Ping! Zine Issue 73 - SSL and the AutoInstall SSL™ Phenomenon

Page 1




INSIDE

PING! ZINE

073

010 IN THIS ISSUE... eighteen

KAJE: A PICTURE IS WORTH A THOUSAND CHARACTERS twenty two

GAMER: MORTAL KOMBAT X COMING IN 2015 twenty four

BUILDING AN APP FOR YOUR BUSINESS

twenty nine

ACCESS: D-LINK WI-FI SMART PLUG

thirty

DON’T MISS AN ISSUE! SUBSCRIBE NOW PRINT & DIGITAL EDITIONS...FREE!

0

0

4 P i n g Zi ne. c om

ACCESS: ZTE OPEN C PHONE


Free Domain For Life REGISTER

YOURS

TODAY!

D

Web Hosting As Low As

$

3

/mo 00 .

*Free domain for life included with every hosting account. As long as you renew your hosting account with Arvixe, Arvixe will renew your domain name at no charge.

Free .COM or .NET Domain Name 25% Lifetime Web Hosting Discount Fully Managed Linux & Windows Hosting 24/7/365 Live Chat & Phone Support 60 Day Money Back Guarantee No Hidden Fees

Save 25% OFF for Life Use Coupon Code:

PINGZINE25

www.arvixe.com/pingzine

arvixe.com 1-888-927-8493


ABOUT

PING! ZINE

073 OUR SPONSORS...

EXECUTIVE STAFF Publisher Keith Duncan Managing Editor/Art Director Derek Morris Senior Online Editor Brandie Richardson Executive Editor David Dunlap

EDITORIAL STAFF Technical Editor John Burmeister Commentary Editor Gary Cross Marketing Editor Frank Feingold Headlines Editor Derek Vaughan

zero two

BLACK LOTUS zero five

ARVIXE WEB HOSTING zero seven

1&1 INTERNET seventeen

TIER.NET twenty one

CONTRIBUTING WRITERS

KAJE PICTURE PASSWORDS

Garen Arnold Marsha Friedman Ginny Grimsley Jonathan Sellers

ADDRESS Ping! Zine, LLC Post Office Box 516 Denham Springs, LA 70726

twenty six

FIBERHUB twenty eight

HOST COLOR thirty one

GODADDY thirty two

THE SSL STORE Ping! Zine Web Tech Magazine Š September 2014, Ping! Zine Web Tech Magazine, Published and Copyrighted 2014 by PINGZINE, LLC, P.O. Box 516, Denham Springs, LA 70726. All rights reserved. Permission to reproduce part or all of this issue must be secured in writing from the publisher. Complementary subscriptions are at the discretion of the publisher and may be cancelled or modified at any time. Unsolicited submissions are welcome. We assume no liability for lost or damage of submissions. We assume no liability for the content of this issue and all points and ideas are strictly that of the writers involved and not that of the publisher, publishing company, printing company or editors.

0

0

6 P i n g Zi ne. c om


DOMAINS | MAIL | HOSTING | eCOMMERCE | SERVERS

NEW HOSTING POPULAR APPS - NOW EVEN BETTER!

WordPress & Powerful App Platforms! Supports over 140 popular apps including WordPress, Drupal™, Joomla!™, TYPO3, and more ■ Security & version upgrade notifications ■ Trial version available for all applications ■ App Expert Support ■ 1&1 CDN powered by CloudFlare™ and 2 GB guaranteed RAM for peak performance ■

Powerful Tools PHP 5.5, Perl, Python, Ruby 1&1 Mobile Website Builder ■ NetObjects Fusion® 2013 included ■ ■

Successful Marketing Facebook® advertising credits Listing in business directories ■ 1&1 Search Engine Optimization ■ 1&1 E-Mail Marketing Manager ■ ■

COMPLETE PACKAGES

State-of-the-Art Technology ■ ■

FOR PROFESSIONALS

Maximum availability (Geo-Redundancy) 300 Gbit/s network connection

$ .99

All Inclusive 1 FREE domain: .com, .net, .org, .biz, .info ■ Unlimited Power: webspace, traffic, mail accounts, MySQL databases ■ Secure e-mail addresses with virus and spam protection ■ Linux or Windows operating system ■

1

TRIAL

30 DAY MONEY BACK GUARANTEE

1

MONTH

FLEXIBLE PAYMENT OPTIONS

0

Starting at

per month*

®

1

CALL

SPEAK WITH AN EXPERT 24/7

1 (877) 461-2631 * Offer valid for a limited time only. The $0.99/month price reflects a 12-month pre-payment option for the 1&1 Basic Hosting Package. Regular price of $5.99/month after 12 months. Some features listed are only available with package upgrade. Visit www.1and1.com for full promotion details. Program and pricing specifications and availability subject to change without notice. 1&1 and the 1&1 logo are trademarks of 1&1 Internet, all other trademarks are the property of their respective owners. ©2014 1&1 Internet. All rights reserved. Rubik’s Cube® used by permission of Rubik’s Brand Ltd

