How do I migrate my site from shared hosting to a virtual or dedicated server?

You have been developing your website for several years, brought it to a higher level, and now you do not have enough power of a regular shared hosting solution. Or you want to launch a new project. In both cases, website owners need to choose an optimal and high-performance hosting option. This can be a virtual or dedicated server for frequently used websites.

Switching from shared hosting to a virtual or dedicated server is an essential step for the business. After the transfer of the site, you will immediately notice the changes. Site performance will improve, security and reliability will be higher, and the owner will have more control over resources.

You have already chosen VPS/VDS hosting or a dedicated server (we have already written here to understand that this variant is right for you), decided on the pricing plan with optimal cost, and decided on your needs. But to begin to take advantage of a virtual or dedicated server, you need to at least move your website to it.

And here’s where many people have a question about how the data is transferred. On the one hand, it may seem that it is easy. Nothing new to implement, no need – just take all the previously hosted data on virtual hosting and move to a virtual or dedicated server.

But there is another side to the issue, the site can not be transported automatically. For those going to move from shared hosting to a virtual or dedicated server, we have prepared a small tutorial, with which the transfer of your site will not take much time and effort.

How do I migrate a website from shared hosting to a private server?

First of all, contact your old host and notify them that the site is moving. Pay for the last months of use and fulfill all the contract clauses, which specify information about the termination of cooperation.

Then you have two options. You can ask for help in transferring the site from the hoster who provides the server for rent or do it yourself. In the first case, the transition to a virtual or dedicated server is smooth and easy. In the second case, there may be some difficulties. But consider both situations in detail.

Porting the site by the hoster

If you decide to use VPS/VDS-hosting or rent a dedicated server, you can get support from your hoster. For example, we at QuantumHost offer our clients help in transferring a site from shared hosting to our server infrastructure. Our team will help you move your website, and you do not have to spend a lot of time and effort.

Independent Website Migration.

In some cases, website owners must handle the migration process by themself. Often all the work falls on the shoulders of administrators. But if you are faced with the transition to a virtual or dedicated server for the first time, there may be some difficulties.

Indeed, you can not move the site to another server for 5 minutes. But in fact, the process is not complicated.

The self-transfer method means manually. First, you must make sure that the service is activated, and you have the right to transport all your data. Then you can proceed directly to the transfer of the site. To do this:

  • Download all of your site’s files. All images, pages, and other components need to be downloaded from your old hosting service so you can export them to the new one. Perhaps your previous hosting provider backs up your sites regularly. In that case, it is enough to download the latest backup via SFTP. You can also create and download a site backup yourself. To do that, you can use one of the available FTP clients. For example, you can download a backup copy using FileZilla or the Total Commander file manager with a built-in FTP-client.
  • Create a database dump. Technically, at this step, you also need to download the database for further export, but we will put it as a separate item. A database dump is essentially the same backup copy in the form of a downloaded file. For example, the MySQL database dump is a file with the extension .sql. After downloading, you do not need to recreate the database manually – it is enough to upload the existing database to the server.
  • Upload the downloaded files to the new server. When all the necessary data of your site is already uploaded as a backup, you need to place them on the new hosting. To do this, gain access to the server (log in using the username and password sent to you earlier) and upload the site archive. The process is the reverse of downloading a backup copy, but the essence is the same. In the first stage, you downloaded the backup file to your device from the server; now, you need to do the opposite. This can be done using the same SFTP connection.
  • Import the database dump. First, you need to create a new database on the server and enter the login and password you received from the hoster to manage it. Then upload the previously created database dump by SFTP.

After the transfer of the site, data should be tested for performance.

Then, to fully transition to a virtual or dedicated server from the old hosting need to transfer your site’s domain name. To do this, contact the domain registrar and reassign DNS-servers. Domain name transfer can take quite a long time – at least a day.

Deal with the domain transfer is after you have transferred the files and databases on the new server. Sometimes you can meet and cardinally opposite recommendations. But if you are first engaged in transferring the domain to the new server, the visitors will come to your site before debating its work. So first, we move the backups and then – the domain.

After you have transferred the domain name, recheck your site’s performance and make sure that all pages, mail, and database are working correctly. If everything is in order, you have successfully moved to a new server and can proceed to further work.

Server administration and technical support from QuantumHost

You have moved your site to a Cloud VPS/VDS and are ready to further develop your business. But in the process of using them, problems may arise that need to be promptly corrected. Also, the major part of the work is server administration, and if you hire an administrator, the costs will increase.

server administration.

404, Bad Gateway, or what do the most well-known mistakes on sites mean?

You probably encountered a situation where, when trying to enter the site instead of the desired page, it gave the error 404, 503, 500, 403. What do all those magic numbers mean, and what should the site owner do if users encounter them? Solve all the mysteries in this material.

A bit about HTTP status codes

First, a little basic theory. When you visit a website, your browser sends an HTTP request to the server hosting the site. Each HTTP request received by the server gets an HTTP status code – a three-digit number. But the number is not simple; it’s remarkable – it belongs to one of five classes of states:

1**: informational;

2**: successful;

3**: redirections;

4**: client-side errors;

5**: errors on the server-side.

This article will focus on error classes 4**, 5** and tell you how to solve them if your site is hosted on shared hosting.

