bits & bytes - Ping! Zine Web Tech Magazine
bits & bytes - Ping! Zine Web Tech Magazine
bits & bytes - Ping! Zine Web Tech Magazine
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
2 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
www.pingzine.com 3
BETWEEN THE COVERS<br />
22<br />
FEATURED ARTICLE<br />
SERVER COMPROMISED<br />
What to do in the event of a security breach,<br />
and how to prevent them in the first place.<br />
Major security breaches can be disastrous to a web hosting firm. Besides<br />
the obvious “black eye” that a security issue creates, you also have to<br />
consider the resulting downtime, potential exposure of customer data,<br />
customer service time (explaining the situation and helping clients repair<br />
any damage), and potential client loss that result for almost any major<br />
security breach. The total cost of these incidents is difficult to accurately<br />
calculate, and often takes weeks to fully realize.<br />
8<br />
BITS & BYTES<br />
COMODO APPOINT CARLOS REGO AS<br />
MANAGING DIRECTOR OF PSOFT<br />
8<br />
10<br />
11<br />
12<br />
13<br />
14<br />
14<br />
16<br />
16<br />
18<br />
19<br />
HOUSE COMMITTEE RELEASES PLAN FOR<br />
TELECOM REFORM<br />
BILLS.COM DOMAIN NAME AND TRADEMARKS<br />
SOLD FOR $964,500<br />
MODERNBILL INTRODUCES A TCADMIN MODULE<br />
FOR AUTOMATED GAMESERVER ORDERING<br />
DOMAIN NAME SOLD FOR $1 MILLION IN CASH<br />
COMODO APPOINT JUDY SHAPIRO<br />
TO HEAD GLOBAL MARKETING OPERATIONS<br />
IPOWER RECEIVES TOP WEB HOSTING AWARD<br />
FROM TOPTENREVIEWSTM<br />
JACUZZI, INC. TAKES A BATH IN AUSTRALIA<br />
AUDRP RULING<br />
INTERLAND ANNOUNCES SALE OF DEDICATED<br />
SERVER ASSETS TO PEER 1 NETWORK<br />
SUPERSERVERS.NET OPENS NEW DATA CENTER<br />
MICROSOFT ENHANCES HOSTED MESSAGING AND<br />
COLLABORATION SOLUTION WITH NEW MOBILITY<br />
FEATURES AND HOSTING TOOLS<br />
WEB HOSTING COMPANIES UNITE BEHIND<br />
HURRICANE RELIEF EFFORTS<br />
4 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
Volume 3 Issue 5<br />
P!<br />
P!<br />
28<br />
30<br />
36<br />
P!<br />
38<br />
42<br />
P!<br />
46<br />
48<br />
P!<br />
50<br />
52<br />
54<br />
56<br />
P!<br />
60<br />
P!<br />
66<br />
HOSTING GURUS<br />
VALUE ADDED HOSTING FOR RESELLERS<br />
HISTORY OF MICROSOFT HOSTED EXCHANGE<br />
A CRITICAL FACTOR: WEBSITE TITLE TAGS<br />
SERVER SECURITY<br />
MAKING THE RIGHT CHOICE OF IDENTITY AND<br />
TRUST ASSURANCE (ITA)<br />
THE SPAM ECONOMY<br />
SALES & MARKETING<br />
SIX STEPS TO ENSURING SITE<br />
VISITOR RETURN<br />
EMAIL MARKETING: TIPS FOR IMPROVING<br />
RESPONSE AND RETURN ON INVESTMENT<br />
BUSINESS ISSUES<br />
HOW TO DRIVE CUSTOMERS<br />
TO YOUR WEBSITE<br />
TRANSACTION FEES:<br />
DEBIT CARDS VS. CREDIT CARDS<br />
WINNING THE CLICK FRAUD BATTLE<br />
JUST REPLACE THE PILOT<br />
PRODUCT REVIEW<br />
PAY-PER-CLICK SEARCH ENGINE<br />
MARKETING HANDBOOK<br />
JUST FOR FUN<br />
HOST LAUGHS<br />
28<br />
38<br />
52<br />
56<br />
www.pingzine.com 5
THANKS TO OUR SPONSORS<br />
Blue Pay............................................................................. 2-3<br />
Bocacom ............................................................................... 7<br />
1 & 1 Internet ............................................................................ 9<br />
Touch Support..................................................................... 11<br />
Press Advance ...................................................................... 13<br />
<strong>Web</strong>hosting Prospector ...................................................... 13<br />
IRun ....................................................................................... 15<br />
Bizland .................................................................................. 17<br />
Matrix Reseller ..................................................................... 19<br />
EV1 Servers ................................................................ 20-21, 41<br />
Control Scan ......................................................................... 25<br />
Host Gator ...........................................................................27<br />
Design Var .......................................................................... 29<br />
Ad Watcher ........................................................................ 33<br />
Rackmount Micro ................................................................. 35<br />
Extreme Internet Solutions ................................................... 39<br />
Demo Demo.......................................................................... 43<br />
Searchfeed .......................................................................... 47<br />
Rackmounts Etc. .................................................................. 49<br />
<strong>Tech</strong>pad Agency.................................................................. 51<br />
Host Hideout ...................................................................... 55<br />
SWsoft ............................................................................. 57-59<br />
Psoft ...................................................................................... 61<br />
iPower........................................................................... 65<br />
Modern Bill........................................................................... 67<br />
Site 5 ..................................................................................... 68<br />
Our Team Contributing Writers<br />
Publisher Keith A. Duncan<br />
Publications Director Kunal Jhunjhunwala<br />
Senior Editor Reece Sellin<br />
Editor/Senior Graphic Designer Derek Morris<br />
Sales Executive Jennifer L. Bayly<br />
Accounting Sheryl Duncan<br />
Daniel J. Briere<br />
Conrad Agramont<br />
Derek Vaughan<br />
Steve Roylance<br />
Eran Aloni<br />
Searchfeed.com<br />
Dan Lok<br />
Brad Stone<br />
Brad Bialas<br />
Ron Dunlap<br />
Boris Mordkovich<br />
Jeff Huckaby<br />
Advisory Board<br />
Isabel Wang, Former Publisher <strong>Web</strong> Hosting <strong>Magazine</strong><br />
Deb Discenza, Former Asso. Publisher Hosting<strong>Tech</strong><br />
Ben Fisher, Co-Owner <strong>Tech</strong>Pad Agency<br />
Aaron Shapiro, Owner HostHideout<br />
Dave Waldack, VP Thruport <strong>Tech</strong>nologies<br />
Contact Information<br />
<strong>Ping</strong><strong>Zine</strong> LLC<br />
1814 S. Range Ave, Suite D<br />
Denham Springs, LA 70726<br />
(225) 791-6140<br />
<strong>Web</strong>site www.pingzine.com<br />
General Info info@pingzine.com<br />
Sales sales@pingzine.com<br />
Editor editor@pingzine.com<br />
<strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong> c December 2005, Published and copyrighted<br />
c 2005 by <strong>Ping</strong>! <strong>Zine</strong>, LLC, P.O. Box 516, Denham Springs, LA 70726. All rights<br />
reserved. Permission to reproduce all or parts of this magazine must be secured<br />
in writing from the publisher. For more information email info@pingzine.com.<br />
Reproduction of any kind is strictly prohibited. By reproducing this magazine<br />
you be held responsible for your actions and have to take it up with “Big D”,<br />
our in-house leg breaker instead of our attorney in whom we could not afford.<br />
Complimentary subscriptions are at the discretion of the publisher and may<br />
be cancelled or modified at any time. Postmaster – please send change of<br />
address to P.O. Box 516, Denham Springs, LA 70726. Unsolicited submissions<br />
are accepted, however we only publish those that are accompanied by a cash<br />
donation (in the form of a money order or cashier’s check) to the Poor <strong>Ping</strong>! <strong>Zine</strong><br />
Employee Fund. “Please Help Us!”<br />
We assume no responsibility for damaged or lost submissions. We assume no<br />
liability for the content of this magazine and all points and ideas are strictly that<br />
of the writers involved and not that of the publisher, publishing company, printing<br />
company or anyone involved with the same. Also, we assume no liability for any<br />
of our own actions or actions of the readers. If brought to court on any of these<br />
issues, we will pack up, skip town and head toward Mexico, never to be heard<br />
from again. Printed in the U.S. on paper made from recycled toilet paper and<br />
dyed with the blood of Louisiana roadkill.<br />
6 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
www.pingzine.com 7
BITS & BYTES<br />
Comodo Appoints Carlos Rego<br />
as Managing Director of PSOFT<br />
Comodo Inc, a global leader in Identity and Trust<br />
Assurance Management solutions today announced the<br />
appointment of Carlos Rego as Managing Director of<br />
PSOFT.<br />
Mr. Rego has worked for PSOFT since 2002 as<br />
Director of Business Development and will now assume<br />
full control of global sales, marketing and business<br />
development operations. Prior to joining PSOFT, Carlos<br />
served in a wide range of senior management positions<br />
including president of datacenter and hosting company<br />
Datacolo, and CEO/Owner of WizardsHosting.<br />
“From day one, Carlos took an energetic and<br />
proactive approach to the establishment and nurturing<br />
of relationships with key business partners,” commented<br />
Igor Seletskiy, <strong>Tech</strong>nical Director Comodo Inc. “His<br />
extensive knowledge of the web hosting and data center<br />
industry has been invaluable both to the continuing<br />
growth of PSOFT and to the development of our range<br />
of hosting infrastructure solutions. We are delighted that<br />
Carlos will use this track record to help shape PSOFT<br />
and H-Sphere into the dominant force in the web hosting<br />
industry.”<br />
PSOFT, whose assets include offices in Brooklyn, USA<br />
and a huge development center in Ukraine, were acquired<br />
by Comodo in 2004.<br />
Further information can be found at www.psoft.net and<br />
www.comodo.com.<br />
House Committee Releases<br />
Plan for Telecom Reform<br />
The New Draft Improved, But Still Flawed says<br />
Competitive Enterprise Institute <strong>Tech</strong>nology Counsel<br />
The U.S. House Committee on Energy and Commerce<br />
this week released a “Staff Discussion Draft” of its plan for<br />
reforming regulation of the telecommunications industry.<br />
The Staff Discussion Draft is a noticeable improvement<br />
over the draft previously circulated by the Committee. And<br />
while it updates current law to reflect new technologies and<br />
ways of communicating, for IP-based communications it<br />
actually creates new regulation. Consumers and industry alike<br />
would be best served by legislation that is deregulatory in all<br />
aspects.<br />
The draft bill includes troubling provisions that prevent<br />
video providers from targeting early adopter consumers<br />
(“redlining”), even though this business practice is common<br />
in most other technology industries. It still requires the filing<br />
of registration statements with the FCC for broadband, VoIP<br />
and video providers – regardless of size, messaging platform<br />
or need for price regulation – that raises potential civil liberty<br />
implications. And the draft bill does nothing to reduce the<br />
number of telecommunications lawyers in Washington, D.C.,<br />
due to broad language on interconnection, consumer protection,<br />
and universal service.<br />
Broadly speaking, new telecom legislation should be more<br />
than just an update of existing law to reflect new technologies.<br />
It’s time to go back to first principles and not just revisit the<br />
1996 Telecom Act, but analyze the basis for communications<br />
regulation itself. Market players – both consumers and<br />
telecom companies – deserve more than a mere “update.”<br />
For maximum benefit, the structure and powers exercised by<br />
the FCC need to be radically re-examined and, in most cases,<br />
phased out altogether.<br />
.......................<br />
8 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
1&1 DOMAINS – LOW<br />
PRICES, NO HIDDEN COSTS<br />
.info<br />
.com<br />
.net<br />
.org<br />
THE ORIGINAL HOME OF<br />
LOW-COST DOMAINS!<br />
While other hosts may change their<br />
pricing in response to the industry,<br />
1&1 will always offer feature-packed<br />
domains at consistently low prices.<br />
NO HIDDEN COSTS,<br />
NO GIMMICKS!<br />
1&1’s no-nonsense pricing comes<br />
without conditions. Register unlimited<br />
domains at the same low cost – and<br />
with nothing additional to buy!<br />
1&1 – LEADER IN DOMAIN PRICES<br />
1&1 Go Daddy Yahoo!<br />
.com|.net|.org|.info $5.99 $8.95|$9.95 $9.95<br />
(.info)<br />
ICANN Fee Included $0.25 Included<br />
E-mail Account FREE NO NO<br />
1 GB<br />
Mailbox Size<br />
Mailbox<br />
Included<br />
Mailbox<br />
Included<br />
Total Annual Cost $5.99 $9.20 $9.95<br />
© 2005 1&1 Internet Inc. All rights reserved. Prices based on a comparison of regular prices effective 8/2/05, product and program specifications,<br />
availability, and pricing subject to change without notice. Visit 1and1.com for details. Go Daddy is a registered trademark of Go Daddy Software,<br />
Inc. and Yahoo! is a registered trademark of Yahoo! Inc.<br />
OVER 5 MILLION DOMAINS AND GROWING!<br />
1&1 offers feature-packed domains at rock bottom prices, so it's no wonder more than<br />
5 million domains have been registered with us worldwide. Choose .com .net .org .info<br />
.us .name domains for just $5.99/year | .biz or .ws for $8.99/year | .cc for $19.99/year |<br />
.tv for $29.99/year. Or, sign up for any 1&1 shared hosting plan and get up to 5 .com<br />
.net or .org domains FREE!<br />
1&1 Domains<br />
for only<br />
$5.99<br />
per year<br />
FREE WITH EVERY DOMAIN ACCOUNT:<br />
Private Domain Registration<br />
1&1 lets you keep your contact information<br />
confidential when you register your domain,<br />
so your personal data<br />
remains hidden from<br />
spammers.<br />
Starter <strong>Web</strong> Page<br />
Choose your template<br />
and create a mini<br />
website in minutes<br />
for your online business<br />
card, coming soon page,<br />
or parking page.<br />
Search Engine Tools<br />
Use Hello! Engines and<br />
UP TO 5<br />
FREE<br />
DOMAINS<br />
INCLUDED<br />
WITH SHARED<br />
HOSTING<br />
PACKAGES!<br />
Ranking Toolbox software to get your site listed<br />
on search engines like Yahoo! and Google.<br />
E-mail account with 1 GB space<br />
Your included e-mail account lets you send<br />
and receive professional-looking e-mail using<br />
your domain name as the address.<br />
DNS Management<br />
200 e-mail aliases<br />
Domain forwarding<br />
Domain locking<br />
Domain masking<br />
24/7 Support<br />
1AND1.COM<br />
1.877.GO1AND1<br />
www.pingzine.com 9
BITS & BYTES<br />
Bills.com Domain Name and<br />
Trademarks Sold for $964,500<br />
by Derek Vaughan, The Hosting News<br />
www.thehostingnews.com<br />
The domain name and trademark of bills.com has been sold<br />
for $964,500 and other considerations. Payment Data Systems,<br />
Inc., an integrated electronic payments solutions provider,<br />
today announced that it has signed a Letter of Intent to sell the<br />
domain to Alivio Holdings, LLC (Alivio), parent of Freedom<br />
Financial Network, LLC (FFN), Freedom Debt Relief, LLC<br />
(FDR) and Freedom Tax Relief, LLC (FTR) of San Mateo,<br />
California.<br />
The intended asset sale has a number of key and important<br />
strategic elements to it:<br />
-- PDS will sell the<br />
assets (domain and<br />
trademarks) of bills.<br />
com and related services<br />
to Alivio for $964,500<br />
dollars.<br />
• PDS will retain all assets of bills.com exclusive of the bills.<br />
com domain and bills.com trademark and gain new revenue.<br />
• PDS and FFN will agree that PDS build and run a private<br />
labeled bill payment site for FFN.<br />
• FFN will pay to PDS, a recurring fee for each subscriber<br />
they acquire into the new bills.com program, and guarantee<br />
$72,000 in minimum subscriber fees to PDS.<br />
• FTR, a wholly owned affiliate of Alivio Holdings, LLC,<br />
will engage PDS for additional services not directly related<br />
to the bills.com transaction. This includes ACH processing,<br />
Returned Check processing, and credit card processing.<br />
• FFN will commit a minimum of $180,000 to be applied<br />
to marketing bill payment services for the new bills.com<br />
website.<br />
• FFN is projecting that the FFN bills.com website, powered<br />
by billx.com, could have over 5,000 subscribers within the<br />
next twelve months.<br />
This projected growth will generate over $25,000 a month in<br />
additional subscriber revenue for PDS.<br />
Additional and important aspects of the transaction include:<br />
• PDS will rename their subsidiary Bills.com, Inc. to Billx.<br />
com, Inc. or similar name.<br />
• All existing customers of the current bills.com service<br />
will be ported to the new billx.com domain without service<br />
interruption.<br />
• PDS, through billx.com, will not lose any existing revenue<br />
as a result of this transaction. In fact, servicing the new FFN<br />
bills.com website will bring in new revenue.<br />
The anticipated effects of the agreement and the associated<br />
follow on transactions are:<br />
• The transaction and related agreements should be accretive<br />
to earnings for PDS over the term of the agreements.<br />
• Positions PDS for positive EBITDA (earnings before<br />
interest, taxes, depreciation and amortization) and net income<br />
in the fourth quarter of 2005 and eliminates our debt.<br />
• Positions billx.com to accomplish a number of existing and<br />
new initiatives include:<br />
• Expands and enhances our ability to acquire and deliver<br />
private-labeled sites for banks, debit card issuers, and credit<br />
unions quickly and efficiently. A differentiating and valuable<br />
component of our solution allows these private-labeled sites<br />
to be operated as payment consolidators for all bills not just<br />
their own bills.<br />
• Enhances PDS’ ability to expand delivery of bill payment,<br />
account transfer, and debit-card loading technologies to new<br />
clients, particularly those in the debt management industry<br />
with “customer-facing” needs.<br />
“We are very pleased with this event,’’ stated Michael Long,<br />
Chairman and CEO of PDS. ‘’Clearly the agreements when<br />
fully executed validate the viability of our strategy of private<br />
labeling and create a cash position that significantly changes<br />
our financial profile and opens up new opportunities for PDS.<br />
We expect these agreements to be completed within the current<br />
week.’’<br />
Andrew Housser, Co-CEO of Alivio and Freedom Financial<br />
Network, added, ‘’We are very excited about the acquisition of<br />
bills.com and see this as a key step in enhancing our brand and<br />
profile in the consumer debt management industry. In addition<br />
we look forward to entering the fast growing bill payment space<br />
by partnering with one of the leading players in the industry.’’<br />
To learn more, please visit: www.paymentdata.com or www.<br />
freedomfinancialnetwork.com.<br />
10 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
ModernBill introduces a TCAdmin<br />
Module for automated gameserver ordering<br />
ModernGigabyte, LLC, a leading developer of automated and<br />
integrated billing solutions for hosting providers, and Balance<br />
Servers, producer of the TCAdmin game control panel, today<br />
announced support for TCAdmin in the latest build of ModernBill<br />
4.3.2. The integration between ModernBill and TCAdmin<br />
represents a complete solution for Gaming Service Providers<br />
(GSPs), providing them a scalable and automated system for<br />
delivering their products.<br />
TCAdmin is the first GSP panel to have a built-in integration<br />
module within ModernBill. This will mean that GSPs will be able<br />
to completely automate the ordering, payment, fraud verification<br />
and service provisioning for game servers. This automation<br />
will significantly lower overhead costs of operating a GSP and<br />
improve the service delivery to game players everywhere.<br />
Balance Servers found that the two products are very similar<br />
in their design. Both offer the flexibility to do things the GSPs<br />
own way, instead of forcing a method on their companies. And<br />
both companies seem to have found out that by listening to their<br />
clients, and incorporating new features that their clients want,<br />
the software becomes even more flexible and appealing to new<br />
clients as well.<br />
“With the release of the TCAdmin Module for ModernBill,<br />
we as a company can honestly say that ModernGigabyte and its<br />
staff are truly a great group of people to work with,” said Balance<br />
Servers Co-owner, Kevin O’Donnell. “And we would fully<br />
encourage other companies to work with them as well.”<br />
ModernBill’s order process has the ability to accept many<br />
additional variables that create package add-ons. When used with<br />
the TCAdmin module, the order process supports over 20 add-ons<br />
that let the GSP collect all of the required information from the<br />
customers and fully automate the order based on those variables.<br />
