12.06.2015 Views

bits & bytes - Ping! Zine Web Tech Magazine

bits & bytes - Ping! Zine Web Tech Magazine

bits & bytes - Ping! Zine Web Tech Magazine

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


www.pingzine.com 3


BETWEEN THE COVERS<br />

22<br />

FEATURED ARTICLE<br />

SERVER COMPROMISED<br />

What to do in the event of a security breach,<br />

and how to prevent them in the first place.<br />

Major security breaches can be disastrous to a web hosting firm. Besides<br />

the obvious “black eye” that a security issue creates, you also have to<br />

consider the resulting downtime, potential exposure of customer data,<br />

customer service time (explaining the situation and helping clients repair<br />

any damage), and potential client loss that result for almost any major<br />

security breach. The total cost of these incidents is difficult to accurately<br />

calculate, and often takes weeks to fully realize.<br />

8<br />

BITS & BYTES<br />

COMODO APPOINT CARLOS REGO AS<br />

MANAGING DIRECTOR OF PSOFT<br />

8<br />

10<br />

11<br />

12<br />

13<br />

14<br />

14<br />

16<br />

16<br />

18<br />

19<br />

HOUSE COMMITTEE RELEASES PLAN FOR<br />

TELECOM REFORM<br />

BILLS.COM DOMAIN NAME AND TRADEMARKS<br />

SOLD FOR $964,500<br />

MODERNBILL INTRODUCES A TCADMIN MODULE<br />

FOR AUTOMATED GAMESERVER ORDERING<br />

DOMAIN NAME SOLD FOR $1 MILLION IN CASH<br />

COMODO APPOINT JUDY SHAPIRO<br />

TO HEAD GLOBAL MARKETING OPERATIONS<br />

IPOWER RECEIVES TOP WEB HOSTING AWARD<br />

FROM TOPTENREVIEWSTM<br />

JACUZZI, INC. TAKES A BATH IN AUSTRALIA<br />

AUDRP RULING<br />

INTERLAND ANNOUNCES SALE OF DEDICATED<br />

SERVER ASSETS TO PEER 1 NETWORK<br />

SUPERSERVERS.NET OPENS NEW DATA CENTER<br />

MICROSOFT ENHANCES HOSTED MESSAGING AND<br />

COLLABORATION SOLUTION WITH NEW MOBILITY<br />

FEATURES AND HOSTING TOOLS<br />

WEB HOSTING COMPANIES UNITE BEHIND<br />

HURRICANE RELIEF EFFORTS<br />

4 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


Volume 3 Issue 5<br />

P!<br />

P!<br />

28<br />

30<br />

36<br />

P!<br />

38<br />

42<br />

P!<br />

46<br />

48<br />

P!<br />

50<br />

52<br />

54<br />

56<br />

P!<br />

60<br />

P!<br />

66<br />

HOSTING GURUS<br />

VALUE ADDED HOSTING FOR RESELLERS<br />

HISTORY OF MICROSOFT HOSTED EXCHANGE<br />

A CRITICAL FACTOR: WEBSITE TITLE TAGS<br />

SERVER SECURITY<br />

MAKING THE RIGHT CHOICE OF IDENTITY AND<br />

TRUST ASSURANCE (ITA)<br />

THE SPAM ECONOMY<br />

SALES & MARKETING<br />

SIX STEPS TO ENSURING SITE<br />

VISITOR RETURN<br />

EMAIL MARKETING: TIPS FOR IMPROVING<br />

RESPONSE AND RETURN ON INVESTMENT<br />

BUSINESS ISSUES<br />

HOW TO DRIVE CUSTOMERS<br />

TO YOUR WEBSITE<br />

TRANSACTION FEES:<br />

DEBIT CARDS VS. CREDIT CARDS<br />

WINNING THE CLICK FRAUD BATTLE<br />

JUST REPLACE THE PILOT<br />

PRODUCT REVIEW<br />

PAY-PER-CLICK SEARCH ENGINE<br />

MARKETING HANDBOOK<br />

JUST FOR FUN<br />

HOST LAUGHS<br />

28<br />

38<br />

52<br />

56<br />

www.pingzine.com 5


THANKS TO OUR SPONSORS<br />

Blue Pay............................................................................. 2-3<br />

Bocacom ............................................................................... 7<br />

1 & 1 Internet ............................................................................ 9<br />

Touch Support..................................................................... 11<br />

Press Advance ...................................................................... 13<br />

<strong>Web</strong>hosting Prospector ...................................................... 13<br />

IRun ....................................................................................... 15<br />

Bizland .................................................................................. 17<br />

Matrix Reseller ..................................................................... 19<br />

EV1 Servers ................................................................ 20-21, 41<br />

Control Scan ......................................................................... 25<br />

Host Gator ...........................................................................27<br />

Design Var .......................................................................... 29<br />

Ad Watcher ........................................................................ 33<br />

Rackmount Micro ................................................................. 35<br />

Extreme Internet Solutions ................................................... 39<br />

Demo Demo.......................................................................... 43<br />

Searchfeed .......................................................................... 47<br />

Rackmounts Etc. .................................................................. 49<br />

<strong>Tech</strong>pad Agency.................................................................. 51<br />

Host Hideout ...................................................................... 55<br />

SWsoft ............................................................................. 57-59<br />

Psoft ...................................................................................... 61<br />

iPower........................................................................... 65<br />

Modern Bill........................................................................... 67<br />

Site 5 ..................................................................................... 68<br />

Our Team Contributing Writers<br />

Publisher Keith A. Duncan<br />

Publications Director Kunal Jhunjhunwala<br />

Senior Editor Reece Sellin<br />

Editor/Senior Graphic Designer Derek Morris<br />

Sales Executive Jennifer L. Bayly<br />

Accounting Sheryl Duncan<br />

Daniel J. Briere<br />

Conrad Agramont<br />

Derek Vaughan<br />

Steve Roylance<br />

Eran Aloni<br />

Searchfeed.com<br />

Dan Lok<br />

Brad Stone<br />

Brad Bialas<br />

Ron Dunlap<br />

Boris Mordkovich<br />

Jeff Huckaby<br />

Advisory Board<br />

Isabel Wang, Former Publisher <strong>Web</strong> Hosting <strong>Magazine</strong><br />

Deb Discenza, Former Asso. Publisher Hosting<strong>Tech</strong><br />

Ben Fisher, Co-Owner <strong>Tech</strong>Pad Agency<br />

Aaron Shapiro, Owner HostHideout<br />

Dave Waldack, VP Thruport <strong>Tech</strong>nologies<br />

Contact Information<br />

<strong>Ping</strong><strong>Zine</strong> LLC<br />

1814 S. Range Ave, Suite D<br />

Denham Springs, LA 70726<br />

(225) 791-6140<br />

<strong>Web</strong>site www.pingzine.com<br />

General Info info@pingzine.com<br />

Sales sales@pingzine.com<br />

Editor editor@pingzine.com<br />

<strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong> c December 2005, Published and copyrighted<br />

c 2005 by <strong>Ping</strong>! <strong>Zine</strong>, LLC, P.O. Box 516, Denham Springs, LA 70726. All rights<br />

reserved. Permission to reproduce all or parts of this magazine must be secured<br />

in writing from the publisher. For more information email info@pingzine.com.<br />

Reproduction of any kind is strictly prohibited. By reproducing this magazine<br />

you be held responsible for your actions and have to take it up with “Big D”,<br />

our in-house leg breaker instead of our attorney in whom we could not afford.<br />

Complimentary subscriptions are at the discretion of the publisher and may<br />

be cancelled or modified at any time. Postmaster – please send change of<br />

address to P.O. Box 516, Denham Springs, LA 70726. Unsolicited submissions<br />

are accepted, however we only publish those that are accompanied by a cash<br />

donation (in the form of a money order or cashier’s check) to the Poor <strong>Ping</strong>! <strong>Zine</strong><br />

Employee Fund. “Please Help Us!”<br />

We assume no responsibility for damaged or lost submissions. We assume no<br />

liability for the content of this magazine and all points and ideas are strictly that<br />

of the writers involved and not that of the publisher, publishing company, printing<br />

company or anyone involved with the same. Also, we assume no liability for any<br />

of our own actions or actions of the readers. If brought to court on any of these<br />

issues, we will pack up, skip town and head toward Mexico, never to be heard<br />

from again. Printed in the U.S. on paper made from recycled toilet paper and<br />

dyed with the blood of Louisiana roadkill.<br />

6 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


www.pingzine.com 7


BITS & BYTES<br />

Comodo Appoints Carlos Rego<br />

as Managing Director of PSOFT<br />

Comodo Inc, a global leader in Identity and Trust<br />

Assurance Management solutions today announced the<br />

appointment of Carlos Rego as Managing Director of<br />

PSOFT.<br />

Mr. Rego has worked for PSOFT since 2002 as<br />

Director of Business Development and will now assume<br />

full control of global sales, marketing and business<br />

development operations. Prior to joining PSOFT, Carlos<br />

served in a wide range of senior management positions<br />

including president of datacenter and hosting company<br />

Datacolo, and CEO/Owner of WizardsHosting.<br />

“From day one, Carlos took an energetic and<br />

proactive approach to the establishment and nurturing<br />

of relationships with key business partners,” commented<br />

Igor Seletskiy, <strong>Tech</strong>nical Director Comodo Inc. “His<br />

extensive knowledge of the web hosting and data center<br />

industry has been invaluable both to the continuing<br />

growth of PSOFT and to the development of our range<br />

of hosting infrastructure solutions. We are delighted that<br />

Carlos will use this track record to help shape PSOFT<br />

and H-Sphere into the dominant force in the web hosting<br />

industry.”<br />

PSOFT, whose assets include offices in Brooklyn, USA<br />

and a huge development center in Ukraine, were acquired<br />

by Comodo in 2004.<br />

Further information can be found at www.psoft.net and<br />

www.comodo.com.<br />

House Committee Releases<br />

Plan for Telecom Reform<br />

The New Draft Improved, But Still Flawed says<br />

Competitive Enterprise Institute <strong>Tech</strong>nology Counsel<br />

The U.S. House Committee on Energy and Commerce<br />

this week released a “Staff Discussion Draft” of its plan for<br />

reforming regulation of the telecommunications industry.<br />

The Staff Discussion Draft is a noticeable improvement<br />

over the draft previously circulated by the Committee. And<br />

while it updates current law to reflect new technologies and<br />

ways of communicating, for IP-based communications it<br />

actually creates new regulation. Consumers and industry alike<br />

would be best served by legislation that is deregulatory in all<br />

aspects.<br />

The draft bill includes troubling provisions that prevent<br />

video providers from targeting early adopter consumers<br />

(“redlining”), even though this business practice is common<br />

in most other technology industries. It still requires the filing<br />

of registration statements with the FCC for broadband, VoIP<br />

and video providers – regardless of size, messaging platform<br />

or need for price regulation – that raises potential civil liberty<br />

implications. And the draft bill does nothing to reduce the<br />

number of telecommunications lawyers in Washington, D.C.,<br />

due to broad language on interconnection, consumer protection,<br />

and universal service.<br />

Broadly speaking, new telecom legislation should be more<br />

than just an update of existing law to reflect new technologies.<br />

It’s time to go back to first principles and not just revisit the<br />

1996 Telecom Act, but analyze the basis for communications<br />

regulation itself. Market players – both consumers and<br />

telecom companies – deserve more than a mere “update.”<br />

For maximum benefit, the structure and powers exercised by<br />

the FCC need to be radically re-examined and, in most cases,<br />

phased out altogether.<br />

.......................<br />

8 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


1&1 DOMAINS – LOW<br />

PRICES, NO HIDDEN COSTS<br />

.info<br />

.com<br />

.net<br />

.org<br />

THE ORIGINAL HOME OF<br />

LOW-COST DOMAINS!<br />

While other hosts may change their<br />

pricing in response to the industry,<br />

1&1 will always offer feature-packed<br />

domains at consistently low prices.<br />

NO HIDDEN COSTS,<br />

NO GIMMICKS!<br />

1&1’s no-nonsense pricing comes<br />

without conditions. Register unlimited<br />

domains at the same low cost – and<br />

with nothing additional to buy!<br />

1&1 – LEADER IN DOMAIN PRICES<br />

1&1 Go Daddy Yahoo!<br />

.com|.net|.org|.info $5.99 $8.95|$9.95 $9.95<br />

(.info)<br />

ICANN Fee Included $0.25 Included<br />

E-mail Account FREE NO NO<br />

1 GB<br />

Mailbox Size<br />

Mailbox<br />

Included<br />

Mailbox<br />

Included<br />

Total Annual Cost $5.99 $9.20 $9.95<br />

© 2005 1&1 Internet Inc. All rights reserved. Prices based on a comparison of regular prices effective 8/2/05, product and program specifications,<br />

availability, and pricing subject to change without notice. Visit 1and1.com for details. Go Daddy is a registered trademark of Go Daddy Software,<br />

Inc. and Yahoo! is a registered trademark of Yahoo! Inc.<br />

OVER 5 MILLION DOMAINS AND GROWING!<br />

1&1 offers feature-packed domains at rock bottom prices, so it's no wonder more than<br />

5 million domains have been registered with us worldwide. Choose .com .net .org .info<br />

.us .name domains for just $5.99/year | .biz or .ws for $8.99/year | .cc for $19.99/year |<br />

.tv for $29.99/year. Or, sign up for any 1&1 shared hosting plan and get up to 5 .com<br />