1and1.com


SPAM

SPRINT AND T-MOBILE MOVING TOWARDS A $32 BILLION DEAL

MICROSOFT TO CUT 2,100 EMPLOYEES TODAY AS PART OF ITS NEXT LAYOFF PHASE

GOOGLE’S SKYBOX IMAGING ACQUISITION SAID TO IMPROVE GOOGLE MAPS

N A D

Sprint is reportedly close to closing its purchase agreement of acquiring T-Mobile, a move that could reduce competition in the mobile market.“In an industry this concentrated, normally going from four to three will not make it more competitive,” says law professor at NYU, Harry First. “The incentives are to be more cooperative than competitive.” According to Forbes, Sprint has agreed to pay roughly $40 per share, around $32 billion, and undertake T-Mobile’s $9 billion debt. Sprint Chairman Masayoshi Son, who purchased the company last year for $22 billion, says he needs more if they are to stand a chance against top competitor AT&T and Verizon. “We can start a small fight, but it does not scale, it does not last, it’s not sustainable,” said Son during a speech in March. If the merger gets approved, Sprint would have to lower its costs to match T-Mobiles, a move that could hurt their revenue, reports Reuters. On average, Sprint customers spend $62 a month, while T-Mobile customers only spend $50.

Microsoft will be eliminating 2,100 workers today as part of its plan to layoff 18,000 employees by next year. Microsoft spokesman Peter Wootton announced that 747 of the cuts will be from the Washington State region, with the remaining cuts from various Microsoft locations worldwide. Wootton declined to specify from which departments the employees would be getting cut from, though the tech giant said in July that the cuts would affect employees in sales, marketing, engineering, and factory workers. Microsoft cut its first wave of employees in July, eliminating around 13,000 jobs, mostly from its newly acquired Nokia division. This is Microsoft’s biggest job reduction ever, with the last major reduction of 5,800 coming from Steve Ballmer in 2009

Google announced that it has acquired satellite startup Skybox Imaging, a move that could further the tech giant’s vision to bring Internet access to remote areas of the world.This $500 million acquisition will help to ensure the accuracy and quality of the satellite imagery used in Google Maps. “Skybox and Google share more than just a zip code. We both believe in making information (especially accurate geospatial information) accessible and useful. And to do this, we’re both willing to tackle problems head on — whether it’s building cars that drive themselves or designing our own satellites from scratch,” says a blog post from Skybox. Earlier this month reports surfaced claiming that Google is planning on spending more than $1 billion on a project to offer Internet access to those in some of the world’s most remote areas. According to the Wall Street Journal, the project will begin with 180 “small, high capacity satellites” that orbit the earth at low altitudes through its Project Loon initiative.

A t t S f A in h A s a o “ 2 A T t o A o c d a

0

0

8 P i n g Zi ne. c om


TABLET COMPUTERS CONTINUE TO SEE INCREASE IN DEMANDS The tablet market isn’t dead yet, despite many saying it has reached its peak after four years. According to a report from Liberty Voice, the tablet market is seeing an increase in sales due to software companies marketing the tablet as a replacement for laptops. Samsung’s South Africa Director of Mobile Communications, Craige Fleischer, says consumers are shifting their preference towards tablets rather than computers. “Traditionally tablets were seen as social devices that consumers predominantly used to view content. The technology has since evolved, with a clear focus on productivity, enabling users to both consume and create content, all on the same portable device.” As stated in the report, the demands in increase for tablets are due to three markets, the healthcare

industry, schools, and the elderly. Hospitals, doctor’s offices, and emergency medical services has seen an increase in tablets due to its portability and the increase in applications that assist medical personnel with medical diagnoses and storing information. With the educational system, tablets are becoming more accessible. Studies conducted by Tufts’ Center for Reading and MIT have found that widespread tablet use could potentially fight against illiteracy. Over the last year, tablet sales from K-12 schools increased by 60%, and by the end of 2014, U.S. schools are expected to purchase more than 3.5 million tablets, theWashington Post reports. Tablet sales increased by 12 percent from 2012 to 2013 among senior citizens, due to an increase in Internet and email use.

NEW ANDROID MALWARE ATTACK DEMANDS MONEY FOR DECRYPTED DATA

NEW OPENSSL BUG DISCOVERED, ANDROID USERS VULNERABLE TO ATTACKS

COURT RULES THAT INTERNET BROWSING ISN’T COPYRIGHT INFRINGEMENT

Android users beware, a security firm has detected the first ever ransomware for Android, specifically targeting Ukrainian users.The software, called Simplelocker, uses AES encryption to block users from accessing their docs, images, PDFs, and files. According to security firm ESET, if users want their information decrypted, they have to pay 260 Ukrainian hryvnias ($22 US) through the MoneXy transfer system. Affected users received a message on their devices saying they were locked out because they viewed and distributed “child pornography, zoophilia and other perversion.” “After payment your device will be unlocked within 24 hours. In case of no PAYMENT YOU WILL LOSE ALL DATA ON your device!,” says the message. The security firm noted that the ransomware is hard to trace because it is located on Tor, a “hidden part” of the Internet. A similar attack such as this one recently occurred, but for iPhone users. Hackers remotely compromised Australian and US iPhones, demanding the user pay a ransom if they wanted access back into their devices.

A new security bug has been found in the popular encryption tool OpenSSL that exposes users Internet data to malicious hackers across the web.Accoding to CNN, the SSL/TLS bug allows hackers to look into your Internet sessions through the “handshake” process between computers and web servers. “Attackers can exploit this behavior so that they can decrypt and/or modify data in the communication channel,” says a blog post from the researcher who discovered the bug, Masahi Kikuchi. Kikuchi noted that the vulnerability has been hiding on the web for more than 16 years. “The biggest reason why the bug hasn’t been found for over 16 years is that code reviews were insufficient, especially from experts who had experiences with TLS/SSL implementation. If the reviewers had enough experiences, they should have been verified OpenSSL code in the same way they do their own code. They could have detected the problem.” Users using Internet Explorer, Safari, Firefox, and Chrome are not affected by the SSL/TLS MITM bug, though Android and Chrome for Android are vulnerable to the security flaw.