ModernBill supports every administrative variable found in<br />
TCAdmin. The system can automatically create, delete, suspend<br />
and unsuspend services based on payment or nonpayment.<br />
www.pingzine.com 11
BITS & BYTES<br />
Domain Name Sold<br />
for $1 Million in Cash<br />
by Derek Vaughan, The Hosting News<br />
www.thehostingnews.com<br />
Domain name broker, Afternic.com has announced that it<br />
managed the $1 million sale of Fish.com between an undisclosed<br />
private party and www.dog.com, a discount dog supplies<br />
company and the new owner of the high-value domain name.<br />
The all-cash sale sets a new record for e-commerce transactions<br />
this year.<br />
Only one other domain name sale, a transaction related to<br />
off-shore gaming, had a higher nominal price tag. That deal,<br />
however, included a cash payment of well under $1 million plus<br />
stock of still-indeterminate value.<br />
Afternic President Roger Collins commented on the<br />
transaction, “The Fish.com transaction underscores the value of<br />
owning a mission-critical domain name. There is no question<br />
that premium names help businesses establish the impression<br />
of brand leadership and allow them to become more effective<br />
Internet marketers.’’<br />
Mr. Collins said that not only does a domain name like Fish.<br />
com generate excellent search engine results, but it is an ideal<br />
domain to drive “type-in” traffic to the new owner’s business.<br />
Type-in traffic is generated by consumers who simply type a<br />
generic URL into a browser and land on a site.<br />
Facilitating the record-breaking deal, Afternic guided the<br />
acquisition by delivering the offer, serving as agent during<br />
escrow and acting as a conduit in negotiations that preserved<br />
both parties’ anonymity while ensuring all expectations were<br />
met.<br />
‘’Due to the explosive growth of business and consumer<br />
usage of the web, good domains are becoming more and more<br />
valuable, and the best and most memorable names have already<br />
been registered. This is where an aftermarket partner such as<br />
Afternic can be instrumental in acquiring that key domain<br />
name,’’ Collins said.<br />
Dog.com CEO Dr. Alex Tabibi agreed that working with<br />
Afternic ensured security and confidentiality for a transaction<br />
that otherwise could have been much more complicated and<br />
might have required extensive legal fees.<br />
Dr. Tabibi commented, ‘’Afternic’s involvement created an<br />
atmosphere of trust and as much of a turnkey experience as<br />
one could expect with a transaction of this size. Even parties<br />
conducting much smaller deals than ours would benefit from<br />
their services, which included a secure escrow account.’’<br />
Mr. Collins noted that Afternic.com has posted triple-digit<br />
annual growth since he acquired it from Register.com in 2002.<br />
He attributed the site’s success to its creation of an extensive<br />
exchange network in which members gain greater exposure<br />
for their listings and partner domain name registrars earn<br />
commissions from Afternic. Afternic provides a “one-stop<br />
shop” where consumers can purchase secondary domains in a<br />
secure, anonymous environment. Some of the industry’s leading<br />
registrars, including Register.com, eNom.com and Eurodns.<br />
com, are Afternic partners.<br />
Dr. Tabibi, the owner of other premium pet-related domains<br />
such as Horse.com, Bird.com and Ferret.com, plans to create a<br />
user-friendly super-site that caters to an array of fish fanciers’<br />
needs. The site will be designed as a source for supplies,<br />
information, forums and news. Fish.com plans to offer customer<br />
discounts of up to 70 percent on supplies such as aquariums,<br />
food and fish tank accessories by eliminating retail middlemen.<br />
The site, which is scheduled to go live in the second quarter<br />
of 2006, will also offer multi-tiered pricing for both industry<br />
professionals and hobbyists.<br />
With the acquisition of Fish.com, Tabibi believes he has<br />
created a unique commodity on the Internet, where several key<br />
domain names in one category are leveraged to foster crosstraffic.<br />
‘’The combined synergy of the other names means we<br />
will be very strong across the pet-supply category,’’ he added.<br />
‘’No one else has done this online to this extent.’’<br />
Since the demise of Pets.com, Tabibi noted, the pet-supply<br />
space has been largely abandoned with no significant “e-tailer”<br />
focusing on the channel. He plans to lead the space. Evidencing<br />
this, he points to sales at Dog.com, which grew 80 percent this<br />
year, with similar projections for 2006.<br />
To learn more about Afternic.com, please visit: www.afternic.<br />
com.<br />
12 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
Comodo appoints Judy Shapiro<br />
to head global marketing operations<br />
Comodo Inc., a global leader in Internet security, authentication<br />
and assurance services, today announced the appointment of<br />
Judy Shapiro as VP of Marketing. Ms. Shapiro’s background and<br />
experience in technology marketing will strengthen Comodo’s<br />
substantial leadership and growth in Identity Assurance<br />
Management solutions for businesses, infrastructure service<br />
providers and end-users.<br />
Ms. Shapiro joins Comodo from Computer Associates<br />
where most recently she was VP, Marketing responsible for<br />
customer acquisition, retention and upsell efforts. Prior to<br />
joining Computer Associates, Ms. Shapiro held several senior<br />
management positions at Lucent <strong>Tech</strong>nologies, Bell Labs,<br />
Metropolitan Telecommunications and AT&T in the areas of<br />
marketing, market development, new technologies and corporate<br />
strategy. Ms. Shapiro also had been a Vice President at NWAyer,<br />
an advertising agency, where she managed numerous accounts<br />
including Procter & Gamble, JCPenney, Gillette and Chemical<br />
Bank.<br />
“Judy immediately identified Comodo’s core competencies<br />
and built a plan to leverage them,” said Melih Abdulhayoglu,<br />
President and CEO Comodo; “She will take a strong, customerfocused<br />
organization to the next step by developing and<br />
executing strategies designed to promote Comodo’s innovative<br />
range of products and solutions. We recognize her distinctive<br />
leadership style will be a strong and positive impact on the<br />
performance of the business.”<br />
Ms. Shapiro earned her degree from the City University of NY<br />
within numerous disciplines including Marketing, Advertising<br />
and History. She lives in Manhattan with her husband and two<br />
children.<br />
www.pingzine.com 13
BITS & BYTES<br />
IPOWER Receives Top <strong>Web</strong> Hosting<br />
Award from TopTenREVIEWS TM<br />
IPOWERWEB, Inc., a leading <strong>Web</strong> site hosting provider<br />
for small businesses, announced it has been awarded the<br />
top award – the Gold Award – for <strong>Web</strong> Hosting by Top<br />
TenREVIEWSTM for 2006. Top TenREVIEWS is an<br />
Internet publisher of expert product reviews for software<br />
and web services and has served over 25 million visitors<br />
since its in inception in January of 2003.<br />
“This web host offers an astounding 10 GB of storage<br />
and a monthly transfer ability of 250 GB,” stated Top<br />
TenREVIEWS on their <strong>Web</strong> site. “They also offer more<br />
eCommerce tools than any other host, including a choice<br />
of shopping carts, marketing tools and a shared SSL<br />
Certificate.”<br />
“We are very excited to receive the top honor for Top<br />
TenREVIEWS’ <strong>Web</strong> Hosting category for 2006,” said<br />
T. Griffin Conrad, Executive Vice President and V.P. of<br />
Marketing at IPOWER. “We work hard to create <strong>Web</strong> site<br />
packages that address our customers’ needs, and we are<br />
very proud to receive such a distinctive award as this for<br />
our efforts.”<br />
“When considering a web hosting service, you need a<br />
provider that offers robust features in hosting, versatile<br />
product offerings and exceptional customer service,” said<br />
Jerry Ropelato, CEO/President of TopTenREVIEWS.<br />
“IPOWER has accomplished this and clearly surpasses all<br />
the competition.”<br />
IPOWERWEB, Inc., founded in October 2001, is the<br />
5th largest <strong>Web</strong>site hosting company worldwide. Over<br />
350,000 customers in over 100 countries depend on<br />
IPOWER to build, manage, promote and profit from an<br />
online presence.<br />
Established in January 2003, TopTenREVIEWS, Inc. is<br />
an Internet publisher of expert product reviews for software<br />
and web services. The company provides online shoppers<br />
with free access to in-depth product reviews, side-by-side<br />
feature comparisons, industry-related news and articles,<br />
online help, and safe links to purchase products. We do<br />
the research so you don’t have to. For more information<br />
about TopTenREVIEWS, visit www.toptenreviews.com.<br />
Jacuzzi, Inc. Takes a Bath<br />
in Australia AUDRP Ruling<br />
by Jeffrey A. Cohen<br />
Jacuzzi, Inc. of Dallas Texas initiated administrative proceedings<br />
against the Jacuzzi Unit Trust of Patterson Lakes, Australia to<br />
recover the domain name jacuzzi.com.au. The three judge panel<br />
found that although Jacuzzi Inc. has registered the JACUZZI<br />
trademark, or variations thereof, in at least 83 different countries<br />
including Australia, and although the domain in question was found<br />
to be confusingly similar to the JACUZZI trademark, the evidence<br />
was insufficient to order the transfer of the domain name.<br />
This will likely not be the end of the question, however. The<br />
Jacuzzi Unit Trust denied infringement on the grounds that the<br />
Complainant’s registered trademarks, or the term “Jacuzzi”, is<br />
or has become “descriptive” – a common defense to trademark<br />
infringement allegations. The panel found that the issues raised in<br />
the matter required a more in-depth analysis of the issues than could<br />
be provided in a WIPO administrative hearing. The panel stated “A<br />
proper assessment of [the issues] requires much wider evidence<br />
gathering powers, including discovery and cross-examination<br />
of witnesses, than is available in an administrative proceeding<br />
of this kind. In view of the limited nature of these administrative<br />
proceedings as proceedings on the papers, therefore, the Panel’s<br />
finding cannot, and should not, be taken as a final endorsement of<br />
the Respondent’s claims.”<br />
The opinion noted in particular that shortly after the<br />
commencement of the administrative proceeding, Jacuzzi, Inc. also<br />
commenced Federal Court proceedings No VID316 of 2005. The<br />
panel’s comments indicate clearly that in matters with significant<br />
issues of fact such as were involved in this matter, the courts offer a<br />
better forum and a fuller investigation of the issues presented than<br />
.......................<br />
can be offered by the WIPO arbitration process.<br />
14 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
www.pingzine.com 15
BITS & BYTES<br />
Interland Announces Sale of Dedicated<br />
Server Assets to Peer 1 Network<br />
Interland (NASDAQ: INLD), a leading provider of <strong>Web</strong> sites<br />
and online services for small and medium-sized businesses,<br />
announced that it has sold its dedicated server assets to Peer 1<br />
Network Enterprises, Inc., a provider of high performance Internet<br />
infrastructure, for a purchase price of approximately $14 million in<br />
cash. Under the terms of the agreement, Peer 1 Network acquired<br />
approximately 8,300 servers, as well as operating facilities in<br />
Atlanta, GA, Miami, FL, and Fremont, CA. The dedicated server<br />
assets accounted for approximately 37% of Interland’s revenues<br />
for the nine-month period ending May 31, 2005.<br />
“The sale of the dedicated server assets is an important milestone<br />
in our restructuring plan and allows Interland to invest in our<br />
core lines of business - providing <strong>Web</strong> sites and online services<br />
to small and medium-sized businesses,” said Jeffrey M. Stibel,<br />
CEO of Interland. “This transaction gives the company increased<br />
financial flexibility and is the first step toward focusing on our<br />
core competencies while realigning our revenues with high<br />
margin, high growth business initiatives.”<br />
The company’s dedicated customers, which represent<br />
approximately 5% of Interland’s total accounts, should experience<br />
no immediate change in services and should receive continuity of<br />
<strong>Web</strong> site operations under Peer 1 Network. The goal is to ensure<br />
a seamless transition for employees and customers, enabling both<br />
companies to focus on their core lines of business. Interland will<br />
provide more detail on the transaction’s impact on its business<br />
in its future SEC filings and on the next quarterly earnings<br />
conference call.<br />
Disposing of the dedicated server assets will allow Interland to<br />
realize significant savings, including long term lease obligations<br />
associated with the three data center facilities, capital expenditures<br />
associated with the ongoing purchase of dedicated servers,<br />
multiple bandwidth contract eliminations, and a substantial<br />
reduction in the number of employees. The $14 million in gross<br />
cash proceeds will be reduced by $2.8 million that will be held<br />
in an escrow account for 12 months and by approximately $1.4<br />
to $2.2 million in transaction-related expenses. The company<br />
expects that the transaction will have a net negative effect in the<br />
range of $1.5 to $3.0 million on its reported net earnings for its<br />
fourth quarter mostly as a result of non-cash charges.<br />
Under the deal, Interland employees will continue to run the<br />
dedicated server business, under Peer 1’s management, for<br />
approximately 90 days after closing. Peer 1 will have the<br />
opportunity to extend employment offers to those employees<br />
during the 90- day transition period.<br />
SuperbServers.Net<br />
Opens new Data Center.<br />
SuperbServers.Net, a subsidiary of Superb Internet<br />
Corporation, a world leader in managed Internet and e-commerce<br />
solutions, unveiled its third Data Center today.<br />
The state of the art facility, located just south of Seattle,<br />
Washington will host between 5000 and 7000 customer<br />
servers.<br />
Equipped with three 500KVA N+1 redundant UPS’s and a<br />
1.5MW diesel generator power backup system, 180 tons of AC<br />
power, with easy expandability up to 540 tons, fibre redundancy<br />
through multiple private SONET rings via multiple carriers,<br />
and a redundant architecture Gigabit Ethernet-based internal<br />
network using Cisco backbone-grade equipment, the SEA2<br />
Data Center is among the very best in the business.<br />
“We’re tremendously proud of this new facility”, said<br />
Haralds Jass, President & CEO, “Everything is top of the line<br />
and designed to provide the very highest level of service to our<br />
customers.”<br />
SuperbServers.net is committed to providing flexible,<br />
customizable dedicated server solutions at affordable prices.<br />
“The Seattle Data Center allows us to offer an even wider range<br />
of services and support a broader range of customers. We are<br />
planning for significant growth in 2006 and Seattle is a critical<br />
component of that plan,” said Sasha Wilson, VP Sales and<br />
Marketing.<br />
Superb Internet has offices and 24-hour/365-day operations in<br />
Washington, DC, McLean, VA, Tukwila, WA, and Vancouver,<br />
.......................<br />
BC, serving customers in over 150 countries worldwide.<br />
16 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
BITS & BYTES<br />
Microsoft Enhances Hosted Messaging<br />
and Collaboration Solution With New<br />
Mobility Features and Hosting Tools<br />
Microsoft Corp. announced Microsoft® Solution for Hosted<br />
Messaging and Collaboration version 3.5, a hosted solution that<br />
enables service providers to equip small and midsize businesses<br />
(SMBs) with enterprise-class e-mail services, mobile device<br />
data access, team <strong>Web</strong> sites and online presence information. In<br />
version 3.5, Microsoft incorporates new mobile synchronization<br />
capabilities, a variety of security enhancements, and new tools<br />
that lessen management time and extend customer acquisition<br />
opportunities for hosting partners. Further, with the latest release<br />
of the solution, Microsoft underscores its commitment to building<br />
strategic relationships with telecommunications and hosting<br />
service providers to deliver a range of services to businesses.<br />
“More and more small and midsize businesses require advanced<br />
enterprise-class features once reserved only for corporations with<br />
extensive IT budgets. The latest release of Hosted Messaging<br />
and Collaboration addresses that issue with unprecedented new<br />
features for these organizations,” said Pascal Martin, general<br />
manager of Worldwide Hosting at Microsoft. “Hosting providers<br />
are clamoring for ways to meet the demands of their customers<br />
while keeping a tight rein on costs. By providing a consistent<br />
platform, we give our hosting partners the tools to upgrade to<br />
the latest software and thereby differentiate their offerings with<br />
minimal effort and cost.”<br />
Business-Class Communication Tools for SMBs<br />
Targeted at companies with between 10 and 250 users and<br />
delivered through hosting providers, version 3.5 provides businessclass<br />
communication tools on a variety of computing mediums,<br />
such as a desktop computer in the office or a mobile device<br />
on the road. This update offers small and midsize businesses a<br />
cutting-edge messaging and collaboration solution with minimal<br />
upfront costs, and helps reduce the need for internal IT resources.<br />
End users can now benefit from Microsoft messaging solutions<br />
through Windows Mobile-based phones and personal digital<br />
assistants (PDAs) running Windows Mobile 5.0. With direct push<br />
technology, users will now have up-to-the minute access to e-<br />
mail, calendar appointments and task notifications. New mobile<br />
security features include the ability to wipe data from devices<br />
that have been lost or stolen and set up automated rules to help<br />
prevent access by unauthorized users.<br />
“For a company our size, running and maintaining our own<br />
e-mail and document-sharing server is a proposition we would<br />
prefer to avoid. Yet communicating with both customers and our<br />
employees is such a critical component of business, it’s not an<br />
area of operations we can neglect,” said Graeme Lloyd-Roberts,<br />
technical director at Bellwether Enterprises Ltd. “Through<br />
our hosting provider, we have a robust, stable e-mail system,<br />
document-sharing capabilities, and access to the latest and<br />
greatest software. We have enterprise-class technology at smallbusiness<br />
prices.”<br />
“Small and midsize companies see a benefit in choosing<br />
enterprise-class hosted e-mail services in response to the growing<br />
complexities of in-house messaging systems, brought on by the<br />
challenges of managing spam, virus prevention, storage, archiving<br />
and compliance requirements,” said Marcel Nienhuis, senior<br />
market analyst at the Radicati Group Inc. “Microsoft Solution<br />
for Hosted Messaging and Collaboration is an attractive option<br />
for service providers because it allows them to meet this demand,<br />
along with helping provide additional revenue opportunities.<br />
With service providers hosting the solution, small and midsize<br />
businesses can focus on their business without worrying about<br />
technology concerns or recurring costs.”<br />
Enabling Service Providers<br />
With Microsoft Hosted Messaging and Collaboration version<br />
3.5, service providers can help simplify application deployment,<br />
accelerate customer acquisition and improve customer satisfaction<br />
through a complete, end-to-end messaging and collaboration<br />
suite. The pre-engineered solution includes deployment<br />
automation tools and scripts, code samples, and documented<br />
procedures and best practices that help allow for rapid time to<br />
market. Management and monitoring tools ease administration of<br />
the solution and help provide superior service levels to end users.<br />
Additional new features in version 3.5 include these:<br />
· Automated password synchronization between hoster<br />
directories and end-customer accounts<br />
· New customer migration tools and updates to key<br />
technology components<br />
“Microsoft Solution for Hosted Messaging and Collaboration<br />
has enabled us to cut our solution deployment time two-thirds<br />
by using the pre-tested provisioning system as the foundation<br />
for our turnkey private-label Hosted Exchange platform,” said<br />
Ravi Agarwal, chief executive officer of groupSPARK Inc. “Our<br />
