How to Upgrade CentOS 7 to CentOS 8

How to Easily Upgrade your Server from Linux CentOS 7 to CentOS 8

Updated on January 21, 2021

In this article, you will learn how to upgrade your Linux dedicated or virtual server from CentOS 7 to CentOS 8.

Step 1: Install the EPEL Repository

# yum install epel-release -y

Step 2: Install yum-utils Tools

# yum install yum-utils

After the above step, you now need to resolve the RPM packages by executing the commands:

# yum install rpmconf
# rpmconf -a

Next, perform a clean up of all the packages you don’t require with the following commands:

# package-cleanup --leaves
# package-cleanup --orphans

Step 3: Install the dnf in CentOS 7

DNF is the default package manager in CentOS 8. Install it by executing the following command:

# yum install dnf 

Now remove the yum package manager:

# dnf -y remove yum yum-metadata-parser
# rm -Rf /etc/yum

Step 4: Upgrade CentOS 7 to CentOS 8

First upgrade the dnf package manager:

# dnf upgrade

Next, install CentOS 8 release package using dnf as shown below. This will take a while.

# dnf install http://mirror.centos.org/centos/8/BaseOS/x86_64/os/Packages/centos-repos-8.2-2.2004.0.1.el8.x86_64.rpm http://mirror.centos.org/centos/8/BaseOS/x86_64/os/Packages/centos-release-8.2-2.2004.0.1.el8.x86_64.rpm http://mirror.centos.org/centos/8/BaseOS/x86_64/os/Packages/centos-gpg-keys-8.2-2.2004.0.1.el8.noarch.rpm

Next, upgrade the EPEL repository as follows:

# dnf -y upgrade https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm

Now, remove all the temporary files by executing the following command:

# dnf clean all

Remove the old CentOS 7 kernel core

# rpm -e `rpm -q kernel`

Then you need to remove all conflicting packages:

# rpm -e --nodeps sysvinit-tools

Thereafter, launch the CentOS 8 system upgrade as shown below:

# dnf -y --releasever=8 --allowerasing --setopt=deltarpm=false distro-sync

Step 5: Install the New Kernel Core for CentOS 8

# dnf -y install kernel-core

You are now ready to install CentOS 8 minimal package:

# dnf -y groupupdate "Core" "Minimal Install"

The CentOS 7 to CentOS 8 upgrade task has been completed! You may issue the following command to verify:

# cat /etc/redhat-release

If you are a NetShop ISP Fully Managed Hosting Customer, you may simply drop an email to the Support team to upgrade your CentOS 7 server to CentOS 8. Alternatively, should you wish to perform the upgrade on your own feel free to use this article with the steps described above.

The procedure has been tested at NS Labs for the purposes of drafting this Linux tutorial.

How to Order a Cheap Linux CentOS Server

You can deploy your next Linux CentOS Server in 60 seconds by choosing any of our VPS Hosting plans in Cyprus, Malta, UK, Amsterdam (Netherlands), Los Angeles (United States) and Singapore.

If you prefer dedicated resources then we strongly recommend that you order a cheap dedicated server, at the location of your preference from this page.

Scanning for Malware without affecting your Machine’s Real-time activities and Performance

Malware infects backups quite often. Some companies can scan backups in a centralized location but it takes a lot of time to perform consecutive regular scans. Active malware can also infect unpatched disk images all over again. Daily or evenweekly full disk on-demand scans take a lot of time and often can’t be done in […]

Malware infects backups quite often. Some companies can scan backups in a centralized location but it takes a lot of time to perform consecutive regular scans. Active malware can also infect unpatched disk images all over again. Daily or even
weekly full disk on-demand scans take a lot of time and often can’t be done in non-working time, meaning employees are constantly disturbed by scans and can lose productivity.

A typical systems administrator has to deal with a lot of machines and their corresponding backups. As part of that work, they need to deal with all of the issues mentioned above and be prepared for other challenges. For example, backed up system drives aren’t the only components susceptible to malware. A device’s OS and third-party apps can also become gateways of infection.

Backup and anti-malware are two essential parts of a modern endpoint security posture. While scanning for malware is usually performed before doing a backup, there are many cases when malware makes its way into backup images. This can happen because of the limited detection capabilities of an average anti-malware solution or because a backup was done before the anti-malware scan.

Full scans of large archives (including backups) to detect malware require considerable time and computational resources. As a result, they’re often not an efficient use of time and resources. That said, scanning archives becomes especially critical if the archives are not stored locally, but in cloud storage, because the speed of access to an archive in the cloud may be significantly slower than accessing a local storage device (depending on the speed of the network or communication channel being used, and/or how heavily-loaded the channel is). Additionally, if any viruses and/or malicious files are found in the archive, the archive is considered damaged or infected, and may not be suitable for use in a system recovery or for file and data extraction.

Historically, to avoid restoring data that’s infected, archives were periodically scanned with anti-virus scanners during storage, when new slices are added to the archive, and/or before restoring the data. However, today there is no solution that allows for custom archive scans in terms of timing or scope. Instead, solutions are forced to scan the entire archive. Furthermore, damaged or infected data in archives cannot be repaired.