.net or .org domains FREE!<br />

1&1 Domains<br />

for only<br />

$5.99<br />

per year<br />

FREE WITH EVERY DOMAIN ACCOUNT:<br />

Private Domain Registration<br />

1&1 lets you keep your contact information<br />

confidential when you register your domain,<br />

so your personal data<br />

remains hidden from<br />

spammers.<br />

Starter <strong>Web</strong> Page<br />

Choose your template<br />

and create a mini<br />

website in minutes<br />

for your online business<br />

card, coming soon page,<br />

or parking page.<br />

Search Engine Tools<br />

Use Hello! Engines and<br />

UP TO 5<br />

FREE<br />

DOMAINS<br />

INCLUDED<br />

WITH SHARED<br />

HOSTING<br />

PACKAGES!<br />

Ranking Toolbox software to get your site listed<br />

on search engines like Yahoo! and Google.<br />

E-mail account with 1 GB space<br />

Your included e-mail account lets you send<br />

and receive professional-looking e-mail using<br />

your domain name as the address.<br />

DNS Management<br />

200 e-mail aliases<br />

Domain forwarding<br />

Domain locking<br />

Domain masking<br />

24/7 Support<br />

1AND1.COM<br />

1.877.GO1AND1<br />

www.pingzine.com 9


BITS & BYTES<br />

Bills.com Domain Name and<br />

Trademarks Sold for $964,500<br />

by Derek Vaughan, The Hosting News<br />

www.thehostingnews.com<br />

The domain name and trademark of bills.com has been sold<br />

for $964,500 and other considerations. Payment Data Systems,<br />

Inc., an integrated electronic payments solutions provider,<br />

today announced that it has signed a Letter of Intent to sell the<br />

domain to Alivio Holdings, LLC (Alivio), parent of Freedom<br />

Financial Network, LLC (FFN), Freedom Debt Relief, LLC<br />

(FDR) and Freedom Tax Relief, LLC (FTR) of San Mateo,<br />

California.<br />

The intended asset sale has a number of key and important<br />

strategic elements to it:<br />

-- PDS will sell the<br />

assets (domain and<br />

trademarks) of bills.<br />

com and related services<br />

to Alivio for $964,500<br />

dollars.<br />

• PDS will retain all assets of bills.com exclusive of the bills.<br />

com domain and bills.com trademark and gain new revenue.<br />

• PDS and FFN will agree that PDS build and run a private<br />

labeled bill payment site for FFN.<br />

• FFN will pay to PDS, a recurring fee for each subscriber<br />

they acquire into the new bills.com program, and guarantee<br />

$72,000 in minimum subscriber fees to PDS.<br />

• FTR, a wholly owned affiliate of Alivio Holdings, LLC,<br />

will engage PDS for additional services not directly related<br />

to the bills.com transaction. This includes ACH processing,<br />

Returned Check processing, and credit card processing.<br />

• FFN will commit a minimum of $180,000 to be applied<br />

to marketing bill payment services for the new bills.com<br />

website.<br />

• FFN is projecting that the FFN bills.com website, powered<br />

by billx.com, could have over 5,000 subscribers within the<br />

next twelve months.<br />

This projected growth will generate over $25,000 a month in<br />

additional subscriber revenue for PDS.<br />

Additional and important aspects of the transaction include:<br />

• PDS will rename their subsidiary Bills.com, Inc. to Billx.<br />

com, Inc. or similar name.<br />

• All existing customers of the current bills.com service<br />

will be ported to the new billx.com domain without service<br />

interruption.<br />

• PDS, through billx.com, will not lose any existing revenue<br />

as a result of this transaction. In fact, servicing the new FFN<br />

bills.com website will bring in new revenue.<br />

The anticipated effects of the agreement and the associated<br />

follow on transactions are:<br />

• The transaction and related agreements should be accretive<br />

to earnings for PDS over the term of the agreements.<br />

• Positions PDS for positive EBITDA (earnings before<br />

interest, taxes, depreciation and amortization) and net income<br />

in the fourth quarter of 2005 and eliminates our debt.<br />

• Positions billx.com to accomplish a number of existing and<br />

new initiatives include:<br />

• Expands and enhances our ability to acquire and deliver<br />

private-labeled sites for banks, debit card issuers, and credit<br />

unions quickly and efficiently. A differentiating and valuable<br />

component of our solution allows these private-labeled sites<br />

to be operated as payment consolidators for all bills not just<br />

their own bills.<br />

• Enhances PDS’ ability to expand delivery of bill payment,<br />

account transfer, and debit-card loading technologies to new<br />

clients, particularly those in the debt management industry<br />

with “customer-facing” needs.<br />

“We are very pleased with this event,’’ stated Michael Long,<br />

Chairman and CEO of PDS. ‘’Clearly the agreements when<br />

fully executed validate the viability of our strategy of private<br />

labeling and create a cash position that significantly changes<br />

our financial profile and opens up new opportunities for PDS.<br />

We expect these agreements to be completed within the current<br />

week.’’<br />

Andrew Housser, Co-CEO of Alivio and Freedom Financial<br />

Network, added, ‘’We are very excited about the acquisition of<br />

bills.com and see this as a key step in enhancing our brand and<br />

profile in the consumer debt management industry. In addition<br />

we look forward to entering the fast growing bill payment space<br />

by partnering with one of the leading players in the industry.’’<br />

To learn more, please visit: www.paymentdata.com or www.<br />

freedomfinancialnetwork.com.<br />

10 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


ModernBill introduces a TCAdmin<br />

Module for automated gameserver ordering<br />

ModernGigabyte, LLC, a leading developer of automated and<br />

integrated billing solutions for hosting providers, and Balance<br />

Servers, producer of the TCAdmin game control panel, today<br />

announced support for TCAdmin in the latest build of ModernBill<br />

4.3.2. The integration between ModernBill and TCAdmin<br />

represents a complete solution for Gaming Service Providers<br />

(GSPs), providing them a scalable and automated system for<br />

delivering their products.<br />

TCAdmin is the first GSP panel to have a built-in integration<br />

module within ModernBill. This will mean that GSPs will be able<br />

to completely automate the ordering, payment, fraud verification<br />

and service provisioning for game servers. This automation<br />

will significantly lower overhead costs of operating a GSP and<br />

improve the service delivery to game players everywhere.<br />

Balance Servers found that the two products are very similar<br />

in their design. Both offer the flexibility to do things the GSPs<br />

own way, instead of forcing a method on their companies. And<br />

both companies seem to have found out that by listening to their<br />

clients, and incorporating new features that their clients want,<br />

the software becomes even more flexible and appealing to new<br />

clients as well.<br />

“With the release of the TCAdmin Module for ModernBill,<br />

we as a company can honestly say that ModernGigabyte and its<br />

staff are truly a great group of people to work with,” said Balance<br />

Servers Co-owner, Kevin O’Donnell. “And we would fully<br />

encourage other companies to work with them as well.”<br />

ModernBill’s order process has the ability to accept many<br />

additional variables that create package add-ons. When used with<br />

the TCAdmin module, the order process supports over 20 add-ons<br />

that let the GSP collect all of the required information from the<br />

customers and fully automate the order based on those variables.<br />

ModernBill supports every administrative variable found in<br />

TCAdmin. The system can automatically create, delete, suspend<br />

and unsuspend services based on payment or nonpayment.<br />

www.pingzine.com 11


BITS & BYTES<br />

Domain Name Sold<br />

for $1 Million in Cash<br />

by Derek Vaughan, The Hosting News<br />

www.thehostingnews.com<br />

Domain name broker, Afternic.com has announced that it<br />

managed the $1 million sale of Fish.com between an undisclosed<br />

private party and www.dog.com, a discount dog supplies<br />

company and the new owner of the high-value domain name.<br />

The all-cash sale sets a new record for e-commerce transactions<br />

this year.<br />

Only one other domain name sale, a transaction related to<br />

off-shore gaming, had a higher nominal price tag. That deal,<br />

however, included a cash payment of well under $1 million plus<br />

stock of still-indeterminate value.<br />

Afternic President Roger Collins commented on the<br />

transaction, “The Fish.com transaction underscores the value of<br />

owning a mission-critical domain name. There is no question<br />

that premium names help businesses establish the impression<br />

of brand leadership and allow them to become more effective<br />

Internet marketers.’’<br />

Mr. Collins said that not only does a domain name like Fish.<br />

com generate excellent search engine results, but it is an ideal<br />

domain to drive “type-in” traffic to the new owner’s business.<br />

Type-in traffic is generated by consumers who simply type a<br />

generic URL into a browser and land on a site.<br />

Facilitating the record-breaking deal, Afternic guided the<br />

acquisition by delivering the offer, serving as agent during<br />

escrow and acting as a conduit in negotiations that preserved<br />

both parties’ anonymity while ensuring all expectations were<br />

met.<br />

‘’Due to the explosive growth of business and consumer<br />

usage of the web, good domains are becoming more and more<br />

valuable, and the best and most memorable names have already<br />

been registered. This is where an aftermarket partner such as<br />

Afternic can be instrumental in acquiring that key domain<br />

name,’’ Collins said.<br />

Dog.com CEO Dr. Alex Tabibi agreed that working with<br />

Afternic ensured security and confidentiality for a transaction<br />

that otherwise could have been much more complicated and<br />

might have required extensive legal fees.<br />

Dr. Tabibi commented, ‘’Afternic’s involvement created an<br />

atmosphere of trust and as much of a turnkey experience as<br />

one could expect with a transaction of this size. Even parties<br />

conducting much smaller deals than ours would benefit from<br />

their services, which included a secure escrow account.’’<br />

Mr. Collins noted that Afternic.com has posted triple-digit<br />

annual growth since he acquired it from Register.com in 2002.<br />

He attributed the site’s success to its creation of an extensive<br />

exchange network in which members gain greater exposure<br />

for their listings and partner domain name registrars earn<br />

commissions from Afternic. Afternic provides a “one-stop<br />

shop” where consumers can purchase secondary domains in a<br />

secure, anonymous environment. Some of the industry’s leading<br />

registrars, including Register.com, eNom.com and Eurodns.<br />

com, are Afternic partners.<br />

Dr. Tabibi, the owner of other premium pet-related domains<br />

such as Horse.com, Bird.com and Ferret.com, plans to create a<br />

user-friendly super-site that caters to an array of fish fanciers’<br />

needs. The site will be designed as a source for supplies,<br />

information, forums and news. Fish.com plans to offer customer<br />

discounts of up to 70 percent on supplies such as aquariums,<br />

food and fish tank accessories by eliminating retail middlemen.<br />

The site, which is scheduled to go live in the second quarter<br />

of 2006, will also offer multi-tiered pricing for both industry<br />

professionals and hobbyists.<br />

With the acquisition of Fish.com, Tabibi believes he has<br />

created a unique commodity on the Internet, where several key<br />

domain names in one category are leveraged to foster crosstraffic.<br />

‘’The combined synergy of the other names means we<br />

will be very strong across the pet-supply category,’’ he added.<br />

‘’No one else has done this online to this extent.’’<br />

Since the demise of Pets.com, Tabibi noted, the pet-supply<br />

space has been largely abandoned with no significant “e-tailer”<br />

focusing on the channel. He plans to lead the space. Evidencing<br />

this, he points to sales at Dog.com, which grew 80 percent this<br />

year, with similar projections for 2006.<br />

To learn more about Afternic.com, please visit: www.afternic.<br />

com.<br />

12 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


Comodo appoints Judy Shapiro<br />

to head global marketing operations<br />

Comodo Inc., a global leader in Internet security, authentication<br />

and assurance services, today announced the appointment of<br />

Judy Shapiro as VP of Marketing. Ms. Shapiro’s background and<br />

experience in technology marketing will strengthen Comodo’s<br />

substantial leadership and growth in Identity Assurance<br />

Management solutions for businesses, infrastructure service<br />

providers and end-users.<br />

Ms. Shapiro joins Comodo from Computer Associates<br />

where most recently she was VP, Marketing responsible for<br />

customer acquisition, retention and upsell efforts. Prior to<br />

joining Computer Associates, Ms. Shapiro held several senior<br />

management positions at Lucent <strong>Tech</strong>nologies, Bell Labs,<br />

Metropolitan Telecommunications and AT&T in the areas of<br />

marketing, market development, new technologies and corporate<br />

strategy. Ms. Shapiro also had been a Vice President at NWAyer,<br />

an advertising agency, where she managed numerous accounts<br />

including Procter & Gamble, JCPenney, Gillette and Chemical<br />

Bank.<br />

“Judy immediately identified Comodo’s core competencies<br />

and built a plan to leverage them,” said Melih Abdulhayoglu,<br />

President and CEO Comodo; “She will take a strong, customerfocused<br />

organization to the next step by developing and<br />

executing strategies designed to promote Comodo’s innovative<br />

range of products and solutions. We recognize her distinctive<br />

leadership style will be a strong and positive impact on the<br />

performance of the business.”<br />

Ms. Shapiro earned her degree from the City University of NY<br />

within numerous disciplines including Marketing, Advertising<br />

and History. She lives in Manhattan with her husband and two<br />

children.<br />

www.pingzine.com 13


BITS & BYTES<br />

IPOWER Receives Top <strong>Web</strong> Hosting<br />

Award from TopTenREVIEWS TM<br />

IPOWERWEB, Inc., a leading <strong>Web</strong> site hosting provider<br />

for small businesses, announced it has been awarded the<br />

top award – the Gold Award – for <strong>Web</strong> Hosting by Top<br />

TenREVIEWSTM for 2006. Top TenREVIEWS is an<br />

Internet publisher of expert product reviews for software<br />

and web services and has served over 25 million visitors<br />

since its in inception in January of 2003.<br />

“This web host offers an astounding 10 GB of storage<br />

and a monthly transfer ability of 250 GB,” stated Top<br />

TenREVIEWS on their <strong>Web</strong> site. “They also offer more<br />

eCommerce tools than any other host, including a choice<br />

of shopping carts, marketing tools and a shared SSL<br />

Certificate.”<br />

“We are very excited to receive the top honor for Top<br />

TenREVIEWS’ <strong>Web</strong> Hosting category for 2006,” said<br />

T. Griffin Conrad, Executive Vice President and V.P. of<br />

Marketing at IPOWER. “We work hard to create <strong>Web</strong> site<br />

packages that address our customers’ needs, and we are<br />

very proud to receive such a distinctive award as this for<br />

our efforts.”<br />

“When considering a web hosting service, you need a<br />

provider that offers robust features in hosting, versatile<br />

product offerings and exceptional customer service,” said<br />

Jerry Ropelato, CEO/President of TopTenREVIEWS.<br />

“IPOWER has accomplished this and clearly surpasses all<br />

the competition.”<br />

IPOWERWEB, Inc., founded in October 2001, is the<br />

5th largest <strong>Web</strong>site hosting company worldwide. Over<br />

350,000 customers in over 100 countries depend on<br />

IPOWER to build, manage, promote and profit from an<br />

online presence.<br />

Established in January 2003, TopTenREVIEWS, Inc. is<br />

an Internet publisher of expert product reviews for software<br />

and web services. The company provides online shoppers<br />

with free access to in-depth product reviews, side-by-side<br />

feature comparisons, industry-related news and articles,<br />

online help, and safe links to purchase products. We do<br />

the research so you don’t have to. For more information<br />

about TopTenREVIEWS, visit www.toptenreviews.com.<br />

Jacuzzi, Inc. Takes a Bath<br />

in Australia AUDRP Ruling<br />

by Jeffrey A. Cohen<br />

Jacuzzi, Inc. of Dallas Texas initiated administrative proceedings<br />

against the Jacuzzi Unit Trust of Patterson Lakes, Australia to<br />

recover the domain name jacuzzi.com.au. The three judge panel<br />

found that although Jacuzzi Inc. has registered the JACUZZI<br />

trademark, or variations thereof, in at least 83 different countries<br />

including Australia, and although the domain in question was found<br />

to be confusingly similar to the JACUZZI trademark, the evidence<br />

was insufficient to order the transfer of the domain name.<br />

This will likely not be the end of the question, however. The<br />

Jacuzzi Unit Trust denied infringement on the grounds that the<br />

Complainant’s registered trademarks, or the term “Jacuzzi”, is<br />

or has become “descriptive” – a common defense to trademark<br />

infringement allegations. The panel found that the issues raised in<br />

the matter required a more in-depth analysis of the issues than could<br />

be provided in a WIPO administrative hearing. The panel stated “A<br />

proper assessment of [the issues] requires much wider evidence<br />

gathering powers, including discovery and cross-examination<br />

of witnesses, than is available in an administrative proceeding<br />

of this kind. In view of the limited nature of these administrative<br />

proceedings as proceedings on the papers, therefore, the Panel’s<br />

finding cannot, and should not, be taken as a final endorsement of<br />

the Respondent’s claims.”<br />

The opinion noted in particular that shortly after the<br />

commencement of the administrative proceeding, Jacuzzi, Inc. also<br />

commenced Federal Court proceedings No VID316 of 2005. The<br />

panel’s comments indicate clearly that in matters with significant<br />

issues of fact such as were involved in this matter, the courts offer a<br />

better forum and a fuller investigation of the issues presented than<br />

.......................<br />

can be offered by the WIPO arbitration process.<br />

14 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


www.pingzine.com 15


BITS & BYTES<br />

Interland Announces Sale of Dedicated<br />

Server Assets to Peer 1 Network<br />

Interland (NASDAQ: INLD), a leading provider of <strong>Web</strong> sites<br />

and online services for small and medium-sized businesses,<br />

announced that it has sold its dedicated server assets to Peer 1<br />

Network Enterprises, Inc., a provider of high performance Internet<br />

infrastructure, for a purchase price of approximately $14 million in<br />

cash. Under the terms of the agreement, Peer 1 Network acquired<br />

approximately 8,300 servers, as well as operating facilities in<br />

Atlanta, GA, Miami, FL, and Fremont, CA. The dedicated server<br />

assets accounted for approximately 37% of Interland’s revenues<br />

for the nine-month period ending May 31, 2005.<br />

“The sale of the dedicated server assets is an important milestone<br />

in our restructuring plan and allows Interland to invest in our<br />

core lines of business - providing <strong>Web</strong> sites and online services<br />

to small and medium-sized businesses,” said Jeffrey M. Stibel,<br />

CEO of Interland. “This transaction gives the company increased<br />

financial flexibility and is the first step toward focusing on our<br />

core competencies while realigning our revenues with high<br />

margin, high growth business initiatives.”<br />

The company’s dedicated customers, which represent<br />

approximately 5% of Interland’s total accounts, should experience<br />

no immediate change in services and should receive continuity of<br />

<strong>Web</strong> site operations under Peer 1 Network. The goal is to ensure<br />

a seamless transition for employees and customers, enabling both<br />

companies to focus on their core lines of business. Interland will<br />

provide more detail on the transaction’s impact on its business<br />

in its future SEC filings and on the next quarterly earnings<br />

conference call.<br />

Disposing of the dedicated server assets will allow Interland to<br />

realize significant savings, including long term lease obligations<br />

associated with the three data center facilities, capital expenditures<br />

associated with the ongoing purchase of dedicated servers,<br />

multiple bandwidth contract eliminations, and a substantial<br />

reduction in the number of employees. The $14 million in gross<br />

cash proceeds will be reduced by $2.8 million that will be held<br />

in an escrow account for 12 months and by approximately $1.4<br />

to $2.2 million in transaction-related expenses. The company<br />

expects that the transaction will have a net negative effect in the<br />

range of $1.5 to $3.0 million on its reported net earnings for its<br />

fourth quarter mostly as a result of non-cash charges.<br />

Under the deal, Interland employees will continue to run the<br />

dedicated server business, under Peer 1’s management, for<br />

approximately 90 days after closing. Peer 1 will have the<br />

opportunity to extend employment offers to those employees<br />

during the 90- day transition period.<br />

SuperbServers.Net<br />

Opens new Data Center.<br />

SuperbServers.Net, a subsidiary of Superb Internet<br />

Corporation, a world leader in managed Internet and e-commerce<br />

solutions, unveiled its third Data Center today.<br />

The state of the art facility, located just south of Seattle,<br />

Washington will host between 5000 and 7000 customer<br />

servers.<br />

Equipped with three 500KVA N+1 redundant UPS’s and a<br />

1.5MW diesel generator power backup system, 180 tons of AC<br />

power, with easy expandability up to 540 tons, fibre redundancy<br />

through multiple private SONET rings via multiple carriers,<br />

and a redundant architecture Gigabit Ethernet-based internal<br />

network using Cisco backbone-grade equipment, the SEA2<br />

Data Center is among the very best in the business.<br />

“We’re tremendously proud of this new facility”, said<br />

Haralds Jass, President & CEO, “Everything is top of the line<br />

and designed to provide the very highest level of service to our<br />

customers.”<br />

SuperbServers.net is committed to providing flexible,<br />

customizable dedicated server solutions at affordable prices.<br />

“The Seattle Data Center allows us to offer an even wider range<br />

of services and support a broader range of customers. We are<br />

planning for significant growth in 2006 and Seattle is a critical<br />

component of that plan,” said Sasha Wilson, VP Sales and<br />

Marketing.<br />

Superb Internet has offices and 24-hour/365-day operations in<br />

Washington, DC, McLean, VA, Tukwila, WA, and Vancouver,<br />

.......................<br />

BC, serving customers in over 150 countries worldwide.<br />

16 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


BITS & BYTES<br />

Microsoft Enhances Hosted Messaging<br />

and Collaboration Solution With New<br />

Mobility Features and Hosting Tools<br />

Microsoft Corp. announced Microsoft® Solution for Hosted<br />

Messaging and Collaboration version 3.5, a hosted solution that<br />

enables service providers to equip small and midsize businesses<br />

(SMBs) with enterprise-class e-mail services, mobile device<br />

data access, team <strong>Web</strong> sites and online presence information. In<br />

version 3.5, Microsoft incorporates new mobile synchronization<br />

capabilities, a variety of security enhancements, and new tools<br />

that lessen management time and extend customer acquisition<br />

opportunities for hosting partners. Further, with the latest release<br />

of the solution, Microsoft underscores its commitment to building<br />

strategic relationships with telecommunications and hosting<br />

service providers to deliver a range of services to businesses.<br />

“More and more small and midsize businesses require advanced<br />

enterprise-class features once reserved only for corporations with<br />

extensive IT budgets. The latest release of Hosted Messaging<br />

and Collaboration addresses that issue with unprecedented new<br />

features for these organizations,” said Pascal Martin, general<br />

manager of Worldwide Hosting at Microsoft. “Hosting providers<br />

are clamoring for ways to meet the demands of their customers<br />

while keeping a tight rein on costs. By providing a consistent<br />

platform, we give our hosting partners the tools to upgrade to<br />

the latest software and thereby differentiate their offerings with<br />

minimal effort and cost.”<br />

Business-Class Communication Tools for SMBs<br />

Targeted at companies with between 10 and 250 users and<br />

delivered through hosting providers, version 3.5 provides businessclass<br />

communication tools on a variety of computing mediums,<br />

such as a desktop computer in the office or a mobile device<br />

on the road. This update offers small and midsize businesses a<br />

cutting-edge messaging and collaboration solution with minimal<br />

upfront costs, and helps reduce the need for internal IT resources.<br />

End users can now benefit from Microsoft messaging solutions<br />

through Windows Mobile-based phones and personal digital<br />

assistants (PDAs) running Windows Mobile 5.0. With direct push<br />

technology, users will now have up-to-the minute access to e-<br />

mail, calendar appointments and task notifications. New mobile<br />

security features include the ability to wipe data from devices<br />

that have been lost or stolen and set up automated rules to help<br />

prevent access by unauthorized users.<br />

“For a company our size, running and maintaining our own<br />

e-mail and document-sharing server is a proposition we would<br />

prefer to avoid. Yet communicating with both customers and our<br />

employees is such a critical component of business, it’s not an<br />

area of operations we can neglect,” said Graeme Lloyd-Roberts,<br />

technical director at Bellwether Enterprises Ltd. “Through<br />

our hosting provider, we have a robust, stable e-mail system,<br />

document-sharing capabilities, and access to the latest and<br />

greatest software. We have enterprise-class technology at smallbusiness<br />

prices.”<br />

“Small and midsize companies see a benefit in choosing<br />

enterprise-class hosted e-mail services in response to the growing<br />

complexities of in-house messaging systems, brought on by the<br />

challenges of managing spam, virus prevention, storage, archiving<br />

and compliance requirements,” said Marcel Nienhuis, senior<br />

market analyst at the Radicati Group Inc. “Microsoft Solution<br />

for Hosted Messaging and Collaboration is an attractive option<br />

for service providers because it allows them to meet this demand,<br />

along with helping provide additional revenue opportunities.<br />

With service providers hosting the solution, small and midsize<br />

businesses can focus on their business without worrying about<br />

technology concerns or recurring costs.”<br />

Enabling Service Providers<br />

With Microsoft Hosted Messaging and Collaboration version<br />

3.5, service providers can help simplify application deployment,<br />

accelerate customer acquisition and improve customer satisfaction<br />

through a complete, end-to-end messaging and collaboration<br />

suite. The pre-engineered solution includes deployment<br />

automation tools and scripts, code samples, and documented<br />

procedures and best practices that help allow for rapid time to<br />

market. Management and monitoring tools ease administration of<br />

the solution and help provide superior service levels to end users.<br />

Additional new features in version 3.5 include these:<br />

· Automated password synchronization between hoster<br />

directories and end-customer accounts<br />

· New customer migration tools and updates to key<br />

technology components<br />

“Microsoft Solution for Hosted Messaging and Collaboration<br />

has enabled us to cut our solution deployment time two-thirds<br />

by using the pre-tested provisioning system as the foundation<br />

for our turnkey private-label Hosted Exchange platform,” said<br />

Ravi Agarwal, chief executive officer of groupSPARK Inc. “Our<br />

resellers see mobility as a key driver for their small and mediumsized<br />

business customers, and the version 3.5 upgrade allows us<br />

to quickly meet their demand without making a large investment<br />

in our platform.”<br />

“Microsoft provides a consistent platform that enables us to<br />

fully upgrade to the latest solutions available without having to<br />

perform a forklift upgrade every two or three years,” said Mark<br />

Adams, managing director of Cobweb Solutions Ltd. “The<br />

resellers we engage with see mobility as a key driver for their<br />

small and medium-sized business customers. Microsoft Solution<br />

for Hosted Messaging and Collaboration 3.5 will allow us to meet<br />

that demand, while also cutting deployment time of the entire<br />

solution by 67 percent over the best alternative of building the<br />

capabilities from scratch.”<br />

“For a communications company like TELUS, [a large<br />

Canadian teloc], the Microsoft Solution for Hosted Messaging<br />

and Collaboration is a very good way to simultaneously offer<br />

connectivity and hosted services,” said Robert Tasker, vice<br />

president of product marketing at TELUS Business Solutions.<br />

“It allows us to combine our expertise in hosting and services<br />

management with Microsoft applications so we can offer the<br />

business market a complete managed solutions portfolio.”<br />

Availability<br />

Microsoft Solution for Hosted Messaging and Collaboration<br />

version 3.5 is nowavailable worldwide. More information<br />

on Microsoft’s hosting solutions can be found at http://www.<br />

microsoft.com/serviceproviders/hostedmessaging.<br />

Those interested in more information on Microsoft Solution<br />

for Hosted Messaging and Collaboration version 3.5 can attend a<br />

free Microsoft seminar, running worldwide from December 2005<br />

through February 2006. Registration information is available at<br />

http://www.msattend.com.<br />

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide<br />

leader in software, services and solutions that help people and<br />

businesses realize their full potential.<br />

18 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


WEB HOSTING COMPANIES<br />

UNITE BEHIND HURRICANE<br />

RELIEF EFFORTS<br />

by Derek Vaughan, The Hosting News<br />

www.thehostingnews.com<br />

The web hosting community was directly impacted by<br />

hurricane Katrina earlier this year. Here is a summary of the<br />

broad-based humanitarian effort across the entire industry:<br />

Affinity Internet, Inc. donated to the Red Cross and matched<br />

employee contributions. Go Daddy announced a $250,000<br />

donation to Americares. Interland worked with customers that<br />

were actively involved in using the Internet to provide relief such<br />

as Ken Burton of the GulfCoastNews.com. The GulfCoastNews.<br />

com is operating the Katrina Survivor-Connector List, an<br />

interactive database that permits users to list the person or<br />

families they are looking to find. IPOWER, one of the nation’s<br />

largest hosting providers, has recently relocated its headquarters<br />

to Phoenix, Arizona, and collected goods for the over 500<br />

evacuees that were brought to the Phoenix area. Rackspace<br />

Managed Hosting provided free hosting to a number of missing<br />

persons sites and a relief portals. In addition, the company and<br />

its employees made a large cash donation to the Food Bank.<br />

<strong>Web</strong>site Host Directory, a leading web hosting portal, in addition<br />

