RSS

Category Archives: Web Services

How Webmasters Can Use SMS for Success – Part I

As a webmaster, your experience with SMS as a business tool might simply be a marketer who came to you with a plan for building a mobile marketing database, and requests for API hooks into an SMS database with a provider somewhere.

But what I’m talking about in this two-part series is how you (yes, you webmaster) can use the benefits of SMS messaging for your own success.

In today’s post, I will focus on the uses of text messaging to help you succeed in the managing and operations of your sites and servers.

First of all, let’s discuss what makes SMS an ideal fit for the webmaster.

Monitor servers when voice and email isn’t an option

Whether you have a smartphone or not, when you are out on a day-off excursion with the family to the beach, you probably don’t get very good mobile coverage. Certainly, voice will be patchy, and you can probably forget consistent 3G connectivity for email .

How will you know if a server goes down?

SMS. That’s how.

The small data size allows SMS messages to get through to you when voice and data services aren’t fully available. You could be in a region without 3G services at all and still receive SMS messages from your servers.

If you receive email alerts from your servers, you can receive SMS. By integrating a service such as Email to SMS or an SMS alert from a reputable text message provider, you can either get both the email and SMS sent to you or have emails from a specific mailbox forwarded to your mobile as text messages. Even if you don’t have a smartphone, you can still receive emergency SMS messages in this way.

Smart.

Query and response via SMS API

With an SMS gateway integrated via API, you can create custom scripts in Java, Perl, PHP, Ruby and Python to monitor virtually any aspect of your web servers. This could allow alerts to be sent to you via SMS, or perhaps more usefully, you could actively query your servers via text messages no matter where you are.

With experience, you’ll be able to expand how you use SMS for your own success, and in the Part II of the series, I’ll cover how you can use text messaging for success with your company, customers and clients.

 
Leave a comment

Posted by on February 10, 2012 in Mobiles, Tips, Tricks, Web Services

 

Tags: , ,

Application Setup on Google App Engine

Run your web apps on Google’s infrastructure.
Easy to build, easy to maintain, easy to scale.

1) Register a free account here https://appengine.google.com/.
2) Create an Application here https://appengine.google.com/start/createapp.
3) Download Google App Engine SDK for Java from here http://code.google.com/appengine/downloads.html#Google_App_Engine_SDK_for_Java.
4) Unzip appengine-java-sdk-1.4.2.zip in your favorite drive like “D:\appengine-java-sdk”
5) Now download apps svnmedia.zip “D:\appengine-java-sdk\demos” and unzip here “D:\appengine-java-sdk\demos”
6) Edit application XML file “D:\appengine-java-sdk\demos\svnmedia\war\WEB-INF\appengine-web.xml” to the name of the application like “svnmedia”.
7) Run below commands to upload your application, make sure JDK in system classpath variables 🙂

D:\appengine-java-sdk\bin> cd D:\appengine-java-sdk\bin
D:\appengine-java-sdk\bin> appcfg.cmd update D:\appengine-java-sdk\demos\svnmedia\war

8) Finally you can check your application here http://svnmedia.appspot.com/

Please check features for Google App Engine: http://code.google.com/p/googleappengine/issues/list

Reference:
http://www.builderau.com.au/blogs/
http://www.liventerprise.com/tool/Google_Apps/
http://images.google.com/

http://rcm.amazon.com/e/cm?t=svnlabs09-20&o=1&p=13&l=ur1&category=outlet&banner=1YDJ88YXNCZ632V7HWG2&f=ifr

 

Tags: , , , , ,

How to clean malware from website?

Malware, short for malicious software, is a software designed to secretly access a computer system without the owner’s informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

You have seen above warning many times when you want to browse website using web browsers. This is the warning from search engine bots like Google for website is affected from malwares or viruses. If you still want to access website, it can affect your system or system resources.

Most of times websites are hacked or unauthorized accessed from hackers or cross-site scripting (XSS) or cross-site request forgeries (CSRF).