Patching machines and applying the latest anti-malware definitions allows sysadmins to restore an OS image that’s ready to withstand a reoccurring infection. To scan backups for malware effectively and properly in a centralized location is another necessary step to ensure safe restores and safe data storage. This is what NetShop’s Cyber Protect solution (powered by Acronis) provides.

Through Acronis Cyber Protect, users can scan full disk backups at a centralized location (Acronis Cloud or onpremises server with the ability to expand support for Amazon, Google, Microsoft, or any other popular cloud storage environment in the future) to find potential vulnerabilities and malware infections, thus ensuring a malware-free backup for a malware-free restore, should it become necessary.

It is now possible to inspect not only one big backup but also archived slices for malware. We can mount the first slice of a plurality of slices in a backup archive to a disk, wherein the first slice is an image of user data for the first time. Acronis technology can detect a modified block of the mounted slice, identify files in the mounted first slice that correspond to the detected modified block, and scan specific files for viruses and other malicious software. This approach also allows Acronis to generate a cured slice that comprises the user data of the mounted first slice without the inclusion of malicious files. By scanning in centralized locations, Acronis Cyber Protect allows users to:

  • Reduce loads on client endpoints
  • Restore only clean data
  • Increase the potential of rootkit and bootkit detections (which are not easily detected during the first on-access or on-demand scans)
TIP: Do quick scans of endpoints and the remaining scan in the centralized location after backup. This ensures you don’t need to compromise between performance and security with Acronis Cyber Protect.

Contact our Cyber Security Specialists today for a free consultation and instant access to your Cyber Protect account.

NetShop ISP announced as an Official Supporter of the Safer Gambling Week 2020 (Cyprus)

The National Betting Authority is organising for the 3rd consecutive year the Safer Gambling Week (SGW) which will be held from the 5th until the 11th of October 2020. The SGW aims to inform the public and raise awareness, as well as involve and mobilise all stakeholders regarding safer gambling and protection of wider society from any harmful […]

The National Betting Authority is organising for the 3rd consecutive year the Safer Gambling Week (SGW) which will be held from the 5th until the 11th of October 2020. The SGW aims to inform the public and raise awareness, as well as involve and mobilise all stakeholders regarding safer gambling and protection of wider society from any harmful consequences of gambling activities.

NetShop Internet Services, a two-time Award winning iGaming Hosting Provider, has been announced as an Official Support of this year’s SWG Conference in Cyprus.

The launch of the week will be marked by the 3rd Safer Gambling Conference. During the week, there will be various activities and events such as workshops, interactive games, presentations, training seminars, and more in all districts in the Republic.

The SGW’s objective is to inform the public on safer gambling practices, self-protection measures that players can set for themselves, as well as treatment centres and facilities for gambling disorder. The week aims to communicate that gambling should remain a fun activity for those who decide to participate in any gambling activities.

The ultimate goal of the Safer Gambling Week is to become a platform for discussion and constructive dialogue between various stakeholders of the Cypriot society and the gambling industry regarding safer gambling practices, and eventually become a cross-industry and community wide institution where it will get people talking about safer gambling: gambling venues staff, players, family, friends, wider community.

The theme for the 3rd Safer Gambling Week is “Let’s keep it a game”. Safe participation in gambling implies that the person who decides to gamble, will do so without putting in risk himself or those around him.

The agenda for the SGW 2020 will be announced soon and will be updated frequently. More information on the week and its activities can be found at www.sgw.cy

This year, taking into consideration international best practices and the suggestions of the scientific community, the Authority has decided to proceed with the rebranding of Responsible Gaming to Safer Gambling. The focus on safer gambling promotes a new understanding of the responsibility of the state and gambling operators and providers to enhance player’s protection mechanisms. The idea of “Responsible Gaming” suggests that the players is primarily responsible for protecting himself. This prevailing view, although correct, should be revised and used in a broader sense. The notion of “Safer Gambling” emphasizes that in addition to individual responsibility, there is a clear responsibility of the state and its institutions, as well as gambling operators and all stakeholders involved.

More information on safer gambling can be found at the website www.safergambling.gov.cy

The Authority informs the public that, all the activities of the Week will be carried out in accordance with the directives and the decrees of the Minister of Finance for containing the spread of the COVID-19 Coronavirus disease.

Six Costly Microsoft Office 365 Data Protection Gaps

To prevent data loss, ensure business continuity and avoid compliance penalties, you need to be aware that Microsoft does not include formal data protection for Office 365, so there might be gaps in your expectations and the reality.

For over 500,000 businesses worldwide, it’s hard to imagine business as usual without Microsoft Office 365 — anywhere, anytime access to applications means you can work non-stop. That is until you can’t.

Working without Office 365 today is a huge hurdle for users – so recovering that data quickly is essential to keep businesses running. The challenge is, Microsoft promises reliable access to its applications but not true backup. This means managers are responsible for defending their organization’s O365 data from loss.