HTTP status codes in class 4** indicate that the problem was caused by the user visiting the site (for example, by browser problems or typographical errors in the links). However, it’s always good to know what kind of error the user has encountered – the problem might actually be on the site. And class 5** codes are returned by the webserver when it encounters an error and probably can’t handle the client request.

Let’s see what the site administrator can do to solve common errors when accessing a web resource.

Client Errors

400: Bad Request

The code “Invalid request” means that there is a syntax error in the HTTP request. A few examples of when this can happen and what actions you should take:

User has corrupted cookies – advise cleaning cache and cookies.

Internal browser error – you can try upgrading or reinstalling the browser.

A typo when manually typing a request (for example, in console commands like wget or curl).

401: Unauthorized

The “Not Authorized” code appears when there are problems with authentication or authorization on the site. For example, the visitor is trying to view his online store profile but has not entered his username and password or has entered them incorrectly. In this case, a 401 response code is sent until the visitor provides the correct credentials.

If the error does not go away, the site administrator should check that the .htpasswd file containing the user’s login credentials is intact.

403: Forbidden

The “Forbidden” site connection error indicates that the visitor has no access to the requested resource, file, or page. This situation usually occurs for a variety of reasons:

  • No permissions to open the files. Make sure the user has the rights to read the file (chmod command to help you).
  • Access denied in .htaccess. You may have restricted access to the site to some IP addresses in the .htaccess file.
  • There is no index file in the requested directory. Try to create an index file or enable directory listing in the webserver configuration.

404: Not Found

Perhaps the most well-known error that most Internet users have encountered. It means that the server cannot find the requested resource, or, to put it simply, “this page does not exist”.

If you are sure that the error 404 on the site should not occur, check the link for typos and ensure that the page file is not moved or deleted. The problem can also be a lack of user access to the folder where the file is located – to enable it; you need to add read and execute permission for the directory.

Server errors

500: Internal Server Error

“Internal server error” often appears when the failure cannot be attributed to any other known class 5** error. A site error code 500 means that the problem most likely lies in the server settings.

The most common causes of failure are:

  • An error in the .htaccess file. Try renaming it and check if the website is working.
  • Lack of necessary packages, incorrectly selected version of PHP. Possibly you should change the PHP version or install the required modules.
  • A bug in the site code. If it worked before, restore the site from a backup copy.

502: Bad Gateway

If error 502 occurs regularly, you should contact your web hosting provider’s technical support service when opening the site. Describe in detail the actions that lead to the problem and specify the time at which it was detected (if you contact QuantumHost’s technical support)

503: Service Unavailable

The code “Service unavailable” on shared hosting means that the limit on the number of HTTP requests has been exceeded (you can read about all limits in the hosting specifications). This error may occur if your code makes many calls to images, stylesheets, and other files when generating the page. Possible solutions – either optimize the code, reduce the number of HTTP-queries, or switch to a more effective hosting plan or consider moving those intensively used websites to a Cloud VPS.

504: Gateway Timeout

The error can be decoded as “server response time has expired.” It occurs when the webserver cannot receive a response from the site in a set amount of time.

This usually happens when the site scripts take too long to execute (e.g., database uploads). In this case, you can bypass the webserver and access the site through port 8081 (for sites running on the ISPmanager control panel) or 8080 (for cPanel and Plesk), or 2222 (for DirectAdmin). If you want to configure the intervals for waiting for the site response manually, it can be done only on VPS, where more flexible server settings are available.

Now you know what errors can occur on the client and server sides, where to look for problems, and how to troubleshoot them. There are many more HTTP status codes, and we have listed only the most basic ones.

Also, don’t forget that if you can’t fix any problem with your site, you can search for a solution in our Knowledge Base or contact Technical Support – we are always ready to help.

If you know of any other possible solutions for the errors mentioned in this article, please post them in the comments.

WordPress website update: essential or not?

You have an excellent website, and you are proud of it. Unfortunately, when you log in, you get a notification that updates are available. Many people then do nothing with the update notifications and find that their website functions as usual. Yet WordPress advises you to update your website. Why should I do that? A good question that we are glad to explain.

Your websites will be more easily found.

Users have a strong preference for websites that load up quickly. This is important for the customer experience and therefore causes users to visit your website more often and stay longer on your website. Updating your website fixes bugs that are not visually visible. In addition, your website will be ranked better by Google if users can access the information on your website faster.

Updating the website makes it more secure and less prone to hacking.

WordPress is an open-source CMS (Content Management System). Because it is Open Source, weaknesses in website security can arise more quickly. The WordPress community ensures that new updates are always available. Updates make your website more secure. Therefore, it is important to get the updates performed regularly. Like fast websites, secure websites are also ranked better by Google. The most important thing for your website’s security is to ensure a secure foundation, which starts with hosting and a secure password.

Plugins and updates

WordPress updates are essential for the overall security and speed of your website. However, some updates can cause certain plugins to stop working correctly. Developers of good plugins keep track of developments and make sure their plugins are regularly updated. If that does not happen, we recommend that you look for another plugin. For example, take a look at the plugin database. There you can see for which WordPress versions the plugin is suitable.

