New Plesk Toolkits and Features

Posted at August 7, 2018 at 3:08 pm by Ylber Popaj

Plesk Toolkits bannerPlesk has recently added a few Plesk Toolkits that might have a massive influence on your customer experience. Here is a breakdown on what’s new.

  1. WordPress toolkit
  2. Joomla toolkit
  3. SEO toolkit
  4. Extension catalog

Lets get started!


1. WordPress Toolkit

This toolkit is one of the most outstanding features of them all. First and foremost, it utilizes the world’s most popular CMS, WordPress. Plesk describes it as, “the most complete, secure and versatile toolkit for WordPress.” The most notable CMS feature is its user-friendliness and simplicity; the Plesk WordPress toolkit takes that even further.

The toolkit offers a one-click installer which helps deploy your first WordPress site. Upon installation, you can even stage and test all your creative ideas in a sandbox tool which requires no plugins! This helps make efficient deployment of any new content to your live site. Additionally, there is a built-in security feature that helps protect your website along with a security scanner.

Need more? The toolkit helps make processes like staging, cloning, syncing, updating, migrating, and other high risk tasks easy with one click. If you have multiple WordPress sites, you can even singularity or mass-execute updates across your sites.

If the process seems to be over simplified, the toolkit offers a unique feature that lets you get into the nitty and gritty details for the high level developers out there. You will be able to access WP-CLI, maintenance mode, debug management, search engine index management and more.


2. Joomla toolkit

The Joomla toolkit is similar to the WordPress toolkit. It offers a relaxing feature that allows users to build, secure and run all your Joomla! instances. Just as the WordPress toolkit, there is a one click installer which helps ease the process of initialization and ultimately getting started! Built-in security features and security scanner are all preconfigured and require no security expertise. Lastly, you can update and monitor all of your Joomla! Sites via one single dashboard.


3. SEO toolkit

When it comes to search engine optimization, it may be unclear to many developers as to what exactly needs to be done. What should be focused on? What should be improved? The SEO toolkit becomes your guide to optimization.

It helps improve your search engine ranking by testing, analyzing and monitoring your website and competitors. The included SEO Advisor generates a task list which provides insight on your websites ranking. Also, you can run a Site Audit feature to calculate an Optimization Score based on standard SEO rules and practices. All these tools are very effective when assessing your SEO progress. The toolkit even offers a rank tracker to detect domain popularity in search engines, an awesome tool to monitor your progress. Last but not least, the toolkit offers a defense mechanism that helps track bots! The log file analyzer helps detect any bots that are visiting your site with some extra insight per bot.

Overall, the SEO toolkit is an extremely useful tool that performs a great task. It organizes, studies, and asses your road to SEO success.


4. Extensions Catalog

The extensions offered on Plesk are publicly available independent modules that serve as specific task handlers. On your Plesk panel you can choose to install as many as needed. Via the extensions catalog you can select one that will match your needs. Providing a wide array of features, you can select a specific category or even use the search bar on


Get Started 

We offer Plesk across all of our services. As a part of our Windows or ASP.NET web hosting package, Plesk is automatically included. On our VPS and Dedicated Server options, Plesk can be purchased additionally via the customer portal. If you have any questions or concerns, please contact our support team at or by calling our toll-free number; 1-877-NJ-COLO-1.


Two Factor Authentication: A Security Must-Have

Posted at June 18, 2018 at 8:13 pm by Ylber Popaj

Two-Factor Authentication

Two-Factor Authentication is a super effective and easy to setup security measure. This cPanel feature provides an additional layer of security by requiring a code authentication upon a successful login attempt. So, after logging into WHM with the correct username and password, you would be prompted to input a code generated by an authentication application like Google Authenticator. In this blog post, we will help you activate Two-Factor Authentication and explain the benefits of using it.


1) Setting Up

The initial process begins in your Web Host Manager (WHM). In the search bar located on the left panel of the page you should type “Two-Factor Authentication”. Click on the Two-Factor Authentication tab and proceed to click “Manage My Account”.  You will be prompted for a step by step guide that looks like this:


You will then need an authenticator application installed. In this specific example we used Google Authenticator on a mobile device. The application will offer a “Scan Barcode” option of which you would scan the barcode displayed on WHM. Once scanned, the authenticator option will present to you some information about your service along with a temporary authentication code. Use this code to fill out the steps on WHM and you will see:

The status is then set to configured and your Two-Factor Authentication (2FA) is active! Try logging in and you should be prompted the following:


1) Benefits of Using 2FA

The major benefit of using Two-Factor Authentication is more security. Security is extremely important when it comes to protecting data. 2FA offers a solid solution to a worst case scenario; if your password was stolen. Generally, if your password was stolen and cracked, the hacker would have full access to what is in your account, assuming they have cracked the root or admin user password. With 2FA active, a hacked password is not sufficient enough for a hacker to access your information/data. They would physically need the device setup with your 2FA account to view the generated security code. This feature makes it extremely difficult and almost near impossible to hack your account via WHM. As a team devoted to making your online hosting journey the best it can be, InterServer highly recommends the use of Two-Factor Authentication on any cPanel/WHM accounts.