Users often forget that in the cloud you are renting a service from providers, which means you agreed to their terms. In the case of Microsoft, the company commits to ensuring the building doesn’t fall down and the lights stay on — or delivering high performance, access and uptime for Office 365 applications.

But Microsoft does not take responsibility for what’s inside Office 365 — your data.

To prevent data loss, ensure business continuity and avoid compliance penalties, you need to be aware that Microsoft does not include formal data protection for Office 365, so there might be gaps in your expectations and the reality.

Here are 6 Common Data Threats Office 365 business customers can face:

1. Accidental Deletion Issues

With Microsoft Office 365, administrators and employees alike routinely delete Exchange Online emails, attachments and files, Office 365 user profiles, OneDrive for Business files, and SharePoint Online content. Should an item need to be recovered, the age of the resource may render that impossible: Older data may be hard-deleted and unrecoverable while more recent deletions of newer resources may be found in the Recycle Bin or Recoverable Items folder.

Fact: 29% of data loss is due to human error

Source: CSO

2. Retention Policy Issues

It’s up to customers to manage retention policies, which can be time consuming and error-prone: You may think you’ve set the right parameters to retain data, but changing or misaligned priorities in Office 365 data retention policies can result in data being hard-deleted. Be aware, if for whatever reason a hard-deletion occurs due to aging out of the existing retention policy, Microsoft has no ability to recover the deleted resource.

Fact: 80% of Companies have lost data in the Cloud due to Retention Policy Issues

Source: Osterman Research

3. Internal Security Threats

Microsoft Office 365 resources also require protection from malicious alteration or data destruction by disgruntled employees, contractors or partners. Microsoft does not guard against these foes — it has no way of knowing if deletion was accidental, malicious or intentional.

Fact: 90% of Organizations are vulnerable to insider threats

Source: Insider Threat Report

4. External Security Threats

Microsoft has only limited protections against malware attacks like ransomware (which encrypts user data and holds it hostage until an online ransom is paid) and a limited ability to restore malware-encrypted or -altered files. That means Microsoft Office 365 data is vulnerable to destruction or alteration by a variety of threats mounted by hackers, cybercriminals or hostile state actors.

Fact: $20 billion in global ransomware damages are projected by 2021

Source: Cyber Security Ventures

5. Migration from On-premise to Cloud

Microsoft does not address data loss issues during premises-based Microsoft Office to cloud-based Office 365 migration. The two backup solutions are often incompatible, making it impossible to restore legacy data into the new environment. Meanwhile, few third-party data protection solutions integrate backup functionality for Office and Office 365: they usually protect one or the other, but not both.

Fact: 75% of CXOs say that managing privacy and data protection regulations in the cloud is complex

Source: CXO Today

6. Legal and Compliance Issues

Compliance requirements (e.g. GDPR, HIPPA) and legal issues can exacerbate costs related to any data loss incident. Without timely access to data, businesses are exposed to government or industry-specific regulatory fines, legal penalties, revenue and stock price hits, plus damage to company brand and customer trust.

Fact: $57 million is the largest GDPR penalty issued to date (Google)

Source: Fortune.com

The reality is that emails, attachments, and shared files stored in Office 365 are not protected from the most common and serious data loss issues, ranging from simple accidental deletions to sophisticated malware attacks. This means that Office 365 data loss is an unhappy surprise waiting to happen — with incredibly high stakes. Failure to defend Office 365 data can be career-limiting.

To learn more about securing your Office365 data with an easy-to-use, agentless and reliable cloud backup visit our Acronis Cloud Backup plans or contact one of our Cloud Backup Specialists at sales@netshop-isp.com.cy

NetShop ISP is expanding its SSL Certificates Portfolio with REST API Enabled

[Larnaca, Cyprus – Sep 10th, 2020] – NetShop ISP announces the expansion of SSL certificates offered to End-users and its Resellers to include the World’s most reputable brands such as Symantec, Thawte, GeoTrust, RapidSSL, Certum, and Comodo. NetShop Internet Services has managed to seal the best prices from all brands so customers can buy the […]

[Larnaca, Cyprus – Sep 10th, 2020] – NetShop ISP announces the expansion of SSL certificates offered to End-users and its Resellers to include the World’s most reputable brands such as Symantec, Thawte, GeoTrust, RapidSSL, Certum, and Comodo. NetShop Internet Services has managed to seal the best prices from all brands so customers can buy the certificates at lower rates than buying direct. The SSL offerings include Extended Validation (EV), Organization Validated (OV), and Domain Validation (DV) certificates, along with Multi Domain, Wildcard, Code Signing, and Unified Communication Certificates (UCC).

Moreover, Resellers can take advantage of a powerful REST API to integrate all SSL Certificate brands into their own store/portal with very competitive prices.

“We pay great attention to what our Customers and Partners require and we are flexible enough to provide them with the products, services and bespoke solutions at a timely manner and an affordable pricing,” said Katerina Burtsava, Head of Business Development at NetShop ISP.