European Internet users can safely surf the net without having to worry about infringing any copyrighted material.Recently, the European Court of Justice ruled that digital copies of newspapers and articles on the Internet do not infringe on copyright laws, The Guardian reports. This case was brought on by media monitoring company Melwater in 2009 against the Newspaper Licensing Agency in a copyright tribunal that claims The ECJ ruled that the law “must be interpreted as meaning that the on-screen copies and the cached copies made by an end-user in the course of viewing a website satisfy the conditions… and that they may therefore be made without the authorisation of the copyright holders.” According to the European Parliament, digital copies stored online constitute as a “integral and essential part of a technological process” and do not infringe on any copyrighted work. Without this law, users would be infringing copyrighted material every time they went on the Internet.

PingZine.com

0

0

9


COVER

T

he Internet threat landscape is a dark and scary place. Another day, another hack. Another day, another vulnerability. Is anything safe online anymore?! Believe it or not, there is a staple of the web security industry that continues to grow and remains extremely strong: SSL certificates. While not the sexiest of web security solutions, SSL certificates have continued to be a stalwart of the industry and are only going to continue to gain even more relevance and recognition among web-users. SSL certificates are fairly well-known in the hosting industry, but certainly not a favorite product amongst most, with good reason. The process of obtaining and installing a certificate can be a bit daunting for the average website owner with limited technical knowledge. Unlike most other online products – the process of receiving a certificate isn’t a one-click process. A lot of web hosts simply do not want to deal with the hassle of offering SSL certificates, since they have nightmares of increased support tickets, frustrated customers, and wasted time on a product that is not core to their business. But, as SSL

continues to gain awareness – specifically as hacks continue to dominate the headlines and now with a recent announcement from Google that websites equipped with SSL will get that coveted SEO boost – the time to capitalize on the impending demand is now. But how? Is there a company out there that can help web hosts navigate the murky waters of SSL? Is there technology available that can make the validation and installation process less of a soul-draining experience? The short answer is: yes! But, before we dive into that, let’s examine the current state of web security. Brace yourself. Recent studies by the Symantec Corporation (SYMC), the foremost worldwide information protection specialist, have taken a deep dive into the critical state of web security. Their latest report sadly predicted that what we have seen thus far may just be the tip of the iceberg. As we traverse through 2014, we could be in for bigger web security challenges while hackers persistently develop more innovative and sophisticated attacks every day. The following is a summary of this far-reaching Internet security threat as analyzed by Symantec’s web security experts.

1010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 0

1

0 P i n g Zi ne. c om


Internet Security Threat Landscape How Vulnerable is the Web Browser Ecosystem? The Symantec report started out by showing 2013 as a breakpoint year for online security with much of the attention focused on cyber spying, privacy incursion, and malicious acts by insiders. The 2013 year-end mega Target breach, along with other security infractions, are obvious indications that cybercrimes are getting more aggressive and sophisticated. And it doesn’t help that social media recklessness, proliferation of mobile technology devices and the flourishing realm of the Internet of Things (e.g., the so-called “smart” cars, medical gadgets, refrigerators/household appliances) – all give cyber criminals a more extensive playground. The report includes exploring the prevalent web security threats, their impact on businesses, and how the industry’s response teams can

leverage an in-depth defense strategy to protect their valuable resources.

Most Recent Attacks

It doesn’t look like data breaches and website attacks are going to slow down any time soon. There’s still one quarter left in the year, but a number of high-profile hacks have already stunned and shaken prominent global companies. Cyber criminals are stepping up their craft and data breaches are getting to be (almost) commonplace, larger in scale, and more vicious with stolen financial information and personal records sold on the black market in just a matter of days. Here are some of the most recent devastating attacks and flaws (in no particular order) that have taken place or come to light this year, so far.

Target Gets Targeted With more than 70 million customers affected, the Target attack is considered one of the most brutal data breaches from any consumer business perspective. Target’s massive data breach grabbed the headlines during the first three weeks of holiday shopping season in 2013, and the fallout still remains to this day.

“Backoff” Hits Dairy Queen Dairy Queen is just one of the latest victims of this malware breach that is said to have affected nearly 1,000 businesses in the United States. Backoff, which was discovered in October 2013, is a strain of malware that attacks point-of-service (POS) machines. It is capable of scraping memory for credit card data and logging keystrokes as well as establishing command-andcontrol communication.

Heartbleed The Heartbleed bug managed to remain hidden for more than two years, until it was exposed by a group of Google researchers in conjunction with Codenomicon, a relatively small Finnish security company. This bug exposed credit card details, passwords, encryption keys and a lot more sensitive data. This vulnerability briefly had the industry reeling as some of the largest and most notable sites like Google, Amazon, Yahoo, and Facebook scrambled to patch the flaw.

JP Morgan Chase and Four Other Banks/Firms

The JP Morgan Chase network and at least four other financial institutions were hit by a string of coordinated attacks that siphoned off enormous quantities of data that included savings and checking account information. The attack resulted in the loss of gigabytes of sensitive data that may have jeopardized employee and customer information.

iCloud – Phishing in the Cloud Apple’s iCloud got caught up in the middle of a stolen celebrity scandal just recently and cybercriminals are not about to let the opportunity pass for exploiting the furor. Attackers are launching a phishing campaign that aims to steal Apple IDs. Bogus notification messages are being deployed by the criminal gang behind the Kelihos/Waledac botnet.