More features

The most common reason for updating is the extra features. The WordPress community is a dynamic community. Suppose particular features are frequently requested. Those features are often useful for many users; they may also be for your website.

At QuantumHost, we have special WordPress web hosting. With these web hosting packages, you can be sure of extremely high-speed Web Hosting with a Premium WordPress Manager module built-in in our client area.
With the WordPress Manager, you get the ability to Manage Auto upgrade of WordPress CMS, Plugins, & Themes.
Do you have your hosting elsewhere? No problem. The transition from your current website to QuantumHost WordPress, we take care of completely. Do you have questions about maintaining your WordPress installation, or are you curious about what QuantumHost can do for your WordPress website? Please contact admin@quantumhost.org

Security exercises from QuantumHost: how to shield your organization from phishing

If you have received emails about fabulous winnings or have received calls from suspicious bank employees to find out the code from a text message, know this: this is phishing, an attempt to steal your data or money through malicious links. It can affect both individuals and large companies and have serious consequences.

We’ve written a long read on how scammers operate and what to do to avoid falling into their traps. In the end, you’ll find a list of recommendations on how to keep yourself and your employees safe.

What is phishing?

“Phishing” derives from the English word phishing, consisting of the words fishing and password. It is one of the most widespread types of internet-fraud, where the aim is to get identity data.

Phishers’ actions can lead to consequences of different severity: from an innocent banner on your PC to the company’s content loss without the possibility to recover it.

The main goal of phishing is to steal something valuable, use it for their benefit, or compromise or disrupt someone else’s business.

What phishers usually target:

  • Personal data, including passport data;
  • logins and passwords of all kinds;
  • data for logging in to individual accounts;
  • databases;
  • access codes;
  • personal correspondence;
  • bank card or account details;
  • proprietary information;
  • other sensitive information, etc.

Types of phishing

If you hear someone call you “smishing” or “vishing,” just know that they are not laughing at you. Both are different forms of phishing. Let’s understand the terminology.

Phishing is divided by the target of the attack:

  • Spear phishing – attacks on individuals.
  • Whaling is phishing on a large scale. The main target here is fishes of large companies, high ranking officials.

According to the channels of attack, phishing is divided into:

  • Phishing itself – sending messages with infected or fake sites. This is a general term for all phishing types.
  • Vishing – phishing attacks via phone calls.
  • Smishing is attacking via SMS.
  • Pharming is when the user is secretly redirected to an infected site without his/her knowledge.
  • Sending fraudulent messages to social networks.

Let’s analyze the types of phishing and find out how to protect employees and the company from it.

Phishing emails

A strange letter arrives in your mail informing you that you’ve won, asking you to go somewhere and enter your data, etc., urgently. This is how scammers play on emotions: unexpected joy, fear, curiosity.

Many such “chain letters” end up in the “spam” folder, but some manage to make it to your inbox. You can’t entirely rely on the anti-spam mail system; you must always be on the lookout.

Signs of a phishing email

  • No sender’s name or contact information.
  • The sender’s address consists of a meaningless set of letters.
  • The email is from a large organization, but their real website does not contain the sender’s address.
  • The sender introduces himself as an employee of the company, but he doesn’t write from a corporate email account but a regular one like gmail.com.
  • Hovering over a button or link in the email shows the wrong address in the page’s lower-left corner.
  • There are unusual symbols in the link address, e.g., @.
  • The attached files have an unknown extension and/or incomprehensible name.
  • Links are not inserted in the text but disguised by images, buttons, bright pictures, and QR-codes.

What phishing emails typically contain?

Let’s talk about the subjects of malicious emails. Note that this is not a complete list of all possible phishing scenarios: phishers are very creative and are always coming up with new ways to lure your data. Malicious buttons and links in such emails either trigger viruses or lead to pages where you enter essential data yourself.

  • Someone has hacked your email and learned your password / We found suspicious or fraudulent activity on your account / someone has changed your email security settings.
  • Your account has been blocked, or disabled / You’ve been added to our blacklist: We realized you’re a fraud or a bot!
  • You have an important document from the tax office, police, credit organization, etc. There are files with unknown extensions and strange names attached to the letter.
  • An email from your colleague/partner with documents or “important working” links.
  • You have won a prize! Follow the link to find out the terms of receipt and/or delivery.
  • You didn’t repay the loan – the case goes to court.

The most important rule:

Please do not follow the links in such letters, do not click on pictures, no matter how attractive they may look, do not enter your data on unknown pages!

Phishing sites

Links in phishing emails usually lead to malicious sites.

What sites are commonly spoofed:

  • Banks and microfinance institutions;
  • Payment services;
  • Search engines and email services;
  • Pages with authorization and payment forms in online stores;
  • Airlines, etc.

How to identify phishing sites:

Strange or suspicious domain name

To confuse the victim, scammers register domain names similar to the names of large organizations. But if you look closely, the inconsistencies will be apparent: look at the second-level domain. For example, instead of https://kbc.be, a phishing site will be called http://kbc.k.be. If in doubt, search for the original website and compare the addresses – so you’ll know if you’ve gotten to scammers.