VPS Control Panel Management Made Easy

Posted at June 13, 2018 at 1:22 pm by Ylber Popaj

Control Panels for VPS Management

VPS Management Made Easy: Why You Should Use a Control Panel

Without a GUI, servers must be configured and operated through SSH, which requires extensive knowledge of command line syntax.  Control panels provide a centralized and intuitive way to manage your servers.

Bread Basket, which is included for free with InterServer VPS plans, take the tedium out of having to type line after line of commands — after all, webmasters are humans, not robots.

InterServer’s customized control panel is designed for maximum usability and cost savings. While competitors often charge additional fees for control panel access, Bread Basket allows users to easily deploy hundreds of cloud applications at no extra cost. Between our flexible pricing model and Bread Basket’s versatility, there’s a perfect VPS for every need.

Suitable for running both websites and applications, our virtual servers are well-received within the hosting community. With Bread Basket, we are able to provide a more intuitive, secure, and versatile control panel that significantly lowers the barriers of entry to cloud VPS management.

How Bread Basket Differs from cPanel and Plesk

One of the most popular control panels on the market, cPanel is designed with beginners in mind. The Linux-based interface dates back to 1996, making it one of the earliest server control panels available in the hosting market. Like cPanel, Bread Basket was created with simplicity in mind. On the other hand, Bread Basket relies on fewer resources and is specifically designed to work with our servers, allowing users more freedom and capabilities for management. For customers switching over from cPanel, a comprehensive guide for importing archives can be found here.

Another widely used control panel, Plesk allows for improved instance clustering for both Windows and Linux systems. Because of the compatibility with Windows, Plesk is favored by many webmasters and ASP.NET developers. At the same time, less-experienced users may be intimidated by its text-heavy interface, as well as the premium price other hosting providers often tack on the platform.

In short, Bread Basket is for those who want to save money and need a more beginner-friendly way to streamline website management and application deployment.

Bread Basket is designed for easy scaling, allowing you to add and manage multiple servers directly from the interface. You can also add additional storage and RAM with a few simple clicks. Best of all, Bread Basket is web-based and therefore compatible with your favorite operating systems, including Debian, Windows, and Ubuntu.

Remote Desktop Protocol and GUI for Virtual Servers

Remote desktop access allows users to connect to servers directly. Similar to operating a virtual machine, users can access the server’s desktop from their own computer using a secure protocol. This also enables access to the server’s terminal, granting webmasters more liberty with licensed apps than when using a VPN.

Microsoft uses a proprietary protocol known as Remote Desktop Protocol (RDP), which powers Bread Basket’s VNC application. Our VPS customers — regardless of chosen OS— can access VNC through the control panel, which uses the browser-based HTML5 VNC client.

In addition to being OS-neutral, the HTML5 VNC also allows users to copy and paste from sessions, as well as print pages to a PDF file. As the client is still a new release, Microsoft plans to add additional features in the near future.

Performance Boosts with Frameworks and Web Servers

Implementing HTML5 VNC is just one way we try to incorporate innovation and user empowerment into our platform. In terms of hardware, our infrastructure is built using high-performance CPUs and speedy SSDs. As for Bread Basket, a wide range of frameworks and web servers are available to make running your website or deploying your apps a breeze.

With Bread Basket, users can choose from more than 10 frameworks, including CodeIgniter and Bootstrap. Popular with PHP developers, CodeIgniter is a lightweight and agile framework that allows for easy PHP script debugging without a large footprint. Meanwhile, Bootstrap is well-suited for the mobile market and uses HTML, CSS, and JavaScript. With an extensive library of resources and extensions, Bootstrap makes it easy to develop applications from scratch using templates and design elements for buttons and forms.

Web servers such as Apache, NGINX, and Lighttpd include a number of optimization features to streamline the development and deployment of your web applications. For example, Apache’s Sendfile operation can bypass individual read and send instructions when transferring a file. As for NGINX, the web server excels at handling concurrent connections through an asynchronous, event-driven architecture.