There may be lot of “holes” in website security that invite hackers to play their game.

The possible HOLES may be:
1. File/Folder permissions
2. Poor authentication for application
3. Cross-Site Scripting
4. Cross-Site Request Forgeries
5. Anti-Virus Software
6. File formats
7. Network “Firewalls/Filters”
8. Shell access & Logs

Please check some link to make web application secure and safe 😉
* http://advosys.ca/papers/web/61-web-security.html
* http://www.claymania.com/safe-hex.html
* http://shiflett.org/articles/foiling-cross-site-attacks
* http://www.ehow.com/how_6804695_remove-malware-website.html
* http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-your-hacked-wordpress-installation/

You can review online Virus & Threat Scanner for cleaning malwares & viruses. These softwares are designed to run on your web server and scan your public web files for malicious code.

Google Safe Browsing Tool
http://www.google.com/safebrowsing/diagnostic?site=yoursite.com

Norton Safe Web
http://safeweb.norton.com/

You can search for more tools like…
Security Pro | SiteMonitor | IP trap | htaccess | AntiXSS | Check Permissions | KISS FileSafe

If you are running PHP website under Apache & MySQL, make sure file and folder should not be access public. You have to check PHP function’s security for more secure access.

PHP Functions may be used in hacking:
1. file_get_contents()
2. base64_decode()
3. eval()
4. exec()
5. preg_match()
6. gzuncompress()
7. urldecode()
8. error_reporting()
9. shell_exec()
10. setcookie()
11. chmod()
12. is_writable()
13. move_uploaded_file() and copy()

The above functions can be used by hackers to write malicious code to your files. The malicious code executed using eval() that will execute every run of website. So, disable eval(), file_put_contents(), file_get_contents(), exec() etc. You can check safe_mode in php.ini for disabling shell access 😉

Most of the time websites are hacked using file_get_contents(), eval(base64_decode()), urldecode(), include() or iframes.

You can search infected file on web server “/var/www/” using below command:

# grep -iR ‘eval(base64_decode(‘ /web-root
# grep -iR ‘ # grep -iR ‘urldecode(‘ /web-root
# grep -iR ‘file_get_contents(‘ /web-root
# grep -iR ‘exec(‘ /web-root

As soon as infection found, you have to backup all application running on web server, now you have to remove infected files manually or using scanner.
Now all up to you how you can manage your web server more securely…

I’ve found that luck is quite predictable. If you want more luck, take more chances. Be more active. Show up more often. 😀

 
 

Tags: , , , , , , , , , , , , , , ,

Amazon E-Commerce Service or ECS

Amazon’s ECS is very good service for accessing Amazon’s product database. We can register to this web service quickly, It provides a free access key to access Amazon Store.

Amazon have rich set of web services 🙂 Web Services are used to access DATA over cross platform environments.

Using ECS-driven websites and applications, we can earn commissions by advertising items for sale by Amazon.

Amazon E-Commerce Service can be used to get the information from amazon such as product name, images, availability, ratings, description, specifications, similar products, and more.

We can use PHP to consume web service using PEAR, REST, SOAP and XML etc.

Try: https://github.com/Exeu/Amazon-ECS-PHP-Library

There is one thing which gives radiance to everything. It is the idea of something around the corner.

 

Tags: , , ,

Recursive Replace in Files Folders

Hello Friends,
Some time we want to change branding of web based softwares. Open source web based software have GNU License. We can modify the code and launch versions.
We can use PERL (Perl is a highly capable, feature-rich programming language with over 22 years of development.)
Here are some basic steps to Recursive Replace Rename Files, Variables, Folder Name etc.
Let you have a project in folder "/root/svnlabs"
To replace search string in all filename and foldernames recursively

