<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Stellar Solutions &#187; Website</title>
	<atom:link href="http://stellarsolution.net/category/website/feed/" rel="self" type="application/rss+xml" />
	<link>http://stellarsolution.net</link>
	<description>Stellar solutions for Business, IT, Energy and Home</description>
	<lastBuildDate>Thu, 08 Oct 2015 20:20:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>Domain name searches, Business name selection, Guide to starting a business on internet, .com .net availability, Web hosting providers, Domain name suggestions, Name being used in world or internet, Business organization type</title>
		<link>http://stellarsolution.net/2015/03/05/domain-name-searches-business-name-selection-guide-to-starting-a-business-on-internet-com-net-availability-web-hosting-providers-domain-name-suggestions-name-being-used-in-world-or-internet-b/</link>
		<comments>http://stellarsolution.net/2015/03/05/domain-name-searches-business-name-selection-guide-to-starting-a-business-on-internet-com-net-availability-web-hosting-providers-domain-name-suggestions-name-being-used-in-world-or-internet-b/#comments</comments>
		<pubDate>Thu, 05 Mar 2015 20:17:28 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Ecommerce]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Net programs]]></category>
		<category><![CDATA[Search engines]]></category>
		<category><![CDATA[SEO]]></category>
		<category><![CDATA[Technical support]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[.com .net availability]]></category>
		<category><![CDATA[Business name selection]]></category>
		<category><![CDATA[Business organization type]]></category>
		<category><![CDATA[Domain name searches]]></category>
		<category><![CDATA[Domain name suggestions]]></category>
		<category><![CDATA[Guide to starting a business on internet]]></category>
		<category><![CDATA[Name being used in world or internet]]></category>
		<category><![CDATA[Web hosting providers]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=117</guid>
		<description><![CDATA[Domain name searches, Business name selection, Guide to starting a business on internet, .com .net availability, Web hosting providers, Domain name suggestions, Name being used in world or internet, Business organization type &#160; Thinking of starting a business now or later? Of course you will want a catchy, meaningful and easy to remember business name. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Domain name searches, Business name selection, Guide to starting a business on internet, .com .net availability, Web hosting providers, Domain name suggestions, Name being used in world or internet, Business organization type</p>
<p>&nbsp;</p>
<p>Thinking of starting a business now or later?</p>
<p>Of course you will want a catchy, meaningful and easy to remember business name.</p>
<p>After you have chosen a business name, you should reserve a &#8220;.com&#8221;, domain name.</p>
<p>I have done this on numerous occasions.</p>
<p>First, give some thought to your business name and try not to limit the scope of your potential business activities if applicable.</p>
<p>Next do a search on the internet to see who, if anyone is using your name and what your competition is.</p>
<p>Next, check with your Secretary of State&#8217;s office, or other state agency, to see if the name is being used.</p>
<p>Concurrently have some idea of what type of business organization you will use. Corporation, LLC, etc. You may need to consult a tax/business expert for advice.</p>
<p>As soon as you have a handle on your business name, reserve one or more domain names. If you are reserving a .com you may want to also reserve a .net and other<br />
suffixes to keep a potential competitor from usurping your internet name.</p>
<p>If you have chosen a web hosting provider, you can search for a domain name and purchase it there, although it is often provided with the initial cost of hosting,</p>
<p>If you have not chosen a hosting provider or early on you just want to search for a domain name, here are some suggestions:</p>
<p><strong>InstantDomainSearch.com</strong></p>
<p>&#8220;See Domain Name Search Results As You Type</p>
<p>Just start typing! If the domain name you are looking for is taken, you can click WHOIS to find out who registered it or the URL to visit the website.</p>
<p>We apply a $0.99 coupon for .com domain names when you buy at Go Daddy. The offer is valid for only one .com purchase, and does not include the ICANN fee of $0.18 per<br />
domain name per year. That’s a sweet deal!</p>
<p>Love the site? Spread the word on Twitter and Facebook!</p>
<p>All domain searches are encrypted over https, and searches do not leave our servers. Your search results are not recorded. Pressing Enter or Return will take you<br />