Secure Cloud Backups and Easy Application Installs

Many people prefer to use the cloud when creating and storing backups — and with good reason. Cloud backups through Bread Basket provide peace of mind via redundancy and secure access protocols. Users can easily create and manage backup images from within the Bread Basket interface, keeping data safe no matter what. Automatic weekly backups are also available.

Bread Basket also features a massive library of more than 300 apps to choose from. These run the gamut from content management systems and eCommerce platforms to forums and wikis. Bread Basket uses one-click installs and automatic updates for each of these apps, taking the guesswork and tedium out of maintaining your VPS. Combined with our nearly-instant provisioning, this means you can have your server up and running within a matter of minutes.

We give customers full root access, which lets you optimize your VPS with customized software. Bread Basket is anti-bloat, meaning you get all the apps you want without being bogged down by pre-loaded ones. Multiple options are available for every application category, allowing you to freely install your favorites.

How InterShield Works

Posted at April 18, 2018 at 3:46 pm by Ylber Popaj

How InterShield Works
You may have become familiar with our InterShield blog posts. It has become a special security series of ours which serves of high importance to us and Web Hosting our customers. Due to its ongoing success and popularity, we have decided to describe the step by step process of which InterShield follows.

A request to access a website comes in, someone has entered into a browser.

Step 1: Check IP address against known blacklists

Using litespeed web-server and the RBL rule, Interserver InterShield queries our own internal RBL blacklist. This blacklist contains known bad ips; ips that have been blocked for bad activity, hacking, uploading malware and a number of other activities. The RBL updates frequently, removing IP’s that have not been seen in a while and ensuring good bots like googlebot are not blocked. The request is made without a slowdown, and the request is cached so the lookup doesn’t need to happen again for some time.

Note: If the IP is in the RBL, we log the request for review later, and deny it. Otherwise the request passed.

Step 2: Check for known hacking strings

Using request filter in litespeed, we quickly process rules without causing a delay from Atomic Got Root, a commercial mod_security ruleset, as well as interserver’s own internal rule. These update frequently and by using litespeed the rules process extremely quickly and do not cause a request delay. If the request is blocked, we log the request for review later, note the IP address that was blocked and deny it. Otherwise the request is passed.

Step 3: Check for post content, such as uploads

Any request with a post content is scanned quickly by Clamav using a cluster of servers to quickly scan the request. This will either return a pass or fail result. If malware, is detected we log request and ip for review later, otherwise we pass it. To speed up the request further a checksum of the file is used first, and if the file has been scanned before the file does not need to be scanned again. Finally, the request is sent for processing. Scripts, like PHP scripts, have secondary rules that also scan the file as running if it is not a known file checksum to search for potential malware that may exist in an account already. Notices are sent the account owner through the contact email set in the contact section of the control panel.

Further protection:

Under cpanel, all accounts are isolated from each other. No account can see the files, process or memory – including temporary files of another account.

InterServer Exlusives: Addon domains are further isolated from each other with in the cpanel account.

Additionally the option for dropping PHP privileges is available so that the php scripts being called can not modify files with in your own account.


7 Features That Show Your Shared Hosting Plan is Secure

Posted at April 3, 2018 at 1:05 pm by Ylber Popaj

7 Features that show your shared hosting plan is secure
With massive data breaches hitting the world’s largest brands, website owners may often wonder how well they’d fare against online threats: “If global corporations are having trouble keeping up with web security, how could I stand a chance to stay secure?”

Fortunately, online security isn’t restricted to the wealthiest, most high-traffic sites. Web hosting companies protect themselves and customers by locking down every possible aspect of their infrastructure and clients’ environments. Here are some of the most common tools reputable hosts will offer customers:

  1. Web application firewalls
  2. File upload and script scanners
  3. Malware and antivirus detection
  4. Email monitoring and protection
  5. Regular automated backups
  6. SSL certificates
  7. Reduced PHP permissions

Fortunately, InterServer includes all the above with its standard shared hosting plan. All but the SSL certificates and backups are part of the company’s five-prong InterShield security platform, which was introduced less than a year ago. Here’s more information on the features used to protect site owners, their sensitive data, and their online properties.

1. Web Application Firewall

Slightly different from firewalls that filter traffic to and from networks, web application firewalls (WAFs) introduce specific requirements for visitors to communicate with a host’s servers. WAFs are tailored to protect particular vulnerabilities common in the programs used to operate and manage web hosting environments.

Experts behind many InterServer reviews praise the company for the all-hands-on-deck approach the company takes with security. Co-Founders Mike Lavrik and John Quaglieri still oversee the InterServer datacenters, including network security. The company enables the open-source ModSecurity web application firewall to add another layer of protection for its customers.

