<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ModulesGarden Blog &#187; security</title>
	<atom:link href="https://www.blog.modulesgarden.com/tag/security/feed" rel="self" type="application/rss+xml" />
	<link>https://www.blog.modulesgarden.com</link>
	<description>Where Creativity Meets Technology</description>
	<lastBuildDate>Tue, 05 May 2026 13:28:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Open up to the world with Translations!</title>
		<link>https://www.blog.modulesgarden.com/whmcs-language-localization</link>
		<comments>https://www.blog.modulesgarden.com/whmcs-language-localization#comments</comments>
		<pubDate>Mon, 04 Dec 2023 14:00:52 +0000</pubDate>
		<dc:creator>Anna Bystrzanowska</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[clients]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[translation]]></category>
		<category><![CDATA[WHMCS]]></category>
		<category><![CDATA[WHMCS modules]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=10123</guid>
		<description><![CDATA[Quick question: whenever you can sift through the content in your mother tongue, what are the odds you choose an alternative version, even if you have a fairly good command of the language? Hardly ever obviously, unless it’s for a &#8230; <a href="https://www.blog.modulesgarden.com/whmcs-language-localization">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">Quick question: whenever you can sift through the content in your mother tongue, what are the odds you choose an alternative version, even if you have a fairly good command of the language? Hardly ever obviously, unless it’s for a purely educational purpose. No wonder &#8211; these days people <strong>seek convenience</strong> and value those tools that help dispel even the slightest confusion about foreign terminology.<strong><span id="more-10123"></span></strong></p>
<p style="text-align: justify;">Technology does offer such tools, as the world of business does crave them, for the sake of <strong>successful communication</strong> with various audiences across the globe. When your commercial <em>&#8220;to be, or not to be&#8221;</em> depends hugely on how large your customer base is, communication indeed stands out as a matter of paramount importance. To put it shortly, it all seems to be about understanding your clients, and just as crucially, <strong>making your clients understand your products</strong>.</p>
<p style="text-align: justify;">In light of the above, what deserves special attention is <strong style="color: #f16e0a;">language localization</strong>, defined as the process during which a product’s translation is adapted to a range of <strong>cultural nuances</strong> specific to a certain country or region. It goes far beyond translation per se, i.e. the sole conversion of the content created in one language into a mirror reflection of the same content in a different language. Localization probes into the question of <strong>adaptability</strong>, not only in terms of choosing perfectly corresponding words, but predominantly in taking into account non-textural aspects constituted by various discrepancies between cultural contexts.</p>
<p><img class="aligncenter size-full wp-image-10124" src="https://www.blog.modulesgarden.com/wp-content/uploads/2023/12/Language-Localization-in-WHMCS-Modules-ModulesGarden.png" alt="Language Localization in WHMCS Modules - ModulesGarden" width="575" height="575" /></p>
<p style="text-align: justify;">Bearing all this in mind and aptly connecting the dots, we decided to respond to the growing need for easy-to-use and highly customizable solutions that can make interacting with WHMCS modules as trouble-free as possible. That means implementing the section of <strong style="color: #f16e0a;">Translations</strong> &#8211; a truly cutting-edge tool that promotes what we commonly refer to as user-friendliness. Although the sheer concept of tampering with language files to tailor-make them is by no means a novelty, the emphasis is now on the tool’s <strong>visibility</strong> or, let’s say, <strong>accessibility</strong>.</p>
<p style="text-align: justify;">Until now, setting up the preferred language version or introducing other changes required users to manually modify each record after navigating to the <em>english.php</em> file &#8211; a task that might have seemed slightly intimidating both visually and functionally, particularly for those new to the subject. While this is still the case for the major part of our marketplace, the evolution toward the easier and the prettier has already begun and profoundly affected two of our well-liked products: <a href="https://www.modulesgarden.com/products/whmcs/password-manager" rel="noopener" target="_blank"><strong style="color: #f16e0a; text-decoration: underline;">Password Manager For WHMCS</strong></a> and <a href="https://www.modulesgarden.com/products/whmcs/hosting-renewals" rel="noopener" target="_blank"><strong style="color: #f16e0a; text-decoration: underline;">Hosting Renewals For WHMCS</strong></a>.</p>