Mistakes, typos, and oddities in design and layout

Everything on the page “jumps” and runs over each other, somewhere there is missing text, and somewhere whole sentences are written in a capsule. Gross spelling errors are mixed with calls to enter, type, click and buy. As a rule, such sites are phishing sites – large organizations, which the scammers masquerade as, cannot afford to look so sloppy.

You can always check a suspicious site for the authenticity and the presence of viruses and spam. Use the right service for you, such as:

  • AVG Threatlabs,
  • Google Transparency Report,
  • ScanURL,
  • PhishTank,
  • Urlvoid.com, and more

Phishing Calls: Vishing

How vishing, a voice phishing method, works:

  • A “bank employee” or security officer calls you, tells you about suspicious transactions on your card and offers to name the data from a text message. A real bank employee will not do this: these are scammers.
  • If you advertised for sale, for example, on “Avito”, you probably received a call from “buyers” asking for your card data to transfer the prepayment. This is also one of the vishing schemes.

Phishing via SMS: smishing.

What this type of phishing usually looks like:

  • You receive a message or an email informing you of a problem: something is wrong with your card or identity, someone has tried to charge your account, etc. To find out what the problem is, you need to call the number given in the message.
  • You have received a text message from an unknown person with a link: most likely, they are fraudsters. Don’t follow links in messages!
  • An SMS is received as if from an employee of a company, state services, or tax authorities, but the number is not official but private. Do not believe the message: these are scammers.

Phishing in social networks

What it usually looks like:

  • You receive a personal message that urges you to watch a provocative video starring you, learn something interesting, vote or leave a comment. The scammer sends you a link and wants you to click on it. There you go, your details or get a virus on your device.
  • Scammers hack communities of large companies, post articles with malicious links on the page wall, and collect a data harvest from its subscribers.
  • The “administrator” of the group you belong to writes to you and tells you that you have won a prize. But to get it, you have to pay for insurance or shipping. These are scammers, don’t pay anything, don’t reply to messages, and block the user.
  • And the most common: an acquaintance writes to you and asks for a loan or to vote for him in a talent contest or children’s drawing. Don’t reply to messages. Call this person right away and find out if they wrote to you on the social network.

Types of cyber attacks on companies

Attacking a company through employees

The scheme is simple: fraudsters launch a mailing to an employee of a large company, and the latter, forgetting about security, for example, clicks on a malicious link from his work device. Your employee could fall into any of the traps we described above and accidentally gave attackers access to corporate accounts and information. To prevent this from happening, educate your employees, conduct computer security training. And be sure to provide them with the memo from the end of this article.

Ransomware and other Trojans

These are hazardous viruses that can infiltrate your system in various ways, including through phishing emails. This is how scammers prey mainly on corporate clients, large companies, or government organizations. The Trojan gets into the computer and encrypts all of its contents, after which the scammers demand a payoff to restore the data.

Keyloggers

These viruses read the information you type on your keyboard and can steal a wide variety of data. Keyloggers can be brought in by clicking on a link from a phishing email or using physical media unverified by antivirus: a thumb drive or a disk.

Attacks on cloud storage

Since many large companies use cloud services such as Google Drive or OneDrive, scammers began to attack them as well. Lots of information, corporate data, databases, and personal information are all at risk. The user is often tricked into going to a phishing site that completely mimics a personal account login page, where the person enters his or her access data.

Programs to protect your data

Antivirus

Installing an antivirus is a prerequisite for the security of your devices and those of your company. All major antivirus programs have built-in phishing scanning. All you have to do is set it up and turn it on. Install antivirus software on your smartphone and PC and provide all your work computers with this protection. And don’t forget about timely updates.

You can choose any proper antivirus for cost and functionality.

How not to get phished. Security measures in a company

  • In our opinion, the most important thing: take cyberattacks seriously yourself and teach them to all your employees.
  • Use only two-factor authentication for company accounts. This is a method of identifying a user by two types of parameters; one thing he physically has with him and one he knows. For example, you need to enter your username and password first, and then a code from a text message or email. Less often, biometric data or a special USB-key.
  • For vital accounts, such as access to EDI systems and accounting programs, use eToken – a real security key.
  • Move your site to a secure protocol: HTTPS. It is better to use paid SSL-certificate; it minimizes the risk of hacking. “I’m in business and don’t understand what SSL-certificates are.”
  • When uploading content to the site or backing up, the site data use encrypted SFTP or FTPs protocol instead of open FTP.
  • Delete all irrelevant and unused accounts.
  • Use business security services; we talked about them above.
  • Regularly update passwords to employee email accounts, corporate accounts.
  • Forbid employees from keeping passwords in plain sight.
  • Regularly back up your content, especially the information on your site and cloud storage sites.
  • Immediately react to even the slightest hint of suspicious activity: change passwords, block fraudsters, and perform in-depth antivirus checks.

Drastic measures.

They will not suit everyone, but some companies successfully use them.

  • Block access to social networks on work devices.
  • Block all disk drives and USB connections of work computers.

What to do if you get trapped?

So, the scammers finally convinced you: you fell for their trap. What you can do:

  • Run an antivirus scan on your computer and smartphone.
  • Change your stolen password as soon as possible. If you use it for multiple accounts, change your password for them, too.
  • Set up two-factor authentication.
  • If you gave your card information or a code from a text message, call the bank at the phone number on your card. It will be blocked to protect it from money theft and check for potentially dangerous transactions.