resellers see mobility as a key driver for their small and mediumsized<br />
business customers, and the version 3.5 upgrade allows us<br />
to quickly meet their demand without making a large investment<br />
in our platform.”<br />
“Microsoft provides a consistent platform that enables us to<br />
fully upgrade to the latest solutions available without having to<br />
perform a forklift upgrade every two or three years,” said Mark<br />
Adams, managing director of Cobweb Solutions Ltd. “The<br />
resellers we engage with see mobility as a key driver for their<br />
small and medium-sized business customers. Microsoft Solution<br />
for Hosted Messaging and Collaboration 3.5 will allow us to meet<br />
that demand, while also cutting deployment time of the entire<br />
solution by 67 percent over the best alternative of building the<br />
capabilities from scratch.”<br />
“For a communications company like TELUS, [a large<br />
Canadian teloc], the Microsoft Solution for Hosted Messaging<br />
and Collaboration is a very good way to simultaneously offer<br />
connectivity and hosted services,” said Robert Tasker, vice<br />
president of product marketing at TELUS Business Solutions.<br />
“It allows us to combine our expertise in hosting and services<br />
management with Microsoft applications so we can offer the<br />
business market a complete managed solutions portfolio.”<br />
Availability<br />
Microsoft Solution for Hosted Messaging and Collaboration<br />
version 3.5 is nowavailable worldwide. More information<br />
on Microsoft’s hosting solutions can be found at http://www.<br />
microsoft.com/serviceproviders/hostedmessaging.<br />
Those interested in more information on Microsoft Solution<br />
for Hosted Messaging and Collaboration version 3.5 can attend a<br />
free Microsoft seminar, running worldwide from December 2005<br />
through February 2006. Registration information is available at<br />
http://www.msattend.com.<br />
Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide<br />
leader in software, services and solutions that help people and<br />
businesses realize their full potential.<br />
18 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
WEB HOSTING COMPANIES<br />
UNITE BEHIND HURRICANE<br />
RELIEF EFFORTS<br />
by Derek Vaughan, The Hosting News<br />
www.thehostingnews.com<br />
The web hosting community was directly impacted by<br />
hurricane Katrina earlier this year. Here is a summary of the<br />
broad-based humanitarian effort across the entire industry:<br />
Affinity Internet, Inc. donated to the Red Cross and matched<br />
employee contributions. Go Daddy announced a $250,000<br />
donation to Americares. Interland worked with customers that<br />
were actively involved in using the Internet to provide relief such<br />
as Ken Burton of the GulfCoastNews.com. The GulfCoastNews.<br />
com is operating the Katrina Survivor-Connector List, an<br />
interactive database that permits users to list the person or<br />
families they are looking to find. IPOWER, one of the nation’s<br />
largest hosting providers, has recently relocated its headquarters<br />
to Phoenix, Arizona, and collected goods for the over 500<br />
evacuees that were brought to the Phoenix area. Rackspace<br />
Managed Hosting provided free hosting to a number of missing<br />
persons sites and a relief portals. In addition, the company and<br />
its employees made a large cash donation to the Food Bank.<br />
<strong>Web</strong>site Host Directory, a leading web hosting portal, in addition<br />
to donating to the Red Cross, worked together with the greater<br />
hosting industry to announce relief efforts underway, and help<br />
its web hosting clients respond effectively to the disaster. At the<br />
peak of charitable activity, the redcross.org donation site was<br />
receiving 1.7 million page views and 512,000 unique visitors<br />
in a single day. The overflow of traffic could potentially have<br />
overwhelmed the site, if not for a different type of charitable<br />
giving - the hardware, software and human resources to keep<br />
the site live and accepting the critical donations. This task was<br />
generously undertaken by Yahoo! Small Business. The Red<br />
Cross and Microsoft launched a tool that the two organizations<br />
created together - a website that consolidates data on missing<br />
persons and evacuees to help families locate and register missing<br />
relatives at http://www.katrinasafe.org. These are but a small<br />
portion of the donations and efforts put forth for Katrina victims<br />
by the web hosting industry.<br />
www.pingzine.com 19
20 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
www.pingzine.com 21
SERVER COMPROMISED<br />
What to do in the event of a security breach, and how to<br />
prevent them in the first place.<br />
by Adam C. Greenfield<br />
22 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
[featured article]<br />
Major security breaches can be disastrous to a web hosting<br />
firm. Besides the obvious “black eye” that a security<br />
issue creates, you also have to consider the resulting<br />
downtime, potential exposure of customer data, customer service<br />
time (explaining the situation and helping clients repair any<br />
damage), and potential client loss that result for almost any major<br />
security breach. The total cost of these incidents is difficult to<br />
accurately calculate, and often takes weeks to fully realize.<br />
It’s thus unsurprising that security is an area of high concern<br />
for most hosting providers. Keeping a server secure, while<br />
maintaining a high level of usability with the wealth of software<br />
offered on a modern hosting server, is a delicate balance to<br />
strike. Your server may be extremely secure, but if that security<br />
negatively impacts features important to your customer, it won’t<br />
matter, because your customers will leave. Similarly, offering a<br />
“Wild West” server with no security considerations at all will<br />
result in angry customers when the downtime due to re-installs<br />
starts piling up. As your company grows, scale becomes a major<br />
concern too; spending ten minutes per day on each server for<br />
installing updates and fixing security issues may be acceptable<br />
when you only have half a dozen servers, however you will<br />
quickly find such a time commitment is not acceptable when<br />
you’re talking about three hundred servers.<br />
When making decisions about how best to secure your systems,<br />
you should first consider the nature of the beast. Security is not<br />
some sort of isolated goal that can be addressed in a vacuum;<br />
It needs to be considered in conjunction with all the other<br />
operational decisions you make on a daily basis. New flaws,<br />
exploitation methods, and software updates literally occur minute<br />
by minute. If you’re going to keep up, you need to make sure that<br />
you can quickly address potential security problems as they are<br />
discovered.<br />
One of the most critical systems to put in place is the ability to<br />
deploy updates and fixes across your fleet of servers. The most<br />
efficient method I’ve found for this is utilizing existing package<br />
management tools. Almost every major operating system offers<br />
some solution for deploying updates on a regular schedule (i.e.<br />
daily). Properly leveraging this ability is crucial. I also recommend<br />
not only subscribing your machines to trusted updated sources<br />
(such as those from your software vendors), but also creating your<br />
own means for deploying, at will, updates that you deem critical.<br />
This will enable you to deploy customized fixes and potentially<br />
release critical security updates prior to your vendor making them<br />
available for you.<br />
Another critical system to implement is one that allows you<br />
to quickly verify the integrity of the software installed on your<br />
servers. Again, most package management utilities offer the<br />
ability to verify installed packages, however you must bear in<br />
mind that if you consider a machine to be suspect, the output of<br />
any software on that machine should also be considered suspect<br />
as well. If someone has gained root (or Administrator) access to<br />
your machine, they could potentially alter any component of the<br />
system, causing it to present whatever data they wished.<br />
Monitoring baseline trends of system resource usage (such as<br />
memory usage, processor usage, and disk space) can also provide<br />
an invaluable first warning system to alert you to a potential<br />
security breach. Often, the person breaking into your system wants<br />
to utilize your system resources to further another goal (such as<br />
trading warez, sending spam, and potentially even compromising<br />
additional systems). If you notice a spike in resource usage, it<br />
may alert you to a problem before you receive any complaints, or<br />
before you notice anything has been changed.<br />
These systems are a solid asset to server security, not only<br />
because they yield tangible benefits in the form of improved<br />
www.pingzine.com 23
[featured article]<br />
uptime and service reliability, but also because you can implement<br />
all three of them, on any number of machines, with some simple<br />
automation. Automation is one of the keys to good system<br />
security, because it ensures that security policies and checks<br />
are implemented uniformly, as scheduled, and helps keep costs<br />
down by limiting person-hours spent performing repetitive tasks.<br />
Believe me, nobody wants to recompile Apache on a hundred<br />
servers when a security update is released!<br />
Now that we have discussed how to better maintain security<br />
monitoring and apply software updates, let’s discuss some of the<br />
aspects of server security that require the human touch. First, I<br />
recommend that every hosting company establish a documented<br />
policy on how servers should be configured. Start by disabling<br />
all the system services that will not be used on the server. Do<br />
you use centralized name servers? If so, disable your DNS server.<br />
When you go through each entry of the service list, you should<br />
also note services that don’t need to be publicly accessible and<br />
restrict them only to sources that need access.<br />
You should also consider removing software that doesn’t fit into<br />
your hosting model (e.g. print servers, IRC clients, unused web<br />
server modules), because that lowers the number of applications<br />
that you need to maintain and update. Each additional piece of<br />
software you leave installed on your system (that isn’t going to<br />
be used) creates a pointless security liability.<br />
Keep in mind that your policy needs to be constantly updated,<br />
as customer needs change. If you suddenly begin seeing demand<br />
for a piece of software you don’t have installed you should be<br />
prepared to deploy that software to your fleet (using the package<br />
management tools discussed above) and make sure it is installed<br />
on future machines. Consistency is a primary goal here, because<br />
if each of your systems is unique with its own blend of installed<br />
software, making good security decisions that apply equally to<br />
each of your machines becomes more difficult, if not impossible.<br />
Consider this situation: One of your staff members receives<br />
a request for a specific software application to be installed on<br />
one of your hosting servers. If he (or she) installs an application<br />
specifically for one machine, the chance is very low of that<br />
software being properly updated in the event a security flaw is<br />
discovered.<br />
So, now your fleet has a consistent security policy, you are<br />
regularly applying security updates on every machine, and you<br />
have a solid automated monitoring system. What’s next? A<br />
realization that none of these things are any good unless your<br />
staff properly utilizes available resources. Anyone working on<br />
your systems should thoroughly investigate any potential security<br />
situation, and let you know if something is consistently a false<br />
positive (so you can make changes to your systems and policies<br />
as needed). Vigilant staff can make a huge difference in the use of<br />
any of these systems (and likewise can cause any or all of these<br />
systems to become worthless).<br />
Staff should also be vigilant not only when responding to<br />
notifications, but also in their daily tasks. If something doesn’t<br />
feel right, it usually isn’t. Strange log messages, console<br />
messages, applications acting strangely, and files damaged or out<br />
of place, could all indicate a security issue. These things should<br />
be investigated and reported.<br />
We can’t talk about security without mentioning a few of the<br />
pitfalls that are all too common in the web hosting industry. One<br />
of the biggest mistakes I still see companies making is shared<br />
authentication. If all of your servers share the same password (or,<br />
to a lesser degree, utilize a public key authentication token), then<br />
a compromise of one of your systems can easily result in the viral<br />
compromise of all of your systems.<br />
Each system must have unique authentication data, and<br />
that authentication data must be changed on a regular basis. I<br />
recommend that you cycle authentication data no less than once<br />
per calendar month (and every time you experience a system<br />
compromise on any server, or lose a staff member). It is also<br />
critical that your hosting servers do not have trust relationships<br />
with one another, because these interrelationships can also cause<br />
a viral compromise in the event one server is compromised. If<br />
your servers must trust one another, that trust should be limited to<br />
24 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
www.pingzine.com 25
[featured article]<br />
the specific task that must be performed.<br />
A server that was compromised will always<br />
be suspect. I always recommend reinstalling any<br />
system where administrator (or root) level access is<br />
compromised, because even if you cleaned up the<br />
apparent damage from the compromise, missing<br />
even one file can quickly land you right back in<br />
the same (leaky!) boat. This includes procedures<br />
when restoring backups; you should never assume<br />
that your previous backup is free of traces of the<br />
compromise. You should ensure that configuration<br />
files don’t contain instructions to allow access<br />
to an outside party. Also, system binaries should<br />
never be restored from backup – the restore should<br />
be limited to user data and system configuration<br />
only. User data should also be reviewed as it is<br />
restored, while all passwords should be changed,<br />
following a compromise. Even if your intruder is<br />
only able to obtain user access to your machine,<br />
that still allows them to get their “foot in the door,”<br />
and may provide further potential exposure to<br />
exploitation.<br />
Another pitfall that is still far too common is the<br />
use of shared accounts (like nobody or apache) to<br />
execute web scripts. Not only does this potentially<br />
allow for the defacement or removal of user data<br />
accessible by the shared account, but it also makes<br />
tracking down the point of entry more difficult in<br />
the event a compromise does occur. <strong>Web</strong> scripts<br />
should run with the privileges of a specific system<br />
user, eliminating both of those issues, and limiting<br />
the damage of a script exploit to the user with the<br />
exploitable script.<br />
Also, check the locations that a potential intruder<br />
may use. I’ve found that on a Linux system /tmp, /<br />
var/tmp, /dev/shm, and Apache’s proxy directories<br />
(all writable by default to anyone) are common<br />
places used to store exploit, scanning, and other<br />
potentially malicious applications. Strange files<br />
in these locations can be a good indicator that<br />
your machine may be compromised – even if the<br />
intruder has not gained root access yet.<br />
There are a number of other security tools that<br />
may or may not be of use to you. Obviously,<br />
everyone has a unique situation, and considering<br />
other solutions such as a hardware-based firewall,<br />
Network IDS, and commercial security software<br />
can be useful. Remember, though – if you just<br />
take a few simple steps, you can easily improve<br />
the security of all your servers. While the time<br />
investment can seem like a lot up front, in the long<br />
run the benefits truly outweigh the associated cost.<br />
Security is a serious concern, but if you consider it<br />
as a factor when making decisions, and take basic<br />
steps to improve your system security, it doesn’t<br />
have to be a huge draw on your time nor does it<br />
have to increase your blood pressure!<br />
P!<br />
PING! ZINE WRITER BIO<br />
Adam C. Greenfield currently serves as Site5’s Chief <strong>Tech</strong>nology Officer. He has<br />
been involved in web hosting for almost 10 years as both a Systems Administrator<br />
and a Developer. Currently his primary focus is leading the Site5 Engineering<br />
Team. He maintains a professional weblog at http://www.adamgreenfield.com/.<br />
Adam can be reached at adam.greenfield@site5.com<br />
26 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
Some businesses are this easy to start.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
www.pingzine.com 27
HOSTING GURUS<br />
PING! ZINE WRITER BIO<br />
Daniel J. Briere is the Founder and Chief<br />
Executive Officer of Global<strong>Web</strong>Brands,<br />
a website hosting reseller company<br />
through LiquidNet, HostCentric, and XO<br />
Communications. He can be reached at<br />
dbriere@globalwebbrands.com.<br />
VALUE-ADDED<br />
HOSTING FOR RESELLERS<br />
by Daniel J. Briere<br />
How to Add<br />
Value to Your<br />
<strong>Web</strong>site Hosting<br />
Services and Sell<br />
Them at a Profit.<br />
28 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />
Reselling. It’s a great way to break<br />
into the website hosting business, isn’t<br />
it? And yet it’s so easy to lose your way<br />
and become like every other hosting<br />
provider out there. Ahhhhh, the joys of<br />
being a hosting reseller!<br />
But, did you know that there are<br />
indeed many ways to differentiate your<br />
hosting company and stand out from<br />
the crowd? Yes, it is true – you can rise<br />
above the rest in your own little niche,<br />
while fulfilling your dream of owning a<br />
hosting company that contributes value,<br />
and adds to others’ successes. Although<br />
it’s not necessarily easy, it can be done<br />
in a few simple steps.<br />
The first step starts at one of the<br />
basic fundamentals of your business:<br />
pricing. Although it may be tempting<br />
to compete with GoDaddy and others<br />
who offer hosting at extremely low<br />
prices, this is not the required path<br />
to success, especially if you’re just<br />
starting out. You want to make sure<br />
that you are covering your costs and<br />
turning a worthwhile profit before<br />
pricing yourself out of existence. If<br />
you can price at the levels of GoDaddy<br />
and others, great. If you can’t, don’t<br />
lose any sleep over it! Both HostGator<br />
and Site5.com have shown remarkable<br />
success at the $6.95 per month price<br />
point – well above the $3.95 per month<br />
of GoDaddy’s cheapest plan.<br />
So, the first thing you’ll need to do is<br />
calculate your expenses. Then, decide<br />
how much of a profit you would like<br />
to make. Only after determining those<br />
numbers can you arrive at the price<br />
you’ll charge for your hosting plans.<br />
Instead of working from the top down<br />
(setting your prices and molding your
usiness around them), work from the<br />
bottom up, structuring your business and<br />
setting your prices to match. I guarantee<br />
you that you’ll have a much greater chance<br />
of success, just by following this first step<br />
alone.<br />
Step two involves locating any<br />
efficiencies and advantages that your<br />
hosting services might offer without any<br />
value-add. Do you use particularly fast<br />
servers and internet connections? Are you<br />
using proprietary control panel software?<br />
Do you offer unlimited e-mail accounts<br />
and MySQL databases? Examine your<br />
offerings and look for those things that<br />
would immediately attract your attention if<br />
you were shopping for a hosting provider<br />
yourself. Pull out a sheet of paper and<br />
write down everything you can think of<br />
that stands out to you.<br />
This is a fairly simple and easy-tounderstand<br />
step, so that’s all the time I’ll<br />
spend on it. If you can’t locate anything<br />
in this area, don’t worry – it doesn’t mean<br />
you’ll go the way of the dodo bird – just<br />
keep reading!<br />
The third thing you’ll want to do is<br />
decide which market you’re going to target.<br />
Are you going to host real estate websites,<br />
chiropractic websites, small e-commerce<br />