<p style="text-align: justify;"><a href="https://www.docs.modulesgarden.com/Password_Manager_For_WHMCS#Translations" rel="noopener" target="_blank"><img class="aligncenter size-full wp-image-10149" title="" src="https://www.blog.modulesgarden.com/wp-content/uploads/2023/12/Translations-Section-ModulesGarden-Password-Manager-For-WHMCS.png" alt="Translations Section - ModulesGarden Password Manager For WHMCS" width="1221" height="756" /></a></p>
<p style="text-align: justify;">The Translations section is there built into the user interface, which makes the whole process of <strong>customizing language files</strong> considerably less complex and &#8211; owing to the implementation of a modern design &#8211; much more eye-pleasing. What the new adjustment has brought is the possibility to <strong>modify any language element</strong> by simply following a set of clear-cut instructions, with no need to explore the inner depths of the module. Useful tweaks have not omitted the process of updating or <strong>editing those language elements</strong> as the tool is able to both detect that some intervention has been made in the original file and notify you about the necessity to modify your translation accordingly. As for completely new features, here they are as well: further facilitation of the language file customization process has been ensured thanks to the possibility of <strong>cloning</strong>, <strong>importing</strong> and <strong>exporting translations</strong>.</p>
<p style="text-align: justify;">The great news is this revolutionary enhancement will soon <strong>extend its reach</strong> to another selection of our modules. Meanwhile, feel free to dive a bit deeper into the solutions that are already up and working wonders:</p>
<p style="text-align: justify; padding: 10px 0px 25px 0px;"><span style="display: block; text-align: center;"><a style="text-decoration: none; display: inline-block; margin: 20px 0px 10px 0px;" href="https://www.docs.modulesgarden.com/Password_Manager_For_WHMCS#Translations" rel="noopener" target="_blank"><span style="-webkit-border-radius: 30px; -moz-border-radius: 30px; border-radius: 30px; background: linear-gradient(to right, #edcb6d, #f1a644); color: #132347; padding: 20px 30px; text-decoration: none;"><strong style="font-size: 18px;">Password Manager</strong></span></a><a style="text-decoration: none; display: inline-block; margin: 20px 0px 10px 20px;" href="https://www.docs.modulesgarden.com/Hosting_Renewals_For_WHMCS#Translations" rel="noopener" target="_blank"><span style="-webkit-border-radius: 30px; -moz-border-radius: 30px; border-radius: 30px; background: linear-gradient(to right, #f1a644, #edcb6d); color: #132347; padding: 20px 30px; text-decoration: none;"><strong style="font-size: 18px;">Hosting Renewals</strong></span></a></span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/whmcs-language-localization/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to protect your privacy in the 21st century</title>
		<link>https://www.blog.modulesgarden.com/world-backup-day-2023</link>
		<comments>https://www.blog.modulesgarden.com/world-backup-day-2023#comments</comments>
		<pubDate>Fri, 31 Mar 2023 10:15:03 +0000</pubDate>
		<dc:creator>Daria Śliwa</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WHMCS modules]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=9698</guid>
		<description><![CDATA[In the light of World Backup Day, we felt it’s only right to bring awareness to the ongoing issues concerning data loss. We feel the need to share the importance of safeguarding your data and keeping your devices secure. Throughout &#8230; <a href="https://www.blog.modulesgarden.com/world-backup-day-2023">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">In the light of <strong style="color: #d36635;">World Backup Day</strong>, we felt it’s only right to bring awareness to the ongoing issues concerning data loss. We feel the need to share the importance of safeguarding your data and keeping your devices secure.<strong><span id="more-9698"></span></strong></p>
<p style="text-align: justify;">Throughout the years, many people and organizations struggled with leaks or lost data, resulting in loss of customers, revenue and reputation, not to mention legal consequences. At this day and age, storing data varies from facial recognition thanks to AI and improved technology, to details about your bank account or address, which we don’t want to disclose. Whether you store your personal information, products and projects yet to be released or customer details – you should make sure all of it is <strong>properly saved</strong> and <strong>backed up</strong>.</p>
<p style="text-align: justify; padding: 33px; border: 2px solid #d36635; margin-bottom: 30px;">Some of the most memorable breaches due to backup issues, like the UK prison system, where sensitive information about over <strong>80K</strong> inmates has been leaked out, still weren’t a lesson for some. Even last year, over a decade after some of the largest data loss incidents, CashApp suffered a breach that resulted in leaking personal details about <strong>8.2 million</strong> clients and losing information they won’t be able to get back.</p>