By adding SSL certificates to their portfolio, NetShop Internet Services aims to help their customers increase their trust online, as well as providing a more secure web experience for their users. SSL certificates are digital security protocols that encrypt important information sent from a browser to a server, like credit card numbers, usernames, passwords, and more.

More information: https://netshop-isp.com.cy/en/addons/ssl-certificates

About NetShop ISP
NetShop Internet Services Ltd is a Cyprus incorporated company established in 2004 offering Web Hosting & Data Center Services via Privately-owned Datacenter Infrastructure in Cyprus, Malta, United Kingdom and Los Angeles.

Contact Person: Katerina Burtsava
Direct Sales: sales@netshop-isp.com.cy
Partnership Inquiries: partners@netshop-isp.com.cy
By Phone:
+357-2425-0808 (Cyprus and International)
+356-277-80777 (Malta)
+44-203-5198334 (United Kingdom)
+1-888-4646943 (United States)
+7-499-3715327 (Russia & CIS Region)

Why Use a Virtual Private Server (VPS) when Trading Forex

What is a VPS? VPS stands for Virtual Private Server. A VPS uses virtualization technology to “split” one physical hardware server into multiple virtual servers. The word ‘private’ implies that each Virtual server has its own resources so you won’t have to share RAM and CPU with other users. Additionally, since each VPS is a […]

What is a VPS?

VPS stands for Virtual Private Server. A VPS uses virtualization technology to “split” one physical hardware server into multiple virtual servers. The word ‘private’ implies that each Virtual server has its own resources so you won’t have to share RAM and CPU with other users. Additionally, since each VPS is a different layer on the physical server it can have its own Operating System and host data in non-shared hard disk sectors which enhance the VPS’ performance & the user’s data security.

Why Do I Need VPS to Trade Forex?

Among various benefits that a VPS offers to a user, we have summarized the 3 most important reasons to use it when trading forex:

  1. To ensure your MT4/MT5 terminal stays online. It reduces the risk of loss due to power outages of your personal computer/laptop or internet disconnections. A 24/7 uptime of your Forex trading platform is crucial especially if you are trading using a robot or Expert Advisors (EA).
  2. Faster trade execution. By using a VPS in the same (or as near as possible) location as your Forex broker, you are able to open and close trades much faster than would otherwise be possible. In order to make the best choice when choosing a VPS provider we recommend that you ask for Ping/Latency results. Based on the results choose the provider with the lowest possible latency.
  3. Fully Managed Forex VPS Hosting. We understand that you, as a Forex Trading hobbyist or professional, might not be a technical expert to maintain any Operating System Updates or troubleshoot issues as may arise. Search for VPS Hosting companies that offer Managed VPS so they can help you with any aspects of your VPS environment.
What are the VPS specifications I will need?

VPS Servers that are used for Forex Trading will have Windows Operating System. In most VPS providers you will be asked to choose among Windows Server 2012 R2, Windows Server 2016 or latest. Any of these are good to be chosen.

In terms of the hardware resources, the minimum requirements you should seek to properly run your Trading terminal are:

1GB RAM
1 vCPU
40GB Hard Disk
1 Public Dedicated IP
No Antivirus, No Firewall (unless you are an experienced user)

The above specs can be altered/upgraded depending on the number of trading terminals you wish to run simultaneously.

NetShop ISP maintains multiple Datacenters locations near the world’s most popular Forex brokers in order to keep the lowest possible latency with all our Forex VPS servers. Contact one of our Forex Specialists for a FREE Consultation regarding your Forex VPS needs. Alternatively you may browse our VPS plans get started instantly.

Backup vs Disaster Recovery: 4 Steps in Making the Right Assessment

In data protection, recognizing when a data loss event is a minor blip versus a major catastrophe adds tremendous value to your business – determining the action taken and the impact to their bottom line. Sometimes accessing a secure backup is sufficient. Other times critical data must be instantaneously recovered. Since time is money, knowing […]

In data protection, recognizing when a data loss event is a minor blip versus a major catastrophe adds tremendous value to your business – determining the action taken and the impact to their bottom line. Sometimes accessing a secure backup is sufficient. Other times critical data must be instantaneously recovered. Since time is money, knowing which technique to use in a given circumstance is critical and separates superior service providers apart from the competition.

Here are four steps needed to determine whether your business model requires backup or disaster recovery services:

1. Understand the Basics about Data Protection Tools

Cloud backup – Protects critical data off-site so business files, applications and systems are safe
and accessible – and can always be restored. View Cloud backup plans.

Cloud disaster recovery – Recovers critical data quickly and remotely whenever any serious outage risks a company’s reputation and bottom line.

Disaster recovery as a service (DRaaS) – Delivers instant recovery services by running systems in an off-site data center. Businesses can operate remotely while normal processes are restored. Use-cases include local data loss due to human error, software and hardware failures, malware attacks, and natural disasters.

2. Evaluate critical data needs and pain points

While businesses need thorough, complete backup of all data (e.g. mobile, laptops, servers), disaster recovery is focused on data and systems that businesses need to stay in business. This may be the online cashier system for a retailer. For a firm or hospital, client/patient records may be most essential. Identifying what data matters most will help you and your customers understand the cost of downtime and plan recovery accordingly.