The Home Depot Breach Most recently, everyone’s favorite hardware store was hit hard in a very similar way as Target. In fact, the point-of-sale system was seemingly compromised with a new malware strain that derived from BlackPOS, the same malware found in the Target attack. This attack affected all of their 2,200 US and Canadian stores and millions of customers who used their credit card and debit cards in-store. CONTINUED >>

1010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 PingZine.com

0

1

1


The Relevance and Benefits of SSL Now More Important than Ever

A

lthough, SSL certificates really had nothing to do with any of the attacks mentioned above, general consumers kind of just wrap it all up under the same thing: fear of doing business online. So, anyone who is involved in the web understands that SSL is the backbone of online security. Simply put, it’s the frontline of defense in keeping sensitive information safe and secure when traveling over the web. Here are the overall primary benefits of SSL:

Encryption of Sensitive Information

The fundamental purpose of using SSL is to encrypt sensitive data so that only the intended recipient is able to decipher it. An SSL certificate ensures that information being sent from a browser is encrypted and protected against hackers and other cyber thieves.

But what exactly is SSL?

SSL is an acronym for Secure Socket Layer, an encryption algorithm/technology that creates a uniquely encrypted connection between a web browser and a web server, allowing transmission of private information without getting anxious about data tampering, eavesdropping, or message forgery. It is a digital file that has to be installed on the server. This security certificate is issued by a Certificate Authority (CA), which takes the necessary precaution of verifying that the domain actually belongs to an authentic and legitimate organization, thus protecting users from man-in-the-middle attacks.

Gain and Boost Trust for a Website

Visitors will know when the connection to a website is secured by SSL through visual cues that web browsers provide, such as the green address bar or padlock icon*. Users will take this as an indication that a website can be trusted and they are more likely to make a purchase from that site. A Trust Seal from a recognized third-party security company or Certificate Authority (CA) further instills a sense of trust among online customers.**

SEO Advantage

Obtaining an SSL certificate may not be your number one priority right now, but it is definitely worth keeping in mind since it has become a MUST as Google continues to push towards improved web security. We’ll dive into this a little deeper later, as it is the newest benefit to SSL.

*

Types of SSL

(DV)

Green address bar or padlock icon representing Extended Validation.

**

(OV)

Trust Seal icon example from a recognized third-party.

(EV)

Domain Validation

Organization Validation

Extended Validation

These certificates are the quickest and cheapest to obtain, as they only validate that the person who is receiving the certificate owns the domain(s) they wish to secure.

These more premium certificates require companies to complete a light validation process before issuance. They offer more features with regards to injecting trust into a website.

These are the most feature-rich certificates on the market. They come with the most universally recognized symbol of trust on the Internet – the green address bar – utilized by industry titans like Twitter, Bank of America, PayPal, and more.

1010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 0

1

2 P i n g Zi ne. c om


HTTPS Everywhere

L

Taking Website Security to the Next Level

ast year, Google introduced HTTPS (Hypertext Transport Protocol Secure) by default for encrypted search and Gmail. This means that people using Gmail, Google Drive, and Search, for instance, automatically get secure connections to Google. Google has also been working to make the Internet a safer place for sensitive information with a broader and more comprehensive reach by making sure that websites which users access from Google are likewise secure. It is in this context that Google called for “HTTPS Everywhere” on the web. Since this announcement, an increasing number of webmasters and major communication sites are following suit and adopting HTTPS on their websites.

The SSL Impact on Google Ranking and SEO

This encouraging response prompted Google to run tests that take into account the use of secure, encrypted connections as a signal or factor in their search ranking algorithm. And just last month, Google made an official announcement introducing HTTPS as part of its algorithm. It’s only a very “lightweight” signal to start with (it only affects approximately 1% of worldwide searches/queries at the moment) and other signals, such as high quality content, website speed, and user experience still carry much more weight. This is mainly to give webmasters adequate time to upgrade to HTTPS, as the signal may be strengthened and given considerable significance over time with the primary goal to keep everyone safe on the Internet. In effect, the incentive is such that websites which are adequately secured by HTTPS may get higher rankings in Google and enjoy the full benefits

of increased visibility and traffic. Conversely, those that do not adhere may suffer the “penalty” of not being found on Google at all; hence, less visibility and traffic for their websites.

A Brief Rewind to the Tedious SSL Process

If they are so safe, why hasn’t everyone been using them all along? SSL certificates are quite unlike most products that you can just purchase and use instantly. The entire process of obtaining and installing an SSL certificate, from purchasing to getting it up and running, requires a lot of work that can lead to a lot of delays or erroneously done procedures, most likely because of the user’s unfamiliarity with the process. Although it may be relatively simple for IT experts, it is very technical and can be quite difficult for the Average Joe Website Owner or the neighborhood webmaster who has never experienced installing an SSL certificate before. This is the main reason why some web hosting companies typically don’t even bother with SSL as part of their business – too much hassle to justify what they think is limited profitability. The outdated SSL process of yesterday can be summed up as follows: • After making the purchase, the user has to figure out how to generate and submit the CSR (Certificate Signing Request) • Verify that they own the domain • Provide documentation to properly validate the company Download the certificate upon receipt • Figure out proper installation of the certificate on their type of server • Verify that the SSL certificate is fully up and running CONTINUED >>

1010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 PingZine.com

0

1

3


Meet the

N

eedless to say, inexperienced users would find this archaic process quite daunting and tedious, not to mention frustrating. Luckily, that’s where The SSL Store™ comes in, they were founded in 2008 to take as much pain out of the SSL process as possible. It is thus, that the concept of automated SSL was conceived; stemming from both the general frustration of web companies and customer demand for a better and simpler method to successfully install SSL certificates without going through all of that trouble and confusion.