If you want to protect other users from the actions of scammers, report their activities.

Rules for employees: a checklist

We suggest that you distribute this checklist to all employees in your company.

Protect your social networks

  • Do not click on suspicious links.
  • Don’t enter data from a page on third-party resources.
  • Don’t give your smartphone to strangers.

General rules

  • If you receive messages in social networks from a bank or other organization’s account, check the account on the official site or by phone from the bank/company. If there is no such account, do not reply to messages and block the suspicious account.
  • Do not trust those who ask you for money on social networks, even if the request came from your friend. Call the person from whose page the message came, and clarify whether he needs money. If not – don’t reply to the fraudster, block him and complain to the social network security service.
  • Check all the files which come in personal messages. If there is a book attached but with an .exe extension, it’s strange – don’t open the file.
  • Check periodically to see when your account was last active. If you become suspicious, end all active sessions and change your password.

Facebook

  • Read about Facebook’s security features.
  • Set up two-factor authentication.
  • If you suspect you’ve been hacked, use the instructions.

Instagram

  • Read Instagram’s security tips.
  • Set up two-factor authentication.

Twitter

  • Read Twitter’s security tips.
  • Set up two-factor authentication.

You received a strange email 

  • Do not click on links in emails from strangers, do not click on pictures or buttons.
  • If the sender presents himself as an employee of the company but writes not from the corporate mail but ordinary gmail.com, do not open the letter.
  • Do not believe in promises of sudden winnings, and do not fall for attempts to intimidate you.
  • Do not open attachments from strangers’ emails, no matter how tempting they may look. Do not download files like *.exe, *.scr, *.bat, *.vbs.
  • If you see a strange address in an email, e.g., with an error in the domain name, delete it.

A strange person calls you.

They may be calling you as a bank teller, a customer looking to buy something you have advertised, a company representative saying you have a big win, etc.

  • Don’t give your bank card data, mainly your CVC code, to anyone, especially over the phone to a stranger.
  • If you’ve already received a text message with the code, don’t give it to anyone, especially a “bank employee” – real bank employees won’t ask you for such data.
  • End the conversation. If the person introduced themselves as a bank employee, call your bank, outline the situation, and give the scammer’s phone number for verification.

You have found yourself on a suspicious site

  • Do not click on links, do not click on suspicious and shouting pictures and buttons.
  • Don’t believe the promises of sudden winnings, and don’t be caught up in these attempts to intimidate you.
  • If the site is unkempt, screaming, with gross mistakes in the text and lots of notifications, pop-ups, and calls to proceed or leave data, it’s probably a phishing site. Close the tab and don’t return to it.
  • Before you enter your details on a site, make sure it’s the right site: clones sometimes look very similar to the original. Check the address several times. If something about it confuses you, close the tab.
  • Sign up and buy only on sites with SSL-security certificates and two-factor authentication. To access your account, you will be checked on two parameters: in addition to the username and password, you will be asked, for example, a one-time password.
  • If you see HTTP instead of HTTPS before the site address, and your browser tells you that the page is untrustworthy, it’s right; you should avoid websites without an SSL certificate.

Tips not just for the job

Do not include personal information in public sources. Addresses, dates of birth, phone numbers: yours and your family members’.

Why: all of this can help scammers find out your password or secret word, hack your accounts and get access to your money and data.

Change passwords at least every six months. “I don’t change passwords at all, and I’ve never been hacked. Why start?” – you ask, and that would be a mistake for a victim.

Why: You’ll make it harder for cybercriminals because no one knows when their money and data may be hunted.

Don’t use the same password for all of your accounts. Don’t give crooks a key to all your doors.

Why: A scammer who knows the password to one of your accounts will immediately try to open your other accounts with that key. Don’t risk everything and be creative when coming up with new combinations.

Use incognito mode in your browser when you work at someone else’s computer, log into your accounts and enter personal information.

Why: When you close a browser tab, your passwords and data won’t be saved, and you’ll be logged out of all your accounts automatically.

Turn on two-factor authentication for all your accounts.

Why: This type of protection is better at preventing scammers from attacking your account because they’ll have to overcome a double barrier to break into your account. And it won’t be easy.

Install antivirus on all your devices.

Why: Cautiousness is good, but technical protection is still better.

What are the pros and cons of WordPress multisite?

If you have several websites in your control, all using WordPress, setting up a WordPress multisite may be worth considering. The possibility to use such a multisite has been offered since WordPress 3.0. This article will tell you more about how this works and about the pros and cons of a WordPress multisite.

How a WordPress multisite works

As the name suggests, a WordPress multisite offers the possibility to manage multiple websites from the same management panel. Among others, WordPress itself makes use of this feature! The different blogs created with a .wordpress.com domain name are managed from the same system. Each of the websites affiliated with a WordPress multisite has its own folder of files. In doing so, they are added to their own table in a central database.

The use of a WordPress multisite is ideal for administrators of a large number of websites in WordPress. For the visitors of these websites, it is not visible that a multisite WordPress is used. Each website has its own domain name and can, if desired, be decorated with its own template.