websites, or something else? Or, are you<br />
going to strive to cater to everybody?<br />
While the latter can be a very profitable<br />
strategy for many, there are already many<br />
hosting providers who have found greater<br />
success by specializing in a certain niche.<br />
For instance, a while back I came across<br />
a company that had just started a host for<br />
garage bands. As long as they advertise in<br />
the right places (where these bands will<br />
see the ads), they should have no problem<br />
competing and carving out a niche for<br />
their business. This is the only host I<br />
know of that is targeting this market (and<br />
likely the only host many are likely to find<br />
targeting garage bands). The lesson is that<br />
targeted marketing works if you can make<br />
an emotional connection between your<br />
potential customers and your service.<br />
Once you know who you’re selling<br />
to, the fourth step is very simple. Ask<br />
yourself what website-related services<br />
you can add to your hosting packages to<br />
entice your target market to purchase from<br />
you. This is where the value-add really<br />
comes into play. What will set you lightyears<br />
apart from your closest competitors?<br />
Perhaps you can offer a budget-priced<br />
website hosting/design package where<br />
you provide both their website hosting<br />
and design a simple website for them. Or,<br />
perhaps join forces with SubmitNet or<br />
Template Monster, through their affiliate<br />
programs, and offer their products to your<br />
hosting clients once they have signed up<br />
for hosting. My company has done this,<br />
not only to differentiate our offerings, but<br />
also as another way to pull folks into our<br />
website – and it works! Find something<br />
that is beneficial by itself, and then make<br />
sure it is relevant to your target market.<br />
Depending on the impact of the items you<br />
choose, you may need just one – or you<br />
may need several.<br />
The possibilities in this area are<br />
absolutely endless. The main thing is to be<br />
creative and come up with combinations<br />
that you know your target market will<br />
love. Know your market, and this will be<br />
easy. As long as you’re making money,<br />
providing affordable services, and keeping<br />
your clients happy, there’s nothing to lose,<br />
and a whole lot more to gain! Happy<br />
hosting!P!<br />
B2B<br />
Watch your Revenues<br />
Soar with <strong>Web</strong> Design!<br />
Want to spend fifteen minutes making<br />
$5000.00?You can with DesignVAR!<br />
Hosting Company Value Add<br />
Private Label solutions Help you<br />
Become the 1-Stop Shop you need to be!<br />
Design P ackages & Ecommerce<br />
Custom Database & Applications<br />
DesignVAR lets you bring the profits of<br />
design to your company!<br />
Talk to a representative today about<br />
increasing your revenues tomorrow!<br />
Call us at:<br />
866-880-2754<br />
or email:<br />
sales@designvar.com<br />
866-880-2754 www.designvar.com<br />
www.pingzine.com 29
HOSTING GURUS<br />
by Conrad Agramont<br />
The History<br />
of Microsoft<br />
Hosted Exchange<br />
The latest incarnation of the Hosted Exchange<br />
solution has now been renamed from<br />
“Microsoft Solution for Hosted Exchange<br />
2003” to “Microsoft Solution for Hosted Messaging<br />
& Collaboration 3.0”. With the name change<br />
comes some additional capabilities, an upgrade to<br />
the provisioning system, and several items. With<br />
all of these ongoing changes, I thought it may be<br />
interesting to describe a bit of the history of the<br />
Hosted Exchange solutions.<br />
Microsoft Commercial Internet System<br />
(MCIS): The End of an Era<br />
Just to give you an idea of how Hosted Exchange<br />
came into being, it’s helpful to have a little history<br />
of the product and its important sub-components. It<br />
all started back in the late 1990s with a Microsoft<br />
product called MCIS. I won’t go into too much<br />
detail on MCIS (and there’s lots of it), but succinctly,<br />
MCIS was a product Microsoft created in late 1997<br />
that focused on the ISP market.<br />
MCIS’s components included <strong>Web</strong>mail, SMTP,<br />
POP3, IMAP, personal web pages, commerce,<br />
chat, and news (NNTP) services. Anyone that has<br />
deployed MCIS will tell you how difficult it was<br />
to install, mainly due to issues with Windows NT<br />
4.0, Service Packs, Option Packs, Microsoft Site<br />
Server, and other various components that had to be<br />
installed in the proper order on all servers. (If you<br />
missed a step in certain places, you had to reinstall<br />
the server and start over!) It was often frustrating,<br />
but once you got the product up and running, it ran.<br />
It even performed very well and was generally easy<br />
to manage.<br />
The notable thing about MCIS, though, was<br />
how well it scaled! The directory service was an<br />
LDAP server that used ADSI as a public API<br />
and SQL Server 6.5 for the data store. The MCIS<br />
LDAP database could even be partitioned across<br />
multiple, clustered SQL instances, which allowed<br />
one to scale the user database as much as they<br />
desired. No customer ever pushed MCIS to its<br />
limits in terms of scalability – there were a few<br />
instances of MCIS with more than a few million<br />
users in production. The mail services used a<br />
Front-End/Back-End architecture and stored all of<br />
the mail files on file servers (which could also be<br />
clustered and distributed to provide fault tolerance<br />
and scalability). The platform was truly ahead of its<br />
time. As a matter of fact, sometimes it seems like<br />
Exchange 2000 ended up looking a lot more like<br />
MCIS than Exchange 5.5.<br />
MCIS (in the version 2.0 release) included a<br />
tool called the Microsoft Automated Provisioning<br />
System (MAPS). MAPS was designed to help ISPs<br />
provision MCIS Services, and also included a very<br />
crude method for integrating third party solutions<br />
such as billing systems. One major downside to<br />
MAPS was a poorly defined API, which made it<br />
30 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
difficult to extend or even understand.<br />
MAPS was also difficult to deploy, but<br />
worked fairly well when installed and<br />
configured properly.<br />
Unfortunately (or fortunately, depending<br />
on your perspective) Microsoft had other<br />
plans for its high-end messaging platform,<br />
and that was to focus on Exchange Server.<br />
With the introduction of Exchange<br />
Sever 2000, Microsoft began creating an<br />
architecture in Exchange Server that was<br />
similar to MCIS. This included the use<br />
of Front-End/Back-End servers, using<br />
Active Directory (which was called<br />
“Membership” in MCIS) as its core<br />
storage for configuration, user mailbox<br />
association, and the ability to distribute<br />
services at multiple layers to achieve scale<br />
and fault tolerance.<br />
Microsoft Provisioning System<br />
The Microsoft Provisioning System<br />
(MPS) was created as successor to<br />
linear provisioning actions defined in an<br />
XML document called a “named procedure”<br />
(a collection of named procedures are<br />
encapsulated within something called an<br />
“MPF Namespace”). The extensibility<br />
results from the ability to leverage an<br />
“MPF Provider” (a low-level integration<br />
point between MPF and a given service).<br />
Essentially, an MPF Provider is a DLL that<br />
is responsible for communicating with the<br />
individual service (i.e. Active Directory,<br />
Exchange, File System, IIS, FrontPage,<br />
DNS, etc.). Custom MPF Providers can<br />
be developed in a variety of languages<br />
(C++, VB6, or .NET Assemblies) and<br />
provide the ability to participate in the<br />
same transaction/compensation model as<br />
the standard MPF providers.<br />
At the heart of a Hosted Exchange<br />
deployment are the core components that<br />
make up a typical single-site Exchange<br />
deployment. A single site Exchange<br />
deployment consists of a collection of<br />
Hosted Messaging and Collaboration 1.0<br />
The first version of the “Hosted<br />
Exchange and Collaboration Solution”<br />
was focussed on providing a complete<br />
method of deploying a Hosted Exchange<br />
offering. This included documentation,<br />
automation via MPS, hardware guidance,<br />
hardware pricing through a partnership<br />
with Compaq (prior to its merger with<br />
HP), and partnership with other vendors.<br />
The idea was to give a Service Provider<br />
that was interested in deploying an HMC<br />
environment everything they needed to<br />
go into production, with a final cost to get<br />
that done. For the most part, this is the<br />
type of thing that most customers look for.<br />
However, there were three reasons why<br />
this wasn’t a huge success.<br />
The first reason is that HMC used<br />
Microsoft Exchange Server 2000. Where<br />
Exchange Server 2003 is a great product,<br />
and a solid platform for Enterprise<br />
MAPS. It was a product that focused on<br />
provisioning Hosted Exchange 2000 and<br />
<strong>Web</strong> Hosting on IIS 5.0.<br />
A key component of MPS is the ability<br />
to deploy a secure shared Active Directory<br />
structure. This is important as it allows<br />
Service Providers to deploy web hosting<br />
and Hosted Exchange services while only<br />
allowing customers to be able to see and<br />
manage their own organization’s accounts<br />
and services. At the heart of MPS is the<br />
Microsoft Provisioning Framework (MPF).<br />
MPF is a COM+ application that provides<br />
an extensible transaction/compensation<br />
platform for service provisioning. (By<br />
compensation we mean that any transaction<br />
that fails will result in the rollback of all<br />
the tasks that were completed before the<br />
failure.) This results in a consistently clean<br />
platform.<br />
The MPF Engine performs a series of<br />
physical servers with Windows Server<br />
(where the version depends on what<br />
version of Exchange is being deployed)<br />
as the operating system. Active Directory<br />
is deployed too, and all servers in the<br />
environment act as member servers.<br />
Exchange Server itself is also deployed.<br />
(Admittedly, there are a lot of other<br />
components such as DNS Services, IIS,<br />
and SMTP, that are also deployed, but<br />
these are the “high level” pieces that<br />
are not at the base of the deployment.)<br />
Taking this base Exchange deployment<br />
and turning it into a “Hosted Exchange”<br />
deployment is a mixture of configuration<br />
settings deployed on Active Directory and<br />
Exchange, and repeatable provisioning for<br />
isolated organizations and users. This is<br />
where MPS is used to provide the ability<br />
to repeatedly provision organizations and<br />
users.<br />
deployments, with Exchange 2000<br />
there were many capabilities that were<br />
insufficient for customer demands. The<br />
most noticeable was support for Microsoft<br />
Outlook XP – in order to get the full<br />
capabilities of Outlook, connectivity<br />
between the Outlook client and the<br />
Exchange server must be done using<br />
Microsoft Remote Procedure Calls (RPC).<br />
The RPC protocol is used heavily within<br />
a Microsoft Windows environment and<br />
opens the door to many other services on a<br />
given server beyond Exchange. To have a<br />
HMC offering and allow clients to connect<br />
with their Outlook clients, it required<br />
giving those customers access to the<br />
Service Providers back end environment<br />
via a firewall, VPN or Microsoft Internet<br />
and Security Accelerator Server (ISA)<br />
which was recommended by Microsoft.<br />
This indicated additional hardware and<br />
www.pingzine.com 31
HOSTING GURUS<br />
The “Microsoft Solution for Hosted<br />
Exchange 2003” (HE2003) was a giant<br />
step forward in the ability to support a<br />
large number of customer organizations<br />
and services.<br />
network costs, higher operations expenses,<br />
and increased complexity.<br />
The second reason was scalability as it<br />
relates to the number of “Organizations”<br />
that could be deployed in a single<br />
deployment of HMC. HMC v1 could<br />
only support up to 800 organizations that<br />
required Outlook client support. This was<br />
due to an issue in Active Directory and the<br />
implementation of multi-valued attributes<br />
within the schema. There was no hard<br />
limit to the number of organizations that<br />
a Service Provider could host if they only<br />
required support for Outlook <strong>Web</strong> Access,<br />
POP3, or IMAP.<br />
The third reason was the bursting of<br />
the .com bubble. When this happened,<br />
there was a huge downturn in the number<br />
of companies that wanted to come online<br />
and host corporate email. Many Service<br />
Providers went out of business, while<br />
others decided to focus on their then<br />
current customer base, and defer new<br />
ventures. There were still plenty of Service<br />
Providers that did deploy HMC, but those<br />
deployments didn’t match the deployment<br />
scenarios defined in the solution. Often,<br />
hardware was scaled back and a “bare<br />
bones” approach was taken. Two or three<br />
years earlier, hosts would have deployed a<br />
solution that anticipated huge growth and<br />
over-building the platform.<br />
Hosted Exchange 2003<br />
The “Microsoft Solution for Hosted<br />
Exchange 2003” (HE2003) was a giant<br />
step forward in the ability to support a large<br />
number of customer organizations and<br />
services. The largest of the changes was<br />
the ability to support Outlook 2003 clients<br />
through an Exchange Front-End server.<br />
This was accomplished by supporting<br />
RPC over HTTPS, thus removing the<br />
requirement to host a VPN for clients that<br />
wanted to access their Exchange data via<br />
Outlook.<br />
Exchange Server 2003 also provided<br />
additional improvements to Outlook <strong>Web</strong><br />
Access, allowing for greater customization<br />
and providing additional features that<br />
could be enabled or disabled on a per-user<br />
basis. Upgrading to Exchange Server 2003<br />
also enabled a number of features and<br />
improvements that made it a better platform<br />
than its predecessors. For example, as the<br />
Exchange Server 2003 product improved,<br />
so did the solution that made Exchange<br />
Server ready for Service Providers.<br />
HE2003 also included a new namespace<br />
called, “Hosted Exchange,” the key feature<br />
of which is support for “Plans” (which<br />
leverage a SQL Server Database to define<br />
“feature bundling”). This allowed hosts<br />
to enable and track services that were<br />
deployed for hosted organizations and<br />
users. The “Hosted Exchange” namespace<br />
also leveraged the improved Resource<br />
Manager that shipped with MPS. The<br />
Resource Manager allows the host to<br />
keep track of how resources are allocated<br />
(e.g. Exchange databases, web servers or<br />
disk usage). The new Hosted Exchange<br />
Namespace also provided a new set of<br />
“extensions” to the Resource Manager to<br />
allow for additional support for queries,<br />
moves, and reallocation of storage for<br />
users and organizations.<br />
The HE2003 solution also took a<br />
different approach to HMC as it didn’t<br />
have any direct tie to any third-party<br />
product or hardware. This is both good<br />
and bad, because it provides (or at least<br />
32 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
SEARCH ENGINE ACTIVITY<br />
<br />
2004<br />
If you are advertising on the following search engines,<br />
you may be losing money to click fraud:<br />
DETECT CLICK FRAUD AND GET YOUR MONEY BACK WITH ADWATCHER<br />
AdWatcher will protect<br />
your advertising dollars by:<br />
Take our 30 day challenge - Absolutely Free - and discover how<br />
much of your marketing budget goes to waste every month.<br />
WWW.ADWATCHER.COM/PING<br />
Visit our site today to sign up for a free, no-risk, no obligation, 30 day trial.<br />
If you decide to continue, it starts at only $19.95 per month after that.<br />
www.pingzine.com 33
HOSTING GURUS<br />
gives the appearance of) more hardware<br />
deployment options. However, with this<br />
agnosticism comes a lack of capacity<br />
planning documentation on the part of<br />
hardware vendors. This means that while<br />
the platform was more scalable and<br />
feature-rich, it has to make more generic<br />
recommendations about how to scale and<br />
improve performance.<br />
Overall, the Microsoft Solution for<br />
Hosted Exchange 2003 provided a<br />
comprehensive solution for Service<br />
Providers to deploy a service for small<br />
business looking to outsource their<br />
Outlook 2003 clients.<br />
Hosted Exchange 2003.1<br />
A few months after HE2003 came<br />
to market, a new interim release was<br />
shipped. The goal of this release was to<br />
overcome some of the scalability issues<br />
found in HE2003. The HE2003.1 release<br />
provided the ability to scale beyond<br />
the 1000 organization limitation in all<br />
previous Hosted Exchange solutions.<br />
This was done by providing some new<br />
tools as a part of the solution which made<br />
modifications to Active Directory (http://<br />
weblogs.asp.net/conrad/archive/2005/0<br />
6/03/410238.aspx) and by developing a<br />
workaround that allowed for more than<br />
1000 Offline Address Books (OAB)<br />
within a single Exchange Organization.<br />
These improvements allowed Service<br />
Providers to feel comfortable in deploying<br />
an environment that would scale out and<br />
provide some platform longevity.<br />
34 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />
Hosted Messaging & Collaboration 3.0<br />
The “Microsoft Solution for Messaging<br />
& Collaboration 3.0” (HMC3) shipped<br />
in the first half of 2005, and leverages<br />
the components found in the HE2003.1<br />
solution while adding new hosted services.<br />
HMC3 includes Windows Sharepoint<br />
Services (WSS) and Live Communication<br />
Server 2005 (LCS). There are also a few<br />
new tools included within the solution for<br />
additional Hosted Exchange functionality.<br />
One of the more interesting and underpublicized<br />
Hosted Exchange additions<br />
is the inclusion of a new MPS “Import”<br />
namespace. The “Import” namespace<br />
is much needed if you have an existing<br />
Exchange environment with production<br />
customers, users, and mailboxes and want<br />
to import these into an HMC3 Hosted<br />
Exchange architecture. This allows<br />
Exchange Hosters to leverage their current<br />
deployment environment and move/<br />
migrate/import those users into the new<br />
HMC-specific deployment. The solution<br />
also provides an MPF Provider and an<br />
MPF Namespace to provision Windows<br />
Sharepoint Services. Planning and<br />
Deployment documentation is provided in<br />
the solution for WSS as well.<br />
Provisioning of LCS services is provided<br />
via an MPF Namespace of its own. This<br />
namespace is leveraged within the Hosted<br />
Exchange namespace to provision LCS<br />
Services (e.g. a SIP Address) for all new<br />
organizations and users when a user is<br />
given an Exchange mailbox. For more<br />
information read (http://weblogs.asp.net/<br />
conrad/archive/2005/05/16/406890.aspx).<br />
At the time this article was written,<br />
Microsoft is focussed on the next version<br />
of HMC. The core of the next release<br />
will include support for Windows Server<br />
2003 Service Pack 1, and a few additional<br />
features. In addition, Microsoft is working<br />
on future versions of the solution that<br />
will leverage the mobility features of<br />
Exchange 2003 SP2. This should serve as<br />
evidence to the Service Provider industry<br />
to demonstrate Microsoft’s commitment<br />
and investment to shipping solutions that<br />
meet their customer’s requirements.<br />
Conclusion<br />
Microsoft continues to invest a great deal<br />
of time and money in the development,<br />
testing, and release of these hosted products<br />
and solutions. Over the past five years,<br />
Microsoft has consistently delivered new<br />
versions of Hosted Exchange solutions that<br />
give Service Providers the added features<br />
they need to host a rich mail platform for<br />
small to medium size businesses.<br />
P!<br />
PING! ZINE WRITER BIO<br />
Conrad Agramont is a Senior Architect for<br />
eQuest, a division of Planet <strong>Tech</strong>nologies<br />
Inc., a firm specializing in architecting<br />
automated solutions for Microsoft products<br />
and technologies. Previously, Conrad worked<br />
for Microsoft as a Program Manager for the<br />
Microsoft Provisioning System 1.0, Service<br />
Provisioning component in Microsoft Solution<br />
for Hosted Messaging & Collaboration, Hosted<br />
Exchange 2003, Hosted Exchange 2003.1,<br />
and Windows based Hosting 3.0. Paul Edlund<br />
also deserves an honorable mention, as he<br />
provided a great deal of editing and additions<br />
to the article.