A Premium SSL Service

In today’s hosting industry, where just about everything is automated,

constantly updated, and comprehensively enhanced, it would seem that SSL got stuck in an antiquated phase – up until The SSL Store™ came up with the brilliant idea of AutoInstall SSL™. With more than six years of extensive SSL experience, The SSL Store™ has answered thousands of queries about SSL verification and installation, which led them to the conclusion that a lot more resources should be dedicated to making the users’ SSL experience much more straightforward and convenient. According to Kevin Johnson, The SSL Store™ Channel Manager, they have more than 50 employees focused solely on SSL and collectively came up with

a one-of-a-kind automated solution that only a premium SSL service can provide to end-users. SSL has finally come of age and is catching up with 21st technology, at last!

AutoInstall SSL™ and Its Distinctive Features

Talk about streamlining the SSL process from top to bottom! As the name implies, it fully automates the usually burdensome process of installing SSL certificates and eliminates redundant back-and-forths that often result in ill-will, unnecessary headaches, and the need to seek assistance from someone or somewhere else. In contrast to the arduous manual steps typically associated with archaic SSL, this innovative technology allows end-users to:

1010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101


We’re all re ally excited abou t our latest relea se of AutoInstall S SL™. The new use r experience t ruly showcases h ow far we’ve come w improving th ith e general SSL process for the entire hosti ng industry. Bil

The SSL S

l Gr uenin

tore™ Ch

• • • •

Automatically generate the CSR Automatically verify/validate domain ownership Automatically download and install the SSL certificate Automatically verify that the installed certificate is up and efficiently running

AutoInstall SSL™ is designed to work with all three types of SSL certificates – Organization Validated (OV), Domain Validated (DV), and Extended Validation (EV). Multi-domain and wildcard certificates are also supported. For DV certificates, AutoInstall SSL™ handles virtually the entire installation and validation process – all it takes is a few minutes and a couple mouse clicks.

For OV and EV certificates, the customer will still have to carry out the validation process as required by the guidelines of the CA/B Forum; however, AutoInstall SSL™ will “pause” and walk you through the validation process, after which it resumes automatic installation when validation is completed. Moreover, AutoInstall SSL™ not only works with all types of certificates, also it’s compatible with the most trusted Certificate Authorities in the industry, such as Symantec, Thawte, GeoTrust, Comodo, and RapidSSL.

ger

ief Operati

ng Officer

The entire process, from purchase to installation, is completed in a matter of minutes. Generating the CSR and installing the certificate are carried out in real-time right in front of the customers’ eyes. The plugin automatically deals with it all, and all the customer has to do is provide essential information to facilitate the entire process. How much simpler can it get?! CONTINUED >>

Obtaining and Installing an SSL Certificate Has Never Been This Simple

With AutoInstall SSL™, setting up a new SSL certificate in cPanel is a breeze.

1010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 PingZine.com

0

1

5


A lot simpler, as demonstrated by these 5 easy steps: 1. Purchase the SSL via WHMCS using the provided plugin or through your own website if you are using The SSL Store’s API. 2. Receive the Token ID and Token Code. All orders come with tokens once you get hooked up with The SSL Store™. 3. Deploy the Tokens into the Control Panel. This is basically copying and pasting the Token ID and Token Code into the form found in the control panel. 4. Provide Admin and Technical Contact Details. This is mainly for purposes of identifying the designated name/person associated with the SSL certificate. 5. Watch AutoInstall SSL™ perform its magic in real time – right before your eyes.

Available with Multiple Hosting Control Panels AutoInstall SSL™ currently has two versions that are available for cPanel and Parallels Plesk. It is also designed with the capability to seamlessly work with WHMCS. On top of that, AutoInstall SSL™ will release a Command Line version, as well as versions for Windows and Linux desktops.

Web Hosting Provider as an SSL Reseller – The Potential to Boost Profits

AutoInstall SSL™ does not only make life easier; it can also boost your bottom line. Easily stand out from other web hosting and SSL providers by signing up for a reseller account with The SSL Store™ – absolutely FREE! – No startup/upfront fees, no contracts, no long-term commitment of any kind. Simply join the reseller program, wait for approval from The SSL Store™, and download AutoInstall SSL™ - it’s ready to go! Although AutoInstall SSL™ is only available to approved resellers at the moment; a web host gets immediate access to all its features once onboard, which typically takes just a couple of minutes. As soon as it’s activated, a web hosting reseller can start telling customers that their SSL nightmares are over. The SSL Store™ offers some of the best pricing in the industry because they purchase certificates in extremely large quantities at deeply discounted rates from some of the most respected brands. Resellers definitely have the advantage of being able to offer this game-changing SSL technology at ridiculously low prices. Along with integration options, robust plugins, and specialized enablement programs, resellers also have exclusive access to a number of free intuitive tools. The SSL Store™ resellers indeed have all the necessary help to sell more SSL.