directly to Go Daddy or the registrar you’ve chosen where you can buy your domain name. Good luck!&#8221;</p>
<p><a href="https://instantdomainsearch.com/">Search</a></p>
<p><strong>DomainsBot.com</strong></p>
<p>&#8220;The domain name search engine!</p>
<p>Available domain suggestions + expired, expiring and for sale domain name search + whois lookup. Domain + Twitter + Facebook identity suggesitons.&#8221;</p>
<p><a href="http://www.domainsbot.com/">Search</a></p>
<p><strong>PCnames.com</strong></p>
<p>&#8220;Check Domains, Instantly!</p>
<p>Based on your query, PCNames.com instantly checks whether .com, .net, .org, .info, .biz, .us, .mobi and .name domain names are available. The domain search results<br />
will appear with 2-second delay for your convenience.</p>
<p>Your domain search results are not shared with 3-rd parties. However, we keep history of your recent domain searches and favorite domain picks so you can easily follow<br />
up on all the important search results.&#8221;</p>
<p><a href="http://www.pcnames.com/">Search</a></p>
<p><strong>From Entrepreneur.</strong></p>
<p>&#8220;Do&#8217;s and Don&#8217;ts of Securing a Domain Name</p>
<p>Consider these six tips from small-business owners and experts before deciding on a website name.&#8221;<br />
<a href="http://www.entrepreneur.com/article/219410">Read more</a></p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2015/03/05/domain-name-searches-business-name-selection-guide-to-starting-a-business-on-internet-com-net-availability-web-hosting-providers-domain-name-suggestions-name-being-used-in-world-or-internet-b/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WiFi security, Securing your router from hackers cyber attacks, How to Video, Firmware updated, Change passwords, WPA2, Use MAC addresses if possible</title>
		<link>http://stellarsolution.net/2015/01/19/wifi-security-securing-your-router-from-hackers-cyber-attacks-how-to-video-firmware-updated-change-passwords-wpa2-use-mac-addresses-if-possible/</link>
		<comments>http://stellarsolution.net/2015/01/19/wifi-security-securing-your-router-from-hackers-cyber-attacks-how-to-video-firmware-updated-change-passwords-wpa2-use-mac-addresses-if-possible/#comments</comments>
		<pubDate>Mon, 19 Jan 2015 20:49:06 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Cyber attack]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[Change passwords]]></category>
		<category><![CDATA[Firmware updated]]></category>
		<category><![CDATA[How to Video]]></category>
		<category><![CDATA[Securing your router from hackers cyber attacks]]></category>
		<category><![CDATA[Use MAC addresses if possible]]></category>
		<category><![CDATA[WiFi security]]></category>
		<category><![CDATA[WPA2]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=96</guid>
		<description><![CDATA[WiFi security, Securing your router from hackers cyber attacks, How to Video, Firmware updated, Change passwords, WPA2, Use MAC addresses if possible &#160; If you read our article yesterday, January 18, 2015, you know that no router is safe from hacking. Read more So, what can you do to improve your odds of not being [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>WiFi security, Securing your router from hackers cyber attacks, How to Video, Firmware updated, Change passwords, WPA2, Use MAC addresses if possible</p>
<p>&nbsp;</p>
<p>If you read our article yesterday, January 18, 2015, you know that no router is safe from hacking.</p>
<p><a href="http://stellarsolution.net/2015/01/18/router-security-101-wpa2-not-foolproof-security-not-optional-when-buying-or-using-routers-any-router-can-be-hacked-cnet-warning-from-2013-goes-unheeded/">Read more</a></p>
<p>So, what can you do to improve your odds of not being hacked?</p>
<p><strong>From We Live Security July 22, 2014.</strong></p>
<h3>&#8220;Wi-Fi security – steps you can take now</h3>
<p>A We Live Security <a title="Wi-Fi security" href="http://www.welivesecurity.com/videos/router-attacks-five-simple-tips-lock-criminals/" target="_blank">video guide offers basic tips on how to secure home routers </a>- and offers a good starting point for ensuring a Wi-Fi network isn’t vulnerable to snoopers and other unwanted ‘guests’.</p>
<p>Harley says, “Firstly, ensure your firmware is kept updated.” Firmware is the code and data which allows routers to function – similar in some ways to a computer operating system, but with the crucial difference that updates (to protect against bugs) often have to be installed manually.&#8221;</p>
<h3>&#8220;Check your settings again</h3>