to donating to the Red Cross, worked together with the greater<br />

hosting industry to announce relief efforts underway, and help<br />

its web hosting clients respond effectively to the disaster. At the<br />

peak of charitable activity, the redcross.org donation site was<br />

receiving 1.7 million page views and 512,000 unique visitors<br />

in a single day. The overflow of traffic could potentially have<br />

overwhelmed the site, if not for a different type of charitable<br />

giving - the hardware, software and human resources to keep<br />

the site live and accepting the critical donations. This task was<br />

generously undertaken by Yahoo! Small Business. The Red<br />

Cross and Microsoft launched a tool that the two organizations<br />

created together - a website that consolidates data on missing<br />

persons and evacuees to help families locate and register missing<br />

relatives at http://www.katrinasafe.org. These are but a small<br />

portion of the donations and efforts put forth for Katrina victims<br />

by the web hosting industry.<br />

www.pingzine.com 19


20 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


www.pingzine.com 21


SERVER COMPROMISED<br />

What to do in the event of a security breach, and how to<br />

prevent them in the first place.<br />

by Adam C. Greenfield<br />

22 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


[featured article]<br />

Major security breaches can be disastrous to a web hosting<br />

firm. Besides the obvious “black eye” that a security<br />

issue creates, you also have to consider the resulting<br />

downtime, potential exposure of customer data, customer service<br />

time (explaining the situation and helping clients repair any<br />

damage), and potential client loss that result for almost any major<br />

security breach. The total cost of these incidents is difficult to<br />

accurately calculate, and often takes weeks to fully realize.<br />

It’s thus unsurprising that security is an area of high concern<br />

for most hosting providers. Keeping a server secure, while<br />

maintaining a high level of usability with the wealth of software<br />

offered on a modern hosting server, is a delicate balance to<br />

strike. Your server may be extremely secure, but if that security<br />

negatively impacts features important to your customer, it won’t<br />

matter, because your customers will leave. Similarly, offering a<br />

“Wild West” server with no security considerations at all will<br />

result in angry customers when the downtime due to re-installs<br />

starts piling up. As your company grows, scale becomes a major<br />

concern too; spending ten minutes per day on each server for<br />

installing updates and fixing security issues may be acceptable<br />

when you only have half a dozen servers, however you will<br />

quickly find such a time commitment is not acceptable when<br />

you’re talking about three hundred servers.<br />

When making decisions about how best to secure your systems,<br />

you should first consider the nature of the beast. Security is not<br />

some sort of isolated goal that can be addressed in a vacuum;<br />

It needs to be considered in conjunction with all the other<br />

operational decisions you make on a daily basis. New flaws,<br />

exploitation methods, and software updates literally occur minute<br />

by minute. If you’re going to keep up, you need to make sure that<br />

you can quickly address potential security problems as they are<br />

discovered.<br />

One of the most critical systems to put in place is the ability to<br />

deploy updates and fixes across your fleet of servers. The most<br />

efficient method I’ve found for this is utilizing existing package<br />

management tools. Almost every major operating system offers<br />

some solution for deploying updates on a regular schedule (i.e.<br />

daily). Properly leveraging this ability is crucial. I also recommend<br />

not only subscribing your machines to trusted updated sources<br />

(such as those from your software vendors), but also creating your<br />

own means for deploying, at will, updates that you deem critical.<br />

This will enable you to deploy customized fixes and potentially<br />

release critical security updates prior to your vendor making them<br />

available for you.<br />

Another critical system to implement is one that allows you<br />

to quickly verify the integrity of the software installed on your<br />

servers. Again, most package management utilities offer the<br />

ability to verify installed packages, however you must bear in<br />

mind that if you consider a machine to be suspect, the output of<br />

any software on that machine should also be considered suspect<br />

as well. If someone has gained root (or Administrator) access to<br />

your machine, they could potentially alter any component of the<br />

system, causing it to present whatever data they wished.<br />

Monitoring baseline trends of system resource usage (such as<br />

memory usage, processor usage, and disk space) can also provide<br />

an invaluable first warning system to alert you to a potential<br />

security breach. Often, the person breaking into your system wants<br />

to utilize your system resources to further another goal (such as<br />

trading warez, sending spam, and potentially even compromising<br />

additional systems). If you notice a spike in resource usage, it<br />

may alert you to a problem before you receive any complaints, or<br />

before you notice anything has been changed.<br />

These systems are a solid asset to server security, not only<br />

because they yield tangible benefits in the form of improved<br />

www.pingzine.com 23


[featured article]<br />

uptime and service reliability, but also because you can implement<br />

all three of them, on any number of machines, with some simple<br />

automation. Automation is one of the keys to good system<br />

security, because it ensures that security policies and checks<br />

are implemented uniformly, as scheduled, and helps keep costs<br />

down by limiting person-hours spent performing repetitive tasks.<br />

Believe me, nobody wants to recompile Apache on a hundred<br />

servers when a security update is released!<br />

Now that we have discussed how to better maintain security<br />

monitoring and apply software updates, let’s discuss some of the<br />

aspects of server security that require the human touch. First, I<br />

recommend that every hosting company establish a documented<br />

policy on how servers should be configured. Start by disabling<br />

all the system services that will not be used on the server. Do<br />

you use centralized name servers? If so, disable your DNS server.<br />

When you go through each entry of the service list, you should<br />

also note services that don’t need to be publicly accessible and<br />

restrict them only to sources that need access.<br />

You should also consider removing software that doesn’t fit into<br />

your hosting model (e.g. print servers, IRC clients, unused web<br />

server modules), because that lowers the number of applications<br />

that you need to maintain and update. Each additional piece of<br />

software you leave installed on your system (that isn’t going to<br />

be used) creates a pointless security liability.<br />

Keep in mind that your policy needs to be constantly updated,<br />

as customer needs change. If you suddenly begin seeing demand<br />

for a piece of software you don’t have installed you should be<br />

prepared to deploy that software to your fleet (using the package<br />

management tools discussed above) and make sure it is installed<br />

on future machines. Consistency is a primary goal here, because<br />

if each of your systems is unique with its own blend of installed<br />

software, making good security decisions that apply equally to<br />

each of your machines becomes more difficult, if not impossible.<br />

Consider this situation: One of your staff members receives<br />

a request for a specific software application to be installed on<br />

one of your hosting servers. If he (or she) installs an application<br />

specifically for one machine, the chance is very low of that<br />

software being properly updated in the event a security flaw is<br />

discovered.<br />

So, now your fleet has a consistent security policy, you are<br />

regularly applying security updates on every machine, and you<br />

have a solid automated monitoring system. What’s next? A<br />

realization that none of these things are any good unless your<br />

staff properly utilizes available resources. Anyone working on<br />

your systems should thoroughly investigate any potential security<br />

situation, and let you know if something is consistently a false<br />

positive (so you can make changes to your systems and policies<br />

as needed). Vigilant staff can make a huge difference in the use of<br />

any of these systems (and likewise can cause any or all of these<br />

systems to become worthless).<br />

Staff should also be vigilant not only when responding to<br />

notifications, but also in their daily tasks. If something doesn’t<br />

feel right, it usually isn’t. Strange log messages, console<br />

messages, applications acting strangely, and files damaged or out<br />

of place, could all indicate a security issue. These things should<br />

be investigated and reported.<br />

We can’t talk about security without mentioning a few of the<br />

pitfalls that are all too common in the web hosting industry. One<br />

of the biggest mistakes I still see companies making is shared<br />

authentication. If all of your servers share the same password (or,<br />

to a lesser degree, utilize a public key authentication token), then<br />

a compromise of one of your systems can easily result in the viral<br />

compromise of all of your systems.<br />

Each system must have unique authentication data, and<br />

that authentication data must be changed on a regular basis. I<br />

recommend that you cycle authentication data no less than once<br />

per calendar month (and every time you experience a system<br />

compromise on any server, or lose a staff member). It is also<br />

critical that your hosting servers do not have trust relationships<br />

with one another, because these interrelationships can also cause<br />

a viral compromise in the event one server is compromised. If<br />

your servers must trust one another, that trust should be limited to<br />

24 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


www.pingzine.com 25


[featured article]<br />

the specific task that must be performed.<br />

A server that was compromised will always<br />

be suspect. I always recommend reinstalling any<br />

system where administrator (or root) level access is<br />

compromised, because even if you cleaned up the<br />

apparent damage from the compromise, missing<br />

even one file can quickly land you right back in<br />

the same (leaky!) boat. This includes procedures<br />

when restoring backups; you should never assume<br />

that your previous backup is free of traces of the<br />

compromise. You should ensure that configuration<br />

files don’t contain instructions to allow access<br />

to an outside party. Also, system binaries should<br />

never be restored from backup – the restore should<br />

be limited to user data and system configuration<br />

only. User data should also be reviewed as it is<br />

restored, while all passwords should be changed,<br />

following a compromise. Even if your intruder is<br />

only able to obtain user access to your machine,<br />

that still allows them to get their “foot in the door,”<br />

and may provide further potential exposure to<br />

exploitation.<br />

Another pitfall that is still far too common is the<br />

use of shared accounts (like nobody or apache) to<br />

execute web scripts. Not only does this potentially<br />

allow for the defacement or removal of user data<br />

accessible by the shared account, but it also makes<br />

tracking down the point of entry more difficult in<br />

the event a compromise does occur. <strong>Web</strong> scripts<br />

should run with the privileges of a specific system<br />

user, eliminating both of those issues, and limiting<br />

the damage of a script exploit to the user with the<br />

exploitable script.<br />

Also, check the locations that a potential intruder<br />

may use. I’ve found that on a Linux system /tmp, /<br />

var/tmp, /dev/shm, and Apache’s proxy directories<br />

(all writable by default to anyone) are common<br />

places used to store exploit, scanning, and other<br />

potentially malicious applications. Strange files<br />

in these locations can be a good indicator that<br />

your machine may be compromised – even if the<br />

intruder has not gained root access yet.<br />

There are a number of other security tools that<br />

may or may not be of use to you. Obviously,<br />

everyone has a unique situation, and considering<br />

other solutions such as a hardware-based firewall,<br />

Network IDS, and commercial security software<br />

can be useful. Remember, though – if you just<br />

take a few simple steps, you can easily improve<br />

the security of all your servers. While the time<br />

investment can seem like a lot up front, in the long<br />

run the benefits truly outweigh the associated cost.<br />

Security is a serious concern, but if you consider it<br />

as a factor when making decisions, and take basic<br />

steps to improve your system security, it doesn’t<br />

have to be a huge draw on your time nor does it<br />

have to increase your blood pressure!<br />

P!<br />

PING! ZINE WRITER BIO<br />

Adam C. Greenfield currently serves as Site5’s Chief <strong>Tech</strong>nology Officer. He has<br />

been involved in web hosting for almost 10 years as both a Systems Administrator<br />

and a Developer. Currently his primary focus is leading the Site5 Engineering<br />

Team. He maintains a professional weblog at http://www.adamgreenfield.com/.<br />

Adam can be reached at adam.greenfield@site5.com<br />

26 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


Some businesses are this easy to start.<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