sales@rackmountmicro.com<br />
1.800.673.0174<br />
http://rackmountmicro.com/holidays<br />
Great<br />
Racks.<br />
Enter to<br />
win a<br />
server<br />
at our<br />
website!<br />
Photo by Jessica Tyner Photography<br />
www.pingzine.com 35
HOSTING GURUS<br />
><br />
A Critical Factor:<br />
<strong>Web</strong>site Title Tags<br />
by Derek Vaughan<br />
A Critical Factor: <strong>Web</strong>site title tags.<br />
Have you ever noticed that in the<br />
upper-left corner of the main bar of your<br />
web browser, there is some text on every<br />
website you visit? You can also usually<br />
see the first portion of this text when you<br />
minimize the browser window. This text is<br />
displayed from the website’s Title tag – and<br />
it’s vitally important to any commercial<br />
website.<br />
Although the title tag is easy to see in<br />
the browser, it originates in the underlying<br />
code used to design the website. If you<br />
‘right click’ on a website with your<br />
mouse, you will see a pop-up menu with<br />
several menu items listed – if you click on<br />
‘View Source’ (or ‘View Page Source’ in<br />
FireFox) – you will see a text display of the<br />
underlying code for that website. Here are<br />
the first few lines of HTML code from one<br />
of our sites (http://www.webmaster911.<br />
com):<br />
<br />
<br />
<br />
<strong>Web</strong>master, <strong>Web</strong> Hosting,<br />
Domain Name, Internet Marketing<br />
Resources - <strong>Web</strong>master911.com<br />
As you can see, the page title is enclosed<br />
by the tags. The text within those tags is<br />
what appears in the browser’s main title<br />
bar.<br />
“Okay – I get it!,” you may say. “So I<br />
can put any message I want in there to sell<br />
my goods (or and services).” That’s true,<br />
but the title tag is important for a much<br />
more significant reason: Search engines<br />
treat your title tag as an indicator of your<br />
site’s main purpose. Therefore, the title tag<br />
determines how your site is categorized<br />
and what search terms it is placed under.<br />
If you want to be found under a specific<br />
search term in search engines, you must<br />
include that term in your title tag.<br />
So, how do you determine which search<br />
terms are best to include in your title tag?<br />
I would suggest using a great tool from<br />
Yahoo! Search Marketing, which will help<br />
you find popular search terms that can help<br />
you generate more traffic to your site. It is<br />
called the “Keyword Selector Tool,” and it<br />
can be found at http://inventory.overture.<br />
com/d/searchinventory/suggestion.<br />
To use the tool, simply type in a keyword<br />
that you think is relevant to your site. The<br />
36 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
tool will display various search terms related to your original<br />
query, and list them in order of popularity (based on the searches<br />
conducted in the previous month). For example, suppose that you<br />
sell mobile phones on your website. If you type in the search<br />
term ‘mobile phone,’ the Keyword Selector Tool generates the<br />
following list (shortened from actual):<br />
Searches done in June 2005<br />
Count Search Term<br />
3225909 cell phone<br />
98607 cell phone plan<br />
28751 nokia cellular phone<br />
10921 samsung cellular phone<br />
8879 att cellular phone<br />
8809 ericsson cellular phone<br />
7593 cheap cellular phone<br />
7210 lg cellular phone<br />
6382 cellular phone wallpaper<br />
5616 verizon cellular phone<br />
5517 cellular phone ringtone<br />
4841 cellular phone number lookup<br />
4526 cellular phone company<br />
4124 cellular phone directory<br />
4064 free cellular phone wallpaper<br />
3710 cell phone headset<br />
3621 us cellular phone<br />
3523 cellular phone numbers<br />
3509 sprint cellular phone<br />
3299 free cellular phone ringtone<br />
3293 cellular phone deal<br />
found in titles that display to users. The optimal length for a title<br />
is shorter than 50 to 60 characters, [as] longer titles are cut off in<br />
search results, in browser windowpanes, and make poor [default]<br />
bookmarks.”<br />
So, the lessons are clear: while there are many important<br />
activities that will result in great search engine placement, you<br />
must absolutely address your title tag. Give it some thought, use<br />
the techniques and suggestions mentioned above, and you should<br />
have a great title tag for your site that helps you obtain more<br />
website traffic. P!<br />
PING! ZINE WRITER BIO<br />
Derek Vaughan has been an active Internet marketer since 1995.<br />
His marketing experience includes online direct marketing of books<br />
for NYSE-traded book publisher Thomas Nelson, serving as online<br />
marketing manager for the ESPNstore.com, and being marketing<br />
manager for the launch of the NASCAR Online Store. In web hosting,<br />
he served for three years as Senior Director of Marketing for Affinity<br />
Internet. Most recently Mr. Vaughan has been consulting with http://<br />
www.cheaphostingdirectory.com. He holds degrees from Indiana<br />
University School of Music and Purdue University, as well as an<br />
MBA from the Owen School at Vanderbilt University.<br />
As you can see, according to the tool, ‘mobile phone’ is not<br />
commonly searched – at least relative to other terms. It would<br />
thus be better to be found under the search term ‘cell phone’.<br />
Experimenting with the tool and starting from the general (e.g.<br />
you could use the search term “phone”) will give you a sense of<br />
which terms are best for your title tag.<br />
Another important tip – be sure to place your most important<br />
keywords at the beginning of the title tag. For most companies,<br />
this will not be your company name (you should save that for the<br />
end of the title).<br />
Brent Conver, Manager of Professional Services at Affinity<br />
Internet, Inc. had this to say regarding a website’s title tag: “The<br />
title tag is crucial to any optimization effort, as it is the first item<br />
on the website that is seen by the search engines. It is important<br />
that your targeted keyword phrase be in your title tag, as close to<br />
the front of the tag as possible.” He continued, stating that “an<br />
effective title tag has greater implications to your website than<br />
just ‘SEO’ [search engine optimization] – it has real marketing<br />
value as well.”<br />
An additional word of caution – don’t put everything under<br />
the sun into your title tag, thinking that you will benefit from<br />
having a vast number of terms listed. Asked for his thoughts on<br />
title tag usage, Mr. Detlev Johnson, Vice President of Consulting<br />
with Position <strong>Tech</strong>nologies (http://www.positiontech.com)<br />
stated, “The importance of writing titles cannot be understated<br />
– keyword stuffing is a mistake, [because] branding and clicks<br />
are too important.” He continued, “Search engines credit terms<br />
www.pingzine.com 37
SERVER SECURITY<br />
Making the Right Choice<br />
of Identity and Trust Assurance (ITA)<br />
Infrastructure Can Boost E-commerce<br />
by Steve Roylance<br />
As the Internet continues to expand, so do the challenges<br />
for new e-business brands wishing to differentiate<br />
themselves from a multitude of “similar” providers, all<br />
of whom are vying for a share of increased online business. With<br />
a plethora of experts offering new and innovative ways of driving<br />
additional traffic to emergent sites, and with the simplicity of<br />
advertising campaigns such as Google Adwords, in most cases<br />
“traffic generation” is not the biggest problem. “Conversion”<br />
– taking a visitor and turning them into a customer – is one of<br />
the most important hurdles that new e-business brands must<br />
overcome.<br />
Optimizing conversion in website traffic is a direct function of<br />
managing consumer trust. The higher the consumer trusts a site, the<br />
higher the conversion rates for that site. Well-established brands<br />
rely heavily on their brand integrity, improved service levels<br />
and expanded offerings to entice business from new consumers.<br />
Larger brands therefore have effectively translated the internet<br />
“web trust” model into a revenue-generating strategy.<br />
However, “unknown brands” are at a significant “trust”<br />
disadvantage, and they experience tremendous pressure to<br />
differentiate themselves to survive. With no means to compete<br />
directly with stronger, more established brands, new brands<br />
are forced to focus on two alternative methods to grow market<br />
share. The first, and rather more risky strategy, entails providing<br />
higher and higher discount levels. By its very nature, it minimizes<br />
margins and profitability, and more often than not, results in a far<br />
greater failure rate. The alternative method relies on maximizing<br />
the use of an ITA (Identity and Trust Assurance) infrastructure.<br />
This method yields a far higher rate of return on investment, and<br />
more importantly, it proves to be highly effective at building<br />
loyalty in a shorter time frame.<br />
So, what is Identity and Trust Assurance and why does it<br />
succeed when compared to the alternative choice of offering<br />
lower prices? For example, consider two competing restaurants,<br />
both offering a similar selection of foods. If the higher-priced<br />
restaurant actually has customers sitting down and eating, this<br />
offers a far more powerful influence to potential new consumers<br />
than the restaurant with lower prices. This clearly indicates how<br />
trust and assurance can be more persuasive than price, and is one<br />
of the reasons why many websites offer case studies (i.e. people<br />
already eating) to provide reassurance to new customers. Even<br />
more powerful tools and techniques to provide trust and assurance<br />
should also be implemented, right across the website, to provide<br />
consumers with recognized trust credentials that can help them<br />
manage their risk. Some examples of these technologies include<br />
high assurance SSL certificates – or a web seal to assure customers<br />
that the site is “Hacker Proof.”<br />
How Trusted <strong>Tech</strong>nologies Work<br />
To date, one of the key reasons for the growth of the Internet<br />
as an e-commerce engine has been the widespread deployment<br />
of security technologies implemented within browsers and web<br />
38 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
servers – most notably the use of SSL (Secure Sockets Layer)<br />
encryption. The use of SSL has invariably encouraged online<br />
commerce, and as a result, the Internet economy has come to<br />
depend on SSL to provide the trust infrastructure. Since the SSL<br />
protocol was released by Netscape as a security technology in<br />
1996, consumers have been educated to look for the SSL padlock<br />
before passing any critical details over the Internet. <strong>Tech</strong>nically,<br />
the SSL protocol provides an encrypted link between two parties,<br />
however in the eyes of the consumer, seeing the SSL padlock has<br />
become so much more, letting people know that:<br />
• That they have a secure, encrypted link with the website<br />
• That the website displaying the padlock is a valid and<br />
legitimate organization, or an accountable legal entity<br />
Unfortunately, however, whilst this was originally the true<br />
meaning of the padlock, changes in the validation practices of a<br />
handful of Certification Authorities created an alternative, lowercost<br />
SSL certificate type that did not fulfil the previous stringent<br />
validation practices used to verify the authenticity of the applicant.<br />
Over time, these ‘Low Assurance’ certificates were incorrectly<br />
deployed on numerous e-commerce websites, rather than being<br />
used for the actual role they were designed to fulfil (i.e. serving<br />
the needs of mail servers, Intranets, SSL VPNs or other similar<br />
devices where organizational details were not a requirement). The<br />
result was an erosion of trust in the internet experience.<br />
To combat this new confusion in the market place, web browsers<br />
such as Opera 8 and the forthcoming Internet Explorer 7.0 will<br />
display new information within the padlock, to help consumers<br />
differentiate between “high assurance” and “low assurance”<br />
certificates. Opera has chosen to display the organizational<br />
details next to the padlock, whilst Microsoft have released a<br />
white paper on their enhanced security status bar, highlighting<br />
the ease by which information can be found on the ‘entity’<br />
through new dropdown padlock functionality. They state that<br />
“With the explosion of small- and home- based business websites<br />
selling goods that span the pricing spectrum, users are even more<br />
likely to encounter unknown entities asking for their financial<br />
information. These factors combine to create a situation ripe<br />
for malicious abuse. Internet Explorer 7 addresses this issue by<br />
providing users with clear and prominent visual cues to the safety<br />
and trustworthiness of a website”<br />
It is therefore absolutely essential that any new e-commerce<br />
business uses a “High Assurance” SSL certificate on their secure<br />
payment and data collection pages, to ensure the highest level of<br />
consumer trust.<br />
Another strategy to improve trust credentials of a site that<br />
“levels the playing field” for many new e-merchants is to<br />
utilize additional site seal/trust indicators, proven by numerous<br />
consumer study groups to be a particularly effective technique<br />
of influencing consumer buying behavior. These act to provide<br />
a positive indicator of trust in the authenticity of the site, while<br />
the additional brand strength from the seal itself gives consumers<br />
additional confidence. Examples of cross industry third party<br />
www.pingzine.com 39
SERVER SECURITY<br />
site assurance seals include those offered<br />
by the Better Business Bureau® (www.<br />
bbb.org – certifying business practices),<br />
TRUSTe (www.truste.org – certifying<br />
privacy and assurance practices), and<br />
HackerGuardian (www.hackerguardian.<br />
com – certifying vulnerability-free<br />
hardware). When combined with industry<br />
specific accreditations, the branding mix<br />
offers a compelling level of trust and<br />
assurance to new visitors.<br />
Site seals were initially proven to be most<br />
effective when used on landing pages and/<br />
or home pages, providing confidence at the<br />
time of arrival to the website. However as<br />
search engines now efficiently index entire<br />
sites, the possibility exists that any page<br />
becomes a landing page and therefore<br />
needs to evoke trust and assurance<br />
immediately. The latest evolution in site<br />
seal technology – “Corner of TrustLogo”<br />
– was announced by Comodo last month,<br />
and offers a consistent image which can<br />
be used across an entire website. With<br />
active “Point to Verify®” technology, the<br />
seal allows essential trust credentials to<br />
be presented to users by simply moving<br />
a mouse across the seal. Therefore, a<br />
combination of High Assurance SSL<br />
and the associated site assurance seals,<br />
together with the right mix of third party<br />
trust providers, can provide a baseline ITA<br />
infrastructure.<br />
But how do emergent brands also evoke<br />
trust in their own brand? There are two<br />
possibilities – visitors may recognize the<br />
name of the organization, or they may<br />
not. If they do, they need some way to<br />
verify that they truly are the company they<br />
claim to be (or an authorized member of<br />
a credentialed organization), which will<br />
enable them to decide whether to entrust<br />
it with their card details (and their money).<br />
If they do not recognize the company,<br />
they need to be provided with a method to<br />
verify that a trusted third party recognizes<br />
the organization. For example, consider<br />
the way a currency exchange works:<br />
Bank notes handed to a traveler may be<br />
completely unrecognizable to a traveler, not<br />
having visited that particular destination<br />
before, however trust is provided by<br />
the currency exchange that the notes are<br />
genuine. Also, the notes themselves have<br />
verification technologies built into them,<br />
such that the traveller is able to recognise<br />
alternative denominations on arrival at<br />
their destination.<br />
In much the same way, ‘Content<br />
Verification’ technologies such as<br />
VerificationEngine (www.vengine.<br />
com ) are freely available to consumers,<br />
such that by simply moving their mouse<br />
over a logo or brand, an indicator will<br />
appear around the border of their system<br />
if the brand is to be trusted. As advocacy<br />
groups continue the process of education,<br />
these technologies will herald a new level<br />
of understanding in consumers. This will<br />
in turn drive merchants to increase still<br />
further their ITA infrastructure, building<br />
more confidence into the internet, building<br />
trust in the internet and a still further<br />
increased demand for e-businesses.<br />
P!<br />
PING! ZINE WRITER BIO<br />
Steve Roylance is the <strong>Tech</strong>nical Marketing<br />
Director for Comodo, based in their European<br />
Headquarters in Manchester, UK. Steve is<br />
directly responsible for the implementation<br />
of the go-to- market strategy for the Identity<br />
and Trust Assurance product range,<br />
funneling the feedback from major partners<br />
into the various development groups, and<br />
harnessing the power of Comodo’s Digital<br />
Trust Lab to bring to market an ever widening<br />
portfolio of ITA products.<br />
40 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
www.pingzine.com 41
SERVER SECURITY<br />
PING! ZINE WRITER BIO<br />
Eran Aloni is marketing director for Blue Security,<br />
developer of the The Do Not Intrude Registry, a<br />
community-based anti-spam solution that stops the<br />
flow of unsolicited e-mail to people who do not wish<br />
to receive it. Previosly, Eran was a senior program<br />
manager at Microsoft’s ISA Server group and an<br />
assistant VP at Comverse, a leading provider of<br />
software and systems-enabling, multimedia valueadded<br />
services in wireless and wireline networks.<br />
THE<br />
SPAM<br />
ECONOMY<br />
When one considers the<br />
remarkably low operating<br />
costs involved in operating a<br />
spam business, and the facts that at least<br />
seventy-five percent of worldwide e-mail<br />
traffic consists of spam (with roughly ten<br />
percent of internet users reporting having<br />
purchased products or services advertised<br />
by spam), it is clear that spam is a very<br />
lucrative business concept.<br />
While few statistics exist regarding how<br />
much money can be made by sending spam<br />
messages, recent court victories provide a<br />
glimpse into the world of spammers. Scott<br />
Richter, formerly known as the “Spam<br />
King,” has recently reached a settlement<br />
with Microsoft, agreeing to pay $7M in<br />
damages. The New York Attorney General,<br />
Eliot Spitzer, estimates Richter cleared<br />
millions in monthly profits, all derived<br />
from sending spam.<br />
Most current solutions to spam consist<br />
of defensive filtering concepts. While<br />
filters may hide the problem from the end<br />
users that can afford to buy and maintain<br />
them, this technology suffers from, among<br />
other weaknesses, lack of accuracy in<br />
distinguishing spam from legitimate<br />
messages. Additionally, filters do not<br />
42 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />
by Eran Aloni<br />
address the dynamics of the spam economy<br />
that motivate spammers to continue<br />
sending millions of messages every day<br />
– in fact, filters actually cause spammers<br />
to increase the amount of spam they send,<br />
in an effort to maintain their spam’s total<br />
reach. Because sending e-mail is almost<br />
free, increasing e-mail output can be done<br />
at almost no additional cost. Consumers<br />
and organizations that need to continually<br />
invest in better filters to process all this<br />
additional traffic pay the price.<br />
On the legal front, industry heavyweights<br />
such as Microsoft and AOL have been<br />
aggressively suing spammers for violation<br />
of the CAN-SPAM Act of 2003. While<br />
both of the aforementioned companies<br />
have had their fair share of court winnings,<br />
the number of spammers actually brought<br />
to justice is minimal.<br />
Faced with legal threats and technical<br />
challenges, such as more advanced filters,<br />
spammers are as persistent as ever. All the<br />
efforts and financing put into the “spam<br />
wars” have not yielded the desired results<br />
– spam remains on the rise, affecting<br />
essentially anyone with an e-mail address.<br />
It is clear that a viable solution to spam<br />
must address the spam economy, while<br />
ensuring that the spammer’s incentive<br />
to send spam is eliminated (or at least<br />
reduced).<br />
Let’s take a deeper look into the works<br />
of a spammer to better understand the<br />
allure of spam.<br />
The Spam Cycle<br />
A typical spam cycle includes the<br />
following steps:<br />
1. E-mail address collection – also<br />
known as harvesting – is a process in<br />
which the spammer retrieves millions of<br />
e-mail addresses which can be sent spam.<br />
The one-time cost of a mailing list with<br />
millions of addresses is typically less than<br />
$60.<br />
2. Spam site creation – the spammer<br />
creates an online store from which<br />
prospective customers can place orders,<br />
following the spam-driven campaign.<br />
A specific “spamvertised” site remains<br />
online for the duration of the campaign.<br />
Designing a simple website can cost a few<br />
hundred dollars, and the monthly hosting<br />
fee from a spam-friendly ISP can amount
www.pingzine.com 43
SERVER SECURITY<br />
to another few hundred dollars a month.<br />
3. Next is the spam run” – the<br />
process in which the spammer sends out<br />
millions of e-mail messages as part of a<br />
specific campaign. Sending spam from<br />
compromised computers (“zombies”), a<br />
very common practice, does not incur any<br />
costs at all.<br />
4. Revenue generation – with the<br />
campaign on its way, and the online store<br />
live, the spammer sits back and counts<br />
the money coming in. Assuming a 0.01%<br />
sales conversion rate on one million e-<br />
mails, a spammer’s gross profit can range<br />
from$3,000 (porn website subscription),<br />
to $10,000 (Sex-related products) or<br />
even to $150,000 (home refinancing) per<br />
campaign.<br />
Getting Your Address<br />
Let’s take a look at the process from<br />
an economic standpoint, starting with e-<br />
mail lists. A list containing 300M e-mail<br />
addresses can be purchased online from<br />
$29.99 to $59.99. These lists are often<br />
automatically created by special software<br />
modules (called ‘bots’), which crawl the<br />
internet in search of e-mail addresses.<br />
For example, if you have participated in<br />
a newsgroup discussion and used your<br />
e-mail address, chances are you will be<br />
receiving spam to the e-mail address<br />
you’ve used for posting.<br />
44 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />
Since e-mail addresses are easily obtained<br />
from across the internet, e-mail lists are also<br />
relatively low-priced. Spammers utilize<br />
a variety of other technical methods to<br />
harvest addresses too, such as “dictionary<br />
attacks” (automatically guessing common<br />
e-mail addresses) and “P2P harvesting,”<br />
in which spammers exploit peer-to-peer<br />
(e.g. filesharing) networks to obtain e-mail<br />
addresses.<br />
Sending You Spam<br />
Each spam campaign advertises a<br />
specific type of product. The types of<br />
products favored by spammers include<br />
generic prescription drugs, mortgages<br />
and sex-related products. The spammer<br />
usually sets up an online store selling the<br />
advertised product. Those online stores<br />
exist only for a few days, and are moved<br />