<p><a href="http://www.welivesecurity.com/videos/router-attacks-five-simple-tips-lock-criminals/" target="_blank">Changing passwords is an essential first step</a> – but it’s worth checking back that your router’s settings haven’t changed, as this can be a problem with some models.</p>
<p>Harley says that users should always, “Change default router administrator usernames and passwords, and change the default SSID.” The SSID is the name of the network – which is broadcast to anywhere within Wi-Fi range. Leaving it as a default can broadcast information that is useful to an attacker – such as the model of router you are using, or whether you are using one supplied by your ISP. When choosing a new network name, avoid any personally identifying information such as your name or house number.</p>
<p>It’s worth considering making yours a “hidden network” – disabling the broadcast of the SSID’s name. That way you’re less visible to attackers – and to connect new devices, simply type in your network’s name on the gadget.</p>
<p>Harley warns that these precautions can be wasted if your router’s software is updated – which can occasionally revert settings to the default. “After any update, check these settings have not reverted,” he says.</p>
<h3>WEP is not your friend</h3>
<p>If your family or business has had the same router for  a long time, you may be using WEP – an outdated form of encryption that can be cracked easily, even by unskilled hackers. Most new routers will use the more secure WPA2 standard – but if your router has been around for a while, it’s possible family members may have chosen WEP to connect older devices such as Nintendo’s first DS handheld. “Don’t use WEP encryption, if anyone still is,” Harley says. “If the router doesn’t allow anything else, time to change it. WPA2 is reasonably secure.”</p>
<p>Even if you’ve had trouble connecting mobile devices to a network, leaving it “open” is always a bad idea. Harley says, “ If you’re not using encryption at all, fix it.”</p>
<h3>Know who is connecting to your network</h3>
<p>Harley says that controlling which devices can connect to a network offers another layer of reassurance. “MAC filtering reduces the risk from intruder machines using your network,” he says.</p>
<p>Any PC or mobile computing device has a unique identifying number known as a MAC address. If you access your router’s settings, you can select which devices can and cannot connect to your network – meaning for instance, a neighbor couldn’t log in, or a teenage visitor could not access unsuitable sites via a smartphone.</p>
<p>Add the MAC addresses of all authorized devices in the home – iPhones, tablets, laptops etc. – to the router’s authorized list. No other device will then be allowed on the network. You can find the MAC addresses of mobile phones and other portable devices under their network settings, though this will vary for each device. Check with the manufacturer.&#8221;<br />
<a href="http://www.welivesecurity.com/2014/07/22/wi-fi-security-2/">Read more</a></p>
<p><iframe width="1170" height="658" src="https://www.youtube.com/embed/bu0vlpfxfnI?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2015/01/19/wifi-security-securing-your-router-from-hackers-cyber-attacks-how-to-video-firmware-updated-change-passwords-wpa2-use-mac-addresses-if-possible/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack, FBI claims North Korea source of attack, The Interview comedy about CIA attempt to assassinate Kim Jong Un</title>
		<link>http://stellarsolution.net/2014/12/20/sony-hires-fireeye-inc-mandiant-forensics-unit-to-clean-up-massive-cyber-attack-fbi-claims-north-korea-source-of-attack-the-interview-comedy-about-cia-attempt-to-assassinate-kim-jong-un/</link>
		<comments>http://stellarsolution.net/2014/12/20/sony-hires-fireeye-inc-mandiant-forensics-unit-to-clean-up-massive-cyber-attack-fbi-claims-north-korea-source-of-attack-the-interview-comedy-about-cia-attempt-to-assassinate-kim-jong-un/#comments</comments>
		<pubDate>Sat, 20 Dec 2014 15:01:49 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Cyber attack]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[FBI claims North Korea source of attack]]></category>
		<category><![CDATA[Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack]]></category>
		<category><![CDATA[The Interview comedy about CIA attempt to assassinate Kim Jong Un]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=56</guid>
		<description><![CDATA[Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack, FBI claims North Korea source of attack, The Interview comedy about CIA attempt to assassinate Kim Jong Un &#160; &#160; From Reuters. The FBI claims to have evidence that the Cyber attack upon Sony computer systems came from North Korean sources. &#8220;Sony [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack, FBI claims North Korea source of attack, The Interview comedy about CIA attempt to assassinate Kim Jong Un</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>From Reuters.</strong></p>