3. Get your Calculator out

Budget reports provide needed information to evaluate costs like infrastructure expenses (from staff to IT hardware) as well as revenuegenerating channels. Companies need to run the numbers to establish the basic requirements they have to keep running. This information clarifies two key pieces of information: the
Recovery Time Objective (RTO) and the Recovery Point Objective (RPO).

RTO – The absolute maximum amount of time a business can be down after a failure or disaster occurs to avoid unacceptable consequences.

RPO – Determines how often backups must be made in order to recover an acceptable quality of data within the RTO.

4. Exercise Judment to Plan Recovery

The financial cost of downtime becomes self evident, but these numbers still need to be weighed against the risk of intangible losses, like reputation damage. For example, for an online retailer that’s built its brand on efficient customer service, any downtime can be disastrous. A landscaping business can likely tolerate more downtime before it affects customers, so the restore priorities would be different. Knowing your customer’s specific requirements means you can establish a plan that brings back the heart of their operation first, and so forth. Businesses must spend more to recover quickly, so prioritizing your data protection needs along with the establishment of your Budget from Step 3, is crucial to the execution of a successful Disaster Recovery and Backup Protection plan.

Talk with one of our Business Continuity Specialists today for a Free Consultation. Additionally, you may review our Acronis Backup Plans and Sign up instantly.

Never lose GSuite data with NetShop’s worry-free backup solution

Never lose G Suite data and ensure quick recovery with a worry-free, cloud-to-cloud solution. Since Google does not take responsibility for protecting customer G Suite data from loss – as in the case of accidental or intentional data deletion, malicious actions, or ransomware – a separate backup and recovery solution is needed. With cloud-to-cloud G […]


Never lose G Suite data and ensure quick recovery with a worry-free, cloud-to-cloud solution.

Since Google does not take responsibility for protecting customer G Suite data from loss – as in the case of accidental or intentional data deletion, malicious actions, or ransomware – a separate backup and recovery solution is needed. With cloud-to-cloud G Suite data backup with Acronis Cyber Backup Cloud, you can recover certain items quickly and reliably and eliminate complexity related to setting up and maintaining the solution.

WHY DO WE NEED GSUITE BACKUP?

Google has a great reputation for keeping G Suite systems up and available for customers. But like many SaaS solutions, it does not take responsibility for keeping customer data safe – it does not offer true backup and recovery functionalities.

There are many reasons why companies lose their G Suite data. The top reasons include:

• Accidental data deletion
• Malicious actions
• Malware and ransomware.

So while Google ensures infrastructure resilience, data protection remains the customer’s responsibility. This means businesses require a backup solution to avoid downtime and unrecoverable data loss.

By signing up with any of NetShop ISP’s Cloud Backup Plans (https://netshop-isp.com.cy/en/addons/cloud-backup) you benefit from the following features:

  • Protection for Gmail, Drive, Calendar and Contacts
  • Reliable point-in-time recovery of single items and entire Drive or Gmail data
  • Quick Recovery of needed items with GSuite Backups full-text search
  • Authenticity Verification of files in Drive backups with blockchain
  • Backup Health monitoring and reporting of your GSuite Backup Operations

Learn more about our various Cloud Backup Plans starting from €7.5/month at https://netshop-isp.com.cy/en/addons/cloud-backup or drop us an email to speak with a Cloud Backup Specialist.Toggle panel: Yoast SEO Premium

Why Do We Still Need Data Centers in 2021? Facts Revealed Here!

Understanding the roles and functions of a business IT infrastructure is a must. Why? It is through establishing this infrastructure that your business data and information can properly be taken good care of. That is why you need data centers because they are used to make sure that there is continuity of the IT infrastructure of your business.

Updated on 26 May, 2021

Understanding the roles and functions of a business IT infrastructure is a must. Why? It is through establishing this infrastructure that your business data and information can properly be taken good care of. That is why you need data centers because they are used to make sure that there is continuity of the IT infrastructure of your business.

Most businesses these days, small or big, are contracting data centers. They are doing this because they believe in their tested servers to perform even if there is a power outage in one locality. They have backup generators for electricity production purposes. They need backup generators because their operation should not stop. 

A normally functioning data center should offer 100% Uptime SLAs, UPS and Generators. These are the important aspects to protect the data even during the time of an inevitable outage. They also have backups for Internet trouble. They have 24/7 technical support that purposely functions to give a controlled access to its clientele. They are well trained in providing a tight security, monitoring services, and surveillance services round the clock.

Data Centers Protect Your Business Data

Today, computer hardware is constantly evolving. From the larger versions in the past to getting so smaller at present. In terms of efficiency, capacity and speed, today’s hardware is more efficient, more powerful and faster. However, the processing power of a particular computer hardware inside your office is not enough to cater to the needs of your clients when it comes to storing and managing bulky files and information. Therefore, there should be a strategy to manage information and data properly. And this is where data centers play their important role and functions for all business organizations globally. 