What AutoInstall SSL™ Can Do for Business – Endless Possibilities

Amid the sea of hackers and data sniffers prowling the Internet these days, SSL certificates become undeniably more crucial to the trust and confidence that a website projects; thus, AutoInstall SSL™ can be particularly beneficial to website owners. Despite SSL’s extreme importance, most people who are not quite familiar with SSL certificates are hesitant about going through the seemingly intricate process. The conventional SSL installation process can be excruciating to some, as it typically involves coming back and forth across second- and third-parties in the course of company verification and nearly all other moving aspects. With AutoInstall SSL™, a website owner gains the capability to secure their website in a matter of minutes and with just a few clicks of the mouse. The benefits of AutoInstall SSL™ don’t end there. It is especially advantageous to web hosting providers as they are now in a better position to resell SSL certificates. There are numerous quantifiable benefits to that business once AutoInstall SSL™ is up and running: • Significant reduction in associated SSL labor costs • More time to focus on the core of the business • Considerable decrease in support tickets, since customers can actually handle the purchase and installation without having to call for support or open a ticket • Attract and stir up interest among prospective SSL customers • Turn SSL into a profit center that allows you to make money while sleeping!

The SSL Store™ Has Your Back – 24/7-Support from SSL Experts

And here’s the best part: The SSL Store™ provides around-theclock Platinum-level support through a team of SSL experts via Email, Phone, and/or Live Chat. A dedicated account manager is immediately assigned to all resellers to help them with whatever they need, whenever they need it. More Than Enough Reasons to Love The SSL Store™ With HTTPS gaining weight in Google’s most recent algorithm update, using robust security certificates has become serious business if you want websites to make it to the top of Google’s search rankings. SSL is now part of any SEO strategy and boosts Google rankings that can eventually turn into huge website visibility and more traffic. The SSL Store™ can be your staunchest ally as it is the world’s leading SSL service that is exclusively and totally dedicated to SSL needs and an upperstratum, Platinum Level Partner of all foremost CAs. Moreover, the ground-breaking AutoInstall SSL™ technology is a huge business opportunity that largely remains untapped. Don’t let this opportunity go to waste; take advantage of AutoInstall SSL™; watch your profits soar. Sign up for a free reseller account with The SSL Store™ today! www.theSSLstore.com

10101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010 0

1

6 P i n g Zi ne. c om


10


TECHIE 0

1

8 P i n g Zi ne. c om


A Picture Is Worth A Thousand Characters

A

By Brandie Richardson

s the number of security breaches on personal computers and mobile devices continues to increase, security remains the number one concern for online users. Maybe you know what we’re talking about? Have you got an unpleasant email from your web hosting provider stating that your account has been compromised? Obviously, passwords are put in place to keep people out of our data. The amount of havoc this can cause on your personal life or business is tremendous. Earlier this month Wisconsin based security firm Hold Security discovered the largest data breach to date, revealing that a group of Russian hackers successfully managed to steal over 4.5 billion records, including more than 500 million email addresses and 1.2 billion user names and passwords. Other notable database breaches include last year’s Target hack that affected over 110 million customers, the group of Chinese hackers that compromised U.S. government computers in order to gain information on federal employees in March, and the recent announcement of a data breach on the popular encryption service, Tor. What this tells us is that no matter how difficult you make your password, there is a good chance it can be cracked. Since there are more and more “cyber criminals” lurking around the corner, there needs to be a more effective way to safeguard our personal data. With these growing concerns Bright Plaza is aiming to increase security measures with its new secure password service, Kaje Picture Passwords. Kaje, pronounced as “cagey” meaning “shrewd of crafty”, allows clients and website owners the ability to replace traditional text passwords or PINs with one of their own pictures, making it easier for users to remember their passwords due to an “emotional connection.” This security service is a refreshing change from traditional user names and passwords because clients can use their own personal pictures ranging from photos of pets to loved ones to prized possessions. Don’t worry if you’re feeling a little lost on how this works. Let’s take a hypothetical situation and show you exactly how Kaje would work. So, we all remember that time that you took your niece out to get her first ice cream cone. Obviously, we brought our camera to take a picture of her eating it for the first time.

The picture would look something like her holding an ice cream cone up to her mouth and smiling. Our picture that we would upload for our Kaje image protection would be our niece smiling with the cone with dots that go all across the image. Then we could have three motions were we touched the picture where she didn’t get ice cream all over her face. So we could touch both ears and maybe one place above the right eye. This would then be our password. Pretty cool, huh? “Picture passwords are superior in every way to typed passwords. Anytime you ask your users to type in a password, consider giving them the option to mouse-in or touch-in their password instead. With only THREE actions, you get the strength of EIGHT typed alphanumeric-symbol characters,” says the password service’s website. “When users change their pictures, their picture passwords are easier to remember than their typed passwords. This is a fact of human recognition memory.” In order to use this two-fold security feature, users must first select a unique image, followed by three specific actions or patterns. Using the click of a mouse or the motion of a finger can enter these patterns. When the picture and pattern combination is successfully used, the service redirects clients to the website with a “yes” message that completes the login process. For instance, let’s say you finally get tired of someone cracking your password on your Wordpress site; Kaje would be an excellent option for you. Gone are the days of someone hacking into your site and doing God knows what with it. There is no program that can crack the three actions you touched on the screen. With these endless combinations, security measures greatly reduce the chance of user’s information being compromised. “Kaje Picture Passwords is a patented “Software as a Service” that provides an option to text passwords with minimal effort or impact on a website’s design, systems, or maintenance,” says Kaje Picture Password VP of Strategic Business Development, Gary Bickford. “As with the Picture Password option on Windows 8+ login, they have been shown to be safer, easier to remember, and more secure than other methods. But Kaje Picture Passwords are available to web sites, and works on all platforms from desktops to phones, all operating systems, and all browsers.” PingZine.com