www.pingzine.com 27


HOSTING GURUS<br />

PING! ZINE WRITER BIO<br />

Daniel J. Briere is the Founder and Chief<br />

Executive Officer of Global<strong>Web</strong>Brands,<br />

a website hosting reseller company<br />

through LiquidNet, HostCentric, and XO<br />

Communications. He can be reached at<br />

dbriere@globalwebbrands.com.<br />

VALUE-ADDED<br />

HOSTING FOR RESELLERS<br />

by Daniel J. Briere<br />

How to Add<br />

Value to Your<br />

<strong>Web</strong>site Hosting<br />

Services and Sell<br />

Them at a Profit.<br />

28 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />

Reselling. It’s a great way to break<br />

into the website hosting business, isn’t<br />

it? And yet it’s so easy to lose your way<br />

and become like every other hosting<br />

provider out there. Ahhhhh, the joys of<br />

being a hosting reseller!<br />

But, did you know that there are<br />

indeed many ways to differentiate your<br />

hosting company and stand out from<br />

the crowd? Yes, it is true – you can rise<br />

above the rest in your own little niche,<br />

while fulfilling your dream of owning a<br />

hosting company that contributes value,<br />

and adds to others’ successes. Although<br />

it’s not necessarily easy, it can be done<br />

in a few simple steps.<br />

The first step starts at one of the<br />

basic fundamentals of your business:<br />

pricing. Although it may be tempting<br />

to compete with GoDaddy and others<br />

who offer hosting at extremely low<br />

prices, this is not the required path<br />

to success, especially if you’re just<br />

starting out. You want to make sure<br />

that you are covering your costs and<br />

turning a worthwhile profit before<br />

pricing yourself out of existence. If<br />

you can price at the levels of GoDaddy<br />

and others, great. If you can’t, don’t<br />

lose any sleep over it! Both HostGator<br />

and Site5.com have shown remarkable<br />

success at the $6.95 per month price<br />

point – well above the $3.95 per month<br />

of GoDaddy’s cheapest plan.<br />

So, the first thing you’ll need to do is<br />

calculate your expenses. Then, decide<br />

how much of a profit you would like<br />

to make. Only after determining those<br />

numbers can you arrive at the price<br />

you’ll charge for your hosting plans.<br />

Instead of working from the top down<br />

(setting your prices and molding your


usiness around them), work from the<br />

bottom up, structuring your business and<br />

setting your prices to match. I guarantee<br />

you that you’ll have a much greater chance<br />

of success, just by following this first step<br />

alone.<br />

Step two involves locating any<br />

efficiencies and advantages that your<br />

hosting services might offer without any<br />

value-add. Do you use particularly fast<br />

servers and internet connections? Are you<br />

using proprietary control panel software?<br />

Do you offer unlimited e-mail accounts<br />

and MySQL databases? Examine your<br />

offerings and look for those things that<br />

would immediately attract your attention if<br />

you were shopping for a hosting provider<br />

yourself. Pull out a sheet of paper and<br />

write down everything you can think of<br />

that stands out to you.<br />

This is a fairly simple and easy-tounderstand<br />

step, so that’s all the time I’ll<br />

spend on it. If you can’t locate anything<br />

in this area, don’t worry – it doesn’t mean<br />

you’ll go the way of the dodo bird – just<br />

keep reading!<br />

The third thing you’ll want to do is<br />

decide which market you’re going to target.<br />

Are you going to host real estate websites,<br />

chiropractic websites, small e-commerce<br />

websites, or something else? Or, are you<br />

going to strive to cater to everybody?<br />

While the latter can be a very profitable<br />

strategy for many, there are already many<br />

hosting providers who have found greater<br />

success by specializing in a certain niche.<br />

For instance, a while back I came across<br />

a company that had just started a host for<br />

garage bands. As long as they advertise in<br />

the right places (where these bands will<br />

see the ads), they should have no problem<br />

competing and carving out a niche for<br />

their business. This is the only host I<br />

know of that is targeting this market (and<br />

likely the only host many are likely to find<br />

targeting garage bands). The lesson is that<br />

targeted marketing works if you can make<br />

an emotional connection between your<br />

potential customers and your service.<br />

Once you know who you’re selling<br />

to, the fourth step is very simple. Ask<br />

yourself what website-related services<br />

you can add to your hosting packages to<br />

entice your target market to purchase from<br />

you. This is where the value-add really<br />

comes into play. What will set you lightyears<br />

apart from your closest competitors?<br />

Perhaps you can offer a budget-priced<br />

website hosting/design package where<br />

you provide both their website hosting<br />

and design a simple website for them. Or,<br />

perhaps join forces with SubmitNet or<br />

Template Monster, through their affiliate<br />

programs, and offer their products to your<br />

hosting clients once they have signed up<br />

for hosting. My company has done this,<br />

not only to differentiate our offerings, but<br />

also as another way to pull folks into our<br />

website – and it works! Find something<br />

that is beneficial by itself, and then make<br />

sure it is relevant to your target market.<br />

Depending on the impact of the items you<br />

choose, you may need just one – or you<br />

may need several.<br />

The possibilities in this area are<br />

absolutely endless. The main thing is to be<br />

creative and come up with combinations<br />

that you know your target market will<br />

love. Know your market, and this will be<br />

easy. As long as you’re making money,<br />

providing affordable services, and keeping<br />

your clients happy, there’s nothing to lose,<br />

and a whole lot more to gain! Happy<br />

hosting!P!<br />

B2B<br />

Watch your Revenues<br />

Soar with <strong>Web</strong> Design!<br />

Want to spend fifteen minutes making<br />

$5000.00?You can with DesignVAR!<br />

Hosting Company Value Add<br />

Private Label solutions Help you<br />

Become the 1-Stop Shop you need to be!<br />

Design P ackages & Ecommerce<br />

Custom Database & Applications<br />

DesignVAR lets you bring the profits of<br />

design to your company!<br />

Talk to a representative today about<br />

increasing your revenues tomorrow!<br />

Call us at:<br />

866-880-2754<br />

or email:<br />

sales@designvar.com<br />

866-880-2754 www.designvar.com<br />

www.pingzine.com 29


HOSTING GURUS<br />

by Conrad Agramont<br />

The History<br />

of Microsoft<br />

Hosted Exchange<br />

The latest incarnation of the Hosted Exchange<br />

solution has now been renamed from<br />

“Microsoft Solution for Hosted Exchange<br />

2003” to “Microsoft Solution for Hosted Messaging<br />

& Collaboration 3.0”. With the name change<br />

comes some additional capabilities, an upgrade to<br />

the provisioning system, and several items. With<br />

all of these ongoing changes, I thought it may be<br />

interesting to describe a bit of the history of the<br />

Hosted Exchange solutions.<br />

Microsoft Commercial Internet System<br />

(MCIS): The End of an Era<br />

Just to give you an idea of how Hosted Exchange<br />

came into being, it’s helpful to have a little history<br />

of the product and its important sub-components. It<br />

all started back in the late 1990s with a Microsoft<br />

product called MCIS. I won’t go into too much<br />

detail on MCIS (and there’s lots of it), but succinctly,<br />

MCIS was a product Microsoft created in late 1997<br />

that focused on the ISP market.<br />

MCIS’s components included <strong>Web</strong>mail, SMTP,<br />

POP3, IMAP, personal web pages, commerce,<br />

chat, and news (NNTP) services. Anyone that has<br />

deployed MCIS will tell you how difficult it was<br />

to install, mainly due to issues with Windows NT<br />

4.0, Service Packs, Option Packs, Microsoft Site<br />

Server, and other various components that had to be<br />

installed in the proper order on all servers. (If you<br />

missed a step in certain places, you had to reinstall<br />

the server and start over!) It was often frustrating,<br />

but once you got the product up and running, it ran.<br />

It even performed very well and was generally easy<br />

to manage.<br />

The notable thing about MCIS, though, was<br />

how well it scaled! The directory service was an<br />

LDAP server that used ADSI as a public API<br />

and SQL Server 6.5 for the data store. The MCIS<br />

LDAP database could even be partitioned across<br />

multiple, clustered SQL instances, which allowed<br />

one to scale the user database as much as they<br />

desired. No customer ever pushed MCIS to its<br />

limits in terms of scalability – there were a few<br />

instances of MCIS with more than a few million<br />

users in production. The mail services used a<br />

Front-End/Back-End architecture and stored all of<br />

the mail files on file servers (which could also be<br />

clustered and distributed to provide fault tolerance<br />

and scalability). The platform was truly ahead of its<br />

time. As a matter of fact, sometimes it seems like<br />

Exchange 2000 ended up looking a lot more like<br />

MCIS than Exchange 5.5.<br />

MCIS (in the version 2.0 release) included a<br />

tool called the Microsoft Automated Provisioning<br />

System (MAPS). MAPS was designed to help ISPs<br />

provision MCIS Services, and also included a very<br />

crude method for integrating third party solutions<br />

such as billing systems. One major downside to<br />

MAPS was a poorly defined API, which made it<br />

30 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


difficult to extend or even understand.<br />

MAPS was also difficult to deploy, but<br />

worked fairly well when installed and<br />

configured properly.<br />

Unfortunately (or fortunately, depending<br />

on your perspective) Microsoft had other<br />

plans for its high-end messaging platform,<br />

and that was to focus on Exchange Server.<br />

With the introduction of Exchange<br />

Sever 2000, Microsoft began creating an<br />

architecture in Exchange Server that was<br />

similar to MCIS. This included the use<br />

of Front-End/Back-End servers, using<br />

Active Directory (which was called<br />

“Membership” in MCIS) as its core<br />

storage for configuration, user mailbox<br />

association, and the ability to distribute<br />

services at multiple layers to achieve scale<br />

and fault tolerance.<br />

Microsoft Provisioning System<br />

The Microsoft Provisioning System<br />

(MPS) was created as successor to<br />

linear provisioning actions defined in an<br />

XML document called a “named procedure”<br />

(a collection of named procedures are<br />

encapsulated within something called an<br />

“MPF Namespace”). The extensibility<br />

results from the ability to leverage an<br />

“MPF Provider” (a low-level integration<br />

point between MPF and a given service).<br />

Essentially, an MPF Provider is a DLL that<br />

is responsible for communicating with the<br />

individual service (i.e. Active Directory,<br />

Exchange, File System, IIS, FrontPage,<br />

DNS, etc.). Custom MPF Providers can<br />

be developed in a variety of languages<br />

(C++, VB6, or .NET Assemblies) and<br />

provide the ability to participate in the<br />

same transaction/compensation model as<br />

the standard MPF providers.<br />

At the heart of a Hosted Exchange<br />

deployment are the core components that<br />

make up a typical single-site Exchange<br />

deployment. A single site Exchange<br />

deployment consists of a collection of<br />

Hosted Messaging and Collaboration 1.0<br />

The first version of the “Hosted<br />

Exchange and Collaboration Solution”<br />

was focussed on providing a complete<br />

method of deploying a Hosted Exchange<br />

offering. This included documentation,<br />

automation via MPS, hardware guidance,<br />

hardware pricing through a partnership<br />

with Compaq (prior to its merger with<br />

HP), and partnership with other vendors.<br />

The idea was to give a Service Provider<br />

that was interested in deploying an HMC<br />

environment everything they needed to<br />

go into production, with a final cost to get<br />

that done. For the most part, this is the<br />

type of thing that most customers look for.<br />

However, there were three reasons why<br />

this wasn’t a huge success.<br />

The first reason is that HMC used<br />

Microsoft Exchange Server 2000. Where<br />

Exchange Server 2003 is a great product,<br />

and a solid platform for Enterprise<br />

MAPS. It was a product that focused on<br />

provisioning Hosted Exchange 2000 and<br />

<strong>Web</strong> Hosting on IIS 5.0.<br />

A key component of MPS is the ability<br />

to deploy a secure shared Active Directory<br />

structure. This is important as it allows<br />

Service Providers to deploy web hosting<br />

and Hosted Exchange services while only<br />

allowing customers to be able to see and<br />

manage their own organization’s accounts<br />

and services. At the heart of MPS is the<br />

Microsoft Provisioning Framework (MPF).<br />

MPF is a COM+ application that provides<br />

an extensible transaction/compensation<br />

platform for service provisioning. (By<br />

compensation we mean that any transaction<br />

that fails will result in the rollback of all<br />

the tasks that were completed before the<br />

failure.) This results in a consistently clean<br />

platform.<br />

The MPF Engine performs a series of<br />

physical servers with Windows Server<br />

(where the version depends on what<br />

version of Exchange is being deployed)<br />

as the operating system. Active Directory<br />

is deployed too, and all servers in the<br />

environment act as member servers.<br />

Exchange Server itself is also deployed.<br />

(Admittedly, there are a lot of other<br />

components such as DNS Services, IIS,<br />

and SMTP, that are also deployed, but<br />

these are the “high level” pieces that<br />

are not at the base of the deployment.)<br />

Taking this base Exchange deployment<br />

and turning it into a “Hosted Exchange”<br />

deployment is a mixture of configuration<br />

settings deployed on Active Directory and<br />

Exchange, and repeatable provisioning for<br />

isolated organizations and users. This is<br />

where MPS is used to provide the ability<br />

to repeatedly provision organizations and<br />

users.<br />

deployments, with Exchange 2000<br />

there were many capabilities that were<br />

insufficient for customer demands. The<br />

most noticeable was support for Microsoft<br />

Outlook XP – in order to get the full<br />

capabilities of Outlook, connectivity<br />

between the Outlook client and the<br />

Exchange server must be done using<br />

Microsoft Remote Procedure Calls (RPC).<br />

The RPC protocol is used heavily within<br />

a Microsoft Windows environment and<br />

opens the door to many other services on a<br />

given server beyond Exchange. To have a<br />

HMC offering and allow clients to connect<br />

with their Outlook clients, it required<br />

giving those customers access to the<br />

Service Providers back end environment<br />

via a firewall, VPN or Microsoft Internet<br />

and Security Accelerator Server (ISA)<br />

which was recommended by Microsoft.<br />

This indicated additional hardware and<br />

www.pingzine.com 31


HOSTING GURUS<br />

The “Microsoft Solution for Hosted<br />

Exchange 2003” (HE2003) was a giant<br />

step forward in the ability to support a<br />

large number of customer organizations<br />

and services.<br />

network costs, higher operations expenses,<br />

and increased complexity.<br />

The second reason was scalability as it<br />

relates to the number of “Organizations”<br />

that could be deployed in a single<br />

deployment of HMC. HMC v1 could<br />

only support up to 800 organizations that<br />

required Outlook client support. This was<br />

due to an issue in Active Directory and the<br />

implementation of multi-valued attributes<br />

within the schema. There was no hard<br />

limit to the number of organizations that<br />

a Service Provider could host if they only<br />

required support for Outlook <strong>Web</strong> Access,<br />

POP3, or IMAP.<br />

The third reason was the bursting of<br />

the .com bubble. When this happened,<br />

there was a huge downturn in the number<br />

of companies that wanted to come online<br />

and host corporate email. Many Service<br />

Providers went out of business, while<br />

others decided to focus on their then<br />

current customer base, and defer new<br />

ventures. There were still plenty of Service<br />

Providers that did deploy HMC, but those<br />

deployments didn’t match the deployment<br />

scenarios defined in the solution. Often,<br />

hardware was scaled back and a “bare<br />

bones” approach was taken. Two or three<br />

years earlier, hosts would have deployed a<br />

solution that anticipated huge growth and<br />

over-building the platform.<br />

Hosted Exchange 2003<br />

The “Microsoft Solution for Hosted<br />

Exchange 2003” (HE2003) was a giant<br />

step forward in the ability to support a large<br />

number of customer organizations and<br />

services. The largest of the changes was<br />

the ability to support Outlook 2003 clients<br />

through an Exchange Front-End server.<br />

This was accomplished by supporting<br />

RPC over HTTPS, thus removing the<br />

requirement to host a VPN for clients that<br />

wanted to access their Exchange data via<br />

Outlook.<br />

Exchange Server 2003 also provided<br />

additional improvements to Outlook <strong>Web</strong><br />

Access, allowing for greater customization<br />

and providing additional features that<br />

could be enabled or disabled on a per-user<br />

basis. Upgrading to Exchange Server 2003<br />

also enabled a number of features and<br />

improvements that made it a better platform<br />

than its predecessors. For example, as the<br />

Exchange Server 2003 product improved,<br />

so did the solution that made Exchange<br />

Server ready for Service Providers.<br />

HE2003 also included a new namespace<br />

called, “Hosted Exchange,” the key feature<br />

of which is support for “Plans” (which<br />

leverage a SQL Server Database to define<br />

“feature bundling”). This allowed hosts<br />

to enable and track services that were<br />

deployed for hosted organizations and<br />

users. The “Hosted Exchange” namespace<br />

also leveraged the improved Resource<br />

Manager that shipped with MPS. The<br />

Resource Manager allows the host to<br />

keep track of how resources are allocated<br />

(e.g. Exchange databases, web servers or<br />

disk usage). The new Hosted Exchange<br />

Namespace also provided a new set of<br />

“extensions” to the Resource Manager to<br />

allow for additional support for queries,<br />

moves, and reallocation of storage for<br />

users and organizations.<br />

The HE2003 solution also took a<br />

different approach to HMC as it didn’t<br />

have any direct tie to any third-party<br />

product or hardware. This is both good<br />

and bad, because it provides (or at least<br />

32 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


SEARCH ENGINE ACTIVITY<br />

<br />

2004<br />

If you are advertising on the following search engines,<br />

you may be losing money to click fraud:<br />

DETECT CLICK FRAUD AND GET YOUR MONEY BACK WITH ADWATCHER<br />

AdWatcher will protect<br />

your advertising dollars by:<br />

Take our 30 day challenge - Absolutely Free - and discover how<br />

much of your marketing budget goes to waste every month.<br />

WWW.ADWATCHER.COM/PING<br />

Visit our site today to sign up for a free, no-risk, no obligation, 30 day trial.<br />

If you decide to continue, it starts at only $19.95 per month after that.<br />

www.pingzine.com 33


HOSTING GURUS<br />

gives the appearance of) more hardware<br />

deployment options. However, with this<br />

agnosticism comes a lack of capacity<br />

planning documentation on the part of<br />

hardware vendors. This means that while<br />

the platform was more scalable and<br />

feature-rich, it has to make more generic<br />

recommendations about how to scale and<br />

improve performance.<br />

Overall, the Microsoft Solution for<br />

Hosted Exchange 2003 provided a<br />

comprehensive solution for Service<br />

Providers to deploy a service for small<br />

business looking to outsource their<br />

Outlook 2003 clients.<br />

Hosted Exchange 2003.1<br />

A few months after HE2003 came<br />

to market, a new interim release was<br />

shipped. The goal of this release was to<br />

overcome some of the scalability issues<br />

found in HE2003. The HE2003.1 release<br />

provided the ability to scale beyond<br />

the 1000 organization limitation in all<br />

previous Hosted Exchange solutions.<br />

This was done by providing some new<br />

tools as a part of the solution which made<br />

modifications to Active Directory (http://<br />

weblogs.asp.net/conrad/archive/2005/0<br />

6/03/410238.aspx) and by developing a<br />

workaround that allowed for more than<br />

1000 Offline Address Books (OAB)<br />

within a single Exchange Organization.<br />

These improvements allowed Service<br />

Providers to feel comfortable in deploying<br />

an environment that would scale out and<br />

provide some platform longevity.<br />

34 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />

Hosted Messaging & Collaboration 3.0<br />

The “Microsoft Solution for Messaging<br />

& Collaboration 3.0” (HMC3) shipped<br />

in the first half of 2005, and leverages<br />

the components found in the HE2003.1<br />

solution while adding new hosted services.<br />

HMC3 includes Windows Sharepoint<br />

Services (WSS) and Live Communication<br />

Server 2005 (LCS). There are also a few<br />

new tools included within the solution for<br />

additional Hosted Exchange functionality.<br />

One of the more interesting and underpublicized<br />

Hosted Exchange additions<br />

is the inclusion of a new MPS “Import”<br />

namespace. The “Import” namespace<br />

is much needed if you have an existing<br />

Exchange environment with production<br />

customers, users, and mailboxes and want<br />

to import these into an HMC3 Hosted<br />

Exchange architecture. This allows<br />

Exchange Hosters to leverage their current<br />

deployment environment and move/<br />

migrate/import those users into the new<br />

HMC-specific deployment. The solution<br />

also provides an MPF Provider and an<br />

MPF Namespace to provision Windows<br />

Sharepoint Services. Planning and<br />

Deployment documentation is provided in<br />

the solution for WSS as well.<br />

Provisioning of LCS services is provided<br />

via an MPF Namespace of its own. This<br />

namespace is leveraged within the Hosted<br />

Exchange namespace to provision LCS<br />

Services (e.g. a SIP Address) for all new<br />

organizations and users when a user is<br />

given an Exchange mailbox. For more<br />

information read (http://weblogs.asp.net/<br />

conrad/archive/2005/05/16/406890.aspx).<br />

At the time this article was written,<br />

Microsoft is focussed on the next version<br />

of HMC. The core of the next release<br />

will include support for Windows Server<br />

2003 Service Pack 1, and a few additional<br />

features. In addition, Microsoft is working<br />

on future versions of the solution that<br />

will leverage the mobility features of<br />

Exchange 2003 SP2. This should serve as<br />

evidence to the Service Provider industry<br />

to demonstrate Microsoft’s commitment<br />

and investment to shipping solutions that<br />

meet their customer’s requirements.<br />

Conclusion<br />

Microsoft continues to invest a great deal<br />

of time and money in the development,<br />

testing, and release of these hosted products<br />

and solutions. Over the past five years,<br />

Microsoft has consistently delivered new<br />

versions of Hosted Exchange solutions that<br />

give Service Providers the added features<br />

they need to host a rich mail platform for<br />

small to medium size businesses.<br />

P!<br />

PING! ZINE WRITER BIO<br />

Conrad Agramont is a Senior Architect for<br />

eQuest, a division of Planet <strong>Tech</strong>nologies<br />

Inc., a firm specializing in architecting<br />

automated solutions for Microsoft products<br />

and technologies. Previously, Conrad worked<br />

for Microsoft as a Program Manager for the<br />

Microsoft Provisioning System 1.0, Service<br />

Provisioning component in Microsoft Solution<br />

for Hosted Messaging & Collaboration, Hosted<br />

Exchange 2003, Hosted Exchange 2003.1,<br />

and Windows based Hosting 3.0. Paul Edlund<br />

also deserves an honorable mention, as he<br />

provided a great deal of editing and additions<br />

to the article.