<p>The FBI claims to have evidence that the Cyber attack upon Sony computer systems came from North Korean sources.</p>
<p>&#8220;Sony hires Mandiant to help clean up after cyber attack&#8221;</p>
<p>&#8220;Pictures Entertainment has hired FireEye Inc&#8217;s Mandiant forensics unit to clean up a massive cyber attack that knocked out the studio&#8217;s computer network nearly a week ago, three people with knowledge of the matter said on Sunday.</p>
<p>Computer systems at the Sony Corp unit went down last Monday after displaying a red skull and the phrase &#8220;Hacked By #GOP,&#8221; which reportedly stands for Guardians of Peace, the Los Angeles Times reported.</p>
<p>Technicians are making headway in repairing damage caused by the attack and expect to have the email systems back online Monday, said one of the people, who were not authorized to publicly discuss efforts to deal with the attack.&#8221;</p>
<p>&#8220;Mandiant is an incident response firm that helps victims of breaches identify the extent of attacks, clean up networks and restore systems.</p>
<p>The technology news website Re/code reported on Friday that Sony was investigating to determine whether hackers working on behalf of North Korea might be responsible for the attack, possibly in retribution for the studio&#8217;s backing of the film &#8220;The Interview,&#8221; which is to be released on Dec. 25 in the United States and Canada.</p>
<p>The movie is a comedy about a CIA attempt to assassinate North Korean leader Kim Jong Un.&#8221;</p>
<p>Read more:</p>
<p><a href="http://www.reuters.com/article/2014/11/30/sony-cybersecurity-mandiant-idUSL2N0TK0R920141130">http://www.reuters.com/article/2014/11/30/sony-cybersecurity-mandiant-idUSL2N0TK0R920141130</a></p>
<p><strong>From Fireeye:</strong></p>
<div class="title entrytitle">
<div class="entrytitle_wrap">
<h2>&#8220;Security Predictions</h2>
</div>
<div class="entry-meta-block selfClear"><time class="entry-date">December 19, 2014</time> <span class="sep">| </span><span class="by-author">By <a title="View all entries filed under 'Fireeye - Authors : Bryce Boland'" href="https://www.fireeye.com/blog/executive-perspective.html/category/etc/tags/fireeye-blog-authors/cap-bryce-boland">Bryce Boland</a></span></div>
</div>
<div class="summary entrytextteaser"></div>
<div class="par parsys">
<div class="section entrytext">There’s no crystal ball, but based on what we saw in 2014, we can predict trends we’re likely to see in the coming year. Here are a few technical and business insights from our experts to help security professionals prepare for 2015.&nbsp;</p>
<p>1)    <b>The rate of &#8220;cataclysmic events&#8221; such as Heartbleed and Shellshock will likely increase in 2015.  </b>It won&#8217;t be just one thing, but a combination of unrelated events that have the capability to destabilize &#8220;the internet of things.&#8221;  Organizations need to get better at dealing with these storms. We believe that 2015 will bring more of these far-reaching attacks that are tough to patch and cause widespread damage. Our advice: Put processes in place to discover vulnerabilities and react immediately with patches as needed.</p>
<p>&nbsp;</p>
<p>2)    <b>Linux POS malware increases. </b>We’ve seen plenty of Windows-based Point-of-Sale (POS) malware. Watch for Linux-based POS to become a new playground for attackers. Linux-based POS systems are in use all over the world, some are even free, open source or far less expensive than their Windows-based counterparts. Operators likely have minimal experience and in-house expertise to address threats and maintain updated configurations. Our advice: Understand the attack surface of your Linux hosts, the attack vectors they are exposed to, and initiate robust operational processes to manage, monitor and maintain their security.</p>
<p>&nbsp;</p>
<p>3)    <b>No more AV for me</b>.  IT security organizations will stop paying third-party vendors and consider Microsoft-provided AV as &#8220;good enough.&#8221; Instead, they’ll spend more on other endpoint solutions to address advanced detection, response and forensics. Our advice: Evaluate your security investments, considering both how your organization has changed and how the threat landscape has matured. Focus your investments on threat detection and protection.</p>
<p>&nbsp;</p>