Benefits of a WordPress multisite

The main advantage of a WordPress multisite is obviously the ability to manage everything at once. Also, a WordPress multisite offers the possibility to exchange plug-ins and templates between different websites without installing them separately in your systems. Here lies the great strength of a WordPress multisite. By standardizing the websites as much as possible, it is possible to make all websites up-to-date at once. If you would use different templates and plug-ins on the websites, updating them could also affect other websites. These will temporarily go into maintenance mode.

Tip: use a WordPress multisite to manage a network of affiliate websites or informative websites! These websites are often very similar. Besides, the template used has a lesser impact on these websites’ results than a webshop or corporate website.

Disadvantages of WordPress multisite for website owners

Although it can be very nice to manage a website from one system, it can also be a disadvantage. Because everything is linked together, damage to one website can affect other websites. After all, all websites are added to the same database. Hacking the central database can affect all connected websites. Something less likely to be the case with individual websites in WordPress.

What is the difference between HTTP1.1 and HTTP/2?

HTTP is short for “HyperText Transport Protocol,” version 1.1 of which was introduced in 1997. HTTP 1.1 is still the most widely used version of HTTP, although it seems that this will change in the coming years with the introduction of HTTP/2. The switch to HTTP/2 is necessary because HTTP 1.1 no longer fits the way people use the Internet today.

Before we go into the details of the difference between HTTP 1.1 and HTTP/2, it is good to understand how HTTP works. HTTP makes it possible to send requests and get them responded to. Based on a request, the typing of the URL of a website, the called server then displays the website.

Problems with the use of HTTP 1.1

HTTP 1.1 is not the first version of HTTP. The first version bore the name HTTP 0.9 and was introduced back in 1991, six years before HTTP 1.1 was introduced. The basis of HTTP 0.9 is still used in HTTP 1.1 and HTTP/2. Although HTTP 1.1 was happily used by website owners and web hosting providers for many years, more and more problems arose. For example, HTTP 1.1 allowed only one request to be processed per connection. This meant that four or five connections were needed to load four or five images. Not efficient at all!

Also, more and more cookies are being used, one of which is sent per connection. Cookies make it possible to track visitors’ use of the website. These cookies are now so large that they slow down the connection and thus the website.

Introduction of the new HTTP/2

To provide a solution to these problems, Google, Microsoft, and Facebook introduced the new HTTP/2. HTTP/2 allows many more requests to be processed within the same time, as was possible with HTTP 1.1. The server itself can determine which requests should be processed first. Besides, headers, which contain information about the established connection, are no longer sent as separate entities. The headers are now compressed per connection, which makes a website faster.

This article describes the basic differences between HTTP 1.1 and HTTP/2. However, there are several other, much more technical differences to notice when looking at both HTTP versions. You can find more information about this on the Internet.

Starting an online store

Do you want to start a commercial web-shop? Then there are some steps you need to follow. In this article, you can read which steps to follow. If you use this step-by-step plan to start your web-shop, you are guaranteed to do this in the right way. It can increase the chances of business success.

Register at the Chamber of Commerce

Before you can start a web-shop, you must first register your company with the Chamber of Commerce. The Chamber of Commerce ensures that you are registered as an entrepreneur with the tax authorities. You will immediately receive a VAT number. You state this number on your invoices.

If you are registered as an entrepreneur with the Chamber of Commerce, you will be notified when it is time for your tax return. This is handy because, as a starting entrepreneur, you can sometimes forget to file your tax return. Thanks to the Chamber of Commerce’s notification, you are guaranteed to submit your tax return on time.

Register a domain name

When you registered your company at the Chamber of Commerce, you provided a company name. You register this company name as a domain name. Is your domain name already taken? Then you can’t register it. So it would be best if you chose a different domain name.

Registering your domain name online at QuantumHost is quick and easy. You enter your domain name, check if it is still available, and immediately put the domain name on your name. The domain name can be easily ordered and paid online.

Make sure you have a good administration.

A successful business needs good administration. The tax authorities are not only happy with good records but so is the entrepreneur. If you have a clear and complete administration, you can run your business much better. You see opportunities, developments, and threats better and can therefore better respond to them. This is a must for business success.

Building a web store (or having it made)

If you’ve registered your company name at the Chamber of Commerce, you’ve registered a domain name, and you’ve set up a good administration, you can start developing your web-shop. You can build your web-shop yourself, but you can also outsource this task. Do you have no experience with web-shop development? Then it is better to outsource the construction of your online shop. This way, you can be sure that you get a high-quality online store, and you will also save a lot of time since you do not have to start developing your online shop yourself.

Once your online store is built, you can fill it with text, images, and possibly videos. Make sure your online store meets your requirements, wishes, and expectations. If necessary, ask someone to take a good look at your online store. Is there still room for improvement? If so, then make some adjustments. The more people who check your online shop for you, the better your store will be.

Apply for a Trademark

Is your store finished? Then we recommend you apply for one or more trust marks. With a Trademark, your store radiates confidence. Not all consumers attach much value to this, but many of them do.

Especially people who still find it exciting to shop online or in the past have been scammed by a rogue store, attach great value to trust marks. By applying for a Trademark for your online shop, you will convince these consumers to place an order in your online store.