sales@rackmountmicro.com<br />

1.800.673.0174<br />

http://rackmountmicro.com/holidays<br />

Great<br />

Racks.<br />

Enter to<br />

win a<br />

server<br />

at our<br />

website!<br />

Photo by Jessica Tyner Photography<br />

www.pingzine.com 35


HOSTING GURUS<br />

><br />

A Critical Factor:<br />

<strong>Web</strong>site Title Tags<br />

by Derek Vaughan<br />

A Critical Factor: <strong>Web</strong>site title tags.<br />

Have you ever noticed that in the<br />

upper-left corner of the main bar of your<br />

web browser, there is some text on every<br />

website you visit? You can also usually<br />

see the first portion of this text when you<br />

minimize the browser window. This text is<br />

displayed from the website’s Title tag – and<br />

it’s vitally important to any commercial<br />

website.<br />

Although the title tag is easy to see in<br />

the browser, it originates in the underlying<br />

code used to design the website. If you<br />

‘right click’ on a website with your<br />

mouse, you will see a pop-up menu with<br />

several menu items listed – if you click on<br />

‘View Source’ (or ‘View Page Source’ in<br />

FireFox) – you will see a text display of the<br />

underlying code for that website. Here are<br />

the first few lines of HTML code from one<br />

of our sites (http://www.webmaster911.<br />

com):<br />

<br />

<br />

<br />

<strong>Web</strong>master, <strong>Web</strong> Hosting,<br />

Domain Name, Internet Marketing<br />

Resources - <strong>Web</strong>master911.com<br />

As you can see, the page title is enclosed<br />

by the tags. The text within those tags is<br />

what appears in the browser’s main title<br />

bar.<br />

“Okay – I get it!,” you may say. “So I<br />

can put any message I want in there to sell<br />

my goods (or and services).” That’s true,<br />

but the title tag is important for a much<br />

more significant reason: Search engines<br />

treat your title tag as an indicator of your<br />

site’s main purpose. Therefore, the title tag<br />

determines how your site is categorized<br />

and what search terms it is placed under.<br />

If you want to be found under a specific<br />

search term in search engines, you must<br />

include that term in your title tag.<br />

So, how do you determine which search<br />

terms are best to include in your title tag?<br />

I would suggest using a great tool from<br />

Yahoo! Search Marketing, which will help<br />

you find popular search terms that can help<br />

you generate more traffic to your site. It is<br />

called the “Keyword Selector Tool,” and it<br />

can be found at http://inventory.overture.<br />

com/d/searchinventory/suggestion.<br />

To use the tool, simply type in a keyword<br />

that you think is relevant to your site. The<br />

36 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


tool will display various search terms related to your original<br />

query, and list them in order of popularity (based on the searches<br />

conducted in the previous month). For example, suppose that you<br />

sell mobile phones on your website. If you type in the search<br />

term ‘mobile phone,’ the Keyword Selector Tool generates the<br />

following list (shortened from actual):<br />

Searches done in June 2005<br />

Count Search Term<br />

3225909 cell phone<br />

98607 cell phone plan<br />

28751 nokia cellular phone<br />

10921 samsung cellular phone<br />

8879 att cellular phone<br />

8809 ericsson cellular phone<br />

7593 cheap cellular phone<br />

7210 lg cellular phone<br />

6382 cellular phone wallpaper<br />

5616 verizon cellular phone<br />

5517 cellular phone ringtone<br />

4841 cellular phone number lookup<br />

4526 cellular phone company<br />

4124 cellular phone directory<br />

4064 free cellular phone wallpaper<br />

3710 cell phone headset<br />

3621 us cellular phone<br />

3523 cellular phone numbers<br />

3509 sprint cellular phone<br />

3299 free cellular phone ringtone<br />

3293 cellular phone deal<br />

found in titles that display to users. The optimal length for a title<br />

is shorter than 50 to 60 characters, [as] longer titles are cut off in<br />

search results, in browser windowpanes, and make poor [default]<br />

bookmarks.”<br />

So, the lessons are clear: while there are many important<br />

activities that will result in great search engine placement, you<br />

must absolutely address your title tag. Give it some thought, use<br />

the techniques and suggestions mentioned above, and you should<br />

have a great title tag for your site that helps you obtain more<br />

website traffic. P!<br />

PING! ZINE WRITER BIO<br />

Derek Vaughan has been an active Internet marketer since 1995.<br />

His marketing experience includes online direct marketing of books<br />

for NYSE-traded book publisher Thomas Nelson, serving as online<br />

marketing manager for the ESPNstore.com, and being marketing<br />

manager for the launch of the NASCAR Online Store. In web hosting,<br />

he served for three years as Senior Director of Marketing for Affinity<br />

Internet. Most recently Mr. Vaughan has been consulting with http://<br />

www.cheaphostingdirectory.com. He holds degrees from Indiana<br />

University School of Music and Purdue University, as well as an<br />

MBA from the Owen School at Vanderbilt University.<br />

As you can see, according to the tool, ‘mobile phone’ is not<br />

commonly searched – at least relative to other terms. It would<br />

thus be better to be found under the search term ‘cell phone’.<br />

Experimenting with the tool and starting from the general (e.g.<br />

you could use the search term “phone”) will give you a sense of<br />

which terms are best for your title tag.<br />

Another important tip – be sure to place your most important<br />

keywords at the beginning of the title tag. For most companies,<br />

this will not be your company name (you should save that for the<br />

end of the title).<br />

Brent Conver, Manager of Professional Services at Affinity<br />

Internet, Inc. had this to say regarding a website’s title tag: “The<br />

title tag is crucial to any optimization effort, as it is the first item<br />

on the website that is seen by the search engines. It is important<br />

that your targeted keyword phrase be in your title tag, as close to<br />

the front of the tag as possible.” He continued, stating that “an<br />

effective title tag has greater implications to your website than<br />

just ‘SEO’ [search engine optimization] – it has real marketing<br />

value as well.”<br />

An additional word of caution – don’t put everything under<br />

the sun into your title tag, thinking that you will benefit from<br />

having a vast number of terms listed. Asked for his thoughts on<br />

title tag usage, Mr. Detlev Johnson, Vice President of Consulting<br />

with Position <strong>Tech</strong>nologies (http://www.positiontech.com)<br />

stated, “The importance of writing titles cannot be understated<br />

– keyword stuffing is a mistake, [because] branding and clicks<br />

are too important.” He continued, “Search engines credit terms<br />

www.pingzine.com 37


SERVER SECURITY<br />

Making the Right Choice<br />

of Identity and Trust Assurance (ITA)<br />

Infrastructure Can Boost E-commerce<br />

by Steve Roylance<br />

As the Internet continues to expand, so do the challenges<br />

for new e-business brands wishing to differentiate<br />

themselves from a multitude of “similar” providers, all<br />

of whom are vying for a share of increased online business. With<br />

a plethora of experts offering new and innovative ways of driving<br />

additional traffic to emergent sites, and with the simplicity of<br />

advertising campaigns such as Google Adwords, in most cases<br />

“traffic generation” is not the biggest problem. “Conversion”<br />

– taking a visitor and turning them into a customer – is one of<br />

the most important hurdles that new e-business brands must<br />

overcome.<br />

Optimizing conversion in website traffic is a direct function of<br />

managing consumer trust. The higher the consumer trusts a site, the<br />

higher the conversion rates for that site. Well-established brands<br />

rely heavily on their brand integrity, improved service levels<br />

and expanded offerings to entice business from new consumers.<br />

Larger brands therefore have effectively translated the internet<br />

“web trust” model into a revenue-generating strategy.<br />

However, “unknown brands” are at a significant “trust”<br />

disadvantage, and they experience tremendous pressure to<br />

differentiate themselves to survive. With no means to compete<br />

directly with stronger, more established brands, new brands<br />

are forced to focus on two alternative methods to grow market<br />

share. The first, and rather more risky strategy, entails providing<br />

higher and higher discount levels. By its very nature, it minimizes<br />

margins and profitability, and more often than not, results in a far<br />

greater failure rate. The alternative method relies on maximizing<br />

the use of an ITA (Identity and Trust Assurance) infrastructure.<br />

This method yields a far higher rate of return on investment, and<br />

more importantly, it proves to be highly effective at building<br />

loyalty in a shorter time frame.<br />

So, what is Identity and Trust Assurance and why does it<br />

succeed when compared to the alternative choice of offering<br />

lower prices? For example, consider two competing restaurants,<br />

both offering a similar selection of foods. If the higher-priced<br />

restaurant actually has customers sitting down and eating, this<br />

offers a far more powerful influence to potential new consumers<br />

than the restaurant with lower prices. This clearly indicates how<br />

trust and assurance can be more persuasive than price, and is one<br />

of the reasons why many websites offer case studies (i.e. people<br />

already eating) to provide reassurance to new customers. Even<br />

more powerful tools and techniques to provide trust and assurance<br />

should also be implemented, right across the website, to provide<br />

consumers with recognized trust credentials that can help them<br />

manage their risk. Some examples of these technologies include<br />

high assurance SSL certificates – or a web seal to assure customers<br />

that the site is “Hacker Proof.”<br />

How Trusted <strong>Tech</strong>nologies Work<br />

To date, one of the key reasons for the growth of the Internet<br />

as an e-commerce engine has been the widespread deployment<br />

of security technologies implemented within browsers and web<br />

38 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


servers – most notably the use of SSL (Secure Sockets Layer)<br />

encryption. The use of SSL has invariably encouraged online<br />

commerce, and as a result, the Internet economy has come to<br />

depend on SSL to provide the trust infrastructure. Since the SSL<br />

protocol was released by Netscape as a security technology in<br />

1996, consumers have been educated to look for the SSL padlock<br />

before passing any critical details over the Internet. <strong>Tech</strong>nically,<br />

