About Liquid Web

A Leader In Managed Hosting since 1997

Our Heroic Support technicians are located on-site at each of our data centers.
Liquid Web Official Blog

KB Weekly Wrap-Up 12-19-14
Filed under: How To,Knowledge Base,News  December 19, 2014

Knowledge Base Weekly Wrap-Up 12-19-14
Have you checked out our Knowledge Base recently? We’re always adding new articles to help our customers with common tasks or issues they might encounter. This edition of the KB Weekly Wrap-Up features instructions for using Firewald, Apache 2, Docker, and phpMyAdmin!

  • How to Start and Enable and Stop and Disable Firewalld on Fedora 20

    Learn how to start and enable or stop and disable Firewalld, or Dynamic Firewall, a newly implemented firewall in Fedora 20.

  • How to List Which Apache 2 Modules are Enabled on CentOS 7 and Fedora 20

    The flexible and modular design of the Apache web server makes it one of the most popular and powerful web servers in the world. Learn how to list which Apache 2 modules are enabled on both CentOS 7 and Fedora 20.

  • How to Install Docker on Fedora 21

    Follow these step by step instructions for installing Docker, a container-based software framework for automating deployment of applications, on Fedora 21.

  • How to Install and Configured phpMyAdmin on Fedora 21

    Learn how to install and configure phpMyAdmin, an open source tool used for the administration of MySQL, on Fedora 21.

Don’t see what you need to know? Contact our Heroic Support® team and we’ll help! If you’d like to request a specific article for our Knowledge Base, let us know at support@liquidweb.com.




KB Weekly Wrap-Up 12-12-14
Filed under: How To,Knowledge Base,News  December 12, 2014

Knowledge Base Weekly Wrap-Up 12-12-14
It’s been a busy week for the technical writers behind our Knowledge Base! With topics like Varnish, MongoDB, storage engines, and upgrading MariaDB, there’s a little bit of everything in this edition of our KB Weekly Wrap-Up.

  • How to Install Varnish on Fedora 20

    Learn how to install Varnish, an HTTP accelerator designed to improve performance for busy, dynamic web sites, on Fedora 20.

  • How to Install the Mongo PHP Driver (Extension) on CentOS 7 and Fedora 20

    MongoDB is a document database that provides high performance, high availability, and easy scalability. Learn how to install the PHP driver (extension) for both CentOS 7 and Fedora 20.

  • How to Install the Open Query Graph engine (OQGRAPH) for MariaDB 10.0 on Fedora 20 and CentOS 7

    Learn how to install the Open Query Graph engine (OQGRAPH), a computation engine for MariaDB 10.0, on Fedora 20 and CentOS 7.

  • How to Install the Cassandra Storage Engine for MariaDB 10.0 on Fedora 20

    The Cassandra Storage Engine is a component of MariaDB that handle operations for different table types. Learn how to install it on MariaDB 10.0 on the Fedora 20 operating system.

  • How to Upgrade MariaDB 5.5 to MariaDB 10.0 on Fedora 20

    Upgrade MariaDB 5.5 to MariaDB 10.0 on Fedora 20. MariaDB is a drop-in replacement for MySQL that offers more storage engines, including Cassandra, XtraDB, and OQGRAPH.

Don’t see what you need to know? Contact our Heroic Support® team and we’ll help! If you’d like to request a specific article for our Knowledge Base, let us know at support@liquidweb.com.




What is Block Storage?
Filed under: News,Products  December 9, 2014

Do you know which storage option is right for your business? Local storage, block storage and object storage all offer great features depending on the amount and type of storage you need. Before you make your choice, we’ll explore block storage more in depth and learn about it’s basic architecture and how it functions.
Liquid Web Storm Block Storage
Block storage operates very similarly to the standard local storage you’re already familiar with, however there is one notable difference. While local storage keeps all data locally on your server, block storage separates that data out into a high-speed, centralized storage cluster with built-in redundancy. All communication with block storage occurs over a network. Separating your storage from your server allows you to cost-effectively and efficiently scale up your storage – especially for large amounts of data.

Files stored in a block storage system are split and organized into evenly sized blocks of raw data; each individual block contains data and an associated address. Updates to files, databases, etc. occur via individual block updates, and not the update of the entire file. Thus, block storage excels at heavy random read/write I/O, and database storage.

The centralized block storage cluster can be conveniently scaled up or down with the simple click of a button in the Storm interface, however Liquid Web’s Storm® Block Storage has a hard limit of 15 TB per volume.