<p>4)    <b>Supply chain attacks will increase</b>. Attackers will leverage less-mature companies that are the weak entry point into the more-mature enterprises – making the supply ecosystem an increasingly key part of cyber strategies. Our advice: Build security requirements into your MSAs with suppliers to improve their security, and require them to demonstrate that your supply chain is operationalizing their security. Look for measurements of security effectiveness such as a time to detect a new threat, and time to remove the threat.&#8221;</p>
<p><a href="https://www.fireeye.com/blog/executive-perspective/2014/12/security_predictions.html">https://www.fireeye.com/blog/executive-perspective/2014/12/security_predictions.html</a></p>
<p>&nbsp;</p>
</div>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2014/12/20/sony-hires-fireeye-inc-mandiant-forensics-unit-to-clean-up-massive-cyber-attack-fbi-claims-north-korea-source-of-attack-the-interview-comedy-about-cia-attempt-to-assassinate-kim-jong-un/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WordPress websites infected by SoakSoak.ru malware, Google blacklisted over 11k domains, SoakSoak malware decoder, Free SiteCheck scanner, Javascript malware from the SoakSoack.ru</title>
		<link>http://stellarsolution.net/2014/12/17/wordpress-websites-infected-by-soaksoak-ru-malware-google-blacklisted-over-11k-domains-soaksoak-malware-decoder-free-sitecheck-scanner-javascript-malware-from-the-soaksoack-ru/</link>
		<comments>http://stellarsolution.net/2014/12/17/wordpress-websites-infected-by-soaksoak-ru-malware-google-blacklisted-over-11k-domains-soaksoak-malware-decoder-free-sitecheck-scanner-javascript-malware-from-the-soaksoack-ru/#comments</comments>
		<pubDate>Wed, 17 Dec 2014 20:08:21 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[Free SiteCheck scanner]]></category>
		<category><![CDATA[Google blacklisted over 11k domains]]></category>
		<category><![CDATA[Javascript malware from the SoakSoack.ru]]></category>
		<category><![CDATA[SoakSoak malware decoder]]></category>
		<category><![CDATA[WordPress websites infected by SoakSoak.ru malware]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=46</guid>
		<description><![CDATA[WordPress websites infected by SoakSoak.ru malware, Google blacklisted over 11k domains, SoakSoak malware decoder, Free SiteCheck scanner, Javascript malware from the SoakSoack.ru &#160; &#160; From ars technica December 15, 2014. &#8220;More Than 100,000 WordPress Websites Reportedly Infected by Russian Malware&#8221; &#8220;Over 100,000 WordPress sites have been infected by a Russian virus called SoakSoak, which loads [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>WordPress websites infected by SoakSoak.ru malware, Google blacklisted over 11k domains, SoakSoak malware decoder, Free SiteCheck scanner, Javascript malware from the SoakSoack.ru</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>From ars technica December 15, 2014.</strong></p>
<p>&#8220;More Than 100,000 WordPress Websites Reportedly Infected by Russian Malware&#8221;</p>
<p>&#8220;Over 100,000 WordPress sites have been infected by a Russian virus called SoakSoak, which loads an attack code onto webpages created through the uber-popular blogging platform, according to a report by Ars Technica.</p>
<p>Google has already flagged roughly 11,000 malicious domains &#8212; though it is likely that many more than that have been compromised.</p>
<p>According to Gizmodo, more than 70 million total sites use WordPress as a content-management system &#8212; from personal blogs to Time.com. However, only self-hosted sites that use WordPress have been affected by the malware &#8212; meaning personal blogs are okay.</p>
<p>The aim of the hackers and the consequences of the virus &#8212; whether to steal data or otherwise &#8212; remain unclear.</p>
<p>Related: 5 Lessons Leaders Can Learn From the Sony Hacking Scandal</p>
<p>The malware infiltrated WordPress through a vulnerability in a slideshow plug-in called Slider Revolution. While Slider Revolution has since fixed the bug with updates &#8212; it knew about the vulnerability earlier this fall, according to Gizmodo &#8212; the older version of the plug-in is still bundled with many WordPress themes.</p>
<p>“The biggest issue is that the RevSlider plugin is a premium plugin,” wrote Sucuri, an online security firm that was first to identify the infection. “It’s not something everyone can easily upgrade and that in itself becomes a disaster for website owners.&#8221;&#8221;</p>
<p>Read more:</p>
<p><a href="http://arstechnica.com/security/2014/12/some-100000-or-more-wordpress-sites-infected-by-mysterious-malware/">http://arstechnica.com/security/2014/12/some-100000-or-more-wordpress-sites-infected-by-mysterious-malware/</a></p>
<p><strong>Sucuri free website scanner:</strong></p>