the SSL protocol provides an encrypted link between two parties,<br />

however in the eyes of the consumer, seeing the SSL padlock has<br />

become so much more, letting people know that:<br />

• That they have a secure, encrypted link with the website<br />

• That the website displaying the padlock is a valid and<br />

legitimate organization, or an accountable legal entity<br />

Unfortunately, however, whilst this was originally the true<br />

meaning of the padlock, changes in the validation practices of a<br />

handful of Certification Authorities created an alternative, lowercost<br />

SSL certificate type that did not fulfil the previous stringent<br />

validation practices used to verify the authenticity of the applicant.<br />

Over time, these ‘Low Assurance’ certificates were incorrectly<br />

deployed on numerous e-commerce websites, rather than being<br />

used for the actual role they were designed to fulfil (i.e. serving<br />

the needs of mail servers, Intranets, SSL VPNs or other similar<br />

devices where organizational details were not a requirement). The<br />

result was an erosion of trust in the internet experience.<br />

To combat this new confusion in the market place, web browsers<br />

such as Opera 8 and the forthcoming Internet Explorer 7.0 will<br />

display new information within the padlock, to help consumers<br />

differentiate between “high assurance” and “low assurance”<br />

certificates. Opera has chosen to display the organizational<br />

details next to the padlock, whilst Microsoft have released a<br />

white paper on their enhanced security status bar, highlighting<br />

the ease by which information can be found on the ‘entity’<br />

through new dropdown padlock functionality. They state that<br />

“With the explosion of small- and home- based business websites<br />

selling goods that span the pricing spectrum, users are even more<br />

likely to encounter unknown entities asking for their financial<br />

information. These factors combine to create a situation ripe<br />

for malicious abuse. Internet Explorer 7 addresses this issue by<br />

providing users with clear and prominent visual cues to the safety<br />

and trustworthiness of a website”<br />

It is therefore absolutely essential that any new e-commerce<br />

business uses a “High Assurance” SSL certificate on their secure<br />

payment and data collection pages, to ensure the highest level of<br />

consumer trust.<br />

Another strategy to improve trust credentials of a site that<br />

“levels the playing field” for many new e-merchants is to<br />

utilize additional site seal/trust indicators, proven by numerous<br />

consumer study groups to be a particularly effective technique<br />

of influencing consumer buying behavior. These act to provide<br />

a positive indicator of trust in the authenticity of the site, while<br />

the additional brand strength from the seal itself gives consumers<br />

additional confidence. Examples of cross industry third party<br />

www.pingzine.com 39


SERVER SECURITY<br />

site assurance seals include those offered<br />

by the Better Business Bureau® (www.<br />

bbb.org – certifying business practices),<br />

TRUSTe (www.truste.org – certifying<br />

privacy and assurance practices), and<br />

HackerGuardian (www.hackerguardian.<br />

com – certifying vulnerability-free<br />

hardware). When combined with industry<br />

specific accreditations, the branding mix<br />

offers a compelling level of trust and<br />

assurance to new visitors.<br />

Site seals were initially proven to be most<br />

effective when used on landing pages and/<br />

or home pages, providing confidence at the<br />

time of arrival to the website. However as<br />

search engines now efficiently index entire<br />

sites, the possibility exists that any page<br />

becomes a landing page and therefore<br />

needs to evoke trust and assurance<br />

immediately. The latest evolution in site<br />

seal technology – “Corner of TrustLogo”<br />

– was announced by Comodo last month,<br />

and offers a consistent image which can<br />

be used across an entire website. With<br />

active “Point to Verify®” technology, the<br />

seal allows essential trust credentials to<br />

be presented to users by simply moving<br />

a mouse across the seal. Therefore, a<br />

combination of High Assurance SSL<br />

and the associated site assurance seals,<br />

together with the right mix of third party<br />

trust providers, can provide a baseline ITA<br />

infrastructure.<br />

But how do emergent brands also evoke<br />

trust in their own brand? There are two<br />

possibilities – visitors may recognize the<br />

name of the organization, or they may<br />

not. If they do, they need some way to<br />

verify that they truly are the company they<br />

claim to be (or an authorized member of<br />

a credentialed organization), which will<br />

enable them to decide whether to entrust<br />

it with their card details (and their money).<br />

If they do not recognize the company,<br />

they need to be provided with a method to<br />

verify that a trusted third party recognizes<br />

the organization. For example, consider<br />

the way a currency exchange works:<br />

Bank notes handed to a traveler may be<br />

completely unrecognizable to a traveler, not<br />

having visited that particular destination<br />

before, however trust is provided by<br />

the currency exchange that the notes are<br />

genuine. Also, the notes themselves have<br />

verification technologies built into them,<br />

such that the traveller is able to recognise<br />

alternative denominations on arrival at<br />

their destination.<br />

In much the same way, ‘Content<br />

Verification’ technologies such as<br />

VerificationEngine (www.vengine.<br />

com ) are freely available to consumers,<br />

such that by simply moving their mouse<br />

over a logo or brand, an indicator will<br />

appear around the border of their system<br />

if the brand is to be trusted. As advocacy<br />

groups continue the process of education,<br />

these technologies will herald a new level<br />

of understanding in consumers. This will<br />

in turn drive merchants to increase still<br />

further their ITA infrastructure, building<br />

more confidence into the internet, building<br />

trust in the internet and a still further<br />

increased demand for e-businesses.<br />

P!<br />

PING! ZINE WRITER BIO<br />

Steve Roylance is the <strong>Tech</strong>nical Marketing<br />

Director for Comodo, based in their European<br />

Headquarters in Manchester, UK. Steve is<br />

directly responsible for the implementation<br />

of the go-to- market strategy for the Identity<br />

and Trust Assurance product range,<br />

funneling the feedback from major partners<br />

into the various development groups, and<br />

harnessing the power of Comodo’s Digital<br />

Trust Lab to bring to market an ever widening<br />

portfolio of ITA products.<br />

40 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


www.pingzine.com 41


SERVER SECURITY<br />

PING! ZINE WRITER BIO<br />

Eran Aloni is marketing director for Blue Security,<br />

developer of the The Do Not Intrude Registry, a<br />

community-based anti-spam solution that stops the<br />

flow of unsolicited e-mail to people who do not wish<br />

to receive it. Previosly, Eran was a senior program<br />

manager at Microsoft’s ISA Server group and an<br />

assistant VP at Comverse, a leading provider of<br />

software and systems-enabling, multimedia valueadded<br />

services in wireless and wireline networks.<br />

THE<br />

SPAM<br />

ECONOMY<br />

When one considers the<br />

remarkably low operating<br />

costs involved in operating a<br />

spam business, and the facts that at least<br />

seventy-five percent of worldwide e-mail<br />

traffic consists of spam (with roughly ten<br />

percent of internet users reporting having<br />

purchased products or services advertised<br />

by spam), it is clear that spam is a very<br />

lucrative business concept.<br />

While few statistics exist regarding how<br />

much money can be made by sending spam<br />

messages, recent court victories provide a<br />

glimpse into the world of spammers. Scott<br />

Richter, formerly known as the “Spam<br />

King,” has recently reached a settlement<br />

with Microsoft, agreeing to pay $7M in<br />

damages. The New York Attorney General,<br />

Eliot Spitzer, estimates Richter cleared<br />

millions in monthly profits, all derived<br />

from sending spam.<br />

Most current solutions to spam consist<br />

of defensive filtering concepts. While<br />

filters may hide the problem from the end<br />

users that can afford to buy and maintain<br />

them, this technology suffers from, among<br />

other weaknesses, lack of accuracy in<br />

distinguishing spam from legitimate<br />

messages. Additionally, filters do not<br />

42 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />

by Eran Aloni<br />

address the dynamics of the spam economy<br />

that motivate spammers to continue<br />

sending millions of messages every day<br />

– in fact, filters actually cause spammers<br />

to increase the amount of spam they send,<br />

in an effort to maintain their spam’s total<br />

reach. Because sending e-mail is almost<br />

free, increasing e-mail output can be done<br />

at almost no additional cost. Consumers<br />

and organizations that need to continually<br />

invest in better filters to process all this<br />

additional traffic pay the price.<br />

On the legal front, industry heavyweights<br />

such as Microsoft and AOL have been<br />

aggressively suing spammers for violation<br />

of the CAN-SPAM Act of 2003. While<br />

both of the aforementioned companies<br />

have had their fair share of court winnings,<br />

the number of spammers actually brought<br />

to justice is minimal.<br />

Faced with legal threats and technical<br />

challenges, such as more advanced filters,<br />

spammers are as persistent as ever. All the<br />

efforts and financing put into the “spam<br />

wars” have not yielded the desired results<br />

– spam remains on the rise, affecting<br />

essentially anyone with an e-mail address.<br />

It is clear that a viable solution to spam<br />

must address the spam economy, while<br />

ensuring that the spammer’s incentive<br />

to send spam is eliminated (or at least<br />

reduced).<br />

Let’s take a deeper look into the works<br />

of a spammer to better understand the<br />

allure of spam.<br />

The Spam Cycle<br />

A typical spam cycle includes the<br />

following steps:<br />

1. E-mail address collection – also<br />

known as harvesting – is a process in<br />

which the spammer retrieves millions of<br />

e-mail addresses which can be sent spam.<br />

The one-time cost of a mailing list with<br />

millions of addresses is typically less than<br />

$60.<br />

2. Spam site creation – the spammer<br />

creates an online store from which<br />

prospective customers can place orders,<br />

following the spam-driven campaign.<br />

A specific “spamvertised” site remains<br />

online for the duration of the campaign.<br />

Designing a simple website can cost a few<br />

hundred dollars, and the monthly hosting<br />

fee from a spam-friendly ISP can amount


www.pingzine.com 43


SERVER SECURITY<br />

to another few hundred dollars a month.<br />

3. Next is the spam run” – the<br />

process in which the spammer sends out<br />

millions of e-mail messages as part of a<br />

specific campaign. Sending spam from<br />

compromised computers (“zombies”), a<br />

very common practice, does not incur any<br />

costs at all.<br />

4. Revenue generation – with the<br />

campaign on its way, and the online store<br />

live, the spammer sits back and counts<br />

the money coming in. Assuming a 0.01%<br />

sales conversion rate on one million e-<br />

mails, a spammer’s gross profit can range<br />

from$3,000 (porn website subscription),<br />

to $10,000 (Sex-related products) or<br />

even to $150,000 (home refinancing) per<br />

campaign.<br />

Getting Your Address<br />

Let’s take a look at the process from<br />

an economic standpoint, starting with e-<br />

mail lists. A list containing 300M e-mail<br />

addresses can be purchased online from<br />

$29.99 to $59.99. These lists are often<br />

automatically created by special software<br />

modules (called ‘bots’), which crawl the<br />

internet in search of e-mail addresses.<br />

For example, if you have participated in<br />

a newsgroup discussion and used your<br />

e-mail address, chances are you will be<br />

receiving spam to the e-mail address<br />

you’ve used for posting.<br />

44 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />

Since e-mail addresses are easily obtained<br />

from across the internet, e-mail lists are also<br />

relatively low-priced. Spammers utilize<br />

a variety of other technical methods to<br />

harvest addresses too, such as “dictionary<br />

attacks” (automatically guessing common<br />

e-mail addresses) and “P2P harvesting,”<br />

in which spammers exploit peer-to-peer<br />

(e.g. filesharing) networks to obtain e-mail<br />

addresses.<br />

Sending You Spam<br />

Each spam campaign advertises a<br />

specific type of product. The types of<br />

products favored by spammers include<br />

generic prescription drugs, mortgages<br />

and sex-related products. The spammer<br />

usually sets up an online store selling the<br />

advertised product. Those online stores<br />

exist only for a few days, and are moved<br />

from one hosting provider to another.<br />

Typically, those hosting providers are<br />

“spam-friendly” and are willing to host<br />

spam-sites in exchange for high hosting<br />

fees.<br />

Once spammers obtain an e-mail list<br />

and set up an online store, running a<br />

spam campaign is the next step. Although<br />

the spammer is interested in sending out<br />

millions of e-mail messages, but sending<br />

such massive amounts of e-mail would<br />

normally incur significant costs, if done in a<br />

conventional manner. To avoid these costs,<br />

spammers do not typically send out all<br />

these messages from their own servers, but<br />

rather use compromised machines, known<br />

as “zombies,” to send their messages.<br />

Notably, many recent virus outbreaks were<br />

launched to create a network of “zombies”<br />

that could be controlled remotely. Such<br />

machines are used to send out spam e-<br />

mails, often without the knowledge of<br />

their owners.<br />

Assuming spammers rely on 3rd party<br />

infrastructure like zombies, their costs for<br />

sending spam are limited to their own ISP<br />

hosting fees. In such a situation, there is<br />

almost no difference in cost for the sender<br />

to send an e-mail message to one million<br />

recipients versus sending it to a single<br />

recipient. So, in essence, when running<br />

a spam campaign, the spammer actually<br />

uses other people’s resources, incurring<br />

little expense in the process.<br />

Making Money<br />

at Your Expense<br />

With the e-mails on their way, the<br />

spammer waits for customers. Industry<br />

surveys show at least ten percent of the<br />

population actually buys products and<br />

services advertised via spam. In specific<br />

product categories, the percentage of<br />

people buying spamvertised products is<br />

even higher – a recent survey conducted<br />

by the Better Business Bureaus showed<br />

twenty-one percent of American e-<br />

mail users have bought software from<br />

a spammer, while twenty-two percent<br />

purchased apparel and jewelry advertised


y spam. Another thirty-nine percent<br />

admit to clicking on spam links even if<br />

they don’t actually buy the goods. Thus,<br />

the business case for a spam operation is<br />

clear – send out millions of messages (or<br />

ads) at very low cost, and expect a high<br />

conversion rate of paying customers.<br />

Although spam is indeed an appealing<br />

business from the spammer perspective,<br />

it is one of the greatest annoyances to e-<br />

mail users in general, creating immense<br />

losses in productivity costs. In the last few<br />

years, despite significant efforts to fight<br />

spam, spam volume actually increased to<br />

above seventy-five percent of all e-mail<br />

traffic. Another ten percent is composed of<br />

phishing attempts (scams imitating known<br />

brands to fool users into giving their<br />

account details) and viruses aiming to<br />

create bot networks of zombie computers<br />

to facilitate spam sending. According to<br />

the 2004 National <strong>Tech</strong>nology Readiness<br />

Survey (NTRS), online users in the United<br />

States spend an average of three minutes<br />

deleting spam each time they check e-mail.<br />

Aggregating their usage across the 169.4<br />

million online adults in the United States,<br />

this equals 22.9 million hours a week, or<br />

$21.58 billion annually when based on the<br />

average working wage.<br />

Fighting<br />

Spam with Filters<br />

The technology industry has been<br />

waging war on spam for a few years.<br />

Spam filters are the most established<br />

technical solutions in the market. Filters<br />

are a passive means of defense, analyzing<br />

incoming messages and separating the<br />

spam from legitimate messages. As a<br />

result, spammers are constantly coming<br />

up with ways to bypass them.<br />

While filters may alleviate some of the<br />

problem for end users that can afford them,<br />

they introduce their own set of problems.<br />

Being an automatic sorting technology,<br />

filters suffer from false identification of<br />

spam and legitimate e-mails. If a spam<br />

e-mail passes through the filter (known<br />

as a false negative), the user must waste<br />

time in seeing the message and deleting<br />

it. If a legitimate e-mail is tagged as<br />

spam, and does not reach the intended<br />

recipient (known as a false positive), the<br />

result is a lost business or communication<br />

opportunity. In general, filters reduce e-<br />

mail reliability as an effective business<br />

communication tool.<br />

Unfortunately, filtering does not impact<br />

the spam economy, but rather encourages<br />

spammers to innovate and invent new<br />

means to bypass filtering schemes. In<br />

addition, spammers are inclined to send<br />

even more spam since they know that a<br />

large percentage of their traffic is blocked<br />

by filters.<br />

Fighting<br />

Spammers in Court<br />

In January 2003, the US government<br />

stepped forward and enacted the CAN-<br />

SPAM Act. The Act defined the guidelines<br />

for sending unsolicited commercial e-<br />

mails, such as including a valid return<br />

address and providing a working, opt-out<br />

link in each message. The CAN-SPAM act<br />

also outlawed certain spammers practices,<br />

such as address harvesting and the use of<br />

“zombies” for sending mail.<br />

Almost three years after CAN-SPAM<br />

was passed, it has not done much to stop<br />

spam, although several industry giants,<br />

such as AOL and Microsoft, have been<br />

aggressively bringing spammers to court<br />

for CAN-SPAM infringements. Microsoft<br />

won a $7M settlement from Scott Richter,<br />

a man known as one of the world’s most<br />

prolific spammers. AOL even ran a spam<br />

sweepstakes among its members, sharing<br />

the money it was awarded by the court in<br />

its lawsuits.<br />

Legal efforts to bring spammers to court<br />

do impact the spam economy, at least for<br />

those spammers affected directly. However,<br />

the number of spammers brought to court<br />

is very small. In general, anti-spam laws<br />

are extremely hard to enforce due to the<br />

global nature of the internet and spam<br />

operations.<br />

Registry and<br />

Opt-Out Solutions<br />

Before there was spam, there were<br />

telemarketing calls. When the annoyance<br />

was too much, the US government<br />

stepped in and created the “Do Not Call”<br />

registry. Now people had a choice – they<br />

could join the registry and stop receiving<br />

telemarketing calls altogether, or they<br />

could opt-in and continue to receive<br />

commercial calls. In a similar line of<br />

thought, the CAN-SPAM Act called for<br />

creating a national do-not-spam registry,<br />

created to stop spammers from sending<br />

spam to registered e-mail addresses. It was<br />

later decided that such a registry would<br />

not be enforceable by the government, and<br />

thus would not serve its purpose.<br />

Taking the lead on this initiative, some<br />

companies, such as Blue Security, have<br />

created commercial “Do Not Disturb”<br />

registry-based solutions. Other companies,<br />

such as LashBack <strong>Tech</strong>nologies, have taken<br />

the “Safe unsubscribe” approach, allowing<br />

users to automatically unsubscribe from<br />

those spammers that are likely to honor<br />

such request.<br />

E-mail Payment Systems<br />

And, finally, there are those who tout<br />

using a stamp-like system for e-mail. There<br />

are a number of variations on this idea,<br />

including making senders pay for e-mails<br />

rejected by their recipients, or paying for e-<br />

mails with computational power. However,<br />

these ideas have not matured enough to<br />

gain widespread industry support.<br />

How Will<br />

This Battle End?<br />

Analyzing the way spammers work, it is<br />

clear a new approach is required to solve<br />

the spam problem. We need to change the<br />

spam equation and raise the cost of sending<br />

spam. Tying the cost of sending spam to<br />

the number of recipients will ensure that<br />

spammers diligently clean their list of those<br />

who do not want to receive spam offers in<br />

their e-mail. Eventually, we’ll reach a point<br />

where spammers will send advertisements<br />

to the approximately twenty percent of the<br />

population that actually buys from them.<br />

The rest of us will be able to reclaim our<br />

internet experience and enjoy spam-free e-<br />

mail once again. Only time will reveal the<br />

outcome of this battle – but, let’s hope it is<br />

not the spammers who prevail!P!<br />

www.pingzine.com 45


SALES & MARKETING<br />

PING! ZINE WRITER BIO<br />

For further details on this topic or related<br />

Pay Per Click affiliate information,<br />

contact Tiffany Guarnaccia {Tiffany.<br />

Guarnaccia@Searchfeed.com} or visit<br />

www.Searchfeed.com<br />

by Searchfeed.com Corporate Communications<br />

............................................................<br />

A captivating and successful Pay Per Click (PPC) affiliate<br />

implementation encourages internet visitors to leave a site through a<br />

profitable exit route, while still ensuring they will come back for return<br />

visits. Accomplishing this goal means integrating relevant content that<br />

maintains branding and creates a valuable site resource through proper<br />

content placement and advanced integration tools. This may seem like a<br />

difficult process, but it can easily be achieved through the following six<br />

simple steps.<br />

46 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


1Create a place of value and interest for online visitors.<br />

Start by adding site features that encourage interaction.<br />

For example, providing polls, review sections or article<br />

submissions creates a more robust resource that visitors will want<br />

to return to. This prevents the affiliate site from being seen only<br />

as “a middle man” and provides visitors with an additional outlet<br />

of informational sources.<br />

2<br />

Research your site’s user behavior patterns. Studying and<br />

understanding visitors’ activity patterns can offer valuable<br />

insight, and allow for fine-tuning of site content to further<br />

satisfy the visitors’ needs. This will capture their interest, and<br />

help to establish a more solid site audience.<br />

3<br />

Only add relevant site content – it’s as simple as that. Content<br />

or information-based affiliate sites should provide relevant<br />

content that matches their site’s theme or focus. Don’t make<br />

the mistake of adding non-relevant terms, just because they have<br />

a higher cost per click. If an internet surfer comes to a site looking<br />

for refrigerators, they are not likely to click on a paid link for diet<br />

pills. Relevant content presents more options to the visitors, again<br />

ensuring confidence, and prompting return visits.<br />

4<br />

Place sponsored content where it is immediately visible.<br />

Without overwhelming a site, place content “above the<br />

fold” or where it is clearly visible upon first viewing the<br />

homepage. This places the information at the visitors’ hands,<br />

allowing them to either choose to further explore the site, or click<br />

on an ad to transport to outside sources.<br />

5<br />

Be conscious of site aesthetics – a particularly important<br />

consideration, as they can dramatically influence the<br />

visitors’ experience. Coordinating all fonts and colors, thus<br />

ensuring consistency with the site’s branding, can easily create a<br />

visually pleasing site. With most types of text-based ads, the look<br />

and feel can easily be adjusted to exactly match a site.<br />

6<br />

Use all integration tools available. Take full advantage<br />

of integration tools that provide value-added services for<br />

site visitors. Tools like Searchfeed.com’s Search Engine<br />

Generator or the MIVA Ad Revenue Xpress’ Search Box<br />

feature simply places a paid search box on an affiliate’s site.<br />

These methods maintain site branding, and create an additional<br />

resource for visitors. Using tools that maintain branding through<br />

seamlessly integrated content further secures a higher percentage<br />

of site visitor returns.<br />

In conclusion, if knowledge is power, then any affiliate has<br />

a powerful advantage if they use the above six steps to get<br />

maximum results from a PPC program. The use of enriched<br />

content, combined with ensuring excellent matches between<br />

informational and ad placement can provide a positive experience<br />

for visitors, ensuring their return.<br />

P!<br />

P!<br />

www.pingzine.com 47


SALES & MARKETING<br />

>>>>>>>>>>>>>>>>>>>><br />

E-mail Marketing:<br />

Tips for Improving<br />

Response &<br />

Return On<br />

Investment<br />

by Dan Lok<br />

E-mail has resulted in a revolution in marketing – indeed, a<br />

veritable explosion in messaging. For some it is a godsend, in its<br />

role as a technology and method that allows people to sell products<br />

and services quickly and effectively. For others, it’s a “doomsday<br />

device,” resulting in a flame-filled mailbox with angry messages<br />

from those who insist they will never again be customers.<br />

<strong>Web</strong> conversion expert Dan Lok says you must learn several<br />

special techniques before you can truly leverage and make<br />

maximum use of e-mail—the internet’s wunderkind.<br />

Here are some of Dan’s most important keys to successful e-<br />

mail marketing campaigns:<br />

1. Get Permission. Use web page sign up forms or “postcard”<br />

48 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />

return cards, but get permission in a valid way. Also, consider<br />

creating and offering incentives for people to sign-up online to<br />

receive value-added information.<br />

2. Target carefully and make it relevant. Send only relevant e-<br />

mail to opt-in subscribers. Develop and give people what they<br />

want and what you promised; avoid sending e-mail that is outside<br />

the scope of what was promised to those who opted in. Also,<br />

consider targeting and segmenting your subscriber base, to tailor<br />

your messages to specific demographic characteristics.<br />

3. Your Subject Line is Critical. Don’t make it look or sound like<br />

spam. The purpose of the subject line is not to sell, but is rather<br />

to get people to open the e-mail – and that’s it! So, be careful<br />

of the words you select. Also, check your e-mail against a spam<br />

checker, to see that it doesn’t contain words or patterns that will<br />

likely result in deletion.<br />

4. Use your personality. Talk in the first person (i.e. use “I”) and<br />

develop your persona as a friend or as an expert. E-mail is far more<br />

effective if you define your persona based on your customers’<br />

needs and desires, as well as on professional behaviors.<br />

5. Don’t sell – Advise, advise, advise! Offer value-added problem<br />

solving information, advice, tools and help. You can thus use your<br />

e-mail to inspire others to call you or visit your web site. Also,<br />

offering people more of what they like helps build your personal<br />

relationship with them, and by extension, your customer base.<br />

6. Create a single, clear and benefit-laden “call for action.”<br />

Focus on getting people to take one action, and don’t offer more<br />

than one action. Identify the action clearly and persuasively, and<br />

track the results. The goal is to get them to click (thus transporting<br />

them to a relevant landing page), which can then “net” them to<br />

take further action.<br />

7. Create a life-cycle campaign. Design a program that results<br />

in you sending out four to six messages over a six-to-eight week<br />

period. These recurring campaigns can be created in advance, and<br />

operated in a totally automated fashion.<br />

8. Use “triggered” e-mail. Design and set up automated e-mail<br />

campaigns, so that when clients order a product, sign-up for<br />

items, or request information online, a suite of e-mail messages<br />

are automatically sent to them periodically.<br />

9. Use e-mail to get them to click! E-mail is most effective when<br />

kept short; strive for no more than three or four pages. Relate the<br />

first paragraph to the subject line. Also, try to drive people to a<br />

web page, and then close the sale there – don’t try to close the<br />

sale with an e-mail. Also, don’t mention price or cost in e-mail<br />

– the purpose of the e-mail is to pre-sell. Again, the goal is to get<br />

them to click, then go to your web page, where you can do the<br />

selling there.<br />

10. Comply with CAN-SPAM Act requirements. Send from a<br />

valid address, and promptly comply with all remove requests.<br />

Never send a second e-mail to someone who has requested<br />

removal. P!<br />

PING! ZINE WRITER BIO<br />

For more information, visit http://www.websiteconversionexpert.com.<br />

Dan’s web site contains one of the best lists you’ll<br />

ever find of recommended online marketing technologies to<br />

enhance and update marketing. Or, get in direct contact with<br />

Dan Lok at (604) 583-4999, or by e-mail at danielok@shaw.ca


www.pingzine.com 49


BUSINESS ISSUES<br />

How To Drive<br />

Customers To Your <strong>Web</strong>site<br />

.......................................................................<br />

by Brad Stone<br />

As I mentioned in my last article,<br />

having a website will not magically<br />

result in customers visiting, without<br />

you driving them there. I compared<br />

improperly marketed websites to being<br />

equivalent to retail stores without<br />

windows, doors or signs, located on<br />

property with no roads or sidewalks.<br />