# chmod a+x ./RecursiveRegexpRename.pl

# perl RecursiveRegexpRename.pl -m g 'search_text' 'replace_text'

# chmod a+x ./SearchAndReplaceInMultipleFiles.pl

# perl SearchAndReplaceInMultipleFiles.pl -m g 'Search' 'Replace'

# grep -iRl 'Search' /root/svnlabs  (Now search in your project)

If you would hit the mark, you must aim a little above it 😉
 
1 Comment

Posted by on December 11, 2010 in CentOS, Linux, php, Tips, Tricks, Web Services

 

Tags: , , , , , , ,

How to create subaccounts and share buckets using IAM and CloudBerry S3 Explorer

Note: this post applies to CloudBerry Explorer 2.4.2 and later.
As always we are trying to stay on top of the new functionality offered by Amazon S3 to offer the most compelling Amazon S3 and CloudFront client on Windows platform.
A few weeks ago Amazon introduced Identity and Authentication Management (IAM) Service. It is a new exciting service that allows creating user accounts inside the master account and grant those account a set of permissions. CloudBerry Explorer PRO 2.4 already comes with full support for IAM service and you can learn more about that in our previous blog post.
In this blog post we will look into the very common scenario of creating a subaccount within the master account and granting it permissions to a creation bucket. This might be useful if you for instance work with freelancers and want them to be able to work with the content in their own bucket.

Creating a policy

Click Access Manager in the main menu to run IAM management tool from within CloudBerry Explorer.
image001

In the Access Manager click New User to open up a dialog. Name the user and click ok.
image003
The new user should show up on the list. Right click it and click Add Policy…
image005
Click New Statement and then <select actions> to choose the list of actions that your new users will be allowed to do. You can see below those the most common ones.
Click in: to specify the bucket name and the path. Make sure to add “/*” to the path to propagate the policy to the bucket content.
Click New Statement once again this time for the bucket itself. Choose S3:ListBucket for action and make sure that you don’t add “/*” at the end. This is because you are applying the statement to a bucket not to its contents.
You can optionally set a condition. In our example it is valid only till Nov, 1 2010. After that time the user will not have access to the resource.
Click Ok to create the policy.
Designer
Last but not least, you have to generate an access/ secret key pair for your new user. Click Generate Access Keys… in the user context menu. Copy the keys so that you can hand them over to the user later.
image009

Working as a User

Register an account for the newly created user in CloudBerry Explorer console. Use assess/ secret key created earlier.
Note: you can use CloudBerry Explorer freeware to register one bucket for IAM user. If you need to register more than one bucket you will have to turn to our pro version.
image011
Now, select the newly created account in the drop down list. If you look at the list of buckets it will be empty. This is because we have not granted the user a right to list all buckets. You have to add a bucket as an external bucket manually. Click a green button on the tool bar and type the bucket name manually.
image013
Now you can see the bucket in the console. You can copy, move, delete files, create folders, etc.
image015
As always we would be happy to hear your feedback and you are welcome to post a comment.

CloudBerry S3 Explorer is a Windows freeware product that helps managing Amazon S3 storage and CloudFront . You can download it at http://cloudberrylab.com/

CloudBerry S3 Explorer PRO is a Windows program that helps managing Amazon S3 storage and CloudFront . You can download it at http://pro.cloudberrylab.com/ It is priced at $39.99

Like our products? Please help us spread the word about them. Learn here how to do it.
Want to get CloudBerry Explorer PRO for FREE? Make a blog post about us!

 
 

Tags: , , , , , ,

RESTClient – Web Service Consumer

RESTClient is an application use to visit and test RESTful services.

REST (Representational State Transfer) is the model of the Web to consume web resources. The browser makes a request to a URL and receives a response.  The request may be a GET or POST (or a PUT, DELETE, or HEAD) and the response may be anything HTML, Image file, PDF, XML, JSON etc.

Some RESTful Web Services…

http://www.flickr.com/services/api/

http://code.google.com/p/a2zvideoapi/

RESTClient extension: https://addons.mozilla.org/en-US/firefox/addon/9780

 

Tags: , , , , ,