<p style="text-align: justify;">Whether in this form or another, the word <strong style="color: #d36635;">&#8220;backup&#8221;</strong> simply should ring a bell to everyone these days. Essentially, it is a process of moving your data to a secure location. As an example, that being an <strong>USB stick</strong> or a <strong>remote server</strong>, it is used to store your original data and prevent the possible loss of it. Easily accessible storage is a convenient way for successfully saving and retrieving your data, which is a solid foundation to any online business. Nevertheless, you have to consider that in some cases it can also be accessed by an intruder, that’s why we recommend to distribute your data to <strong>a few secure locations</strong>.</p>
<p><a href="https://www.modulesgarden.com/products/whmcs/r1soft-backups"  target="_blank"><img src="https://www.blog.modulesgarden.com/wp-content/uploads/2023/03/World-Backup-Day-2023.png" alt="World Backup Day 2023 - R1Soft Backups For WHMCS by ModulesGarden" width="575" height="300" class="aligncenter size-full wp-image-9703"/></a></p>
<p style="text-align: justify;">We are aware that this may be a lengthy process for some, but it is also absolutely crucial to protect your data. Due to the amount of breaches and consequences mentioned above, we offer <span style="text-decoration: underline;"><a href="https://www.modulesgarden.com/products/whmcs/r1soft-backups" target="_blank"><strong style="color: #d36635;">R1Soft Backups For WHMCS</strong></a></span> to help prevent that happening to your most valuable asset &#8211; your clients.</p>
<p style="text-align: justify;">As stated earlier, well executed security plays a large role in building a successful business, not least in terms of fostering rock-solid customer relationships, which is why R1Soft Backups For WHMCS focuses specifically on providing your clientele with <strong>R1Soft Server Backup Manager</strong> accounts configurable in every key aspect, such as the size or the type and level of compression. At the same time, you will get to create as many R1Soft packages as it feels right for you as well as perform basic management right where the pulse of your business is most felt &#8211; in your WHMCS.</p>
<p style="text-align: justify;">With all of that in mind, we are hoping you will always be cautious and make sure your data is stored in a safe place. Don’t hesitate to check out our module and invite the future of <strong>server data protection</strong> to your offer! </p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/world-backup-day-2023/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Find The Guardian Of Your Data Privacy</title>
		<link>https://www.blog.modulesgarden.com/data-privacy-day</link>
		<comments>https://www.blog.modulesgarden.com/data-privacy-day#comments</comments>
		<pubDate>Fri, 26 Jan 2018 12:30:49 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WHMCS]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=4926</guid>
		<description><![CDATA[The Internet is home to a tempting variety of conveniences, many of which have permanently entered mass consciousness and settled into everyday routines. That same facilities jostling for your rapt attention within the comfy confines of your web browser may, &#8230; <a href="https://www.blog.modulesgarden.com/data-privacy-day">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">The Internet is home to a tempting variety of conveniences, many of which have permanently entered mass consciousness and settled into everyday routines. That same facilities jostling for your rapt attention within the comfy confines of your web browser may, however, easily fool you into dropping your guard and lull you into a false sense of security. <strong>The Data Privacy Day</strong> is on the horizon to remind us all about the paramount gravity of safeguarding the privacy of each single slice of personal information thrown into the cyberspace.<strong><span id="more-4926"></span></strong></p>
<p style="text-align: justify;">In response to the global threat of data breaches and ever more privacy violations committed in a digital sphere, the countries worldwide mobilize each year on 28th January to foster strong awareness and promote current best practices in widely approached protection of online safety. The Data Privacy Day leads an international initiative to fully recognize the long-term impact on the society of the established customs of data collecting and sharing. The ultimate objective is to <strong>educate individuals on how to safely define and control their online presence</strong>, and <strong>guide companies how privacy kept intact works greatly in favor of their business integrity.</strong></p>
