Call us +1-231-421-7160

We’re excited to introduce FREE HOSTING for Joomla and WordPress! It’s simple: launch a FULL VERSION of Joomla or WordPress, build your website, and keep it online indefinitely for FREE. This blog explains why a free hosting option is ideal for open source web development tools like Joomla and WordPress and why we’re making this incredible offer.

free-hosting-wp-and-joomla

A Bit of Background

In 2013 we submitted a proposal in response to an RFP to host joomla.com, a free, limited option for Joomla hosting. In this proposal we indicated that we were not in favor of offering a limited version of Joomla. When the contract was awarded to another vendor, we started working hard to turn our unique proposal into a reality. The result is a system where anyone can launch a free and fully functional Joomla or WordPress site and keep it online indefinitely.

Read more
Posted by

Internet Protocol is the set of rules that governs the exchange of information and the way traffic is routed on the web. Internet Protocol Version 6 (IPv6) is the next generation Internet communication protocol that provides an identification and location system for devices, computers and networks and will replace IPv4, the current protocol that has many limitations. This blog shines some light on IPv6 and explains the impact on Internet users and how the CloudAccess.net platform is IPv6 ready.

ipv6-ready

The Growth of the Internet and the Need for a New Protocol

Originally developed in the 1970s, IPv4 is a cornerstone of the Internet as we know it. It was developed long before anyone could really imagine all of the interconnected devices that we have today. IPv4 allows for approximately 4.3 billion unique IP addresses, which might sound like a lot and certainly was a lot in 1970s standards. Nobody in 1970, however, could have predicted that the Internet would be as popular as it is or that many of us would be walking around with high speed computers in our pockets. With close to 3 billion current Internet users, IPv4 presents some serious limitations.

Read more

Throughout the last few days you may have heard news about the “Bash Bug”, a programming vulnerability posing a threat to Unix-based systems including Linux and Mac OS X. At CloudAccess.net we’ve done everything in our power to protect our network and our clients against the Bash Bug, but this blog contains some useful information that might help you take additional measures to protect yourself.

 bash

What is the Bash Bug?

Bash disrupts a computer or device’s normal operating system by taking control over the command prompt or “shell”, essentially telling the operating system what to do. Bash stands for “Bourne-again shell” and has also been referred to as “Shellshock”. The bug has been around since the 1980s, but has only recently been discovered and exposed as a threat. Without getting too technical, the bug enables outsiders to exploit the security of an affected device, computer or server.

Read more

A good product and marketing campaign can land a client, but your focus then has to be centered on retaining the client. The key to accomplishing this in the IT industry to provide a high level of technical support for your product or service. This weekend, at JoomlaDay Poland, Derek Snieg (a CloudAccess.net Support Team Leader) will be leading a session and sharing ideas on how to build the best possible technical support team.

derek poland

More About Derek’s Presentation

Are you an entrepreneur curious about providing great technical support? Are you an end user looking for tips on how to effectively cooperate with a technical support person to troubleshoot your issues quickly and effectively? Derek has been one a highly valued CloudAccess.net “support guy” for many years now and his insight is as good as gold.

Read more

In a recent online security blog post, Google announced positive results from search engine testing that took into account sites that “use secure, encrypted connections.” As a result, they will begin using HTTPS as a signal in their ranking algorithms. This decision encourages site owners to turn on encryption, making sites a lot more secure. In the past, many have been reluctant to make the switch from HTTP to HTTPS because of costs or fears that such a change would slow their page load time. Using today’s cost efficient, high-speed encryption methods, however, these aren't such huge factors anymore, and many site owners are making the change. 

The Purpose of SSL Certificates

Secure Sockets Layer, or SSL, can be defined as a form of encryption that ensures that no information shared online is in plain text format. To be certain customers feel safe while sharing their credit card information and personal information online, websites started using SSL certificates as a solution to hacking, security breaches and data-tampering attempts.