In other words, having a great website<br />

that looks professional and is salesoriented<br />

is very important – but it<br />

won’t give you business, unless you do<br />

something to direct potential customers<br />

there. There are several ways of doing<br />

just that:<br />

1. List your <strong>Web</strong> Address – Put your<br />

web address on all of your business<br />

cards, stationery, brochures, flyers,<br />

signs, and yellow page ads. (By the<br />

way, did you know that if you and your<br />

competitor have the same size yellow<br />

page ad, but they have their website<br />

listed while you don’t, 65% of the<br />

customers looking for your service or<br />

product will go to your competitor’s<br />

business before they go to you? See<br />

http://www.yellowpagepartners.com<br />

for more information.)<br />

2. Leverage Search Engine<br />

Optimization (SEO) – Getting your<br />

website listed “high” in the common<br />

search engines is not quick nor easy.<br />

Although we don’t have the exact<br />

formulas or algorithms that Google or<br />

Yahoo use to determine the rankings<br />

of websites, we do have a pretty good<br />

understanding of the things that lead to<br />

better ranking – both engines put a lot<br />

of importance on the web pages that<br />

are linked to your site.<br />

3. Consider Pay Per Click (PPC)<br />

Advertising – This is when you pay<br />

search engines such as Google or<br />

Yahoo to list your (linked) ad on<br />

the first or second pages of certain<br />

keyword searches. You normally<br />

bid against other advertisers for the<br />

placement position of your ad – the<br />

higher you bid, generally, the higher<br />

your placement. We have been using<br />

this avenue for our business and are<br />

currently receiving a 400% return on<br />

our marketing dollars.<br />

4. Submitting Articles on your<br />

Business – There are many sources<br />

that will receive your articles for<br />

publication. By getting your articles<br />

on the internet you’ll have many, many<br />

article pages that will be pointing back<br />

to your website. If someone is searching<br />

for a certain piece of information that<br />

your article covers, they will find your<br />

article through a search, and eventually<br />

end up at your website. Check out the<br />

following link for more information:<br />

http://www.ezinearticles.com<br />

I hope that I’ve given you a few things<br />

to think about. If you have questions,<br />

or would like more information,<br />

please feel free to give us a call at: 1-<br />

800-266-0799, or simply email me at<br />

brad@heritageusa.net. P!<br />

50 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


www.pingzine.com 51


BUSINESS ISSUES<br />

Transaction Fees<br />

Debit Cards vs. Credit Cards<br />

by Brad Bialas<br />

.......................................................................<br />

Many may ask: Is the cost of<br />

accepting a debit card the same as<br />

accepting a traditional credit card?<br />

Although the simple answer is “no,”<br />

your transaction processor may not be<br />

passing on the decreased processing<br />

cost. Many merchants believe that<br />

receiving a lower cost for debit cards<br />

requires additional equipment to enter<br />

the cardholder’s PIN at the time of an<br />

order. This is no longer the case.<br />

So-called “offline” debit transactions<br />

(i.e. those processed without a PIN)<br />

now qualify for lower rates, as a result<br />

of a class action lawsuit settlement<br />

against the primary credit card<br />

associations on June 4, 2003. Under the<br />

old system, debit card processing fees<br />

were traditionally the same as credit<br />

cards, unless a PIN was entered. Under<br />

the terms of the settlement, however,<br />

Visa and MasterCard were directed to<br />

significantly reduce the costs to process<br />

offline debit transactions.<br />

The initial debit rate was lowered<br />

in August of 2003, and focussed<br />

on “card present” transactions (i.e.<br />

transactions where the cardholder and<br />

the card are physically present at the<br />

time of purchase). Since then, Visa and<br />

MasterCard expanded the reduced debit<br />

processing costs to include “card not<br />

present” transactions – an action that<br />

can directly benefit mail/phone order<br />

and internet merchants. Unfortunately,<br />

the rate changes do not automatically<br />

ensure that your business is actually<br />

benefiting from the lowered rates.<br />

Whether you receive a reduced rate<br />

depends on your processor passing the<br />

decrease through to your business.<br />

In order to fully understand how<br />

to capitalize on these rates, you need<br />

to first understand each of the rate<br />

classifications and how they work.<br />

Step 1: Understand the basic rate<br />

categories<br />

The most common pricing method<br />

used by transaction processors is a<br />

three-tier categorization. Transactions<br />

are thus one of: 1.) Qualified, 2.) Mid-<br />

Qualified, or 3.) Non-Qualified.<br />

In most cases, for a purchase to be<br />

categorized as a Qualified transaction,<br />

the card must be physically present<br />

at the time of purchase and swiped<br />

through a point-of-sale terminal. For<br />

example, if I purchase a hockey stick<br />

from my local sports store, and the<br />

cashier swipes my credit card, that<br />

transaction will most likely be charged<br />

at the Qualified rate. However, if the<br />

cashier hand-keyed my transaction<br />

into a terminal, the transaction would<br />

likely move to the more expensive<br />

Mid-Qualified rate. Lastly, if I were<br />

to make the same purchase using one<br />

of my rewards program or corporateissued<br />

cards, the transaction would<br />

52 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


likely move to the most expensive<br />

Non-Qualified category, regardless of<br />

whether it was swiped or hand-keyed<br />

by the cashier.<br />

Step 2: Understand how these rates<br />

work with your business.<br />

Because most of you reading<br />

this article are probably not selling<br />

hockey sticks in a retail environment,<br />

it is worthwhile to review how these<br />

rate categories affect internet based<br />

transactions.<br />

The first thing to understand is that<br />

processing rates are generally higher<br />

for an internet merchant than for a<br />

merchant that swipes all transactions.<br />

Typically, internet transactions are<br />

classified as Mid-Qualified in the case<br />

of consumer cards, or non-qualified if<br />

they are reward program or corporate<br />

cards. So, if you do not swipe credit<br />

cards in a face-to-face setting, and<br />

someone is trying to sell you on a<br />

1.64% Qualified rate, you’re probably<br />

best to run away, because very few (if<br />

any) of your transactions will be in this<br />

rate category!<br />

Unfortunately, a great many<br />

merchants are lured with low Qualified<br />

rates, while the Mid-Qualified and<br />

Non-Qualified rates are significantly<br />

higher. To avoid surprises on your<br />

monthly merchant statement, it’s<br />

critical that you understand all possible<br />

rate categories and how your processor<br />

will classify transactions.<br />

Once you are satisfied with your<br />

Mid-Qualified and Non-Qualified<br />

processing programs, you want to<br />

ensure that you receive the decreased<br />

cost for “offline” debit transactions. As<br />

we stated earlier, Visa and MasterCard<br />

lowered the costs for these rates,<br />

however most processors are not<br />

passing the savings to the merchant.<br />

This is particularly distressing in light<br />

of our research – we have found that<br />

the average hosting company accepts<br />

internet debit payments for as much as<br />

thirty percent of their overall business.<br />

Moreover, after having seen hundreds<br />

of credit card processing statements<br />

specifically from hosting companies,<br />

we can report that only a handful<br />

of them have had the Internet debit<br />

rate correctly segregated, and even<br />

fewer have had the appropriate cost<br />

associated. Thus, leveraging the new<br />

rate structure can almost always have<br />

a very positive impact on your bottom<br />

line.<br />

Step 3: Make the new debit rate<br />

work for you.<br />

The easiest way to confirm that you<br />

are receiving the decreased cost for<br />

debit sales is to review your monthly<br />

merchant statement. The debit rate<br />

should be identified as a separate<br />

category, and be billed at a lower rate<br />

than your other sales. One still needs<br />

to be cautious, however! We have seen<br />

numerous advertisements and emails<br />

trying to lure in companies, by offering<br />

a low two-tiered plan. In other words,<br />

they offer a median priced Qualified<br />

and Non-Qualified rate, but they are<br />

not reporting a Mid-Qualified or Debit<br />

rate. In cases like this, the processor<br />

is capitalizing on your debit sales<br />

as opposed to passing the additional<br />

savings on to your business.<br />

To avoid the problems of a two-tiered<br />

system, be sure that you work with a<br />

three-tiered program: one that provides<br />

you the cost for a Debit transaction, a<br />

Mid-Qualified transaction, and a Non-<br />

Qualified transaction.<br />

To view a few examples of<br />

competitive debit rate programs being<br />

offered in this hosting industry, visit<br />

either 1) ModernAuthorize at http://<br />

www.modernauthorize.com (Click<br />

on the American flag) or 2) SWsoft<br />

at http://www.bluepay.com/landings/<br />

swsoft/programSWsoft.html<br />

Step 4: Make sure you are partnering<br />

with the right providers.<br />

Akin to almost any product you<br />

purchase for your business, the closer<br />

you get to the source, the lower your<br />

transaction processing cost will<br />

be. Unfortunately, many hosting<br />

companies purchase their payment<br />

processing services from sales agents<br />

and/or resellers that may be three or<br />

four levels down from the source.<br />

That means your business is filling<br />

the pockets of those independent sales<br />

agents, as opposed to building your<br />

bottom line.<br />

It can thus be very valuable to find out<br />

from who you purchase your payment<br />

gateway and merchant account. If you<br />

are not buying from the source (i.e.<br />

the direct merchant account provider<br />

and the author/development company<br />

behind the payment gateway), it may<br />

be time to look for another provider.<br />

By taking this step, you will inevitably<br />

be able to save on your processing<br />

costs. P!<br />

PING! ZINE WRITER BIO<br />

BluePay is a market-leading provider of direct payment processing<br />

solutions. With a focus on the ISP and Hosting markets, BluePay<br />

offers some of the most cost effective payment processing<br />

solutions available today. In addition, BluePay can customize<br />

their payment gateway to address any payment-processing<br />

environment. You can contact BluePay at http://www.bluepay.<br />

com or toll free at 866-613-5422.<br />

www.pingzine.com 53


BUSINESS ISSUES<br />

Winning<br />

The Click Fraud Battle<br />

by Boris Mordkovich<br />

.......................................................................<br />

Is Click Fraud a Problem?<br />

If somebody were to tell you that 20%<br />

of your advertising budget was being<br />

wasted on fraud, would you be worried?<br />

If you advertise on pay-per-click search<br />

engines, such as Google AdWords, Yahoo!<br />

Search Marketing (formerly Overture),<br />

MIVA, or others, you have a reason<br />

to be concerned.<br />

According to industry metrics, up<br />

to 20% (http://www.adwatcher.com/<br />

?clickfraud) of all pay-per-click activity<br />

delivered to advertisers is fraudulent.<br />

Two of the most common sources include<br />

competitors trying to deplete your<br />

account by repeatedly clicking on your<br />

ads, or a search engine’s partner or affiliate<br />

increasing their own bottom line<br />

by clicking on your ads.<br />

Whatever the source, the situation<br />

is even more complex because search<br />

engines never reveal their click fraud<br />

monitoring tactics. In fact, most simply<br />

state that they use a number of methods<br />

designed to filter out repetitive or invalid<br />

clicking, and then ensure that all<br />

clicks reported to their advertisers are<br />

genuine. For security reasons, however,<br />

they cannot disclose details of their protection<br />

methodology nor give any visual<br />

or system clues to indicate that click<br />

protection is active.<br />

What does this mean to you? As an<br />

advertiser you must rely on the effectiveness<br />

of the search engine’s fraud<br />

monitoring techniques. However, given<br />

that they actually stand to gain financially<br />

from fraudulent clicks (since your ad<br />

account is charged each time any click<br />

is made on the ad), this apparent conflict<br />

of interest with search engines is a<br />

tough pill for advertisers to swallow.<br />

Fortunately, there are a number of<br />

third-party tools available that monitor<br />

your ad campaigns and track potential<br />

fraudulent activity for a nominal monthly<br />

fee, such as AdWatcher.com and<br />

WhosClickingWho.com. These tools<br />

analyze every single click on your ad(s)<br />

and let you know if they detect suspicious<br />

activity.<br />

The question of the day, though, is<br />

what to do once a third-party tool tells<br />

you it has detected click fraud? What’s<br />

the correct process to follow to get your<br />

money back?<br />

The following is a step-by-step guide<br />

to help ensure a refund from the search<br />

engine:<br />

Getting Your Money Back<br />

1. Gather all of the information<br />

you have on the fraud occurrences over a<br />

specific time frame. You will need the ad<br />

campaign name, IP addresses, referring<br />

pages, geographic origin of the clicks in<br />

question, keywords that were searched<br />

for, the number and times of the clicks,<br />

and any other relevant data required by<br />

your search engine to process a claim.<br />

Third-party tracking services are able to<br />

provide you with all of this information,<br />

54 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


and therefore are particularly helpful in<br />

such cases.<br />

2. According to guidelines from<br />

Google, Yahoo, and other search engines,<br />

you should also include a paragraph<br />

describing the trends in logs and/<br />

or reports that have led you to believe<br />

the click activity is invalid.<br />

3. Once all the information is<br />

ready, contact the search engine. If you<br />

have an account representative, forward<br />

the data to him or her. If not, I highly<br />

recommend that you ask for one, as it is<br />

easier to deal with the same person on<br />

an on-going basis.<br />

Alternatively, you can send in the<br />

claim request to an email address specific<br />

to the search engine, such as:<br />

Google AdWords: adwordssupport@google.com<br />

(or use their Contact<br />

form)<br />

Yahoo! Search Marketing:<br />

feedback@overture.com (or use their<br />

Support Center)<br />

Other search engines have relevant<br />

contact procedures on their websites.<br />

4. After you submit the information,<br />

you will likely receive a response<br />

similar to one of these from a low-level<br />

representative:<br />

a) They have conducted the investigation,<br />

found the clicks fraudulent,<br />

and will issue the credit to your account.<br />

b) They are requesting additional<br />

supporting information, such as your<br />

traffic trends, server logs, etc.<br />

c) They may refuse to acknowledge<br />

that the clicks were fraudulent.<br />

Unfortunately, this happens quite often<br />

because search engines are reluctant to<br />

admit click fraud has made it through<br />

their monitoring system (for example,<br />

Google never refers to clicks as<br />

“fraudulent”, just “invalid” – https://adwords.google.com/support/bin/answer.<br />

py?answer=6432).<br />

5. If scenario a) or b) occurs, follow<br />

whatever instructions are provided.<br />

If (c) occurs, ask to speak to your<br />

contact’s supervisor. It may require<br />

numerous emails and/or phone calls to<br />

accomplish this, but remember – don’t<br />

take the first “no” as a final answer. You<br />

are, in effect, asking the search engine<br />

to hand over part of their profits, which<br />

is not something they likely will easily<br />

agree to.<br />

If fraud is detected using a 3rd party<br />

auditor, we recommend that you submit<br />

click fraud reports about once a month,<br />

since it takes time for the search engine<br />

to process and investigate them. This<br />

way, keeping track of the status of your<br />

refund will be less time consuming and<br />

easier for both sides.<br />

Click fraud is a growing problem for<br />

many advertisers – no matter how much<br />

you spend on pay-per-click advertising<br />

monthly. To make sure that you are not<br />

a victim, it’s necessary to take matters<br />

into your own hands: detect click fraud,<br />

and claim the refunds you are entitled<br />

to. P!<br />

www.pingzine.com 55


BUSINESS ISSUES<br />

Just Replace<br />

The Pilot<br />

by Ron Dunlap<br />

.......................................................................<br />

Taxiing down the tarmac, a jetliner<br />

abruptly stopped, turned around and<br />

returned to the gate. After an hour-long<br />

wait, it finally took off. A concerned<br />

passenger asked the flight attendant,<br />

“What was the problem?” “Oh. It wasn’t<br />

anything that important really. The pilot<br />

was bothered by a rumbling noise he<br />

heard in the engine,” explained the<br />

Flight Attendant, “and it took us a while<br />

to find a new pilot.”<br />

Yes, it’s a joke, but it reminded me<br />

of a conversation I had with a web host<br />

owner several years ago. “John” had<br />

just hired a new support manager to<br />

replace “Robert.” Robert had been with<br />

the company since they had opened, and<br />

was a very good support manager. It was<br />

surprising to me, because I knew Robert<br />

loved working there, so I asked what<br />

happened to Robert. I thought he was<br />

doing a pretty good job.<br />

John told me that his company was<br />

going through a growth spurt and it<br />

seemed his company’s support efforts<br />

were lagging behind. They were getting<br />

more and more emails and calls for<br />

support from their customers. I asked if<br />

the increased requests were complaints,<br />

or just the typical setup and operation<br />

questions that are expected with the<br />

influx of new customers. John said they<br />

were mostly setup questions, but there<br />

were so many of them they couldn’t get<br />

to all of them.<br />

Robert had been with the <strong>Web</strong> Host<br />

company from day one, and was a very<br />

good manager. I was eager to find out<br />

why Robert left so I asked, “Did Robert<br />

quit from not being able to deal with the<br />

added pressure or something?” “No,”<br />

said John rather abruptly, “Robert was<br />

doing everything he could to keep up<br />

with the problems, but he constantly<br />

complained that we needed to hire<br />

more people to handle the increased<br />

number of support questions!” That was<br />

reasonable, I thought, but John wasn’t<br />

finished… “His complaints finally got<br />

to me and I couldn’t take it anymore, so<br />

I finally just put a cork in it!”<br />

“Put a cork in it,” I asked, not sure<br />

where he was going with his story?<br />

“Yes! I fired him and hired a new<br />

support manager!”<br />

I was dumbfounded. “Well, maybe I<br />

am not following you. You fired Robert<br />

because he told you he needed to add<br />

more staff to handle the increased<br />

support requests?”<br />

“Yes, I sure did,” John said with<br />

conviction.<br />

Scratching my head, I asked another<br />

“dumb” question. “Well, did hiring<br />

the new manager decrease the support<br />

requests, or something?” I was still<br />

incredulous.<br />

“Nope. But the new manager never<br />

complains to me about adding more<br />

staff and that takes a lot of pressure off<br />

my shoulders!”<br />

Amazing!<br />

John thought it was better to get a “new<br />

pilot” that didn’t complain about the<br />

noise, rather than fix the real problem.<br />

Just so you know, the web host lost a lot<br />

of customers when Robert was let go. It<br />

also lost credibility over the next year,<br />

and was eventually bought out by one<br />

of the “mega-hosts” that gobbled up<br />

quite a few web hosts back then. John<br />

complained that he should have sold his<br />

company when they had more customers<br />

(ironically, that was when Robert was<br />

with them). And, sadder still, Robert was<br />

disillusioned with <strong>Web</strong> Hosting and left<br />

the industry. The remaining customers<br />

were absorbed by the “mega-host,” and<br />

hopefully received better treatment.<br />

I hear this kind of thing happening<br />

every so often and I always believe<br />

that greed is the motivating factor. All<br />

companies face problems, but not all<br />

web hosts deal with them the same way.<br />

Quality web hosts fix the “engine noise.”<br />

Bad web hosts just replace the pilot.<br />

P!<br />

56 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


Complete Automation and<br />

Virtualization Software<br />

Get Your FREE Copy<br />

of SiteBuilder Today!<br />

DOWNLOAD NOW!<br />

WWW.SWSOFT.COM/SITEBUILDER<br />

Innovative Ease of Use<br />

5Step Online Wizard<br />

100s of Quality Templates<br />

Free Product Updates<br />

Unlimited Email Support<br />

1-888-209-8900<br />

sales@swsoft.com<br />

www.pingzine.com 57


Ready to Attract More Hosting Customers?<br />

The Linux/UNIX Control Panel<br />

Innovative <strong>Web</strong>site Builder<br />

• Interface Control Mgmt<br />

• Broader OS Support<br />

• Domain Owner Mgmt<br />

• New Paging Options<br />

• Controllable Stats<br />

• Retooled Interface<br />

• <strong>Web</strong>based Install<br />

• AutoKey Update<br />

• International Ready<br />

• Advanced Security<br />

Advanced Windows Control Panel<br />

7.5.5<br />

Featuring:<br />

• 5Step Online Wizard<br />

• 300+ Rich Templates<br />

• Flexible Pricing Models<br />

New:<br />

• ECommerce Capabilities<br />

• Custom Plan Management<br />

• New Site Management<br />

2.0<br />

• Flexible Interface<br />

• Enhanced Statistics<br />

• Advanced Features<br />

TM<br />

MultiServer Management<br />

The Only True VPS <strong>Tech</strong>nology<br />

• Centralized Mail<br />

• Centralized DNS<br />

• Reseller Account Support<br />

• Flexible Application Mgmt<br />

• License Management<br />

• Designed for Hosting<br />

• Fast Performance<br />

• Always UpToDate<br />

• Sophisticated Engine<br />

• Small Update Footprint<br />

Effective Virus Elimination<br />

Core Advantages:<br />

• Complete<br />

• Proven<br />

• Powerful<br />

• Secure<br />

• Efficient<br />

2.7 3.5<br />

Profitable Uses:<br />

• True VPS<br />

• Advanced Shared<br />

• Dynamic Dedicated<br />

• Split Shared<br />

• Split Dedicated<br />

58 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />

The most complete hosting automation<br />

and virtualization solutions available


Find Out More About Our Proven Solutions<br />

Complete Hosting Automation<br />

HSPcomplete's capabilities:<br />

• Scale to Tens of Thousands of Accounts<br />

• Full Range of Hosting Services<br />

• Infrastructure Management<br />

• Integrated Billing System<br />

• Many Domain Registrars<br />

• Numerous Payment Gateways<br />

• Broad OS/Application Support<br />

• Easy Customization and Integration<br />

CarrierGrade Hosting Automation<br />

PEM's core capabilities:<br />

• Scale to Millions of Accounts<br />

• Complete OSS/BSS Platform<br />

• Full Windows/Exchange/SPS/SQL<br />

• Modular and Easy to Integrate<br />

• Customizable and Extendable<br />

• Truly Distributed and Clustered<br />

• MultiTier and MultiPlatform<br />

• Comprehensive Services<br />

Contact us today to learn more about our flexible pricing options, partner programs,<br />

OPEN FUSION integration initiative and 24/7 professional support.<br />

Call 18882098900<br />

or visit www.swsoft.com<br />

www.pingzine.com 59


PRODUCT REVIEW<br />

Unless you have been<br />

living under a rock,<br />

you know that payper-click<br />

(PPC) advertising<br />

continues to buzz. The<br />

US Marketing Forecast by<br />

Forrester Research (May 2005) suggests that we will see 33%<br />

growth in search engine marketing (SEM) this year and sustain<br />

11% growth per year over the next five years. This rapid<br />

growth will propel SEM spending to more than $11.6 billion by<br />

2010. As SEM grows, the cost of PPC advertising for popular<br />

keywords will increase significantly. With a large market and<br />

increasing complexity in PPC advertising, many small-to-mid<br />

sized businesses hesitate to use PPC advertising. Empowering<br />

small-biz owners to use SEM and PPC in particular is the goal<br />

of Boris and Eugene Mordkovich’s new book: “Pay-Per-Click<br />

Search Engine Marketing Handbook.”<br />

The Mordoviches PPC Handbook guides small business owners<br />

though the maze of PPC marketing. Covering topics from “What<br />

is Pay-Per-Click Search Engine Advertising?” to “Types of Pay-<br />

Per-Click Search Engines and Reviews” the book targets PPC<br />

neophytes. The introductory chapters provide an introduction<br />

to the pay-per-click concept, terminology and benefits. Copious<br />

amounts of jargon fill SEM, so understanding terms like CPC,<br />

CTR, and conversion rate are essential to an effective campaign.<br />

The PPC Handbook will certainly help you with these topics. If<br />

you’ve never deployed a PPC campaign, these early sections will<br />

arm you with sufficient information to get started at places like<br />

Google’s AdWords, Yahoo!, and similar PPC search engines.<br />

Though, I don’t do a lot of PPC advertising, I have used<br />

Google’s AdWords and Yahoo’s Search Marketing. If you have<br />

ever used either of these services, then you will probably find<br />

much of the information in this book a synopsis of information<br />

found at these PPC outlets. If you’ve not used PPC advertising,<br />

early chapters will teach you how to develop a campaign, how<br />

to open an account and how to track your results. For those with<br />

experience in PPC, you may glean the most from the chapters on<br />

tracking click fraud and contextual PPC advertising.<br />

The Mordoviches provide good tips on how and when to<br />

use contextual ads instead of paid search listings. The authors<br />

advise testing landing pages to determine which page provides<br />

the best results. Since you can often create multiple ads with the<br />

same copy, you can easily test landing pages by just changing<br />

the URL in the ad. Though simple, I suspect many of us rarely<br />

do this. Another good tip is to setup the same ad at different<br />

search engines and PPC outlets. In my own experience with<br />

FindWhat, Kanoodle, AdWords, and Yahoo!, I have found that<br />

I get dramatically different results. Since it is sometimes hard<br />

to know where your ad will be published, trying multiple search<br />

engines will help you determine the best place to maximize your<br />

60 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />

Pay-per-click Search Engine Marketing Handbook:<br />

Low Cost Strategies to Attracting New Customers<br />

Using Google, Yahoo & Other Search Engines<br />

Author: Boris Mordkovich, Eugene Mordkovich<br />

......................................................................................................<br />

by Jeff Huckaby<br />

return on the investment (ROI), sound advice when you have<br />

limited PPC dollars.<br />

Chapter 6 provides help on tracking click fraud. With experts<br />

estimating click fraud as high as 50%, keeping tabs on the<br />

fraudsters is essential. Click fraud lowers your ROI and clouds<br />

tracking statistics. The authors point out that click fraud can<br />

increase your advertising even if you are not targeted directly.<br />

Since click fraud increases the cost of a keyword, your advertising<br />

costs may increase, an impact I had not considered. The authors<br />

also highlight what they call “impression click fraud” using<br />

Google’s AdWords program. Using this technique, a competitor<br />

uses a script or robot to visit pages with your ads. They do not<br />

click on the ads, but simply lower your overall click through rate.<br />

If your rate falls to a very low level, Google may disable your ad,<br />

thus allowing competing ads to rise to the top.<br />

The PPC handbook includes reviews of several major PPC<br />

services. The reviews list the pros and cons of each engine, then<br />

minimum deposit and bid process. Having the bid prices and<br />

minimum deposits summarized can save you a lot of time.<br />

The section of the book I found most useful was the “Tips for<br />

the Experts” chapter. This section is filled with a few nuggets<br />

that I’ve not dug up elsewhere. For example, smaller screens will<br />

have fewer ads above the fold. So just as in designing, you need<br />

to bid appropriately to get your ads the best exposure. If you bid<br />

too low, the visibility of your ads may drop below the fold. So<br />

just as in designing, you need to bid appropriately to get your ads<br />

the best exposure. If you bid too low, the visibility of your ads<br />

may drop below the fold and your campaign may suffer. Another<br />

good tip is to use exact matching of keywords and to track these<br />

keywords individually. Though this requires more work, you<br />

can fine tune your keyword list to maximize your ROI. You<br />

will discover several more tips scattered through out this section<br />

which has input from many of the top names in SEM.<br />

Overall, Pay-Per-Click Search Engine Handbook is a good read<br />

for people very new to PPC. However, if you’ve every managed<br />

an ad campaign or do significant PPC advertising, you will<br />

likely need a more advanced book to ferret the most out of your<br />

advertising dollars. Even if you have experimented with PPC, the<br />

contextual advertising and tips chapters provide valuable insights.<br />

You have to overlook the poor publishing quality – it simply does<br />

not mirror the quality of the content. Given that you can pick this<br />

book up for less than twenty dollars, I suspect most people new<br />

to PPC marketing will benefit.<br />

P!<br />

PING! ZINE WRITER BIO<br />

Jeff Huckaby is founder and CEO of rackAID, a outsourced server management<br />

company located in New Haven, Connecticut. Prior to rackAID,<br />

he managed a strategic consulting fi rm that assisted non-profi t organizations<br />

with online business developments and provided system support<br />

services at Yale University. In his spare time, he enjoys baseball, dining<br />

out, and spending too much time at the local bar.


