07 Mar 2019

To rebuy a domain name is possible!

How to rebuy a domain name?

It is necessary to have a website and you have found the perfect domain name for that?

This is a very good thing but there is a problem: the domain name is unavailable. We buy it?

First you type the URL in a browser, then you come across a message like: ERROR 404

It’s a good sign. This shows that the website is not used and probably resalable!

The next step is to have a little more information about who owns it and who to contact.

  1. Go to whois to type the same adress in the search bar.
  2. Go through the intermediation websites for the sale of domain names. One of the best known and used for French speaking is  https://sedo.com/fr/, it puts in relation seller of domain and purchaser and makes it possible to guarantee the transaction of sale of the domain and transfer of the domain to the new buyer . Several other trusted sites exist like https://www.escrow.com/domains.

Warning ! Never go through a direct transaction with the seller.

Once the domain is registered the current owner has full control over it and once you send him the money you have no guarantee that he will transfer the domain to you. Hence the importance of intermediation websites that only pays him money once the domain is transferred to your home or home.

To conclude, having an unavailable domain name can be blocking the momentum of launching a website. We must not lose hope and keep his motivation.

Partager
07 Mar 2019

A domain name, for what use?

All about the usefulness of domain names

A domain name, for what use?

Booking your domain name is the first thing to do on the internet when you create a brand. This is an essential step to put a website online, trade, create e-mail addresses … It represents your first identity on the internet without which we can not see you (or find you) and conditions your presence on several search engines like Google, Bing, Yahoo or Voilà.

Characteristics of the domain name

It is important to book your domain name as soon as possible. The first come will be the first served even if the anteriority of your mark can allow you to recover sometimes this one. It must consist of at least two letters and must not contain any specific sign or space, except the hyphen “-” used as separator. It must have a number of characters between 2 and 63, regardless of the extension even if a name too long could quickly make access to your site tedious. The characters allowed the numbers from 0 to 9 and the letters from a to z. It can not begin or end with a dash.

The principle of extensions

In order to avoid the dangers of cybersquatting (the practice of reserving a domain name specific to a brand to alter the visibility of the latter, note), it is still possible to register domain names under several extensions. In principle, the .com is assigned to international and commercial sites, but no condition regulates its attribution. .Net refers to websites that belong to the field of new technologies and computing. With the advent of social networks, this extension is experiencing renewed interest among entrepreneurs in the new economy. The latter is not subject to any restrictions. Institutional sites are usually designated by the .org, like state agencies or associations. The .eu extension refers to natural or legal persons who are established on the territory of the European Union.

Extensions often refer to a specific set, but are not exclusive. We can choose a domain name with an extension still free or that suits us.

To be sure to use the right domain name, it’s a good idea to check availability. Also, it is advisable to buy several extensions, to protect its brand in the target markets. It is rather embarrassing to have a domain name .com and a competitor has the same name, but with an extension in .net or .ma. This does not require to have several website, but simply to redirect these addresses on the main address of the website.

Today, the domain name has become so important that it sometimes determines the choice of the name of the brand or company name, especially for companies only present on the web.

There are 4 types of extensions:

Extensions linked to a country and limited to 2 letters: .fr, .be, .de, .uk, .cn, etc … Some countries limit the use of their extension to their residents. It is therefore impossible for a foreigner to register a domain name with this extension without being present on the territory.

Generic extensions composed of 3 or more letters and historically the most used: .com, .net, .org, etc … No restriction on these extensions.

The new generic extensions of 3 letters and more launched from 2008: some are still being created and in the future they will be more and more numerous: .pro, .bar, .cafe, .xxx, .bio, .wine, .vin, etc … Extensions reserved for large companies: .amazon, .apple, .leclerc, .total, etc … You must hold an internationally recognized brand and have the means.

Register your domain name before it’s too late https://gozil.ma

Source: dynamique-mag

Partager
07 Mar 2019

Personal branding and domain name

Everyone has an interest in using personal branding. If you type your name in Google, which pages appear first?

  • Are these pages created by others mentioning you?
  • Are you downright absent from the search results?
  • Or are these pages that you have created, that present you professionally and allow at a glance to know your message and your added value?

Obviously, the third option is preferable. And you can set it up with personal branding. But let’s see a little more specifically who is particularly interested in personal branding.

The Branding staff via website creation allows you to:

  • Good visibility on social networks, especially professionals like LinkedIn
  • A strong presence at professional events related to his field of activity
  • Interventions in conferences and seminars
  • Publication of books
  • Writing articles for the press
  • Holding a personal or thematic blog

A web page can contain just your photos, a short biography and links to your profiles on social networks, or a resume to download. If you have content to publish, you can do it on a blog using WordPress for example, which is pre-installed on all our hosting packages. Nothing better than having the domain name containing your name and surname, it will mark the minds of visitors, and will be easy to remember.