Promote your online store

Have you applied for a Trademark? Then start promoting your online store. The better you promote your online shop, the more website visitors you will get. And if you have more website visitors, you are more likely to process any orders.

There are several ways to promote your online store. For example, you can place an ad in the newspaper, but you can also create accounts on various social media networks to promote your web store. SEO also works very well. SEO is also called Search Engine Optimization. With SEO, you adapt your online store in various ways so that it is better indexed by Google. Through the SEO adjustments you make, your store will appear higher in the search results of Google, thus will attract more visitors to your website.

You choose how you want to promote your online store. Whether you have a large or small budget for the promotion of your online shop: there are always several promotional tools that you can use to attract more visitors to your store.

Top 5 SEO plugins for WordPress

Do you want your WordPress website to rank higher in Google? Then you need to engage in SEO actively. The abbreviation SEO stands for Search Engine Optimization. If you are working on SEO, you can improve your website in various areas to obtain a higher position in the search results of Google.

You can improve your website on your own, but you can also use a handy plugin for this. This article will read about the five best known, most popular, and best SEO plugins for WordPress. If you install one or more of the plugins described in this article, your website will quickly rank higher in Google.

Yoast SEO

Yoast SEO is also known as Yoast, one of the best known and most popular SEO plugins of WordPress. The plugin works very well and because it has many different features; for example, with Yoast, you can perform an on-page SEO analysis and generate an XML sitemap.

Moreover, the plugin gives you tips when optimizing your web pages. For example, if the title of a page too long? Then the plugin will tell you immediately. You will also receive a message if a page’s keyword is not mentioned in the relevant page’s content. Handy! Not only does the plugin work well, but it is also very user friendly. Even as a beginning WordPress user, it is not difficult to improve your Google search results with this plugin.

Internal Link Juicer

When indexing your website, Google looks at the popularity of your site, among other things. The more links pointing to your site, the more popular your website is, according to Google. Your website will get a higher position in the search results.

What many people do not know is that Google also looks at the internal links on your website. Do you have many internal links on your site? Then you will automatically get a higher position in the search results. Unfortunately, it takes time to put a lot of internal links on your website. Do you want to save time without saving on your internal links? Then you can install the SEO Auto Linker plugin.

This plugin generates your internal links automatically. You only have to specify the keyword you want to link to and the page you want to link to: the plugin will do the rest. A link will be placed on all pages containing that keyword. And you don’t have to do anything about this yourself.

WP Smush

Images are valuable, but they do make your website slow. If the images on your website have a large size, it will take a long time before your website is fully loaded. It not only harms the user-friendliness of your site but also your position in Google. Slow websites are ranked less high by the search engine.

You can change this by reducing the size of the many images on your site. The handy plugin WP Smush helps you with this. This free plugin resizes the images you want to put on your website when you are uploading them. If you use this plugin, you can be sure that a picture of 5MB will not appear on your site. And do you already have images on your website? Then you can use WP Smush to resize them.

WP Fastest Cache

Finally, you can install the plugin WP Fastest Cache if you want to get your website higher in Google. With this caching plugin, you will make your website a lot faster. And since Google likes fast websites, this usually definitely leads to a higher position in the search results.

Good to know: WP Fastest Cache is certainly not the only caching plugin. However, this plugin generally works better than similar plugins. Also, WP Fastest Plugin is very user-friendly. The plugin does not have many settings, so even the layman can use this tool to make his or her website faster.

Redirection

The plugin Redirection is – as the name implies – a redirect manager. With this plugin, you can manage redirections and keep an eye on 404 error messages on your website. Does your website have some loose ends? Then you’ll find out soon enough if you install this plugin. The plugin will help you detect any loose ends quickly and also resolve them in the right way.

Good for your website’s search engine optimization because Google does not like error messages. If your site has no 404 error messages, then your chances of ranking high in the search results are significantly higher.

How New gTLD Domains Help Business

There are around 800 domain zones globally, so registering a new domain will not be a problem. But this was not always the case. Before 2011, there were only about 30 domain zones, and registering a free, easy to pronounce domain was a challenge.

That has changed, thanks to New gTLDs – new level domain zones that indicate the subject matter or site locality. Let’s see how they came to be and what their advantages are for business.

How New gTLD came to life?

Any domain name – the site’s unique name – consists of several parts, separated by dots. The last part, for example, .be – is the top or first-level domain.

Top-level domains are the same as the domain zone and are divided into two categories:

ccTLDs – by country, so-called national. Some of them (.us – USA, .uk – UK, .il – Israel) appeared in 1985.

gTLD – by topic and purpose of the site.

The first gTLD domains appeared in 1985, and there were only seven:

  • .com,
  • .edu,
  • .gov,
  • .mil,
  • .net,
  • .org,
  • .int.

From 1985 to 2010, ICANN (Corporation for the Management of Domain Names and IP addresses) added about 20 new zones, but even that was not enough.

Because by 2010, many businesses began to develop off-line, not only online, and most of them to exist only online, creating domain names in such a small number of zones became difficult.

Therefore, in 2011, ICANN presented New gTLDs – new top-level domains. In 2012, ICANN started accepting applications for new domain zones. Among the New gTLD: .shop, .club, .online, .store, .moscow and other zones that indicate the purpose of the site or its local placement. Selecting the right domain name has become easier, and the global domain space has become more diverse.