Built on a distributed platform, Storm® Block Storage adds a level of redundancy and high availability to your data storage. Managed by Liquid Web, block storage is ideal for many different types of applications and storage needs and provides businesses with the ability to allocate storage on a per-gig-basis.

If you’d like to learn more about other storage solutions at Liquid Web or to find out which solution would be ideal for you, stay tuned for upcoming articles on storage solutions, or contact our Heroic Support® staff.




KB Weekly Wrap-Up 12-5-14
Filed under: Heroic Support,How To,Knowledge Base  December 5, 2014

Knowledge Base Weekly Wrap-Up 12-5-14This week we’ve added more articles to our Knowledge Base explaining how to install applications like MongoDB, ProFTPD, and MySQL / MariaDB on Fedora 20. In addition, this KB Weekly Wrap-Up also features instructions for installing Cassandra Storage Engine for MariaDB on CentOS 7. Check out these articles and more every day at LiquidWeb.com/kb!

Don’t see what you need to know? Contact our Heroic Support® team and we’ll help! If you’d like to request a specific article for our Knowledge Base, let us know at support@liquidweb.com.




KB Weekly Wrap-Up 11-28-14
Filed under: News  November 28, 2014

Knowledge Base Weekly Wrap 11-28-14
Sick of Black Friday already? Take a break from the madness and focus on your hosting environment instead. If your infrastructure is updated with the latest release of the Fedora operating system, then our Knowledge Base is the perfect place to go for help with installing popular and useful applications. In this edition of the KB Weekly Wrap-Up, find out how to install PostgreSQL, Cassandra 2, Git, and lsyncd all on Fedora 20.

Don’t see what you need to know? Contact our Heroic Support® team and we’ll help! If you’d like to request a specific article for our Knowledge Base, let us know at support@liquidweb.com.

  • No Related Post



KB Weekly Wrap-Up 11-21-14
Filed under: Heroic Support,How To,In 60 Seconds  November 21, 2014

Knowledge Base Weekly Wrap-Up 11-21-14
Our Knowledge Base not only includes helpful how to articles, but also solves many of the common errors you might encounter while troubleshooting your server. In this edition of the KB Weekly Wrap-Up we’ve solved two errors you might encounter when attempting to connect to a vsftpd server. You can also learn how to resize a Liquid Web Storm Server and how to install phpMyAdmin and vsftpd on Fedora 20.

Don’t see what you need to know? Contact our Heroic Support® team and we’ll help! If you’d like to request a specific article for our Knowledge Base, let us know at support@liquidweb.com.




Log Storage: A Cloud-Based Log Management Tool
Filed under: News  November 19, 2014

Evaluating your server’s log files can help immensely when diagnosing issues and storing those files is often required for security and compliance purposes, however the sheer number of files can be overwhelming. Enter Log Storage, a cloud-based log management tool that offers simplified management of your server logs. Log Storage allows customers to view, search, analyze, and manage all of their logs across multiple servers in one convenient location. A unique offering when combined with the full scope of management of our 24/7/365 Heroic Support®, Log Storage is also easy to set up and operate.

Log Storage Features

  • Manage All Logs in a Centralized Environment
  • Isolate and Analyze Trends
  • Improve and Fine Tune Searching Ability
  • Stop Potential Issues Before They Occur

Our Heroic Support® team developed Log Storage by combining the most useful elements of several different applications in order to create a product specific to the needs of our customers. Logs are directly transmitted to our centralized cloud storage cluster from any location chosen by the customer, where they are available for enhanced search, management, or analysis. We offer a plans that come with 30 GB, 60 GB, 150 GB, and 300 GB of storage.
Liquid Web Log Storage User Interface
Many of our customers have found a myriad of benefits to utilizing Log Storage in their day to day operations. One such customer, EchoDitto, has used Log Storage to manage their large cluster of web servers.

“We found it especially useful when trying to follow patterns or IP addresses behind our load balanced cluster of web servers,” explained Senior Systems Administrator Alan Ivey of EchoDitto. “Otherwise we’d have to have multiple terminals open and hope we didn’t overlook something when comparing each window.”

Log Storage is perfect for customers who have hosting environments that generate a large number of events and often find themselves searching through logs looking for particular information. Log Storage also makes it much easier for customers to quickly find and repair potential issues or problems, spot trends in usage, search for malicious activity, or simply store a large amount of logs for security or compliance reasons. If you’d like to learn more about how you can use Log Storage to simplify your log management, let us know!