InterServer’s web application firewall is particularly focused on preventing cross-site scripting and SQL injections, two common vectors where attackers will inject code, execute scripts, or compromise databases within a hosting customer’s website environment.

2. Scans and Monitoring

In addition to inspecting and filtering the traffic coming to and from the company’s servers, Interserver’s standard shared hosting plan includes the file uploading and script scanners that prevent malicious code or programs from entering a customer’s web environment.

Website owners can unknowingly upload files that contain malware, a broad term that covers the range of unwanted or dangerous code. To avoid that, InterShield will scan every uploaded file for certain detectable characteristics of malware. InterServer regularly updates the scanners to account for the rapidly changing threat landscape.

Similarly, InterServer will inspect the various scripts running on its servers for signs of malicious attacks. Scripts are essentially behind-the-scenes programs that automate various tasks that make websites more visually appealing or quicker to load. The company constantly scans servers, looking for any malicious scripts that could compromise website performance or security.

3. Regularly updated malware detection

Given how quickly attackers can adjust their methods of infiltrating a web hosting server or unsecured website, hosting providers need to remain constantly vigilant to the trends and behaviors of those criminals.

InterServer maintains a constantly evolving database of more than 155,000 examples of malware scripts, documenting each specific malicious signature and making them easier to detect and turn back. What’s more, the company transparently reports real-time information on the malware InterShield finds.

Shared hosting customers are particularly vulnerable to malware, given the audience’s general lack of technical expertise and not being aware of the best security practices. What’s more, with so many customers sharing a server, multiple users can fall prey once an attacker gains access to one compromised website. InterServer recommends that shared hosting customers remain vigilant and active when it comes to updating the software components they install — this includes WordPress, eCommerce shopping carts, plugins, and other services.

4. Email security

Although most people think of phishing and Nigerian princes when it comes to threats to email security, secure and protected communications can have a major impact on shared hosting web performance. Accounts discovered to be sending spam or bulk emails may get a server listed on a blacklist, which blocks the delivery of all emails sent from that server or IP address.

With many hosting customers sharing server space, email security is incredibly important — if one account gets blacklisted, hundreds of innocent users can no longer trust that their communications are reaching recipients. Those effects can be devastating for any site owner, but they are especially harmful to businesses relying on email marketing to build and reach their audience.

InterServer guarantees email delivery by checking the content of outgoing email messages against a database of known spam signatures. The characteristics of spam content listed in the database are updated in real time to stay ahead of malicious senders. Unusual or dangerous activity from an account will likely trigger rate limits or sending quotas, or perhaps that user will be blocked from sending outgoing messages.

5. Backups

Included free of charge with every InterServer shared hosting plan, automated weekly backups protect your data in case of an attack. The company keeps at least three copies of site owners’ archived files for at least 60 days, giving customers peace of mind that their data will remain protected in the event their server or environment is compromised.

Additionally, the company’s storage (driven by much faster solid-state drive caching) is assembled in a RAID-10 configuration for added redundancy. RAID-10 arrangements require at least four storage disks and combine disk mirroring and striping to protect data; as long as one disk in each mirrored pair is functional, site owners’ data can be recovered.

6. SSL Certificates

Separate from the InterShield protections, shared hosting customers can enjoy free access to SSL certificates. The perk actually relies on the more secure TLS protocol that uses HTTPS to privately and securely transfer data between a web server and a visitor’s browser. The difference between SSL vs. TLS protocols isn’t terribly important for most shared hosting customers, but the important feature signals to potential customers that your site is trustworthy and secure.

SSL certificates are becoming increasingly critical for all site owners and small businesses, as Google and other search engines give special SEO and user-interface treatment to websites using the secure connections.

7. Reduced PHP Permissions

Last on our list but among the newest InterServer security measures is limiting the actions website code and scripts can take when running on a server. Built with WordPress in mind, the company’s new PHPmmdrop feature prevents code from changing or uploading files and running processes.

Extra protections associated with WordPress websites can be especially beneficial to shared hosting customers who are less likely to understand website security and maintenance. Although the frequently updated WordPress Core is inherently secure, many attackers are able to gain access through poorly coded or outdated themes and plugins. Once the vulnerability is discovered, attackers can add code that compromises the website with malware. PHPmmdrop takes away that threat by restricting file uploads to only the approved administrative users when they’re logged in.

As you can tell, top-notch security is not limited to high-priced hosting or to those who know the ins and outs of technical configurations and web servers. At InterServer, customers can rest easy with the above features handling all the legwork of protecting your data.