from one hosting provider to another.<br />
Typically, those hosting providers are<br />
“spam-friendly” and are willing to host<br />
spam-sites in exchange for high hosting<br />
fees.<br />
Once spammers obtain an e-mail list<br />
and set up an online store, running a<br />
spam campaign is the next step. Although<br />
the spammer is interested in sending out<br />
millions of e-mail messages, but sending<br />
such massive amounts of e-mail would<br />
normally incur significant costs, if done in a<br />
conventional manner. To avoid these costs,<br />
spammers do not typically send out all<br />
these messages from their own servers, but<br />
rather use compromised machines, known<br />
as “zombies,” to send their messages.<br />
Notably, many recent virus outbreaks were<br />
launched to create a network of “zombies”<br />
that could be controlled remotely. Such<br />
machines are used to send out spam e-<br />
mails, often without the knowledge of<br />
their owners.<br />
Assuming spammers rely on 3rd party<br />
infrastructure like zombies, their costs for<br />
sending spam are limited to their own ISP<br />
hosting fees. In such a situation, there is<br />
almost no difference in cost for the sender<br />
to send an e-mail message to one million<br />
recipients versus sending it to a single<br />
recipient. So, in essence, when running<br />
a spam campaign, the spammer actually<br />
uses other people’s resources, incurring<br />
little expense in the process.<br />
Making Money<br />
at Your Expense<br />
With the e-mails on their way, the<br />
spammer waits for customers. Industry<br />
surveys show at least ten percent of the<br />
population actually buys products and<br />
services advertised via spam. In specific<br />
product categories, the percentage of<br />
people buying spamvertised products is<br />
even higher – a recent survey conducted<br />
by the Better Business Bureaus showed<br />
twenty-one percent of American e-<br />
mail users have bought software from<br />
a spammer, while twenty-two percent<br />
purchased apparel and jewelry advertised
y spam. Another thirty-nine percent<br />
admit to clicking on spam links even if<br />
they don’t actually buy the goods. Thus,<br />
the business case for a spam operation is<br />
clear – send out millions of messages (or<br />
ads) at very low cost, and expect a high<br />
conversion rate of paying customers.<br />
Although spam is indeed an appealing<br />
business from the spammer perspective,<br />
it is one of the greatest annoyances to e-<br />
mail users in general, creating immense<br />
losses in productivity costs. In the last few<br />
years, despite significant efforts to fight<br />
spam, spam volume actually increased to<br />
above seventy-five percent of all e-mail<br />
traffic. Another ten percent is composed of<br />
phishing attempts (scams imitating known<br />
brands to fool users into giving their<br />
account details) and viruses aiming to<br />
create bot networks of zombie computers<br />
to facilitate spam sending. According to<br />
the 2004 National <strong>Tech</strong>nology Readiness<br />
Survey (NTRS), online users in the United<br />
States spend an average of three minutes<br />
deleting spam each time they check e-mail.<br />
Aggregating their usage across the 169.4<br />
million online adults in the United States,<br />
this equals 22.9 million hours a week, or<br />
$21.58 billion annually when based on the<br />
average working wage.<br />
Fighting<br />
Spam with Filters<br />
The technology industry has been<br />
waging war on spam for a few years.<br />
Spam filters are the most established<br />
technical solutions in the market. Filters<br />
are a passive means of defense, analyzing<br />
incoming messages and separating the<br />
spam from legitimate messages. As a<br />
result, spammers are constantly coming<br />
up with ways to bypass them.<br />
While filters may alleviate some of the<br />
problem for end users that can afford them,<br />
they introduce their own set of problems.<br />
Being an automatic sorting technology,<br />
filters suffer from false identification of<br />
spam and legitimate e-mails. If a spam<br />
e-mail passes through the filter (known<br />
as a false negative), the user must waste<br />
time in seeing the message and deleting<br />
it. If a legitimate e-mail is tagged as<br />
spam, and does not reach the intended<br />
recipient (known as a false positive), the<br />
result is a lost business or communication<br />
opportunity. In general, filters reduce e-<br />
mail reliability as an effective business<br />
communication tool.<br />
Unfortunately, filtering does not impact<br />
the spam economy, but rather encourages<br />
spammers to innovate and invent new<br />
means to bypass filtering schemes. In<br />
addition, spammers are inclined to send<br />
even more spam since they know that a<br />
large percentage of their traffic is blocked<br />
by filters.<br />
Fighting<br />
Spammers in Court<br />
In January 2003, the US government<br />
stepped forward and enacted the CAN-<br />
SPAM Act. The Act defined the guidelines<br />
for sending unsolicited commercial e-<br />
mails, such as including a valid return<br />
address and providing a working, opt-out<br />
link in each message. The CAN-SPAM act<br />
also outlawed certain spammers practices,<br />
such as address harvesting and the use of<br />
“zombies” for sending mail.<br />
Almost three years after CAN-SPAM<br />
was passed, it has not done much to stop<br />
spam, although several industry giants,<br />
such as AOL and Microsoft, have been<br />
aggressively bringing spammers to court<br />
for CAN-SPAM infringements. Microsoft<br />
won a $7M settlement from Scott Richter,<br />
a man known as one of the world’s most<br />
prolific spammers. AOL even ran a spam<br />
sweepstakes among its members, sharing<br />
the money it was awarded by the court in<br />
its lawsuits.<br />
Legal efforts to bring spammers to court<br />
do impact the spam economy, at least for<br />
those spammers affected directly. However,<br />
the number of spammers brought to court<br />
is very small. In general, anti-spam laws<br />
are extremely hard to enforce due to the<br />
global nature of the internet and spam<br />
operations.<br />
Registry and<br />
Opt-Out Solutions<br />
Before there was spam, there were<br />
telemarketing calls. When the annoyance<br />
was too much, the US government<br />
stepped in and created the “Do Not Call”<br />
registry. Now people had a choice – they<br />
could join the registry and stop receiving<br />
telemarketing calls altogether, or they<br />
could opt-in and continue to receive<br />
commercial calls. In a similar line of<br />
thought, the CAN-SPAM Act called for<br />
creating a national do-not-spam registry,<br />
created to stop spammers from sending<br />
spam to registered e-mail addresses. It was<br />
later decided that such a registry would<br />
not be enforceable by the government, and<br />
thus would not serve its purpose.<br />
Taking the lead on this initiative, some<br />
companies, such as Blue Security, have<br />
created commercial “Do Not Disturb”<br />
registry-based solutions. Other companies,<br />
such as LashBack <strong>Tech</strong>nologies, have taken<br />
the “Safe unsubscribe” approach, allowing<br />
users to automatically unsubscribe from<br />
those spammers that are likely to honor<br />
such request.<br />
E-mail Payment Systems<br />
And, finally, there are those who tout<br />
using a stamp-like system for e-mail. There<br />
are a number of variations on this idea,<br />
including making senders pay for e-mails<br />
rejected by their recipients, or paying for e-<br />
mails with computational power. However,<br />
these ideas have not matured enough to<br />
gain widespread industry support.<br />
How Will<br />
This Battle End?<br />
Analyzing the way spammers work, it is<br />
clear a new approach is required to solve<br />
the spam problem. We need to change the<br />
spam equation and raise the cost of sending<br />
spam. Tying the cost of sending spam to<br />
the number of recipients will ensure that<br />
spammers diligently clean their list of those<br />
who do not want to receive spam offers in<br />
their e-mail. Eventually, we’ll reach a point<br />
where spammers will send advertisements<br />
to the approximately twenty percent of the<br />
population that actually buys from them.<br />
The rest of us will be able to reclaim our<br />
internet experience and enjoy spam-free e-<br />
mail once again. Only time will reveal the<br />
outcome of this battle – but, let’s hope it is<br />
not the spammers who prevail!P!<br />
www.pingzine.com 45
SALES & MARKETING<br />
PING! ZINE WRITER BIO<br />
For further details on this topic or related<br />
Pay Per Click affiliate information,<br />
contact Tiffany Guarnaccia {Tiffany.<br />
Guarnaccia@Searchfeed.com} or visit<br />
www.Searchfeed.com<br />
by Searchfeed.com Corporate Communications<br />
............................................................<br />
A captivating and successful Pay Per Click (PPC) affiliate<br />
implementation encourages internet visitors to leave a site through a<br />
profitable exit route, while still ensuring they will come back for return<br />
visits. Accomplishing this goal means integrating relevant content that<br />
maintains branding and creates a valuable site resource through proper<br />
content placement and advanced integration tools. This may seem like a<br />
difficult process, but it can easily be achieved through the following six<br />
simple steps.<br />
46 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
1Create a place of value and interest for online visitors.<br />
Start by adding site features that encourage interaction.<br />
For example, providing polls, review sections or article<br />
submissions creates a more robust resource that visitors will want<br />
to return to. This prevents the affiliate site from being seen only<br />
as “a middle man” and provides visitors with an additional outlet<br />
of informational sources.<br />
2<br />
Research your site’s user behavior patterns. Studying and<br />
understanding visitors’ activity patterns can offer valuable<br />
insight, and allow for fine-tuning of site content to further<br />
satisfy the visitors’ needs. This will capture their interest, and<br />
help to establish a more solid site audience.<br />
3<br />
Only add relevant site content – it’s as simple as that. Content<br />
or information-based affiliate sites should provide relevant<br />
content that matches their site’s theme or focus. Don’t make<br />
the mistake of adding non-relevant terms, just because they have<br />
a higher cost per click. If an internet surfer comes to a site looking<br />
for refrigerators, they are not likely to click on a paid link for diet<br />
pills. Relevant content presents more options to the visitors, again<br />
ensuring confidence, and prompting return visits.<br />
4<br />
Place sponsored content where it is immediately visible.<br />
Without overwhelming a site, place content “above the<br />
fold” or where it is clearly visible upon first viewing the<br />
homepage. This places the information at the visitors’ hands,<br />
allowing them to either choose to further explore the site, or click<br />
on an ad to transport to outside sources.<br />
5<br />
Be conscious of site aesthetics – a particularly important<br />
consideration, as they can dramatically influence the<br />
visitors’ experience. Coordinating all fonts and colors, thus<br />
ensuring consistency with the site’s branding, can easily create a<br />
visually pleasing site. With most types of text-based ads, the look<br />
and feel can easily be adjusted to exactly match a site.<br />
6<br />
Use all integration tools available. Take full advantage<br />
of integration tools that provide value-added services for<br />
site visitors. Tools like Searchfeed.com’s Search Engine<br />
Generator or the MIVA Ad Revenue Xpress’ Search Box<br />
feature simply places a paid search box on an affiliate’s site.<br />
These methods maintain site branding, and create an additional<br />
resource for visitors. Using tools that maintain branding through<br />
seamlessly integrated content further secures a higher percentage<br />
of site visitor returns.<br />
In conclusion, if knowledge is power, then any affiliate has<br />
a powerful advantage if they use the above six steps to get<br />
maximum results from a PPC program. The use of enriched<br />
content, combined with ensuring excellent matches between<br />
informational and ad placement can provide a positive experience<br />
for visitors, ensuring their return.<br />
P!<br />
P!<br />
www.pingzine.com 47
SALES & MARKETING<br />
>>>>>>>>>>>>>>>>>>>><br />
E-mail Marketing:<br />
Tips for Improving<br />
Response &<br />
Return On<br />
Investment<br />
by Dan Lok<br />
E-mail has resulted in a revolution in marketing – indeed, a<br />
veritable explosion in messaging. For some it is a godsend, in its<br />
role as a technology and method that allows people to sell products<br />
and services quickly and effectively. For others, it’s a “doomsday<br />
device,” resulting in a flame-filled mailbox with angry messages<br />
from those who insist they will never again be customers.<br />
<strong>Web</strong> conversion expert Dan Lok says you must learn several<br />
special techniques before you can truly leverage and make<br />
maximum use of e-mail—the internet’s wunderkind.<br />
Here are some of Dan’s most important keys to successful e-<br />
mail marketing campaigns:<br />
1. Get Permission. Use web page sign up forms or “postcard”<br />
48 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />
return cards, but get permission in a valid way. Also, consider<br />
creating and offering incentives for people to sign-up online to<br />
receive value-added information.<br />
2. Target carefully and make it relevant. Send only relevant e-<br />
mail to opt-in subscribers. Develop and give people what they<br />
want and what you promised; avoid sending e-mail that is outside<br />
the scope of what was promised to those who opted in. Also,<br />
consider targeting and segmenting your subscriber base, to tailor<br />
your messages to specific demographic characteristics.<br />
3. Your Subject Line is Critical. Don’t make it look or sound like<br />
spam. The purpose of the subject line is not to sell, but is rather<br />
to get people to open the e-mail – and that’s it! So, be careful<br />
of the words you select. Also, check your e-mail against a spam<br />
checker, to see that it doesn’t contain words or patterns that will<br />
likely result in deletion.<br />
4. Use your personality. Talk in the first person (i.e. use “I”) and<br />
develop your persona as a friend or as an expert. E-mail is far more<br />
effective if you define your persona based on your customers’<br />
needs and desires, as well as on professional behaviors.<br />
5. Don’t sell – Advise, advise, advise! Offer value-added problem<br />
solving information, advice, tools and help. You can thus use your<br />
e-mail to inspire others to call you or visit your web site. Also,<br />
offering people more of what they like helps build your personal<br />
relationship with them, and by extension, your customer base.<br />
6. Create a single, clear and benefit-laden “call for action.”<br />
Focus on getting people to take one action, and don’t offer more<br />
than one action. Identify the action clearly and persuasively, and<br />
track the results. The goal is to get them to click (thus transporting<br />
them to a relevant landing page), which can then “net” them to<br />
take further action.<br />
7. Create a life-cycle campaign. Design a program that results<br />
in you sending out four to six messages over a six-to-eight week<br />
period. These recurring campaigns can be created in advance, and<br />
operated in a totally automated fashion.<br />
8. Use “triggered” e-mail. Design and set up automated e-mail<br />
campaigns, so that when clients order a product, sign-up for<br />
items, or request information online, a suite of e-mail messages<br />
are automatically sent to them periodically.<br />
9. Use e-mail to get them to click! E-mail is most effective when<br />
kept short; strive for no more than three or four pages. Relate the<br />
first paragraph to the subject line. Also, try to drive people to a<br />
web page, and then close the sale there – don’t try to close the<br />
sale with an e-mail. Also, don’t mention price or cost in e-mail<br />
– the purpose of the e-mail is to pre-sell. Again, the goal is to get<br />
them to click, then go to your web page, where you can do the<br />
selling there.<br />
10. Comply with CAN-SPAM Act requirements. Send from a<br />
valid address, and promptly comply with all remove requests.<br />
Never send a second e-mail to someone who has requested<br />
removal. P!<br />
PING! ZINE WRITER BIO<br />
For more information, visit http://www.websiteconversionexpert.com.<br />
Dan’s web site contains one of the best lists you’ll<br />
ever find of recommended online marketing technologies to<br />
enhance and update marketing. Or, get in direct contact with<br />
Dan Lok at (604) 583-4999, or by e-mail at danielok@shaw.ca
www.pingzine.com 49
BUSINESS ISSUES<br />
How To Drive<br />
Customers To Your <strong>Web</strong>site<br />
.......................................................................<br />
by Brad Stone<br />
As I mentioned in my last article,<br />
having a website will not magically<br />
result in customers visiting, without<br />
you driving them there. I compared<br />
improperly marketed websites to being<br />
equivalent to retail stores without<br />
windows, doors or signs, located on<br />
property with no roads or sidewalks.<br />
In other words, having a great website<br />
that looks professional and is salesoriented<br />
is very important – but it<br />
won’t give you business, unless you do<br />
something to direct potential customers<br />
there. There are several ways of doing<br />
just that:<br />
1. List your <strong>Web</strong> Address – Put your<br />
web address on all of your business<br />
cards, stationery, brochures, flyers,<br />
signs, and yellow page ads. (By the<br />
way, did you know that if you and your<br />
competitor have the same size yellow<br />
page ad, but they have their website<br />
listed while you don’t, 65% of the<br />
customers looking for your service or<br />
product will go to your competitor’s<br />
business before they go to you? See<br />
http://www.yellowpagepartners.com<br />
for more information.)<br />
2. Leverage Search Engine<br />
Optimization (SEO) – Getting your<br />
website listed “high” in the common<br />
search engines is not quick nor easy.<br />
Although we don’t have the exact<br />
formulas or algorithms that Google or<br />
Yahoo use to determine the rankings<br />
of websites, we do have a pretty good<br />
understanding of the things that lead to<br />
better ranking – both engines put a lot<br />
of importance on the web pages that<br />
are linked to your site.<br />
3. Consider Pay Per Click (PPC)<br />
Advertising – This is when you pay<br />
search engines such as Google or<br />
Yahoo to list your (linked) ad on<br />
the first or second pages of certain<br />
keyword searches. You normally<br />
bid against other advertisers for the<br />
placement position of your ad – the<br />
higher you bid, generally, the higher<br />
your placement. We have been using<br />
this avenue for our business and are<br />
currently receiving a 400% return on<br />
our marketing dollars.<br />
4. Submitting Articles on your<br />
Business – There are many sources<br />
that will receive your articles for<br />
publication. By getting your articles<br />
on the internet you’ll have many, many<br />
article pages that will be pointing back<br />
to your website. If someone is searching<br />
for a certain piece of information that<br />
your article covers, they will find your<br />
article through a search, and eventually<br />
end up at your website. Check out the<br />
following link for more information:<br />
http://www.ezinearticles.com<br />
I hope that I’ve given you a few things<br />
to think about. If you have questions,<br />
or would like more information,<br />
please feel free to give us a call at: 1-<br />
800-266-0799, or simply email me at<br />
brad@heritageusa.net. P!<br />
50 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
www.pingzine.com 51
BUSINESS ISSUES<br />
Transaction Fees<br />
Debit Cards vs. Credit Cards<br />
by Brad Bialas<br />
.......................................................................<br />
Many may ask: Is the cost of<br />
accepting a debit card the same as<br />
accepting a traditional credit card?<br />
Although the simple answer is “no,”<br />
your transaction processor may not be<br />
passing on the decreased processing<br />
cost. Many merchants believe that<br />
receiving a lower cost for debit cards<br />
requires additional equipment to enter<br />
the cardholder’s PIN at the time of an<br />
order. This is no longer the case.<br />
So-called “offline” debit transactions<br />
(i.e. those processed without a PIN)<br />
now qualify for lower rates, as a result<br />
of a class action lawsuit settlement<br />
against the primary credit card<br />
associations on June 4, 2003. Under the<br />
old system, debit card processing fees<br />
were traditionally the same as credit<br />
cards, unless a PIN was entered. Under<br />
the terms of the settlement, however,<br />
Visa and MasterCard were directed to<br />
significantly reduce the costs to process<br />
offline debit transactions.<br />
The initial debit rate was lowered<br />
in August of 2003, and focussed<br />
on “card present” transactions (i.e.<br />
transactions where the cardholder and<br />
the card are physically present at the<br />
time of purchase). Since then, Visa and<br />
MasterCard expanded the reduced debit<br />
processing costs to include “card not<br />
present” transactions – an action that<br />
can directly benefit mail/phone order<br />
and internet merchants. Unfortunately,<br />
the rate changes do not automatically<br />
ensure that your business is actually<br />
benefiting from the lowered rates.<br />
Whether you receive a reduced rate<br />
depends on your processor passing the<br />
decrease through to your business.<br />
In order to fully understand how<br />
to capitalize on these rates, you need<br />
to first understand each of the rate<br />
classifications and how they work.<br />
Step 1: Understand the basic rate<br />
categories<br />
The most common pricing method<br />
used by transaction processors is a<br />
three-tier categorization. Transactions<br />
are thus one of: 1.) Qualified, 2.) Mid-<br />
Qualified, or 3.) Non-Qualified.<br />
In most cases, for a purchase to be<br />
categorized as a Qualified transaction,<br />
the card must be physically present<br />
at the time of purchase and swiped<br />
through a point-of-sale terminal. For<br />
example, if I purchase a hockey stick<br />
from my local sports store, and the<br />
cashier swipes my credit card, that<br />
transaction will most likely be charged<br />
at the Qualified rate. However, if the<br />
cashier hand-keyed my transaction<br />
into a terminal, the transaction would<br />
likely move to the more expensive<br />
Mid-Qualified rate. Lastly, if I were<br />
to make the same purchase using one<br />
of my rewards program or corporateissued<br />
cards, the transaction would<br />
52 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
likely move to the most expensive<br />
Non-Qualified category, regardless of<br />
whether it was swiped or hand-keyed<br />
by the cashier.<br />
Step 2: Understand how these rates<br />
work with your business.<br />
Because most of you reading<br />
this article are probably not selling<br />
hockey sticks in a retail environment,<br />
it is worthwhile to review how these<br />
rate categories affect internet based<br />
transactions.<br />
The first thing to understand is that<br />
processing rates are generally higher<br />
for an internet merchant than for a<br />
merchant that swipes all transactions.<br />
Typically, internet transactions are<br />
classified as Mid-Qualified in the case<br />
of consumer cards, or non-qualified if<br />
they are reward program or corporate<br />
cards. So, if you do not swipe credit<br />
cards in a face-to-face setting, and<br />