Learn More About Liquid Web Log Storage

  • No Related Post



KB Weekly Wrap-Up 11-14-14
Filed under: How To,Knowledge Base,News  November 14, 2014

Knowledge Base Weekly Wrap 11-14-14
Have you checked in with our Knowledge Base recently? New articles are added all the time, written with our customer’s specific needs in mind. This edition of our KB Weekly Wrap-Up features Fedora 20, Logwatch, a solved Apache error, and an in-depth performance comparison of MySQL 5.1, 5.5, and 5.6.

Don’t see what you need to know? Contact our Heroic Support® team and we’ll help! If you’d like to request a specific article for our Knowledge Base, let us know at support@liquidweb.com.




How to Protect Your Ecommerce Site From Holiday Hacks
Filed under: Heroic Support,Industry Insights,News  November 13, 2014

Protect Your Ecommerce Site This HolidayThere have been an alarming amount of security breaches covered by the news over the last year, from the Heartbleed vulnerability to the numerous breaches at USPS, Neiman Marcus, eBay, Home Depot, Target, and other retail businesses. According to Trustwave’s 2014 Global Security Report, 54% of the attacks that took place last year targeted ecommerce systems.

With the holidays looming on the horizon and your holiday traffic preparations underway, the last thing you want is a hacked site. Below are the five most common types of hacks that might affect ecommerce businesses this holiday season as compiled by OWASP, the Open Web Application Security Project and the collective knowledge of our heroic security experts. Learn more about these security risks so you can better protect your customers and ensure you have a successful holiday season.

Holiday Hack #1 – Injection

  • What Is It?

    Injection attacks can cause data loss, data corruption, denial of access, and even a complete host takeover that could have negative consequences on your business’s reputation. Injection flaws are easy for attackers to find and happen relatively often. Injection-related attacks are often in the news, much like the recent attack disclosed by Milwaukee-based computer security company Hold Security. They discovered a theft of confidential information from nearly 420,000 websites due to SQL Injections.

  • How Does It Work?

    Untrusted data is injected into a web application and tricks that application into executing commands and accessing data. Often found in legacy code within SQL, LDAP, Xpath, NoSQL queries, OS Commands, XML parsers, SMTP Headers, etc.

  • How Do I Protect Myself?

    Using a safe API can prevent injection attacks, and protections such as ModSecurity for Apache can help in the case of SQL injections. However, it is also vitally important to keep your web applications updated, something that our Heroic Support® can help you maintain. Outdated applications are particularly vulnerable to injection attacks.

Holiday Hack #2 – Authentication

  • What Is It?

    Authentication exploits are widespread and can provide attackers with an authorized user from which they can attack. One method attackers use to gain access to authorized user accounts is a brute force attack, which involves rapid logins against your server. Attackers can also target Session IDs, which keep track of users through multiple requests. Stolen session IDs can be reused to impersonate users on popular websites like Facebook and Google.

  • How Does It Work?

    Attackers take advantage of exposed accounts, weak passwords, or other flaws in the authentication or session management functions to impersonate users. Flaws could be found in the logout, password management, timeouts, account update functions and more.

  • How Do I Protect Myself?

    Protecting your application from session ID exploits requires a strong set of authentication and session management controls, secure communication and credential storage. In addition, services like Brute Force Detection (BFD) watch your log files for failed login attempts and will blog IP addresses that have several in a short period of time.

Holiday Hack #3 – Cross-Site Scripting (XSS)

  • What Is It?

    XSS is one of the most widespread security risks. Attackers hijack user sessions to change websites, insert bad content, conduct phishing and malware attacks, etc. all leading to a negative impact on your website’s reputation. Paypal, as an example, has had to fix XSS vulnerability in their site that allowed the execution of client-side script and browser cookie hijacking.

  • How Does It Work?

    This attack exploits the browser-user trust. Attackers can send text-based attack scripts that execute in the victim’s browser, hijacking the user session.

  • How Do I Protect Myself?

    Follow best practices per OWASP to protect your application from XSS attacks, including properly escaping all untrusted data and including whitelist input validation. In addition, maintaining updated web applications is extremely important because outdated applications are vulnerable to XSS attacks. Our Heroic Support® can help you manage your many applications and their updates.

Holiday Hack #4 – Denial of Service (DoS)

  • What Is It?

    A common attack that allows hackers to bring down a network without needing internal access is Denial of Service or Distributed Denial of Service (DDoS). These types of attacks are particularly worrying because a slow, or even inaccessible website during the holiday season can be devastating. Customers that have experienced debilitating DDoS attacks have found themselves in desperate situations without the proper mitigation techniques.