www.pingzine.com 61


SERVICE DIRECTORY<br />

CONTROL PANEL SOLUTIONS<br />

DEDICATED HOSTING<br />

Positive Software Corporation<br />

www.psoft.net<br />

p: 718-928-9912<br />

e: sales@psoft.net<br />

H-Sphere Control Panel<br />

SWsoft<br />

www.swsoft.com<br />

p: 703-815-5670<br />

e: sales@swsoft.com<br />

Proven Automation and<br />

Virtualization Software<br />

Hosting Controller<br />

www.hostingcontroller.com<br />

p: 213-341-1419<br />

e: sales@hostingcontroller.com<br />

Put <strong>Web</strong> Hosting Business<br />

on Autopilot<br />

LPANEL.NET<br />

www.lpanel.net<br />

e: sales@lpanel.net<br />

Full Billing Support Account<br />

Automation<br />

Bocacom<br />

www.bocacom.net<br />

p: 561-939-3330<br />

e: sales@bocacom.net<br />

Quality Self-Managed<br />

Dedicated Servers<br />

EV1 Servers.net<br />

www.ev1servers.net<br />

p: 800-504-7873<br />

e: sales@ev1servers.net<br />

Nothing Beats Our Racks!<br />

DEDICATED HOSTING<br />

ECOMMERCE SOLUTIONS<br />

iPowerweb<br />

www.ipowerweb.com<br />

p: 888-511-4678<br />

e: sales@ipowerweb.com<br />

<strong>Web</strong> Hosting<br />

Fork Networking<br />

www.forked.net/pingzine<br />

p: 907-735-2475<br />

e: apex@forked.net<br />

Servers by Nerds, for Nerds.<br />

99.998% Up.<br />

Handy Networks, LLC<br />

www.handynetworks.com<br />

p: 877-704-2639<br />

e: sales@handynetworks.com<br />

Specializing in Windows Hosting<br />

Illuminated Hosting<br />

www.illuminatedhosting.com<br />

p: 877-749-3533<br />

e: sales@illuminatedhosting.com<br />

From Just $99/month - 99.9999%<br />

Guarantee!<br />

Relio<br />

www.relio.com<br />

p: 863-943-0203<br />

e: info@relio.com<br />

H-Sphere Hosting & Reseller Plans<br />

Underground Colocation<br />

www.undergroundcolocation.com<br />

e: sales@undergroundcolocation.com<br />

Incredible Data Center 85 Feet<br />

Underground<br />

Associate-O-Matic<br />

www.associate-o-matic.com<br />

e: info@associate-o-matic.com<br />

FREE Amazon Affiliate Store<br />

Software<br />

BluePay<br />

www.bluepay.com<br />

p: 866-613-5422<br />

e: sales@bluepay.com<br />

Providing Integrated Payment<br />

Processing Solutions<br />

ECOMMERCE SOLUTIONS<br />

HARDWARE SOLUTIONS<br />

Control Scan<br />

www.controlscan.com<br />

p: 800-825-3301<br />

e:resellers@controlscan.com<br />

Offers Third Party Fraud<br />

Protection & Verification<br />

Modernbill<br />

www.modernbill.com<br />

p: 502-566-7754<br />

e: marketing@modernbill.com<br />

<strong>Web</strong> Host Billing: Create,<br />

Manage, Grow<br />

CompleteSSL<br />

www.completessl.com<br />

p: 888-562-2123<br />

e: sales@completessl.com<br />

Affordable Digital SSL Certificates<br />

RackMount Micro<br />

www.rackmountmicro.com<br />

p: 800-673-0174<br />

e: sales@rackmountmicro.com<br />

Quality Servers at<br />

Affordable Prices!<br />

Rackmounts, Etc.<br />

www.rackmountsetc.com<br />

p: 619-258-0573<br />

e: sales@rackmountsetc.com<br />

Rackmount Systems with<br />

Unrivaled Prices!<br />

BrowseHosts<br />

www.browsehosts.com<br />

p: 551-206-1398<br />

e: sales@browsehosts.com<br />

PR6 Host Directory, 30K<br />

Visitors Monthly<br />

62 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


SERVICE DIRECTORY<br />

HOSTING DIRECTORIES<br />

RESELLER HOSTING<br />

RateMyHost.com<br />

www.ratemyhost.com<br />

p: 630-788-9942<br />

e: sales@ratemyhost.com<br />

Cheap <strong>Web</strong> Hosting Directory<br />

The Hosting Forums<br />

www.thehostingforums.com<br />

e: mgmt@thetechpad.com<br />

<strong>Web</strong> Hosting Forums<br />

<strong>Web</strong> Hosting Sources<br />

www.webhostingsources.com<br />

e: webmaster@webhosting<br />

sources.com<br />

GREAT offers in 3 clicks or<br />

LESS!<br />

Cheap Hosting<br />

www.cheaphostingdirectory.com<br />

e: mgmt@thetechpad.com<br />

Hosting Companies & FREE<br />

Domain List<br />

<strong>Web</strong>Site Host Directory<br />

www.websitehostdirectory.com<br />

e: mgmt@thetachpad.com<br />

<strong>Web</strong> Hosting Information &<br />

Domains<br />

Bizland<br />

www.bizland.com<br />

p: 800-Bizland (800-249-5263)<br />

e: support@bizland.com<br />

Innovative Reseller Programs<br />

& Affordable Hosting<br />

Gazzin.com Reseller<br />

Provider<br />

www.gazzin.com<br />

e: sales@gazzin.com<br />

Reseller Packages starting at<br />

$6.95 USD<br />

HOSTGATOR.COM<br />

Host Gator<br />

www.hostgator.com<br />

p: 866-964-2867<br />

e: sales@hostgator.com<br />

Reseller and Shared Hosting<br />

Solutions<br />

RESELLER HOSTING<br />

SHARED HOSTING<br />

NetspaceOnline.net<br />

www.netspaceonline.net<br />

p: 877-937-3224<br />

e: sales@netspaceonline.net<br />

Reseller & Shared Hosting<br />

Solutions!<br />

Vortech Hosting<br />

www.vortechhosting.com<br />

p: 407-323-5634<br />

e: sales@vortechhosting.com<br />

H-Sphere Reseller Plans!<br />

Digital Zones - dZones<br />

www.dzones.com<br />

e: sales@dzones.com<br />

Feature Packed <strong>Web</strong> Hosting<br />

for Less<br />

1 & 1 Internet, Inc.<br />

www.1and1.com<br />

p: 887-GO1AND1 (887-461-2631)<br />

e: info@1and1.com<br />

World-Class Hosting,<br />

Free 24/7 Phone Support!<br />

InThrive<br />

www.inthrive.com<br />

p: 877-572-9440<br />

e: sales@inthrive.com<br />

High Availability Clustered<br />

<strong>Web</strong> Hosting<br />

Site5<br />

www.site5.com<br />

p: 888-Site5-com<br />

e: sales@site5.com<br />

The New Paradigm for Shared<br />

& Reseller Hosting<br />

SHARED HOSTING<br />

Doreo Hosting<br />

www.doreo.com<br />

e: sales@doreo.com<br />

Ensim Shared & Reseller Hosting<br />

eRegistry <strong>Web</strong> Registration<br />

& Designs<br />

www.e-registry.net<br />

p: 866-374-7879<br />

e: support@e-registry.net<br />

“Your World, at our Hands”<br />

Fortunatics.com<br />

www.fortunatics.com<br />

p: 800-574-0902<br />

e: info@fortunatics.com<br />

Enterprise-Class eBusiness Services<br />

Global<strong>Web</strong>Brands<br />

www.globalwebbrands.com<br />

p: 804-229-0583<br />

e: sales@globalwebbrands.com<br />

Quality <strong>Web</strong>site Hosting from<br />

$6.95/month<br />

Host The Best<br />

www.hostthebest.com<br />

p: 646-670-4099<br />

e: sales@hostthebest.com<br />

<strong>Web</strong> Hosting, Shoutcast<br />

& Reseller<br />

Hostified <strong>Web</strong> Hosting<br />

www.hostified.com<br />

p: 203-720-0805<br />

e: sales@hostified.com<br />

Double Disk Space when you<br />

mention PING!<br />

HostPC Internet Services<br />

www.hostpc.com<br />

p: 518-724-6424<br />

e: sales@hostpc.com<br />

#1 for DirectAdmin Hosting<br />

My Gathering<br />

www.mygathering.com<br />

e: nelson.uw@gmail.com<br />

100% FREE Forum<br />

Hosting (phpbb)<br />

www.pingzine.com 63


SERVICE DIRECTORY<br />

SHARED HOSTING<br />

WEB DESIGN SERVICES<br />

MyName<strong>Web</strong>.com<br />

www.mynameweb.com<br />

p: 866-642-4678<br />

e: admin@mynameweb.com<br />

Reliable...Affordable...<br />

E-Commerce Hosting<br />

NEXCESS.NET, L.L.C.<br />

www.nexcess.net<br />

p: 866-NEXCESS<br />

e: info@nexcess.net<br />

<strong>Web</strong> Hosting & Software<br />

Development<br />

Speedy Giant <strong>Web</strong> Hosting<br />

www.speedygiant.com<br />

p: 909-953-3459<br />

e: sales@speedygiant.com<br />

The Secure Hosting Solution!<br />

uBuildASite.com<br />

www.ubuildasite.com<br />

p: 800-574-0902<br />

e: info@ubuildasite.com<br />

Build & Host Your Site - $99/yr!<br />

WeHost4U.net, Inc.<br />

www.wehost4u.net<br />

e: sales@wehost4u.net<br />

FREE <strong>Web</strong>sites with Select<br />

Hosting Plans<br />

Windy City <strong>Web</strong> Solutions<br />

www.windycitywebsolutions.com<br />

p: 630-929-3050<br />

e: sales@windycityweb<br />

solutions.com<br />

High Speed Hosting & High<br />

End Support<br />

DesignVAR<br />

www.designvar.com<br />

p: 866-880-2754<br />

e: sales@designvar.com<br />

A Virtual Design Team For<br />

<strong>Web</strong> Based Companies<br />

iRun<br />

www.irun.com<br />

p: 866-312-IRUN<br />

e: sales@irun.com<br />

Private Label <strong>Web</strong>site Builder<br />

Solutions<br />

WEB DESIGN SERVICES<br />

WEB HOSTING TOOLS<br />

Bizwala, Inc.<br />

www.bizwala.com<br />

p: 888-803-3614<br />

e: jr@bizwala.net<br />

Free Virtual Smile w/ Purchase<br />

Equentity,LLC<br />

www.equentity.com<br />

e: pingzine@equentity.com<br />

<strong>Web</strong> Design for the<br />

Professional World<br />

Premium <strong>Web</strong><br />

Development, LLC<br />

www.premiumwebdesign.com<br />

p: 229-888-0931<br />

e: g@premiumwebdesign.com<br />

Hosting with Fantastico<br />

& SiteBuilder!<br />

AdWatcher Ad Tracking<br />

www.adwatcher.net<br />

p: 800-543-9579<br />

e: info@adwatcher.net<br />

Revolutionary Tool that Monitors<br />

Your Ad Campaigns<br />

DemoDemo.com<br />

www.demodemo.com<br />

p:866-811-0911<br />

e: info@demodemo.com<br />

Pioneers in Flash Tutorials<br />

Since 2002<br />

Host Hideout<br />

www.hosthideout.com<br />

<strong>Web</strong> Hosting Communtiy<br />

Press Advance Hosting<br />

www.pressadvance.com<br />

p: 612-605-6619<br />

e: contact@pressadvance.com<br />

<strong>Web</strong> Hosting Press Releases<br />

& More!<br />

Searchfeed.com<br />

www.searchfeed.com<br />

p: 866-722-9951<br />

e: information@searchfeed.com<br />

Pay Per Click Search Engine<br />

Advertising<br />

WEB HOSTING TOOLS<br />

<strong>Tech</strong>Pad Agency<br />

www.thetechpad.com<br />

e: mgmt@thetechpad.com<br />

Owns and Manages Hosting<br />

Directories<br />

Touch Support<br />

www.touchsupport.com<br />

p: 888-45-TOUCH<br />

e: sales@touchsupport.com<br />

Expert Server Administration<br />

<strong>Web</strong>Hosting Prospector<br />

www.webhostingprospector.com<br />

p: 877-937-3224<br />

e: information@webhosting<br />

prospector.com<br />

Target Businesses Based on<br />

Their Hosting Needs<br />

Connectria Corporation<br />

www.connectria.com<br />

p: 800-781-7820<br />

e: info@connectria.com<br />

Custom Business-Critical<br />

Managed Hosting<br />

ResellerGuide.com<br />

www.resellerguide.com<br />

e: info@resellerguide.com<br />

Your Guide on How to Sell<br />

<strong>Web</strong> Hosting!<br />

SupportPRO Outsourced<br />

<strong>Tech</strong> Support<br />

www.supportpro.com<br />

p: 847-717-7647<br />

e: sales@supportpro.com<br />

Try our <strong>Tech</strong> Support. 2 Weeks<br />

FREE Trial<br />

The Hosting News<br />

www.thehostingnews.com<br />

e: mgmt@thetechpad.com<br />

Reseller Hosting Info & Daily New<br />

64 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>


www.pingzine.com 65


Host<br />

Laughs<br />

by <strong>Web</strong> Host <strong>Magazine</strong> & Buyer’s Guide<br />

The New Son-In-Law<br />

The CEO of a very successful <strong>Web</strong> Hosting company in the<br />

mid-west invited his new son-in-law to the company data<br />

center. He walked him around and explained all the ins and<br />

outs of the Hosting business. When they got done with the<br />

tour the CEO brought his son-in-law into his spacious offi ce<br />

where they both sat down to talk.<br />

“As you can see, I run a very successful, multi-million dollar<br />

<strong>Web</strong> Hosting company. I wanted you to see the operations,<br />

because, I want the man that won my daughter’s hand in<br />

marriage to start off successfully. I want to welcome you<br />

into the family and show you how much we care for you.”<br />

The CEO smiled at the young man. “Because of that, I’ve<br />

already drawn up the legal papers to make you a 50-50<br />

partner in my business! How does that sound?”<br />

The young man was excited “That’s great! Thank you sir!”<br />

He replied.<br />

“Good. Then as of this moment, you own half the company!<br />

Beginning Monday I want you to be here at 8:00 AM, sharp,<br />

and I’ll show you your offi ce and you can get started!”<br />

“That’s great sir! But, I hate offi ce work. I can’t stand being<br />

behind a desk all day,” said the son-in-law.<br />

“Good! Then you want to get right in there and work with<br />

your hands! I’ll have you work in the data center where you’ll<br />

learn networking and troubleshooting techniques from the<br />

best technicians...”<br />

His son-in-law interrupted him “Ahh, that’s something I can’t<br />

do sir.”<br />

“Why Not?”<br />

“Well, sir, I can’t stand being around computers,” said the<br />

young man<br />

“Can’t stand computers! Wait a minute,” said the father-inlaw.<br />

I just made you the half-owner of a multi-million-dollar<br />

organization, and you can’t stand desk work, and you can’t<br />

stand computers! What am I going to do with you?”<br />

“Easy!” Said the young man. “Buy me out!”<br />

66 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />

Overheard in the Parking Lot<br />

Two <strong>Web</strong> Host executives were overheard at the last<br />

HostingCon in the parking lot. The fi rst one had a coat<br />

hanger trying to unlock the door of the new Mercedes while<br />

the second one stood there, in a frustrated pose. “I can’t<br />

believe you locked the keys in the car!” Just then the coat<br />

hanger slipped.<br />

“Darn! I almost had it,” said the fi rst one. The second one,<br />

looked up at the sky, palm outstretched, feeling a drop of<br />

rain. “Well you’d better hurry up and try harder! It’s starting<br />

to rain, and the top is down!”<br />

The Trouble’s At Your End<br />

A well known Windows programmer from Microsoft decided<br />

he needed a bigger challenge in his life so he enlisted in the<br />

Marines and went to Boot Camp.<br />

At the rifl e range, he was instructed on how to use his<br />

rifl e, given some bullets, and told to fi re at the target. He<br />

fi red several shots at the target and waited for the results.<br />

The report came back that all of his shots had completely<br />

missed the target. The Windows programmer looked at his<br />

rifl e, and then at the target. He looked at the rifl e again, and<br />

then at the target again. He put his fi nger over the end of<br />

the rifl e barrel and squeezed the trigger with his other hand.<br />

The end of his fi nger was blown off, whereupon he yelled<br />

toward the target area, “The bullet’s are leaving here just<br />

fi ne! The trouble must be at your end!”<br />

Ordering Drinks<br />

A Programmer, a <strong>Web</strong> Designer and a <strong>Web</strong> Host lawyer<br />

headed into a bar and ordered their drinks from the<br />

bartender.<br />

Programmer: “I’ll have a B and C.”<br />

Bartender: “What’s a B and C?”.<br />

Programmer: “Bourbon and Coke.”<br />

<strong>Web</strong> Designer: “And, I’ll have a G and T.”<br />

Bartender: “What’s a G and T?”<br />

<strong>Web</strong> Designer: “Gin and tonic.”<br />

<strong>Web</strong> Host lawyer: “I’ll have a 15.”<br />

Bartender: “What’s a 15?”<br />

<strong>Web</strong> Host lawyer: “7 and 7”


www.pingzine.com 67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!