Source :Gozil

Partager
07 Mar 2019

7 safety tips for wordpress sites

The WordPress security of your website is essential. To be hacked and a tedious experiment and will require a lot of work and money to repair the damage. The best solution is prevention. When you start a blog or site in WordPress, security is usually the last concern. We often say that a small blog will not arouse the interest of pirates. Except over time, the content of your blog and its data are gaining value. A security vulnerability WordPress then becomes a point of entry for hackers and can be exploited to steal your database of customers or launch malicious actions without your knowledge. To prevent you from ending up with a hacked site, here are 7 basic tips to follow and apply:

1. Make regular backups of your site

Several options are possible: either you do the backup yourself and you keep a copy locally, you install a plugin that does it automatically for you, or you opt for a web hosting that contains the option of automatic backup . The backup must include the files and the database. Plugins like UpdraftPlus or WP DB Manager will make your life easier. If your website is hosted at Tudiohost, the backup is done automatically and remains accessible for you 24/24. You do not have to worry about this task.

2. Update WordPress, your themes and your plugins

It can never be said enough, an obsolete installation or plugin and a highway for pirates. WordPress, as well as all important themes and plugins, regularly update their files to add features and to fix WordPress security issues. If you keep an older version, it automatically becomes unsecured and the novice hacker who follows the news updates to exploit it.3. Supprimez le nom d’utilisateur par défaut “admin”

Si vous gardez le nom d’utilisateur par défaut de WordPress, vous avez déjà fait une partie du travail du pirate. Le plus sûr et de créer un nouvel utilisateur et supprimer celui créé par défaut par WordPress. D’ailleurs, le système vous permettra d’attribuer tous les posts au nouvel utilisateur, aucune donnée ne sera supprimée.

3. Delete the default user name “admin”

If you keep the default WordPress username, you’ve already done some of the hijacker’s work. The safest and create a new user and delete the one created by default by WordPress. By the way, the system will allow you to assign all posts to the new user, no data will be deleted.

4. Choose a complex password to improve your WordPress security

Forget the simple and easy passwords like “passedemot”, “password”, “1234567890” and others of the same types. Accounts with this type of password are hacked in minutes with dictionary attacks. If you lack inspiration, use a password generator like this: https://www.generateurdemotdepasse.com

5. Scan your website’s files regularly

Replace “regularly” with “daily” and do it. The faster you detect an intrusion, the easier will be the cleaning and recovery of your site. Again, you do not need to do this manually. Specialists like Sucuri and Wordfence can do it for you for free. You can configure the plugins to inform you of any anomaly detected. You will receive an automatic email with the scan report after each verification.

6. Activate an SSL certificate on your site

This will guarantee the encrypted transmission of data over the network and will avoid the curious to see your password in clear when using spyware. Generally, your host can take care of the implementation of the SSL certificate on your hosting space. It is paid or included with some offers like professional web hosting.

Once the security certificate is in place, you can add the following line to the wp-config.php to force the passage through SSL:

  1. define(‘FORCE_SSL_ADMIN’, true);

This metric will apply to the login pages and the dashboard.

7. Limit the number of login attempts

If someone tries to force access to your WordPress admin space, you can block it by limiting the number of access attempts allowed by the same IP address. This list is far from exhaustive but if you follow these tips you will do better than most sites and blogs online. It will take only an hour and you will certainly avoid hours of anxiety and unnecessary costs.

Source : Gozil

Partager
07 Mar 2019

Why use SSL rather than another system?

Why SSL, and how does it work?

What is it used for ?

SSL = Secure Socket Layer

It is a system that allows to exchange information between 2 computers in a safe way. It ensures 3 things:

  • Confidentiality and Integrity: It is impossible to find or spy on information exchanged.
  • Authentication: It makes it possible to make sure of the identity of the program, the person or the company with which one communicates.

It is a complement to TCP / IP and allows (potentially) to secure any protocol or program using TCP / IP.

It was created and developed by the company Netscape and RSA Security. There are now opensource versions and a similar free protocol: TLS (see below).

Why use it rather than another system?

Why use it?

  • SSL is standardized
  • It exists in free version: OpenSSL (http://www.openssl.org) that you can use in your programs without paying royalties.
  • OpenSSL is open source: everyone can control and verify the source code (The secret lies in the encryption keys, not in the algorithm itself).
  • It has been cryptanalyzed: this system has been more analyzed than any of its competitors. It has been reviewed by many cryptographic specialists. We can therefore consider it safe.

How does it work ?

  • SSL Handshake protocol: Before communicating, the two SSL programs negotiate common keys and encryption protocols.
  • SSL Record protocol: Once negotiated, they encrypt all information exchanged and perform various checks.

1.The negotiation (“handshake“)

At the beginning of the communication the client and the server are exchanged:

  • the SSL version they want to work with,
  • the list of encryption methods (symmetrical and asymmetrical) and signature that everyone knows (with key lengths),
  • compression methods everyone knows,
  • random numbers,
  • certificates.

Client and server try to use the most powerful encryption protocol and decrease until they find a protocol common to both. Once this is done, they can start exchanging data.

2. Communication  (“record“)

With SSL, the sender of the data:

  • Cut the data into packets,
  • Compress the data,
  • Cryptographically sign the data,
  • Number the data,
  • Send them.

Whoever receives the data:

  • Decrypt the data,
  • Check the signature of the data,
  • Decompresses the data,
  • Reassembles the data packets.

 

Source : sebsauvage

Partager

© 2023 Gozil. Tous les droits réservés