  • How Does It Work?

    During a DoS attack, attackers flood the access routers with fake traffic until the system overloads and eventually fails. A DDoS attack involves coordinated attacks from many different sources.

  • How Do I Protect Myself?

    The best way to mitigate a DDoS attack is to monitor incoming traffic. Services like our DDoS Attack Protection differentiate between legitimate and malicious traffic. It analyzes traffic that attempts to reach the server and, if the traffic is determined malicious, routes it away allowing only legitimate traffic through. DDoS Attack Protection can prevent the severe negative consequences of a debilitating attack.

Holiday Hack #5 – Security Misconfiguration

  • What Is It?

    Misconfigured security settings are a frequent oversight made when implementing web servers and applications. Easy to exploit, attackers can get unauthorized access to system data or server functionality, allowing them to steal or modify your data slowly over time. This could lead to a complete system compromise.

  • How Does It Work?

    There are numerous ways attackers can exploit misconfigured settings, including in the web server, application server, database, application framework, and custom code. They can exploit default accounts, unpatched flaws, unprotected files, directories, and more.

  • How Do I Protect Myself?

    Ensuring it is fast and easy to deploy secure environments, maintaining updated software, securely separating components, and periodically auditing your security can help avoid security threats – all of which our Heroic Support® team can guide you through. In addition, setting up a secure firewall will help you protect your entire hosting environment.

Our Heroic Support® team is well versed in protecting our customers against these and other common security exploits. Knowing the importance of the upcoming holiday season for ecommerce businesses, we’re here to help you find out if you’re vulnerable and to implement protections for your sensitive data, 24/7/365.




LiquidWeb.com Scavenger Hunt
Filed under: Contests  November 10, 2014

Hunt through our new website and find the answers to the each day’s clue for a chance to win our prize pack of NEW Liquid Web gear, including our new messenger bags, sunglasses and an 8GB credit-card sized flash drive! Share your answers on Facebook or Twitter throughout the week. The first five people to answer all five clues will win!

LiquidWeb.com Scavenger Hunt Prize Pack

How to Play:

  1. Starting immediately, one clue will be posted each day this week at Noon (EST) on both Facebook and Twitter in the form of a Clue Photo. They will also be added to this blog post.
  2. Decipher each clue and search our new website for the answer to the riddle.
  3. Submit your answer each day via Facebook or Twitter:
    • Via Facebook: Share the Clue Photo with your friends, making sure its security settings are PUBLIC so Liquid Web can see it. Include the answer to that day’s clue in your post along with #LWSiteHunt.
    • Via Twitter: Retweet the Clue Photo, including both your answer to the clue and #LWSiteHunt.
    • Also include your LW Brand Store username in each submission, so you are eligible to win the prize. If you do not have a username, sign up here: LiquidWeb.com/shop.
  4. Check in every day this week at Noon for the next clue. The last clue will be on released Friday, November 14th.
  5. The first five participants that solve every clue and correctly submit their answers will win our Prize Pack, pictured above. The winners will be individually contacted. All other winning participants will be awarded with 100 Liquid Web Bucks usable on great items from LiquidWeb.com/Shop, so keep playing!

Clue 1:

LiquidWeb.com Scavenger Hunt Clue 1

Clue 2:

LiquidWeb.com Scavenger Hunt Clue 2

Clue 3:

LiquidWeb.com Scavenger Hunt Clue 3

Clue 4:

LiquidWeb.com Scavenger Hunt Clue 4

Clue 5:

LiquidWeb.com Scavenger Hunt Clue 5


Rules & Regulations:

  • Submit your answer each day by sharing or retweeting each day’s Clue Photo and including your answer with the #LWSiteHunt hashtag.
  • Submissions must include Liquid Web Brand Store username to be eligible to count as a completed item. If you do not have a username but wish to participate, please register at Liquidweb.com/Shop.
  • Winners will be notified of their winning submission via reply on Facebook or Twitter from Liquid Web.
  • The contest will begin at Noon (Eastern) on November 10th and last until 5pm (Eastern) on November 14th or until we have awarded all of our prize packages.
  • All entries must be unique with YOUR LiquidWeb.com/Shop username written on them.
  • Liquid Web employees and Employee family members are ineligible to win.


Legal Disclaimer




Page 1 of 161234510...Last »

Copyright © 2011 Liquid Web, Inc. All Rights Reserved.