0

1

9


Registration for this service is simple and takes less than one minute. Website owners must fill out a form found on Kaje’s website. Click the “Get Kaje on your site” button and receive 10,000 free logins for the Picture Password. A simple HTTPS RESTful API or a CMS plugin such as WordPress or Drupal is used in the installation process. Once an email confirmation is sent, users can begin using their Picture Password on their websites to ensure safe and secure access. One of the many benefits to Picture Password is that passwords are not kept on the website, so if the site is compromised, attackers will not be able to access any personal information, unless the hackers have the ability to read your mind, which is unlikely. Bickford notes that using a “three-action picture password” is stronger than an 8-character text password using a full ASCII character set and 17 times stronger than a 4 Digit Pin. 8-character text passwords only contain roughly 30 bits of entropy, which means this type of password can be easily cracked in less than 16 minutes on a desktop computer, adds Bickford. Simply put alien technology or mind control is the only way to login as you. Bickford explains some of the risks associated with traditional passwords, “Experts in online security have been aware since at least the middle 1990s that text passwords were a failing methodology. Computers have become faster and algorithms have improved, so that today a desktop computer may be able to use brute force cracking methods to expose any text password that most humans can remember in too short a time,” adding that text passwords are easy to crack and hard to remember, which results in users picking easy combinations such as “1234.” Traditional security policies require users to change passwords regularly or use a minimum character count of 12 or 16, which can be difficult to remember. Most clients use the same passwords for every one of their accounts, meaning that if one site is compromised potentially every account could be as well. Most policies usually require special characters such as upper or lower case letters, numeric, or symbols to be in the password, making it almost unmanageable to have a unique password per account. These examples are popular throughout the Internet. There are better models such as TLS, TTLS, 8021X, and PEAP that range from certificates to user names and passwords with sophisticated encryption. These are standards adopted by security organizations that are empowered to secure communications. According to SplashData’s annual “Worst Passwords” list, 123456, 12345678, password, qwerty, and abc123 are the most commonly used passwords that can easily be cracked. This shouldn’t go without mentioning, but also using your name or the word “password” probably isn’t the smartest idea either. Obviously, changing our ways of logging into our sites has been a long time coming. With Kaje you really don’t have any reason to ever need to remember a password again. Kaje Picture Password is available on all browsers supporting Javascript, including smartphones and tablets, as well as on all operating systems such as Windows, iOS, Chrome, and Linux. More information about Kaje Picture Password can be found at www. picturepassword.info. Users and clients wanting to test out this service can do so by clicking the “Try Me” button on Kaje’s website. Here users can see some administration actions and use one of the plugins to set up the service for your site. Bright Plaza offers 10,000 free logins per SSL site. Bright Plaza, established in 1982, has been a leader in Internet security and privacy since the early 1990s, with numerous patents and “self-encrypting” hard drives related to Internet security. The Kaje Picture Password service has been under development for the past five years following, with its first public beta and pre-release testing released in early 2013. General availability for Picture Password first began in the first quarter of 2014.

0

2

0 P i n g Zi ne. c om

Computers have become faster and algorithms have improved, so that today a desktop computer may be able to use brute force cracking methods to expose any text password that most humans can remember in too short a time.



GAMER

2015 Mortal Kombat will be receiving its tenth installment in the fighting game series from creative director Ed Boon and developer NetherRealm Studios. In the new installment, Boon promises to bring “unparalleled, cinematic presentation” through the power of the next-gen consoles. “’Mortal Kombat’ has always been about over-the-top, visceral fighting and with Mortal Kombat X we wanted to utilize the power of new-gen consoles to give players our most intense game yet,” said Boon. “The team has worked hard to make sure ‘Mortal Kombat X’ delivers everything fans expect along with new characters, new game modes and an all-new graphics engine.” During Sony’s E3 presentation on June 9th, detailed footage of the game was shown, revealing two new playable characters, an insect-infested lady, D’Vorah, and a fighting duo, Torr and Ferra, a brute with a small lady warrior attached to his back. Also shown during the presentation was a fight between legendary characters, Sub-Zero and Scorpion in a snow covered forest. “For the first time ever, Mortal Kombat X gives players the ability to choose from multiple variations of each character impacting both strategy and fighting style. And with a new fully-connected gameplay experience, players are launched into a persistent online contest where every fight matters in a global battle for supremacy,” reads the game’s official website. According to TheKoalition, NetherRealm Studios has focused on incorporating numerous combat features from all their previous games, including Environmental attacks, X-Rays, and weapons in arena-based attacks. Mortal Kombat X will hit shelves in sometime in 2015 for the Xbox One, Xbox 360, PS4, PS3, and Windows PC. For those wanting to purchase the game, it can be pre-order at the BestBuy, Walmart, Target, Newegg, Amazon, and GameStop for $59.99. More detailed information will be released in the coming months.

0

2

2 P i n g Zi ne. c om


PingZine.com

0

2

3



By Dave Charles

Building an app for your business What exactly do you need?