Before the advent of the New gTLD domain zones existed for socially relevant areas (.museum – museums, .edu – educational institutions in the United States, .travel – tourism industry), the intended use of the site (.pro – for professionals and .biz – for business) and the type of organization (.com – commercial organization, .org – not for profit organization). Any legal person can request their domain zone in specially organized stages.

Whether or not to register a new domain zone is up to ICANN.

Why New gTLD? 

The New gTLD domain zones launch has opened up new opportunities for entrepreneurs and greatly simplified their lives.

It’s easier to register the right domain name.

With the New gTLD solved the main obstacle – registering the right domain name is now easier. When all the sites were in a couple of dozen zones, the entrepreneurs had to wriggle out to come up with a name that no one else has registered. And at the same time, it had to be easy to pronounce, print, and reveal the essence of business.

Users imagine what awaits them on the website.

New gTLD zones already have a business purpose in the name. For example, .shop is for online stores, .news is for news pages, and so on.

Seeing the domain zone, the person has a rough idea of which site he will see. This way, more targeted users visit the page.

Most of the domains in the New gTLD zones are cheaper.

The most popular zones in the world are .info, .biz and .com. Also, in most countries, the most attractive zones – national (for example, in Belgium, it is .be, Germany .de, Netherlands .nl, and so forth). Therefore, before the New gTLD to register a domain with a good name was difficult and expensive. You had to buy it on the secondary market.

Domains in the New gTLD are often cheaper because:

there is less competition for an adequate domain name because of the large number of zones,

new domain zones are not yet as popular as national or .com.

Easier to monitor competitors

New gTLD zones divide the global domain space into industry niches. They’re easier to navigate – if you’re planning to create or buy a domain in a zone, you can search for other sites in the same area and see what competitors are offering.

Besides, New gTLD helps to find the right specialists. For example, if you need designers, you can look for them in the .design zone.

New gTLD disadvantages

While most New gTLD domains are cheaper, the price of niche zones such as .bank or .cars is much higher than average. For example, you can park .xyz or .icu domains inexpensively because they do not mean anything specific, and the audience is not yet accustomed to them.

Besides, since the new domain zones while not very popular, not all users will remember that the site is not in their accustomed domain zone, but, for example, by .shop. However, it is better to choose a less well-known domain zone than to register a non-obvious domain name on .be

The bottom line

New gTLD domain zones have expanded the global Internet space and brought positive changes to the business:

New gTLDs make it easier to register a proper domain name.

Users understand what is waiting for them on the site, so it is more targeted visitors.

Domains in the new zones often cost less.

It is easier for entrepreneurs to navigate their market and monitor competitors.

But there are two disadvantages:

domains in niche zones like .bank or .cars are expensive,

Some users will not remember that the site is not in the familiar domain zone.

However, it is better to choose a less well-known domain zone than register a non-obvious domain name in a popular zone.

Find a domain name that stands out.​

Register or Transfer

Universal .site domain

Whatever area of business – photography, beauty, marketing – you need a spectacular domain to go online. Ten years ago, business owners had a limited choice of zones for registration because there were not many of them: .com, .net, .org .info, etc. Demand was high, so short, memorable domains were expensive, and there were fewer and fewer available.

To solve the problem, ICANN, the organization that regulates domains and IP addresses, launched the New gTLD program in 2011. Thanks to this program, more than 800 variants are available for registration. We will talk more about one of them – the universal zone .site.

Why .site works for everyone

The word site is familiar to almost everyone. In other words, the site is a “unit” of the Internet. Opening the browser, we do not walk through a disordered space but go from one place to another.

The term “site” is well-established in the language, so the new domain zone with that name is similar in versatility to some of the first .com and .net zones. It is associated with the sphere of the Internet, and it can be interpreted as desired.

It can be compared with the other new domain zones: .store, .fun, .tokyo, etc. These words have definite meanings attached to them. When users come to a .store site, they expect to see an online store, with .fun, they expect entertainment content, and with .tokyo, they expect to see something related to the Japanese capital.

The .site extension has no theme restrictions. This zone is suitable for all kinds of projects from creative, e-commerce, or emerging technologies.

More and more project owners are satisfied with using .site domains and do not change them after the end of the registration.

The statistics of the .site zone show the following.

According to ntldstats.com, .site ranks 5th among new domain zones in terms of registrations. To date, more than 1.7 million names have been registered in the zone:

This makes up 5.8% of all domains in the New gTLD:

Why choose the .site zone?

Universality. No thematic restrictions, suitable for projects from all areas: from personal blogs to online stores and IT-infrastructure.

A lot of available domains. In contrast to the standard zones, in which the short and vibrant domains are already busy or expensive, the zone .site is just beginning to reveal the potential and unoccupied domain names in it enough.

Suitable for a mirror of the main domain. You can register a domain in the zone .site and make a redirect to the main site to protect yourself from scammers. Read more about this told in a separate article.

It is cheaper. Register a domain name in the New gTLD, often less expensive than finding a comparable domain in the usual zones such as .com, .org, .net. Pick up a domain name in the .site zone for your project on QuantumHost.

Find a domain name that stands out.​

Register or Transfer