How SSL Encryption Works

The diagram below illustrates the process that occurs when site visitors establish a secure session with a website that has an SSL certificate installed.

Read more

The CloudAccess.net API puts the power of our entire platform directly into the hands of developers. Using the API, your site visitors will be able to launch a custom application directly from your website. The API is ideal for any type of web service provider and can be easily integrated into any site. The best part is that you can expand the services that you offer, attract new clients and earn a recurring monthly revenue stream.

How the API Works

Let’s say you’re a developer and you have a perfectly designed application including a template or theme that displays each of your extensions or plug-ins including your image rotator, carousel, gallery and accordion. Your clients typically have to install an application, purchase your software, install it, enable it, configure it, test it and more. At best, this process is time-consuming and tedious.

Read more

Whether you’re a versed veteran or new to Joomla, there is an event this week that is sure to provide you with some great information. Joomla! 3 Day is like an online JoomlaDay of sorts, and with a series of 20 sessions across two days, there is definitely something for everyone. We’re excited to be an organizer of the event and even more excited to lead a session introducing our Demo API component, a new platform feature that allows your site visitors to launch custom Joomla applications from your website.

jdonline

About the Event

With expert Joomla presenters from all over the world, Joomla 3 will be covered from all angles. Each presentation will be approximately 30 - 40 minutes with time for questions and answers.

Read more

CloudAccess.net India team members recently participated in forming the Joomla User Group in Ahmedabad, India. Personally, this was like a dream come true because I’ve been thinking about getting our local Joomla users under one roof for a long time now. We were proud to host the first Ahmedabad JUG meeting at our CloudAccess.net India office on July 27th where we planned the Joomla! Awareness and Outreach Seminar that was held on August 2nd at the School of Computer Studies at Ahmedabad University.

1

Forming the Ahmedabad JUG

I first met Gunjan Patel, a software developer at redweb.dk, and realized that we shared a lot of common goals and enthusiasm about growing the Joomla community in Ahmedabad. We shared our previous JoomlaDay experiences, and we set a date to discuss how we could inject some life into our local community. This led to our the first JUG Meeting at our office where my fellow CloudAccess.net teamsters Larisa Patel, Dhaval Desai and Miraj Ranpura attended along with Gunjan, Mrunal, Akash and Deval.

Read more

Technology is a funny thing. There is a perpetual push to create systems that are better, stronger and faster. This constant drive has led to innovations unimaginable just a few years ago, but being on the leading-edge leaves a lot of room for error. It’s a paradox really: in order to succeed you must experience failure. The web hosting industry certainly isn’t exempt from this catch 22. This blog explores the early days of our web hosting service, some of the failures we experienced on our journey, and how we achieved ultimate success by creating a unified web hosting platform.

pawelp-blog-post

Our Web Hosting Startup Phase

Starting our web hosting company was great fun. We were a web development company at first and we had a strong client base that wanted to host websites with us. Building our first server, turning it on, and seeing it rock gave us a lot of satisfaction. In no time, we were off and running.

Read more

We pride ourselves on having an extremely secure platform, but even the most secure hosting providers see hacked websites on a daily basis. Almost always, the goal of the hacker is to steal content, send spam, spread malware or conduct some type of phishing scam. Many times we’ll see a site administrator clean a site only for it to be hacked again a few days later, and then they come to us wanting to know why. We find that some additional steps that can secure a site and fend off attacks are often neglected. This blog explains why sites are hacked, steps for cleaning up a hacked site, and preventative measures that can be taken to secure the site moving forward.

cleaning up

Why sites get hacked

Vulnerable Extensions

There are several reasons a site can be hacked, but the culprit we identify most often is an outdated extension. Updating extensions is critical because hackers can easily identify vulnerabilities in older versions, which are like a wide open back door to the site. If you’re using a Joomla site, it’s best practice to visit the Vulnerable Extensions List frequently. If you see an extension you’re using on this list, download and install the patches immediately. If no patches exist, disable the extension and find something to replace it.

Read more