<p><a href="http://sitecheck.sucuri.net/">http://sitecheck.sucuri.net/</a></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2014/12/17/wordpress-websites-infected-by-soaksoak-ru-malware-google-blacklisted-over-11k-domains-soaksoak-malware-decoder-free-sitecheck-scanner-javascript-malware-from-the-soaksoack-ru/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Web hosting, Webhostinghub vs Hostmonster, Customer service tech support matters, Website response time, Try before you   buy good advice</title>
		<link>http://stellarsolution.net/2014/09/23/web-hosting-webhostinghub-vs-hostmonster-customer-service-tech-support-matters-website-response-time-try-before-you-buy-good-advice/</link>
		<comments>http://stellarsolution.net/2014/09/23/web-hosting-webhostinghub-vs-hostmonster-customer-service-tech-support-matters-website-response-time-try-before-you-buy-good-advice/#comments</comments>
		<pubDate>Tue, 23 Sep 2014 14:23:19 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Technical support]]></category>
		<category><![CDATA[Website]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=36</guid>
		<description><![CDATA[Web hosting, Webhostinghub vs Hostmonster, Customer service tech support matters, Website response time, Try before you buy good advice &#8220;Technical support is like insurance. You should rarely need it but when you do, you really need it.&#8221;&#8230;L Wells &#160; I have used Hostmonster for web hosting for years and other services prior to that. Three [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Web hosting, Webhostinghub vs Hostmonster, Customer service tech support matters, Website response time, Try before you<br />
buy good advice</p>
<p>&#8220;Technical support is like insurance. You should rarely need it but when you do, you really need it.&#8221;&#8230;L Wells</p>
<p>&nbsp;</p>
<p>I have used Hostmonster for web hosting for years and other services prior to that.</p>
<p>Three of my Hostmonster accounts were to be consolidated into one or two accounts and some of the numerous domains were to<br />
be discontinued.</p>
<p>Recently I attempted to contact tech support at Hostmonster. I have rarely had to do so. What had been a great experience<br />
a few years ago turned into a nightmare.</p>
<p>I tried both calling and chatting. Both wait times were extremely lengthy.</p>
<p>When I finally engaged a chat, the person was not listening to what I wanted, made assumptions and eventually gave me<br />
incorrect information.</p>
<p>I spoke to someone in sales (the only responsive dept.) who did listen and was apologetic.</p>
<p>Without boring you with details I spent some more money and followed the chatter&#8217;s advice.</p>
<p>This turned out to be a bad decision.</p>
<p>Further attempts to get tech support were futile.</p>
<p>I did the usual internet search to find out the experience of others.</p>
<p>I found the following.</p>
<p>&#8220;As time went on performance for my websites became worse and worse. It turns out the *actual* culprit of all this was<br />
drastically oversold (overloaded) servers.&#8221;</p>
<p>&#8220;After receiving several complaints from family who gave up on trying to view some photos in my photo gallery and numerous<br />
complaints from customers (for the software I sell here) I tried contacting HostMonster support again. The chat log from<br />
this contact can be viewed below.&#8221;</p>
<p>&#8220;Since HostMonster clearly did not value me as a customer and offered nothing to resolve the situation I decided to change<br />
web hosting companies. I am now a proud customer of WebHostingHub.com. The performance on all of my websites has<br />
dramatically improved. They’re snappy even! Hopefully I haven’t lost all of my friends &amp; family as readers. If you stopped<br />
checking in because my sites were slow, you have my apologies. I’m welcoming you back with open arms — better performance<br />
and all. If you stumbled across this post because you’re having similar issues with HostMonster’s performance–what are you<br />
waiting for? Cancel your account with HostMonster for a pro-rated refund and make the switch to WebHostingHub.com. Life<br />
here is grand&#8221;</p>
<p>Read more:</p>
<p><a href="http://www.schiffner.com/11-excruciating-months-with-hostmonster-have-come-to-an-end/">http://www.schiffner.com/11-excruciating-months-with-hostmonster-have-come-to-an-end/</a></p>
<p>One of my favorite expressions is &#8220;talk is cheap unless you are talking to an attorney.&#8221;</p>
<p>Therefore, I tried a test with Webhostinghub tech support chat and someone responded well and within 30 seconds.</p>
<p>And this was as a non customer.</p>
<p>I then signed up for a two year service of hosting with them. The introductory price was $ 89.64 for two years.</p>
<p>Since signing up, I have received the best support ever with each call or chat responded to with 30 seconds.</p>
