet. Por exemplo, olhando para a parte superior esquerda no Google Chrome, você pode ver em vermelho X-Google para denotar SSL não segura (Secure Sockets Layer). Sites não-HTTPS também enfrentam as conseqüências da atualização de 2016 para as medidas de segurança do Google, potencialmente confusos os usuários do WordPress e outras páginas de login que parecem ter sido comprometidas (enquanto isso é apenas a maneira do Google de de notar site não-HTTPS).

Além disso, cada vez mais os fabricantes realizam lançamentos de eletrônicos e gadgets cada vez mais complexos, é provável que a segurança seja a última coisa na mente das pessoas. Dispositivos como o HomeKit da Apple transformam o seu iPhone ou iPad em um controle remoto para luzes, fechaduras, termostato, cortinas eletrônicas e até mesmo a sua campainha, tornam as funções típicas do iOS como extensões baseadas na voz da Siri de controlar uma casa inteligente.

No entanto, mesmo que a maioria dos produtos eletrônicos em uma rede doméstica adotem padrões de segurança, tudo o que precisa, às vezes,  é de uma webcam com defeito para um ataque acontecer.

Isso acabou de ocorrer com a empresa de infraestrutura de internet Dyn no final de outubro de 2016. O malware Mirai aproveitou as senhas padrões, fáceis de adivinhar nas webcams dos consumidores e fez um ataque maciço de Distribuição de Negação de Serviço (DDoS) em sites populares como Twitter e PayPal.

Junto com o coprocessador de autenticação da Apple, a criptografia da HomeKit ajuda a mitigar o risco de hackers. O coprocessador só envia um certificado que permite que um dispositivo iOS desbloqueie um acessório (como os dimmers de luz, termostato e medidor de energia da sua casa) após o acessório completar um desafio enviado pelo dispositivo iOS. Qualquer dispositivo Internet de coisas que se conecta a esta rede, no entanto, pode não ter as mesmas regras de robustez no lugar.

De acordo com este gráfico da Arxan, o número de dispositivos conectados à Internet chegou a 6,4 bilhões em 2016. De acordo com o Cisco, a estimativa de número de dispositivos conectados deverá crescer para 50 bilhões até 2020! Assim, em casa, a segurança da rede de comunicação é apenas metade da batalha para os consumidores, como os carros que dirigem estão cada vez mais conectado também. Os fabricantes de automóveis têm OEMs diferentes quando se trata de monitores e armazenamento digital no veículo, o que significa que todos os dispositivos de um carro conectado não podem usar criptografia de ponta a ponta. Os scanners de código podem interromper funções críticas e se você olhar mais adiante na segurança de IoT automotiva você encontrará que muitas partes de um veículo que estiveram ao redor por anos – como a porta OBD2 para diagnósticos de motor e computadores de bordo – poderiam ser descriptografados e Injetado com malware.

Sobre a questão dos ataques DDoS, Arxan CMO Mandeep Khera explica que “hackers vão atrás dos vetores de ataque mais fracos e é cada vez mais evidente que a infra-estrutura de IoT de dispositivos e sensores para o software embutido para APIs é o elo mais fraco”.

A idéia de uma casa inteligente que vemos hoje tem sido em torno desde o início de 2000, quando a fiação estruturada entrou em foco como uma forma de ligar dispositivos de vídeo e rede para DSL, que ofereceu acesso à Internet de alta velocidade do que por uma linha telefônica. Avanço rápido para a tecnologia sem fio em 2016, e casas conectadas são mais fáceis de configurar, entretanto mais vulneráveis de maneiras diferentes.

Um monte de hardware IoT de hoje, incluindo as webcams de consumidores que foram hackeadas durante o ataque DDoS atacando a infra-estrutura da Dyn, ainda podem acessar Telnet depois de alterar o nome de usuário e a senha padrão do sistema. Isso mantém a porta aberta para hacking remoto e sem padrões de segurança de chips sem fio que você encontrar no HomeKit, pode ser mais difícil construir uma rede segura de dispositivos que não sejam iOS.

A Cisco descreve claramente os desafios de segurança dentro dos sistemas IoT, incluindo o gerenciamento de redes multipartidárias, a resiliência criptográfica, a proteção física e mais neste artigo.

Este artigo detalhado com perspectivas da IBM, destaca as coisas que você pode fazer para proteger seus dispositivos IoT com mecanismos como autenticação de ID de usuário, senhas de tempo único, autenticação de identificação exclusiva de servidor e muito mais, além disso, oferece maneiras abrangentes de implementar tais mecanismos.


  • Colaborador gráfico e de conteúdo: Arxan Technologies

  • Arxan é uma aplicação de prevenção de ataque e auto-proteção a empresa com produtos para a coisas de internet (IoT), Mobile, Desktop e outras aplicações. A sede da empresa e as operações de engenharia são baseadas nos Estados Unidos com escritórios globais na EMEA e na APAC.

  • Contribuinte da cotação: Mandeep Khera, Arxan CMO

  • Mandeep Khera, que deu uma cotação para este artigo, é responsável por todas as funções de marketing e desenvolvimento de negócios globalmente para a Arxan. Mandeep traz mais de duas décadas de experiência em Software/SaaS/ Gerenciamento de Serviços de Marketing nas áreas de segurança de aplicativos, IoT, Big Data e outras aplicações de software empresarial para Arxan.
class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”