someone is trying to sell you on a<br />
1.64% Qualified rate, you’re probably<br />
best to run away, because very few (if<br />
any) of your transactions will be in this<br />
rate category!<br />
Unfortunately, a great many<br />
merchants are lured with low Qualified<br />
rates, while the Mid-Qualified and<br />
Non-Qualified rates are significantly<br />
higher. To avoid surprises on your<br />
monthly merchant statement, it’s<br />
critical that you understand all possible<br />
rate categories and how your processor<br />
will classify transactions.<br />
Once you are satisfied with your<br />
Mid-Qualified and Non-Qualified<br />
processing programs, you want to<br />
ensure that you receive the decreased<br />
cost for “offline” debit transactions. As<br />
we stated earlier, Visa and MasterCard<br />
lowered the costs for these rates,<br />
however most processors are not<br />
passing the savings to the merchant.<br />
This is particularly distressing in light<br />
of our research – we have found that<br />
the average hosting company accepts<br />
internet debit payments for as much as<br />
thirty percent of their overall business.<br />
Moreover, after having seen hundreds<br />
of credit card processing statements<br />
specifically from hosting companies,<br />
we can report that only a handful<br />
of them have had the Internet debit<br />
rate correctly segregated, and even<br />
fewer have had the appropriate cost<br />
associated. Thus, leveraging the new<br />
rate structure can almost always have<br />
a very positive impact on your bottom<br />
line.<br />
Step 3: Make the new debit rate<br />
work for you.<br />
The easiest way to confirm that you<br />
are receiving the decreased cost for<br />
debit sales is to review your monthly<br />
merchant statement. The debit rate<br />
should be identified as a separate<br />
category, and be billed at a lower rate<br />
than your other sales. One still needs<br />
to be cautious, however! We have seen<br />
numerous advertisements and emails<br />
trying to lure in companies, by offering<br />
a low two-tiered plan. In other words,<br />
they offer a median priced Qualified<br />
and Non-Qualified rate, but they are<br />
not reporting a Mid-Qualified or Debit<br />
rate. In cases like this, the processor<br />
is capitalizing on your debit sales<br />
as opposed to passing the additional<br />
savings on to your business.<br />
To avoid the problems of a two-tiered<br />
system, be sure that you work with a<br />
three-tiered program: one that provides<br />
you the cost for a Debit transaction, a<br />
Mid-Qualified transaction, and a Non-<br />
Qualified transaction.<br />
To view a few examples of<br />
competitive debit rate programs being<br />
offered in this hosting industry, visit<br />
either 1) ModernAuthorize at http://<br />
www.modernauthorize.com (Click<br />
on the American flag) or 2) SWsoft<br />
at http://www.bluepay.com/landings/<br />
swsoft/programSWsoft.html<br />
Step 4: Make sure you are partnering<br />
with the right providers.<br />
Akin to almost any product you<br />
purchase for your business, the closer<br />
you get to the source, the lower your<br />
transaction processing cost will<br />
be. Unfortunately, many hosting<br />
companies purchase their payment<br />
processing services from sales agents<br />
and/or resellers that may be three or<br />
four levels down from the source.<br />
That means your business is filling<br />
the pockets of those independent sales<br />
agents, as opposed to building your<br />
bottom line.<br />
It can thus be very valuable to find out<br />
from who you purchase your payment<br />
gateway and merchant account. If you<br />
are not buying from the source (i.e.<br />
the direct merchant account provider<br />
and the author/development company<br />
behind the payment gateway), it may<br />
be time to look for another provider.<br />
By taking this step, you will inevitably<br />
be able to save on your processing<br />
costs. P!<br />
PING! ZINE WRITER BIO<br />
BluePay is a market-leading provider of direct payment processing<br />
solutions. With a focus on the ISP and Hosting markets, BluePay<br />
offers some of the most cost effective payment processing<br />
solutions available today. In addition, BluePay can customize<br />
their payment gateway to address any payment-processing<br />
environment. You can contact BluePay at http://www.bluepay.<br />
com or toll free at 866-613-5422.<br />
www.pingzine.com 53
BUSINESS ISSUES<br />
Winning<br />
The Click Fraud Battle<br />
by Boris Mordkovich<br />
.......................................................................<br />
Is Click Fraud a Problem?<br />
If somebody were to tell you that 20%<br />
of your advertising budget was being<br />
wasted on fraud, would you be worried?<br />
If you advertise on pay-per-click search<br />
engines, such as Google AdWords, Yahoo!<br />
Search Marketing (formerly Overture),<br />
MIVA, or others, you have a reason<br />
to be concerned.<br />
According to industry metrics, up<br />
to 20% (http://www.adwatcher.com/<br />
?clickfraud) of all pay-per-click activity<br />
delivered to advertisers is fraudulent.<br />
Two of the most common sources include<br />
competitors trying to deplete your<br />
account by repeatedly clicking on your<br />
ads, or a search engine’s partner or affiliate<br />
increasing their own bottom line<br />
by clicking on your ads.<br />
Whatever the source, the situation<br />
is even more complex because search<br />
engines never reveal their click fraud<br />
monitoring tactics. In fact, most simply<br />
state that they use a number of methods<br />
designed to filter out repetitive or invalid<br />
clicking, and then ensure that all<br />
clicks reported to their advertisers are<br />
genuine. For security reasons, however,<br />
they cannot disclose details of their protection<br />
methodology nor give any visual<br />
or system clues to indicate that click<br />
protection is active.<br />
What does this mean to you? As an<br />
advertiser you must rely on the effectiveness<br />
of the search engine’s fraud<br />
monitoring techniques. However, given<br />
that they actually stand to gain financially<br />
from fraudulent clicks (since your ad<br />
account is charged each time any click<br />
is made on the ad), this apparent conflict<br />
of interest with search engines is a<br />
tough pill for advertisers to swallow.<br />
Fortunately, there are a number of<br />
third-party tools available that monitor<br />
your ad campaigns and track potential<br />
fraudulent activity for a nominal monthly<br />
fee, such as AdWatcher.com and<br />
WhosClickingWho.com. These tools<br />
analyze every single click on your ad(s)<br />
and let you know if they detect suspicious<br />
activity.<br />
The question of the day, though, is<br />
what to do once a third-party tool tells<br />
you it has detected click fraud? What’s<br />
the correct process to follow to get your<br />
money back?<br />
The following is a step-by-step guide<br />
to help ensure a refund from the search<br />
engine:<br />
Getting Your Money Back<br />
1. Gather all of the information<br />
you have on the fraud occurrences over a<br />
specific time frame. You will need the ad<br />
campaign name, IP addresses, referring<br />
pages, geographic origin of the clicks in<br />
question, keywords that were searched<br />
for, the number and times of the clicks,<br />
and any other relevant data required by<br />
your search engine to process a claim.<br />
Third-party tracking services are able to<br />
provide you with all of this information,<br />
54 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
and therefore are particularly helpful in<br />
such cases.<br />
2. According to guidelines from<br />
Google, Yahoo, and other search engines,<br />
you should also include a paragraph<br />
describing the trends in logs and/<br />
or reports that have led you to believe<br />
the click activity is invalid.<br />
3. Once all the information is<br />
ready, contact the search engine. If you<br />
have an account representative, forward<br />
the data to him or her. If not, I highly<br />
recommend that you ask for one, as it is<br />
easier to deal with the same person on<br />
an on-going basis.<br />
Alternatively, you can send in the<br />
claim request to an email address specific<br />
to the search engine, such as:<br />
Google AdWords: adwordssupport@google.com<br />
(or use their Contact<br />
form)<br />
Yahoo! Search Marketing:<br />
feedback@overture.com (or use their<br />
Support Center)<br />
Other search engines have relevant<br />
contact procedures on their websites.<br />
4. After you submit the information,<br />
you will likely receive a response<br />
similar to one of these from a low-level<br />
representative:<br />
a) They have conducted the investigation,<br />
found the clicks fraudulent,<br />
and will issue the credit to your account.<br />
b) They are requesting additional<br />
supporting information, such as your<br />
traffic trends, server logs, etc.<br />
c) They may refuse to acknowledge<br />
that the clicks were fraudulent.<br />
Unfortunately, this happens quite often<br />
because search engines are reluctant to<br />
admit click fraud has made it through<br />
their monitoring system (for example,<br />
Google never refers to clicks as<br />
“fraudulent”, just “invalid” – https://adwords.google.com/support/bin/answer.<br />
py?answer=6432).<br />
5. If scenario a) or b) occurs, follow<br />
whatever instructions are provided.<br />
If (c) occurs, ask to speak to your<br />
contact’s supervisor. It may require<br />
numerous emails and/or phone calls to<br />
accomplish this, but remember – don’t<br />
take the first “no” as a final answer. You<br />
are, in effect, asking the search engine<br />
to hand over part of their profits, which<br />
is not something they likely will easily<br />
agree to.<br />
If fraud is detected using a 3rd party<br />
auditor, we recommend that you submit<br />
click fraud reports about once a month,<br />
since it takes time for the search engine<br />
to process and investigate them. This<br />
way, keeping track of the status of your<br />
refund will be less time consuming and<br />
easier for both sides.<br />
Click fraud is a growing problem for<br />
many advertisers – no matter how much<br />
you spend on pay-per-click advertising<br />
monthly. To make sure that you are not<br />
a victim, it’s necessary to take matters<br />
into your own hands: detect click fraud,<br />
and claim the refunds you are entitled<br />
to. P!<br />
www.pingzine.com 55
BUSINESS ISSUES<br />
Just Replace<br />
The Pilot<br />
by Ron Dunlap<br />
.......................................................................<br />
Taxiing down the tarmac, a jetliner<br />
abruptly stopped, turned around and<br />
returned to the gate. After an hour-long<br />
wait, it finally took off. A concerned<br />
passenger asked the flight attendant,<br />
“What was the problem?” “Oh. It wasn’t<br />
anything that important really. The pilot<br />
was bothered by a rumbling noise he<br />
heard in the engine,” explained the<br />
Flight Attendant, “and it took us a while<br />
to find a new pilot.”<br />
Yes, it’s a joke, but it reminded me<br />
of a conversation I had with a web host<br />
owner several years ago. “John” had<br />
just hired a new support manager to<br />
replace “Robert.” Robert had been with<br />
the company since they had opened, and<br />
was a very good support manager. It was<br />
surprising to me, because I knew Robert<br />
loved working there, so I asked what<br />
happened to Robert. I thought he was<br />
doing a pretty good job.<br />
John told me that his company was<br />
going through a growth spurt and it<br />
seemed his company’s support efforts<br />
were lagging behind. They were getting<br />
more and more emails and calls for<br />
support from their customers. I asked if<br />
the increased requests were complaints,<br />
or just the typical setup and operation<br />
questions that are expected with the<br />
influx of new customers. John said they<br />
were mostly setup questions, but there<br />
were so many of them they couldn’t get<br />
to all of them.<br />
Robert had been with the <strong>Web</strong> Host<br />
company from day one, and was a very<br />
good manager. I was eager to find out<br />
why Robert left so I asked, “Did Robert<br />
quit from not being able to deal with the<br />
added pressure or something?” “No,”<br />
said John rather abruptly, “Robert was<br />
doing everything he could to keep up<br />
with the problems, but he constantly<br />
complained that we needed to hire<br />
more people to handle the increased<br />
number of support questions!” That was<br />
reasonable, I thought, but John wasn’t<br />
finished… “His complaints finally got<br />
to me and I couldn’t take it anymore, so<br />
I finally just put a cork in it!”<br />
“Put a cork in it,” I asked, not sure<br />
where he was going with his story?<br />
“Yes! I fired him and hired a new<br />
support manager!”<br />
I was dumbfounded. “Well, maybe I<br />
am not following you. You fired Robert<br />
because he told you he needed to add<br />
more staff to handle the increased<br />
support requests?”<br />
“Yes, I sure did,” John said with<br />
conviction.<br />
Scratching my head, I asked another<br />
“dumb” question. “Well, did hiring<br />
the new manager decrease the support<br />
requests, or something?” I was still<br />
incredulous.<br />
“Nope. But the new manager never<br />
complains to me about adding more<br />
staff and that takes a lot of pressure off<br />
my shoulders!”<br />
Amazing!<br />
John thought it was better to get a “new<br />
pilot” that didn’t complain about the<br />
noise, rather than fix the real problem.<br />
Just so you know, the web host lost a lot<br />
of customers when Robert was let go. It<br />
also lost credibility over the next year,<br />
and was eventually bought out by one<br />
of the “mega-hosts” that gobbled up<br />
quite a few web hosts back then. John<br />
complained that he should have sold his<br />
company when they had more customers<br />
(ironically, that was when Robert was<br />
with them). And, sadder still, Robert was<br />
disillusioned with <strong>Web</strong> Hosting and left<br />
the industry. The remaining customers<br />
were absorbed by the “mega-host,” and<br />
hopefully received better treatment.<br />
I hear this kind of thing happening<br />
every so often and I always believe<br />
that greed is the motivating factor. All<br />
companies face problems, but not all<br />
web hosts deal with them the same way.<br />
Quality web hosts fix the “engine noise.”<br />
Bad web hosts just replace the pilot.<br />
P!<br />
56 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
Complete Automation and<br />
Virtualization Software<br />
Get Your FREE Copy<br />
of SiteBuilder Today!<br />
DOWNLOAD NOW!<br />
WWW.SWSOFT.COM/SITEBUILDER<br />
Innovative Ease of Use<br />
5Step Online Wizard<br />
100s of Quality Templates<br />
Free Product Updates<br />
Unlimited Email Support<br />
1-888-209-8900<br />
sales@swsoft.com<br />
www.pingzine.com 57
Ready to Attract More Hosting Customers?<br />
The Linux/UNIX Control Panel<br />
Innovative <strong>Web</strong>site Builder<br />
• Interface Control Mgmt<br />
• Broader OS Support<br />
• Domain Owner Mgmt<br />
• New Paging Options<br />
• Controllable Stats<br />
• Retooled Interface<br />
• <strong>Web</strong>based Install<br />
• AutoKey Update<br />
• International Ready<br />
• Advanced Security<br />
Advanced Windows Control Panel<br />
7.5.5<br />
Featuring:<br />
• 5Step Online Wizard<br />
• 300+ Rich Templates<br />
• Flexible Pricing Models<br />
New:<br />
• ECommerce Capabilities<br />
• Custom Plan Management<br />
• New Site Management<br />
2.0<br />
• Flexible Interface<br />
• Enhanced Statistics<br />
• Advanced Features<br />
TM<br />
MultiServer Management<br />
The Only True VPS <strong>Tech</strong>nology<br />
• Centralized Mail<br />
• Centralized DNS<br />
• Reseller Account Support<br />
• Flexible Application Mgmt<br />
• License Management<br />
• Designed for Hosting<br />
• Fast Performance<br />
• Always UpToDate<br />
• Sophisticated Engine<br />
• Small Update Footprint<br />
Effective Virus Elimination<br />
Core Advantages:<br />
• Complete<br />
• Proven<br />
• Powerful<br />
• Secure<br />
• Efficient<br />
2.7 3.5<br />
Profitable Uses:<br />
• True VPS<br />
• Advanced Shared<br />
• Dynamic Dedicated<br />
• Split Shared<br />
• Split Dedicated<br />
58 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />
The most complete hosting automation<br />
and virtualization solutions available
Find Out More About Our Proven Solutions<br />
Complete Hosting Automation<br />
HSPcomplete's capabilities:<br />
• Scale to Tens of Thousands of Accounts<br />
• Full Range of Hosting Services<br />
• Infrastructure Management<br />
• Integrated Billing System<br />
• Many Domain Registrars<br />
• Numerous Payment Gateways<br />
• Broad OS/Application Support<br />
• Easy Customization and Integration<br />
CarrierGrade Hosting Automation<br />
PEM's core capabilities:<br />
• Scale to Millions of Accounts<br />
• Complete OSS/BSS Platform<br />
• Full Windows/Exchange/SPS/SQL<br />
• Modular and Easy to Integrate<br />
• Customizable and Extendable<br />
• Truly Distributed and Clustered<br />
• MultiTier and MultiPlatform<br />
• Comprehensive Services<br />
Contact us today to learn more about our flexible pricing options, partner programs,<br />
OPEN FUSION integration initiative and 24/7 professional support.<br />
Call 18882098900<br />
or visit www.swsoft.com<br />
www.pingzine.com 59
PRODUCT REVIEW<br />
Unless you have been<br />
living under a rock,<br />
you know that payper-click<br />
(PPC) advertising<br />
continues to buzz. The<br />
US Marketing Forecast by<br />
Forrester Research (May 2005) suggests that we will see 33%<br />
growth in search engine marketing (SEM) this year and sustain<br />
11% growth per year over the next five years. This rapid<br />
growth will propel SEM spending to more than $11.6 billion by<br />
2010. As SEM grows, the cost of PPC advertising for popular<br />
keywords will increase significantly. With a large market and<br />
increasing complexity in PPC advertising, many small-to-mid<br />
sized businesses hesitate to use PPC advertising. Empowering<br />
small-biz owners to use SEM and PPC in particular is the goal<br />
of Boris and Eugene Mordkovich’s new book: “Pay-Per-Click<br />
Search Engine Marketing Handbook.”<br />
The Mordoviches PPC Handbook guides small business owners<br />
though the maze of PPC marketing. Covering topics from “What<br />
is Pay-Per-Click Search Engine Advertising?” to “Types of Pay-<br />
Per-Click Search Engines and Reviews” the book targets PPC<br />
neophytes. The introductory chapters provide an introduction<br />
to the pay-per-click concept, terminology and benefits. Copious<br />
amounts of jargon fill SEM, so understanding terms like CPC,<br />
CTR, and conversion rate are essential to an effective campaign.<br />
The PPC Handbook will certainly help you with these topics. If<br />
you’ve never deployed a PPC campaign, these early sections will<br />
arm you with sufficient information to get started at places like<br />
Google’s AdWords, Yahoo!, and similar PPC search engines.<br />
Though, I don’t do a lot of PPC advertising, I have used<br />
Google’s AdWords and Yahoo’s Search Marketing. If you have<br />
ever used either of these services, then you will probably find<br />
much of the information in this book a synopsis of information<br />
found at these PPC outlets. If you’ve not used PPC advertising,<br />
early chapters will teach you how to develop a campaign, how<br />
to open an account and how to track your results. For those with<br />
experience in PPC, you may glean the most from the chapters on<br />
tracking click fraud and contextual PPC advertising.<br />
The Mordoviches provide good tips on how and when to<br />
use contextual ads instead of paid search listings. The authors<br />
advise testing landing pages to determine which page provides<br />
the best results. Since you can often create multiple ads with the<br />
same copy, you can easily test landing pages by just changing<br />
the URL in the ad. Though simple, I suspect many of us rarely<br />
do this. Another good tip is to setup the same ad at different<br />
search engines and PPC outlets. In my own experience with<br />
FindWhat, Kanoodle, AdWords, and Yahoo!, I have found that<br />
I get dramatically different results. Since it is sometimes hard<br />
to know where your ad will be published, trying multiple search<br />
engines will help you determine the best place to maximize your<br />
60 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />
Pay-per-click Search Engine Marketing Handbook:<br />
Low Cost Strategies to Attracting New Customers<br />
Using Google, Yahoo & Other Search Engines<br />
Author: Boris Mordkovich, Eugene Mordkovich<br />
......................................................................................................<br />
by Jeff Huckaby<br />
return on the investment (ROI), sound advice when you have<br />
limited PPC dollars.<br />
Chapter 6 provides help on tracking click fraud. With experts<br />
estimating click fraud as high as 50%, keeping tabs on the<br />
fraudsters is essential. Click fraud lowers your ROI and clouds<br />
tracking statistics. The authors point out that click fraud can<br />
increase your advertising even if you are not targeted directly.<br />
Since click fraud increases the cost of a keyword, your advertising<br />
costs may increase, an impact I had not considered. The authors<br />
also highlight what they call “impression click fraud” using<br />
Google’s AdWords program. Using this technique, a competitor<br />
uses a script or robot to visit pages with your ads. They do not<br />
click on the ads, but simply lower your overall click through rate.<br />
If your rate falls to a very low level, Google may disable your ad,<br />
thus allowing competing ads to rise to the top.<br />
The PPC handbook includes reviews of several major PPC<br />
services. The reviews list the pros and cons of each engine, then<br />
minimum deposit and bid process. Having the bid prices and<br />
minimum deposits summarized can save you a lot of time.<br />
The section of the book I found most useful was the “Tips for<br />
the Experts” chapter. This section is filled with a few nuggets<br />
that I’ve not dug up elsewhere. For example, smaller screens will<br />
have fewer ads above the fold. So just as in designing, you need<br />
to bid appropriately to get your ads the best exposure. If you bid<br />
too low, the visibility of your ads may drop below the fold. So<br />
just as in designing, you need to bid appropriately to get your ads<br />
the best exposure. If you bid too low, the visibility of your ads<br />
may drop below the fold and your campaign may suffer. Another<br />
good tip is to use exact matching of keywords and to track these<br />
keywords individually. Though this requires more work, you<br />
can fine tune your keyword list to maximize your ROI. You<br />
will discover several more tips scattered through out this section<br />
which has input from many of the top names in SEM.<br />
Overall, Pay-Per-Click Search Engine Handbook is a good read<br />
for people very new to PPC. However, if you’ve every managed<br />
an ad campaign or do significant PPC advertising, you will<br />
likely need a more advanced book to ferret the most out of your<br />
advertising dollars. Even if you have experimented with PPC, the<br />
contextual advertising and tips chapters provide valuable insights.<br />
You have to overlook the poor publishing quality – it simply does<br />
not mirror the quality of the content. Given that you can pick this<br />
book up for less than twenty dollars, I suspect most people new<br />
to PPC marketing will benefit.<br />
P!<br />
PING! ZINE WRITER BIO<br />
Jeff Huckaby is founder and CEO of rackAID, a outsourced server management<br />
company located in New Haven, Connecticut. Prior to rackAID,<br />
he managed a strategic consulting fi rm that assisted non-profi t organizations<br />
with online business developments and provided system support<br />
services at Yale University. In his spare time, he enjoys baseball, dining<br />
out, and spending too much time at the local bar.