<p style="text-align: justify;">The ideological focus of this irreproachable campaign continually expands, inspiring not only dialogue but also decisive actions on many instrumental levels. In the information technology field, the chief effort is targeted at <strong>tackling the shortage in sufficiently advanced software</strong> aimed to render the safe data storage and management less of a challenge, and more of an effortless habit.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-4928" style="padding: 0px; border: 0px none;" src="https://www.blog.modulesgarden.com/wp-content/uploads/2018/01/Data-Privacy-Day-ModulesGarden.png" alt="Data Privacy Day - ModulesGarden" width="576" height="576" /></p>
<p style="text-align: justify;">Among the wide choice of techniques commonly deployed to preserve online privacy, <strong>encryption of personal data</strong> is regarded as the absolute fundamentals. As early as almost two decades ago, Lawrence Lessig, in its revealing book, <em>Code and Other Laws of Cyberspace</em>, hailed encryption technologies as „the most important technological breakthrough in the last one thousand years”. Whether Lessig exaggerated or not, we leave it for you to decide, but he surely have got a point, placing well-deserved emphasis on the prominent role of encryption in today’s digitally dominated world.</p>
<p style="text-align: justify;">Simply put, encryption converts pieces of information into another form or code, so that only people who own a decryption key or password can access them. It comes in a great number of types, each with a different mechanism to obscure the data into unreadable content. A popular criterion to classify software encryption is the central purpose it fulfills. From this perspective, technology may be grouped into the tools that encrypt <strong>&#8220;data in transit&#8221;</strong> and ones that encrypt <strong>&#8220;data at rest&#8221;</strong>. The basic difference between them is that the first encryption category pertains to transfers of information, while the second one deals with its storage. Whether they travel across the Internet or through a private network, data is quite rightly considered less secure while in motion, and thus, strict encryption measures for in-transit details are nothing short of a must when building a software armor.</p>
<p style="text-align: justify;">To fully grasp the concept of data transit, simply think of the last time you shared some password with your colleagues using the most ordinary channel possible &#8211; an email. Now, imagine the consequences of this tiny string of characters falling into the wrong hands. A direct blow to your reputation and brand image, hordes of frustrated customers, not to mention the organizational mayhem or, in the worst-case scenario, the complete closure of your business. Terrifying, isn’t it? To prevent any of this from happening, robust software with a sophisticated encryption formula should be implemented and actively used. The tool worthy of careful note in this regard is <a href="https://www.modulesgarden.com/products/whmcs/password-manager"><span style="color: #3f95d5;"><strong>Password Manager For WHMCS</strong></span></a> that features two-way encryption keys converting the sensitive information into code on the fly, so that only its unreadable format is saved in the database. Having the passwords under such top-level protection, neither any storing nor sharing operations will pose a real risk to the enterprise and its clientele.</p>
<p style="text-align: justify;">In the face of ever new social networks to be launched, new applications to be released, and new experiences to be had deep in a digital realm, we all bear a heavy responsibility to embrace all irreversible outcomes of this evolution and ensure that any cyber-valuables we care of are protected both when stored and across transit endpoints. The application of space-age encryption technology is a box all smart companies need to check, no matter their size.</p>
<p style="text-align: center;"><strong>Have you already checked yours?</strong></p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/data-privacy-day/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Grand Your Data The Gift Of Full Protection!</title>
		<link>https://www.blog.modulesgarden.com/world-backup-day</link>
		<comments>https://www.blog.modulesgarden.com/world-backup-day#comments</comments>
		<pubDate>Thu, 31 Mar 2016 14:45:14 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tutorial]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=2769</guid>
		<description><![CDATA[Whether it is intentional or by accident – the merest click can become a real culprit behind a digital fiasco. A fleeting moment of inattention that turned into a drink spilled on your laptop might also be a potential headache &#8230; <a href="https://www.blog.modulesgarden.com/world-backup-day">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">Whether it is intentional or by accident – the merest click can become a real culprit behind a digital fiasco. A fleeting moment of inattention that turned into a drink spilled on your laptop might also be a potential headache of your data being gone beyond retrieval. These, alongside the other types of risks are counted in thousands in today&#8217;s electronic-based reality, but they all can be averted successfully by following one good practice – <strong>a solid strategy of making regular data backups.<span id="more-2769"></span></strong></p>