To some extent, the data being processed daily by a medium sized business entity are voluminous. The specific business groups that need a data center may include but not limited to telecommunication companies, educational bodies, financial groups, retailing businesses, and any other data-driven business forms. Ensuring customer satisfaction is the bottom line why these businesses need the support of a data center. 

It is quite necessary to note that even big companies like Amazon, Google and Facebook are relying on data centers. Why? Because of the fact that without a data center, their data can’t be stored, processed, and managed effectively, efficiently.  But most of those big companies have established cloud-based data center services. They put up virtual servers with backups and they build a more sophisticated data infrastructure.

Those small and medium sized companies are relying on other types of information centers such as Colocation and Enterprise Data Centers. A colocation data center is operating a facility that a company can rent. There is an exclusive space for the computing hardware and servers. It further provides a particular physical space, cooling system, power source, as well as physical and bandwidth security. Then, the customer is typically obliged to provide storage and servers.

Moreover, an enterprise data center has a number of data centers. Each of those centers has a task to sustain some important functions and roles. There are mainly three classifications under this type of a data center: Extranet, Intranet, and Internet.

Data Centers Enhance the Reliability of your Infrastructure

Way back in 2011, there was study conducted by International Data Corporation that said that there were 1.8 zettabytes (ZB) or 1.8 trillion gigabytes (GB) being produced that year. Furthermore, such figure had increased in the succeeding year, 2012, as the data generated had reached to 2.8 ZB more or less. Then there has been a speculation that by 2020, the data are expected to reach 40 ZB.

The constant increase in data accumulation and production each year should trigger businesses all over the world to find the significance of an operational data center. May it be cloud-based or server-based, storing a data in a certain platform and managing the same can be a tricky and tedious thing to do. But with the expertise of the service providers, it can easily be done. In fact, it has been noted that centralized computing networks are the answer to the problems associated with voluminous data storage.

Know Your Data Center Provider

Regardless of the type of hosting you will acquire (shared web hosting, VPS, cloud instances, dedicated servers or colocation), a business owner should know in which Data center his business infrastructure and critical data will be hosted at.

For example, Acronis maintains data centers infrastructure around the world. While its default location for cloud backups is in the United Kingdom, users have the option to choose other locations as well depending on their primary data location. If you are using Acronis Cloud Backup through a Service Provider like NetShop ISP, then you have the opportunity to have your servers and data backed up in a Service Provider’s hosted infrastructure. In both cases, you have the right to ask in which data center your backup is pointing to.

For more information about NetShop ISP’s Data Centers around the world visit this page or contact our 24/7 Customer Service team via Live Chat, Skype and E-mail.

How to install WordPress on CentOS 7 with MariaDB 10, Nginx and PHP-FPM 7

Updated on March 03, 2021 WordPress is one of the most popular open source Content Management systems, powering almost one out of three (1/3) websites on the Internet today. It is based on PHP and MySQL and packs a ton of features that can be extended with free and premium plugins and themes. WordPress is the […]

Updated on March 03, 2021


WordPress is one of the most popular open source Content Management systems, powering almost one out of three (1/3) websites on the Internet today. It is based on PHP and MySQL and packs a ton of features that can be extended with free and premium plugins and themes. WordPress is the simplest way to create your online store, website, or blog.

This tutorial will help you to install WordPress on CentOS 7 with Nginx as a web server, MariaDB 10.3 and PHP-FPM 7.3. It is an easy and straight-forward process and you can have your website up and running in less than 10 minutes.

Prerequisites

  • You have a domain name pointed to your server public IP address. In this tutorial we will use example.com.
  • You have ssh access on your dedicated / vps server and logged in as a user with sudo privileges.

Before starting make sure you update and upgrade all OS libraries and packages:

  • sudo yum update
  • sudo yum upgrade

Install Maria DB 10.3

Adding the MariaDB YUM repository

  • vi /etc/yum.repos.d/MariaDB.repo
[mariadb]
 name = MariaDB
 baseurl = http://yum.mariadb.org/10.3/centos7-amd64
 gpgkey=https://yum.mariadb.org/RPM-GPG-KEY-MariaDB
 gpgcheck=1
  • yum update -y

Install MariaDB 10.3 on CentOS 7

  • yum install MariaDB-server MariaDB-client

Start & Enable MariaDB on CentOS 7

Once the installation is done, you can start and enable MariaDB to run on system boot by executing the commands below:

  • systemctl start mariadb
  • systemctl enable mariadb

Set MariaDB Root Password

  • mysql_secure_installation

The first prompt would be to set the root password. however, if you have set it above, just enter the password and proceed.

… In order to log into MariaDB to secure it, we'll need the current password for the root user. If you've just installed MariaDB, and you haven't set the root password yet, the password will be blank, so you should just press enter here. Enter current password for root (enter for none): OK, successfully used password, moving on… Setting the root password ensures that nobody can log into the MariaDB root user without the proper authorisation. You already have a root password set, so you can safely answer 'n'. Change the root password? [Y/n] n

Next, remove the database anonymous user.