www.pingzine.com 61
SERVICE DIRECTORY<br />
CONTROL PANEL SOLUTIONS<br />
DEDICATED HOSTING<br />
Positive Software Corporation<br />
www.psoft.net<br />
p: 718-928-9912<br />
e: sales@psoft.net<br />
H-Sphere Control Panel<br />
SWsoft<br />
www.swsoft.com<br />
p: 703-815-5670<br />
e: sales@swsoft.com<br />
Proven Automation and<br />
Virtualization Software<br />
Hosting Controller<br />
www.hostingcontroller.com<br />
p: 213-341-1419<br />
e: sales@hostingcontroller.com<br />
Put <strong>Web</strong> Hosting Business<br />
on Autopilot<br />
LPANEL.NET<br />
www.lpanel.net<br />
e: sales@lpanel.net<br />
Full Billing Support Account<br />
Automation<br />
Bocacom<br />
www.bocacom.net<br />
p: 561-939-3330<br />
e: sales@bocacom.net<br />
Quality Self-Managed<br />
Dedicated Servers<br />
EV1 Servers.net<br />
www.ev1servers.net<br />
p: 800-504-7873<br />
e: sales@ev1servers.net<br />
Nothing Beats Our Racks!<br />
DEDICATED HOSTING<br />
ECOMMERCE SOLUTIONS<br />
iPowerweb<br />
www.ipowerweb.com<br />
p: 888-511-4678<br />
e: sales@ipowerweb.com<br />
<strong>Web</strong> Hosting<br />
Fork Networking<br />
www.forked.net/pingzine<br />
p: 907-735-2475<br />
e: apex@forked.net<br />
Servers by Nerds, for Nerds.<br />
99.998% Up.<br />
Handy Networks, LLC<br />
www.handynetworks.com<br />
p: 877-704-2639<br />
e: sales@handynetworks.com<br />
Specializing in Windows Hosting<br />
Illuminated Hosting<br />
www.illuminatedhosting.com<br />
p: 877-749-3533<br />
e: sales@illuminatedhosting.com<br />
From Just $99/month - 99.9999%<br />
Guarantee!<br />
Relio<br />
www.relio.com<br />
p: 863-943-0203<br />
e: info@relio.com<br />
H-Sphere Hosting & Reseller Plans<br />
Underground Colocation<br />
www.undergroundcolocation.com<br />
e: sales@undergroundcolocation.com<br />
Incredible Data Center 85 Feet<br />
Underground<br />
Associate-O-Matic<br />
www.associate-o-matic.com<br />
e: info@associate-o-matic.com<br />
FREE Amazon Affiliate Store<br />
Software<br />
BluePay<br />
www.bluepay.com<br />
p: 866-613-5422<br />
e: sales@bluepay.com<br />
Providing Integrated Payment<br />
Processing Solutions<br />
ECOMMERCE SOLUTIONS<br />
HARDWARE SOLUTIONS<br />
Control Scan<br />
www.controlscan.com<br />
p: 800-825-3301<br />
e:resellers@controlscan.com<br />
Offers Third Party Fraud<br />
Protection & Verification<br />
Modernbill<br />
www.modernbill.com<br />
p: 502-566-7754<br />
e: marketing@modernbill.com<br />
<strong>Web</strong> Host Billing: Create,<br />
Manage, Grow<br />
CompleteSSL<br />
www.completessl.com<br />
p: 888-562-2123<br />
e: sales@completessl.com<br />
Affordable Digital SSL Certificates<br />
RackMount Micro<br />
www.rackmountmicro.com<br />
p: 800-673-0174<br />
e: sales@rackmountmicro.com<br />
Quality Servers at<br />
Affordable Prices!<br />
Rackmounts, Etc.<br />
www.rackmountsetc.com<br />
p: 619-258-0573<br />
e: sales@rackmountsetc.com<br />
Rackmount Systems with<br />
Unrivaled Prices!<br />
BrowseHosts<br />
www.browsehosts.com<br />
p: 551-206-1398<br />
e: sales@browsehosts.com<br />
PR6 Host Directory, 30K<br />
Visitors Monthly<br />
62 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
SERVICE DIRECTORY<br />
HOSTING DIRECTORIES<br />
RESELLER HOSTING<br />
RateMyHost.com<br />
www.ratemyhost.com<br />
p: 630-788-9942<br />
e: sales@ratemyhost.com<br />
Cheap <strong>Web</strong> Hosting Directory<br />
The Hosting Forums<br />
www.thehostingforums.com<br />
e: mgmt@thetechpad.com<br />
<strong>Web</strong> Hosting Forums<br />
<strong>Web</strong> Hosting Sources<br />
www.webhostingsources.com<br />
e: webmaster@webhosting<br />
sources.com<br />
GREAT offers in 3 clicks or<br />
LESS!<br />
Cheap Hosting<br />
www.cheaphostingdirectory.com<br />
e: mgmt@thetechpad.com<br />
Hosting Companies & FREE<br />
Domain List<br />
<strong>Web</strong>Site Host Directory<br />
www.websitehostdirectory.com<br />
e: mgmt@thetachpad.com<br />
<strong>Web</strong> Hosting Information &<br />
Domains<br />
Bizland<br />
www.bizland.com<br />
p: 800-Bizland (800-249-5263)<br />
e: support@bizland.com<br />
Innovative Reseller Programs<br />
& Affordable Hosting<br />
Gazzin.com Reseller<br />
Provider<br />
www.gazzin.com<br />
e: sales@gazzin.com<br />
Reseller Packages starting at<br />
$6.95 USD<br />
HOSTGATOR.COM<br />
Host Gator<br />
www.hostgator.com<br />
p: 866-964-2867<br />
e: sales@hostgator.com<br />
Reseller and Shared Hosting<br />
Solutions<br />
RESELLER HOSTING<br />
SHARED HOSTING<br />
NetspaceOnline.net<br />
www.netspaceonline.net<br />
p: 877-937-3224<br />
e: sales@netspaceonline.net<br />
Reseller & Shared Hosting<br />
Solutions!<br />
Vortech Hosting<br />
www.vortechhosting.com<br />
p: 407-323-5634<br />
e: sales@vortechhosting.com<br />
H-Sphere Reseller Plans!<br />
Digital Zones - dZones<br />
www.dzones.com<br />
e: sales@dzones.com<br />
Feature Packed <strong>Web</strong> Hosting<br />
for Less<br />
1 & 1 Internet, Inc.<br />
www.1and1.com<br />
p: 887-GO1AND1 (887-461-2631)<br />
e: info@1and1.com<br />
World-Class Hosting,<br />
Free 24/7 Phone Support!<br />
InThrive<br />
www.inthrive.com<br />
p: 877-572-9440<br />
e: sales@inthrive.com<br />
High Availability Clustered<br />
<strong>Web</strong> Hosting<br />
Site5<br />
www.site5.com<br />
p: 888-Site5-com<br />
e: sales@site5.com<br />
The New Paradigm for Shared<br />
& Reseller Hosting<br />
SHARED HOSTING<br />
Doreo Hosting<br />
www.doreo.com<br />
e: sales@doreo.com<br />
Ensim Shared & Reseller Hosting<br />
eRegistry <strong>Web</strong> Registration<br />
& Designs<br />
www.e-registry.net<br />
p: 866-374-7879<br />
e: support@e-registry.net<br />
“Your World, at our Hands”<br />
Fortunatics.com<br />
www.fortunatics.com<br />
p: 800-574-0902<br />
e: info@fortunatics.com<br />
Enterprise-Class eBusiness Services<br />
Global<strong>Web</strong>Brands<br />
www.globalwebbrands.com<br />
p: 804-229-0583<br />
e: sales@globalwebbrands.com<br />
Quality <strong>Web</strong>site Hosting from<br />
$6.95/month<br />
Host The Best<br />
www.hostthebest.com<br />
p: 646-670-4099<br />
e: sales@hostthebest.com<br />
<strong>Web</strong> Hosting, Shoutcast<br />
& Reseller<br />
Hostified <strong>Web</strong> Hosting<br />
www.hostified.com<br />
p: 203-720-0805<br />
e: sales@hostified.com<br />
Double Disk Space when you<br />
mention PING!<br />
HostPC Internet Services<br />
www.hostpc.com<br />
p: 518-724-6424<br />
e: sales@hostpc.com<br />
#1 for DirectAdmin Hosting<br />
My Gathering<br />
www.mygathering.com<br />
e: nelson.uw@gmail.com<br />
100% FREE Forum<br />
Hosting (phpbb)<br />
www.pingzine.com 63
SERVICE DIRECTORY<br />
SHARED HOSTING<br />
WEB DESIGN SERVICES<br />
MyName<strong>Web</strong>.com<br />
www.mynameweb.com<br />
p: 866-642-4678<br />
e: admin@mynameweb.com<br />
Reliable...Affordable...<br />
E-Commerce Hosting<br />
NEXCESS.NET, L.L.C.<br />
www.nexcess.net<br />
p: 866-NEXCESS<br />
e: info@nexcess.net<br />
<strong>Web</strong> Hosting & Software<br />
Development<br />
Speedy Giant <strong>Web</strong> Hosting<br />
www.speedygiant.com<br />
p: 909-953-3459<br />
e: sales@speedygiant.com<br />
The Secure Hosting Solution!<br />
uBuildASite.com<br />
www.ubuildasite.com<br />
p: 800-574-0902<br />
e: info@ubuildasite.com<br />
Build & Host Your Site - $99/yr!<br />
WeHost4U.net, Inc.<br />
www.wehost4u.net<br />
e: sales@wehost4u.net<br />
FREE <strong>Web</strong>sites with Select<br />
Hosting Plans<br />
Windy City <strong>Web</strong> Solutions<br />
www.windycitywebsolutions.com<br />
p: 630-929-3050<br />
e: sales@windycityweb<br />
solutions.com<br />
High Speed Hosting & High<br />
End Support<br />
DesignVAR<br />
www.designvar.com<br />
p: 866-880-2754<br />
e: sales@designvar.com<br />
A Virtual Design Team For<br />
<strong>Web</strong> Based Companies<br />
iRun<br />
www.irun.com<br />
p: 866-312-IRUN<br />
e: sales@irun.com<br />
Private Label <strong>Web</strong>site Builder<br />
Solutions<br />
WEB DESIGN SERVICES<br />
WEB HOSTING TOOLS<br />
Bizwala, Inc.<br />
www.bizwala.com<br />
p: 888-803-3614<br />
e: jr@bizwala.net<br />
Free Virtual Smile w/ Purchase<br />
Equentity,LLC<br />
www.equentity.com<br />
e: pingzine@equentity.com<br />
<strong>Web</strong> Design for the<br />
Professional World<br />
Premium <strong>Web</strong><br />
Development, LLC<br />
www.premiumwebdesign.com<br />
p: 229-888-0931<br />
e: g@premiumwebdesign.com<br />
Hosting with Fantastico<br />
& SiteBuilder!<br />
AdWatcher Ad Tracking<br />
www.adwatcher.net<br />
p: 800-543-9579<br />
e: info@adwatcher.net<br />
Revolutionary Tool that Monitors<br />
Your Ad Campaigns<br />
DemoDemo.com<br />
www.demodemo.com<br />
p:866-811-0911<br />
e: info@demodemo.com<br />
Pioneers in Flash Tutorials<br />
Since 2002<br />
Host Hideout<br />
www.hosthideout.com<br />
<strong>Web</strong> Hosting Communtiy<br />
Press Advance Hosting<br />
www.pressadvance.com<br />
p: 612-605-6619<br />
e: contact@pressadvance.com<br />
<strong>Web</strong> Hosting Press Releases<br />
& More!<br />
Searchfeed.com<br />
www.searchfeed.com<br />
p: 866-722-9951<br />
e: information@searchfeed.com<br />
Pay Per Click Search Engine<br />
Advertising<br />
WEB HOSTING TOOLS<br />
<strong>Tech</strong>Pad Agency<br />
www.thetechpad.com<br />
e: mgmt@thetechpad.com<br />
Owns and Manages Hosting<br />
Directories<br />
Touch Support<br />
www.touchsupport.com<br />
p: 888-45-TOUCH<br />
e: sales@touchsupport.com<br />
Expert Server Administration<br />
<strong>Web</strong>Hosting Prospector<br />
www.webhostingprospector.com<br />
p: 877-937-3224<br />
e: information@webhosting<br />
prospector.com<br />
Target Businesses Based on<br />
Their Hosting Needs<br />
Connectria Corporation<br />
www.connectria.com<br />
p: 800-781-7820<br />
e: info@connectria.com<br />
Custom Business-Critical<br />
Managed Hosting<br />
ResellerGuide.com<br />
www.resellerguide.com<br />
e: info@resellerguide.com<br />
Your Guide on How to Sell<br />
<strong>Web</strong> Hosting!<br />
SupportPRO Outsourced<br />
<strong>Tech</strong> Support<br />
www.supportpro.com<br />
p: 847-717-7647<br />
e: sales@supportpro.com<br />
Try our <strong>Tech</strong> Support. 2 Weeks<br />
FREE Trial<br />
The Hosting News<br />
www.thehostingnews.com<br />
e: mgmt@thetechpad.com<br />
Reseller Hosting Info & Daily New<br />
64 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong>
www.pingzine.com 65
Host<br />
Laughs<br />
by <strong>Web</strong> Host <strong>Magazine</strong> & Buyer’s Guide<br />
The New Son-In-Law<br />
The CEO of a very successful <strong>Web</strong> Hosting company in the<br />
mid-west invited his new son-in-law to the company data<br />
center. He walked him around and explained all the ins and<br />
outs of the Hosting business. When they got done with the<br />
tour the CEO brought his son-in-law into his spacious offi ce<br />
where they both sat down to talk.<br />
“As you can see, I run a very successful, multi-million dollar<br />
<strong>Web</strong> Hosting company. I wanted you to see the operations,<br />
because, I want the man that won my daughter’s hand in<br />
marriage to start off successfully. I want to welcome you<br />
into the family and show you how much we care for you.”<br />
The CEO smiled at the young man. “Because of that, I’ve<br />
already drawn up the legal papers to make you a 50-50<br />
partner in my business! How does that sound?”<br />
The young man was excited “That’s great! Thank you sir!”<br />
He replied.<br />
“Good. Then as of this moment, you own half the company!<br />
Beginning Monday I want you to be here at 8:00 AM, sharp,<br />
and I’ll show you your offi ce and you can get started!”<br />
“That’s great sir! But, I hate offi ce work. I can’t stand being<br />
behind a desk all day,” said the son-in-law.<br />
“Good! Then you want to get right in there and work with<br />
your hands! I’ll have you work in the data center where you’ll<br />
learn networking and troubleshooting techniques from the<br />
best technicians...”<br />
His son-in-law interrupted him “Ahh, that’s something I can’t<br />
do sir.”<br />
“Why Not?”<br />
“Well, sir, I can’t stand being around computers,” said the<br />
young man<br />
“Can’t stand computers! Wait a minute,” said the father-inlaw.<br />
I just made you the half-owner of a multi-million-dollar<br />
organization, and you can’t stand desk work, and you can’t<br />
stand computers! What am I going to do with you?”<br />
“Easy!” Said the young man. “Buy me out!”<br />
66 <strong>Ping</strong>! <strong>Zine</strong> <strong>Web</strong> Hosting <strong>Magazine</strong><br />
Overheard in the Parking Lot<br />
Two <strong>Web</strong> Host executives were overheard at the last<br />
HostingCon in the parking lot. The fi rst one had a coat<br />
hanger trying to unlock the door of the new Mercedes while<br />
the second one stood there, in a frustrated pose. “I can’t<br />
believe you locked the keys in the car!” Just then the coat<br />
hanger slipped.<br />
“Darn! I almost had it,” said the fi rst one. The second one,<br />
looked up at the sky, palm outstretched, feeling a drop of<br />
rain. “Well you’d better hurry up and try harder! It’s starting<br />
to rain, and the top is down!”<br />
The Trouble’s At Your End<br />
A well known Windows programmer from Microsoft decided<br />
he needed a bigger challenge in his life so he enlisted in the<br />
Marines and went to Boot Camp.<br />
At the rifl e range, he was instructed on how to use his<br />
rifl e, given some bullets, and told to fi re at the target. He<br />
fi red several shots at the target and waited for the results.<br />
The report came back that all of his shots had completely<br />
missed the target. The Windows programmer looked at his<br />
rifl e, and then at the target. He looked at the rifl e again, and<br />
then at the target again. He put his fi nger over the end of<br />
the rifl e barrel and squeezed the trigger with his other hand.<br />
The end of his fi nger was blown off, whereupon he yelled<br />
toward the target area, “The bullet’s are leaving here just<br />
fi ne! The trouble must be at your end!”<br />
Ordering Drinks<br />
A Programmer, a <strong>Web</strong> Designer and a <strong>Web</strong> Host lawyer<br />
headed into a bar and ordered their drinks from the<br />
bartender.<br />
Programmer: “I’ll have a B and C.”<br />
Bartender: “What’s a B and C?”.<br />
Programmer: “Bourbon and Coke.”<br />
<strong>Web</strong> Designer: “And, I’ll have a G and T.”<br />
Bartender: “What’s a G and T?”<br />
<strong>Web</strong> Designer: “Gin and tonic.”<br />
<strong>Web</strong> Host lawyer: “I’ll have a 15.”<br />
Bartender: “What’s a 15?”<br />
<strong>Web</strong> Host lawyer: “7 and 7”
www.pingzine.com 67