<p>This article will be updated with more information as time progresses.<br />
In fairness to Hostmonster and ironically, I got my best response when I cancelled all three accounts.</p>
<p>Too little too late.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2014/09/23/web-hosting-webhostinghub-vs-hostmonster-customer-service-tech-support-matters-website-response-time-try-before-you-buy-good-advice/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SEO, Search Engine Optimization, Branding, Brand recognition, Website traffic, Search engine rules, Small businesses can compete with larger ones with guided efforts</title>
		<link>http://stellarsolution.net/2014/09/22/seo-search-engine-optimization-branding-brand-recognition-website-traffic-search-engine-rules-small-businesses-can-compete-with-larger-ones-with-guided-efforts/</link>
		<comments>http://stellarsolution.net/2014/09/22/seo-search-engine-optimization-branding-brand-recognition-website-traffic-search-engine-rules-small-businesses-can-compete-with-larger-ones-with-guided-efforts/#comments</comments>
		<pubDate>Mon, 22 Sep 2014 20:19:07 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Search engines]]></category>
		<category><![CDATA[SEO]]></category>
		<category><![CDATA[Social networking]]></category>
		<category><![CDATA[Website]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=34</guid>
		<description><![CDATA[SEO, Search Engine Optimization, Branding, Brand recognition, Website traffic, Search engine rules, Small businesses can compete with larger ones with guided efforts &#160; After using the internet for years, I had some down time after surgery and delved into the nuts and bolts of websites, search engines, blogs and social networking. I experimented with my [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>SEO, Search Engine Optimization, Branding, Brand recognition, Website traffic, Search engine rules, Small businesses can compete with larger ones with guided efforts</p>
<p>&nbsp;</p>
<p>After using the internet for years, I had some down time after surgery and delved into the nuts and bolts of websites, search engines, blogs and social networking. I experimented with my new found knowledge and gained a proficiency in SEO, Search Engine Optimization.</p>
<p>I have used this knowledge in my own sites as well as others to get consistent first page results on search engines.</p>
<p>SEO, search engine optimization, search engine marketing, site ranking, branding, brand recognition are all terms familiar to many in large companies involved in marketing and especially internet marketing. What does this mean in English or to the small business person. It is all about getting customers or potential customers to your website, telephone # and your physical location if applicable. It is also about the public recognizing your brand name, products and reputation. Remember years ago when photocopies were referred to as Xerox copies? That is brand recognition.</p>
<p>Think social networking is just about sharing photos and gossip with your friends? Think again. One of the fastest growing age segments using social networking and the internet is the over 50 group. More people each day are looking for products on the internet and social networking is one way to spread your message and gain internet traffic.</p>
<p>You can spend thousands of dollars with companies that tout expertise in search engine ranking. Most of them are doing the same thing that has been done for over a decade. The question is, how much money can you spend or should you spend to “outdo the Jones.” There is also another axiom that applies. One of the definitions of insanity is doing the same thing over and over expecting different results.</p>
<p>We follow time tested rules created by the search engines but we also employ some techniques that most companies are not using. You can already envision the value in that. I.E., not practicing insanity. We also use the time tested approach of hard work. Our approach may best be described by another name recognition example from years ago that sticks in my memory. John Houseman for Smith Barney.</p>
<p>“We make money the old-fashioned way. We EARN it”<br />
Whether you run a small, medium or large business, we can help.</p>
<p>If you are a small business owner, we can help you compete with larger ones at minimal costs if you are willing to follow our recommendations.</p>
<p>L. Wells</p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2014/09/22/seo-search-engine-optimization-branding-brand-recognition-website-traffic-search-engine-rules-small-businesses-can-compete-with-larger-ones-with-guided-efforts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