By default, a MariaDB installation has an anonymous user, allowing anyone to log into MariaDB without having to have a user account created for them. This is intended only for testing, and to make the installation go a bit smoother. You should remove them before moving into a production environment. Remove anonymous users? [Y/n] y … Success!

Now, disable remote root login

Normally, root should only be allowed to connect from 'localhost'. This ensures that someone cannot guess at the root password from the network. Disallow root login remotely? [Y/n] … Success!

Next, remove test databases

By default, MariaDB comes with a database named 'test' that anyone can access. This is also intended only for testing, and should be removed before moving into a production environment. Remove test database and access to it? [Y/n] y - Dropping test database… … Success! - Removing privileges on test database… … Success!

Finally, reload the privileges tables to effect the changes.

Reloading the privilege tables will ensure that all changes made so far will take effect immediately. Reload privilege tables now? [Y/n] y … Success!

Now restart mariadb:

  • systemctl restart mariadb

You have successfully installed MariaDB 10.3 on CentOS 7 Server. Now lets proceed with the next steps.

Create WordPress Database and WordPress DB User

Login to the MySQL shell by executing the following command:

  • mysql -u root -p

Now create the database, user and grant user to database privileges by executing the following commands. We will use ‘wpdb’ as the database name in our example and ‘wpuser’ for the database username.

  • CREATE DATABASE wpdb CHARACTER SET utf8mb4 COLLATE utf8mb4_general_ci;
  • GRANT ALL ON wpdb.* TO 'wpuser'@'localhost' IDENTIFIED BY 'enter-strong-password-here';
  • FLUSH PRIVILEGES;
  • EXIT;

Install PHP 7.3

To install PHP and all required PHP extensions run the following commands:

  • yum install epel-release yum-utils
  • yum install http://rpms.remirepo.net/enterprise/remi-release-7.rpm
  • yum-config-manager --enable remi-php73
  • yum install php-cli php-fpm php-mysql php-json php-opcache php-mbstring php-xml php-gd php-curl

PHP FPM has now been installed and we will be using Nginx as a web server. By default PHP FPM will run as user apache on port 9000. We’ll change the user to nginx and switch from TCP socket to Unix socket. To do so open the /etc/php-fpm.d/www.conf file edit the lines mentioned below:

...
user = nginx
group = nginx
...
listen = /run/php-fpm/www.sock
...
listen.owner = nginx
listen.group = nginx

Then, make sure the /var/lib/php directory has the correct ownership using the following chown command:

  • sudo chown -R root:nginx /var/lib/php

Start & Enable PHP-FPM on CentOS 7

  • systemctl enable php-fpm
  • systemctl start php-fpm

Now, the WordPress Part…

Before downloading the WordPress archive, you should create a directory in which we will place the WordPress files:

  • sudo mkdir -p /var/www/html/example.com

The next step is to download the latest version of WordPress from the WordPress download page using the following wget command :

  • cd /tmp
  • wget https://wordpress.org/latest.tar.gz

Once the wordpress archive file downloading completes, decompress the downloaded file and move the files into the directory you have created from the previous step:

  • tar xf latest.tar.gz
  • sudo mv /tmp/wordpress/* /var/www/html/example.com/

Set the correct permissions so that the web server can have full access to the site’s files and directories:

  • sudo chown -R nginx: /var/www/html/example.com

Nginx Configuration Instructions

Create a new file with name “example.com.conf” under /etc/nginx/conf.d as follows:

  • sudo nano /etc/nginx/conf.d/example.com.conf

Paste the following block and then save the file:

# Redirect HTTP -> HTTPS
#server {
# listen 80;
# server_name www.example.com example.com;

# include snippets/letsencrypt.conf;
# return 301 https://example.com$request_uri;
#}

# Redirect WWW -> NON WWW
#server {
# listen 443 ssl http2;
# server_name www.example.com;

# ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
# ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
# ssl_trusted_certificate /etc/letsencrypt/live/example.com/chain.pem;
# include snippets/ssl.conf;

# return 301 https://example.com$request_uri;
#}

server {
# listen 443 ssl http2;
listen 80;
server_name example.com;

root /var/www/html/example.com;
index index.php;

# SSL parameters
# ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
# ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
# ssl_trusted_certificate /etc/letsencrypt/live/example.com/chain.pem;
# include snippets/ssl.conf;
# include snippets/letsencrypt.conf;

# log files
access_log /var/log/nginx/example.com.access.log;
error_log /var/log/nginx/example.com.error.log;

location = /favicon.ico {
log_not_found off;
access_log off;
}

location = /robots.txt {
allow all;
log_not_found off;
access_log off;
}

location / {
try_files $uri $uri/ /index.php?$args;
}

location ~ \.php$ {
try_files $uri =404;
fastcgi_pass unix:/run/php-fpm/www.sock;
fastcgi_index index.php;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
include fastcgi_params;
}

location ~* \.(js|css|png|jpg|jpeg|gif|ico|svg)$ {
expires max;
log_not_found off;
}

}

After you save& close the above file, execute the following command to verify the configuration of nginx:

  • sudo nginx -t

If no errors are shown in the output of the above command, proceed with restarting nginx for the new configuration to be effective:

  • sudo systemctl restart nginx

You are now Done with the Server-side Configuration

Now open your browser and type the domain name you configured in the nginx file (e.g. example.com) to continue with the Wizard-style installation of WordPress.