T

he world has become an extremely mobile place for businesses. This means new techniques have to be employed to ensure consumers can be reached anywhere and at any time. With billions of people across the world having smartphones, the obvious place for companies to reach their customers is via their cell phones. Whilst firms could once rely on potential customers searching them out on the Internet, it is now crucial to heighten the consumer’s experience, not only by optimizing websites for cell phone use, but by creating custom and downloadable apps that provide a variety of tools right at their fingertips. Though this might seem a complex area to enter, given the right tools and experts, companies can develop apps that benefit both the customer and the business. Many senior managers might wonder why they need a business app. After all, they already have an online portal, a mobile optimized website, a call center and are actively engaged with customers on social networks such as Facebook and Twitter. So, why is a business app needed? There are many reasons why having an app can be advantageous. Largely, it is about making it easy for customers to engage with businesses, utilize services and get the jobs they need done completed quickly and efficiently. For example, mobile banking can be difficult if customers have to navigate to a website on their small cell phone screen, input login codes and passwords and then proceed through complex drop-down menus and buttons just to get one simple task done. Conversely, life is made a lot easier if it is possible to simply log straight into a business app where care has been taken to streamline services and make process chains as short and easy to use as possible.

Mobile apps also have the advantage that businesses can see how many downloads they are getting and whether specific apps are being well received. There is also the option for targeted marketing to loyal consumers. Though advertising can be placed on a website, it may not be as effective as if it’s put within a business app so that current consumers already using such services are alerted to upgrades and other features available. For many executives, the thought of going into the app development business can be extremely daunting. Professional programming expertise is required to develop the best apps, and there are many independent development houses, such as Worry Free Labs, who are on hand to help. By working with these experts, businesses ensure their investment is going to be handled as efficiently as possible and that at the end of the process, they will have an app to be proud of, rather than a service that is clunky to use and not at all userfriendly. Whilst an independent development house will build an app, the individual company owner or manager has to sit down and think thoroughly about what they want to achieve. The planning phase is crucial if an app is to be a success. At the outset, just four or five features should be included in order to achieve a rapid implementation process and allow users to become used to working with an app before extra services are added. One of the most important aspects is that an app must be kept concise and functional; definitions must be kept actionable too. For example, executives should develop specific features such as consumers being able to schedule service appointments via the app, rather than open-ended goals. One of the best ways to plan an app is write a list of services to be supplied to customers and then prioritize them. The four at the top of the list should be the ones initially included in the app. They should not only make a customer’s life easier, but also provide benefits for the company. For example, scheduling appointments on the app not only makes it simple for its customers, it also reduces workload for company administrators. Building a business app does not have to be difficult, and as long as the most appropriate team is brought on board to actually build the software the entire process can actually be quite enjoyable. By carefully selecting four or five features to provide customers with, an app can be honed into a concise and usable device that offers advantages for all. When designed and implemented correctly, an app can enhance business branding and enable customers to be reached within only a few clicks of a button. For companies that wish to appear innovative and on-trend, having a business app is essential.

PingZine.com

0

2

5


0

2

6 P i n g Zi ne. c om



0

2

8 P i n g Zi ne. c om


ACCESS

D-LINK WI-FI SMART PLUG THE GOOD D-Link’s $50 Wi-Fi Smart Plug allows users to remotely control appliances from their smartphones and tablets, as well as setting on and off schedules and monitoring energy usage. Another plus about this plug in that its thermal sensors will automatically turn off overheating appliances. THE BAD D-Link promises easy setup with its Smart Plug, though it was much more complex than anticipated. It is not compatible with IFTTT like some competitors. Also, it takes about 20 seconds to power on an appliance with the app, not very sensible for a device that promises a fast, on demand switch. THE VERDICT For a few dollars more, you can go with another device that has the same features but fewer issues. SPECS Weight: 4.41 ounces Dimesions: 3.54 x 2.40 x 1.40 inches Input: 100 to 125 V AC Capability: iOS 6/later, Android 4.0/later Warranty: 1-year indoor use only Price: $49.99 Availability: Amazon and Newegg

PingZine.com

0

2

9


ACCESS

ZTE OPEN C PHONE THE GOOD The $99.99 ZTE Open C is affordable and lightweight. Users can pick from three different colors, blue, black and orange. THE BAD The Open C has a number of issues, including poor image quality and slow performance. Additionally, the camera does not have a flash or autofocus. THE VERDICT If you’re looking for an ultra-cheap phone then this is for you, however, it is probably better to save your money for a better quality device. SPECS Display: 4-inch Processor: 1.2 GHz Resolution: 480 x 800 pixels Operating System: Firefox OS Colors: Black, Orange, Blue Availability: eBay exclusive Price: $99.99

0

3

0 P i n g Zi ne. c om


+

+

You asked. We listened.

Superior performance • Outstanding reliability • Beautiful integration • Great value “cPanel Hosting rocks! Just bought the new Ultimate hosting package and it’s amazing. It’s faster, the setup is easier, it has more functionality; I can’t wait to make some websites!” – Jenna

We’re committed to meeting – and exceeding – the expectations of web professionals like you. Get started today: GoDaddy.com/Hosting


Profit from SSL with the worldwide leader. Over $10 million generated for our partners, join forces and grab your share! Sign-up today. Mention Ping! Zine to claim your exclusive offer.

Ask about...

Sign-up! www.theSSLstore.com/ping


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.