Achieve More & Do Less with Managed Server Hosting

NetShop ISP offered Fully Managed hosting for your VPS and Dedicated Server so that you can truly focus on managing your business, not your server.

Simply check the Managed Server option during your checkout and we will handle the rest!

For more information don’t hesitate to contact our Hosting specialists today!

Ukraine says Yes in Online and Land-based Gambling Regulation

Ukraine’s legislature, the Verkhovna Rada, has passed a bill to regulate both online and land-based gambling with 248 votes. The new version of the bill allows gambling advertising but also decreases license fees. Originally introduced in 2019, Bill 2285-D, was pushed forward by Oleg Marusyak. Although it initially failed to pass at first reading in December of that year, […]

Ukraine’s legislature, the Verkhovna Rada, has passed a bill to regulate both online and land-based gambling with 248 votes.

The new version of the bill allows gambling advertising but also decreases license fees. Originally introduced in 2019, Bill 2285-D, was pushed forward by Oleg Marusyak. Although it initially failed to pass at first reading in December of that year, it passed in another vote in January 2020 after some amendments including raising the legal age to gamble to 21.

All gambling except state-run lotteries became illegal in Ukraine in 2009, after nine people were killed in a fire at a slots parlour in Dnipropetrovsk in the east of the nation, but the country has looked to reintroduce legal gambling since 2015, when a new bill to legalise and regulate gambling activities across the country was introduced.

Online gambling, bookmaking and land-based casinos would all be legal under the bill, but casinos may only be located in hotels. This version of the bill also sets out restrictions on the origin and ownership of businesses in the market. The bill stated that all operators and slot machine suppliers “must not be controlled by residents of an occupying state and/or the aggressor state in relation to Ukraine”.

The version of the bill passed by the committee said the parliamentary Committee on Finance, Tax and Customs Policy may appoint members of a Tender Commission, which then elects the chairman and members of the Gambling Commission.

However, the legal committee of the Rada said that this is unconstitutional, as creation of a regulator is an executive function and a committee of the legislature does not have this power in its formation. It is not yet clear whether the Rada passed an amendment to address this.

The Rada must now pass another act to setting out how the industry will be taxed. Currently, there are five different gambling tax bills for the Rada to consider.

The bill would still need to be signed by President Volodymir Zelensky to come into effect. Zelensky has been a vocal supporter of regulated gambling in the past.

Article source: igamingbusiness.com

24/7 Customer Service Improvements for Global Hosting Support Coverage

Our commitment for 24/7 Technical Support worldwide during the COVID-19 pandemic situation.

This post was Updated on 15-Jan-2021

As per our commitment for providing an unparalleled Customer Service, we would like to inform our Valued Customers about the following improvements regarding our 24/7 Technical Support:

Official Communication Channels

Our Level-1 and Level-2 NOC Teams are operating on a 24/7 basis to assist Client inquiries and can be contacted directly, free of charge, as follows:

Identity Verification Process

During the initial conversation with our Level-1 Support team on Live Chat, Phone and Skype, Clients are requested to provide their Support PIN along with their Client ID; both of them uniquely set per each Customer.

For enhanced security, we have improved the Support PIN mechanism in the myNetShop Portal so that the PIN is a 6-digit, randomly generated number, unique for the main account and each of your authorized sub-accounts. Please login to your myNetShop Account (https://my.netshop-isp.com.cy) to Generate a new Support PIN.

Our Response to COVID-19

As the spread of COVID-19 (Coronavirus) continues on a global scale and rapidly affects people and organizations, NetShop Internet Services considers the health and safety of its Employees, Customers and Partners a top priority.

To guarantee and firmly secure uninterrupted business continuity, NetShop ISP has taken the following actions:

Travel Restrictions

All business and non-business global travelling has been suspended, effective immediately. Adding to our previous travel restrictions to Category 1 countries (Italy, China and the Republic of Korea), Employees and Management will not be able to fulfill business obligations that require travelling within the U.S. and Europe, until further notice.

Events and Conferences


Out of caution on the safety of our Employees, Customers and Partners, all organized Events, Conferences and Meetings have been restructured and will be held online via phone/Skype/Telegram/Whatsapp/Live Chat.

Work-from-home/ Remote work


All employees were encouraged to work-from-home to protect themselves and limit their exposure to the virus. Although all Staff members have been tested negative for COVID-19, we will continue to closely monitor their health in the following weeks.
The continuity of your business is as important as our own and we would like to assure you that we are working tirelessly to achieve this. NetShop ISP is known for its flexibility to adjust in every scenario and therefore we have introduced new solutions for our remote work.

While all employees remain safe at home, they are also connected with you on a 24/7 basis to assist and troubleshoot any possible issues you might face. Our on-site NOC teams in all our Datacenters are available as always to assist our customers with any requests.