<p style="text-align: justify;">In honor of World Backup Day that falls on March 31st, we wish to share with you our winning formula for maintaining foolproof data protection.</p>
<p style="text-align: center;"><img class=" wp-image-2781 aligncenter" style="padding: 0px; border: 0px none;" src="https://www.blog.modulesgarden.com/wp-content/uploads/2016/03/ModulesGarden-World-Backup-Day-2016.jpg" alt="ModulesGarden World Backup Day 2016" width="580" height="580" /></p>
<p style="text-align: justify;">What you should do in the first place is realize that it is not just computers that serve as a data repository anymore. These are also smartphones, tablets and plenty of different devices in everyday use that store huge amounts of information, the loss of which might turn out severely damaging to either your personal or business sphere (or both!). It is therefore of utmost importance to think ahead and ensure the perfect safety of documents, photos, videos, emails and absolutely anything of digital kind that you value.</p>
<p style="text-align: justify;">So how exactly can you prepare for the unexpected? A whole myriad of options exists for you to protect your files against any loss. The more of these methods you introduce to your usual routine, the smaller the risk of ever suffering the trauma of data disappearance will be.</p>
<p style="text-align: justify;">Simply put, a backup is an exact copy of your intangible valuables. Instead of keeping them all in a single place, you store a separate copy of each file somewhere safe. Conventional wisdom has it that your digital content can be utterly secured upon the adoption of <strong>the backup rule of three</strong>, also known as the 3-2-1 rule:</p>
<ol>
<li>Have at least 3 copies of your data (i.e. two backup files in addition to the original content).</li>
<li>Store the backups on 2 different media types (such as USB drives, optical media, SD-cards, external and internal hard drives, etc.).</li>
<li>Keep 1 backup off-site (ensure that the copies are saved on physically separated devices – the farther the better!).</li>
</ol>
<p style="text-align: justify;">Take some time to cruise through different backup mechanisms and alternative solutions like <span style="text-decoration: underline;"><a href="http://www.modulesgarden.com/products/whmcs/r1soft_backups/features" target="_blank"><span style="color: #3366ff; text-decoration: underline;">this one</span></a></span>, to decide which approach suits you and your clients the most. Regardless of your choice, keep in mind: it is not just about backups, it is about your personal well-being and business continuity!</p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/world-backup-day/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Take Care Of Your WHMCS!</title>
		<link>https://www.blog.modulesgarden.com/whmcs-analyzer</link>
		<comments>https://www.blog.modulesgarden.com/whmcs-analyzer#comments</comments>
		<pubDate>Wed, 24 Feb 2016 19:40:26 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[free]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WHMCS]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=2594</guid>
		<description><![CDATA[You use it every single day. Hundreds of your business undertakings are carried out with the aid of it on a daily basis. The sustained operation of your entire company depends on its seamless performance. So how exactly can you &#8230; <a href="https://www.blog.modulesgarden.com/whmcs-analyzer">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">You use it every single day. Hundreds of your business undertakings are carried out with the aid of it on a daily basis. The sustained operation of your entire company depends on its seamless performance. So how exactly can you protect the health of your WHMCS?<strong><span id="more-2594"></span></strong></p>
<p style="text-align: justify;"><strong style="text-align: justify;">WHMCS Analyzer</strong> has been created to help you monitor the shape of your technical infrastructure in a very detailed fashion. The script has been armed with a wide scope of advanced algorithms to scan your system and server environment from every angle possible. This way, you can easily determine its current status and address any suspicious aspects before they inflict any damage to your business. The examination outcome will also prove useful for assessing to what extend your WHMCS has been modified, i.e. how many custom files it contains.</p>
<p style="text-align: justify;"><a href="https://www.blog.modulesgarden.com/wp-content/uploads/2016/02/ModulesGarden-WHMCS-Analyzer-Server-Environment.png"><img class="alignnone  wp-image-2598" src="https://www.blog.modulesgarden.com/wp-content/uploads/2016/02/ModulesGarden-WHMCS-Analyzer-Server-Environment.png" alt="ModulesGarden WHMCS Analyzer - Server Environment" width="993" height="1068" /></a></p>
<p style="text-align: justify;">Download the script <strong><span style="color: #6198fd;">entirely for FREE</span></strong> to keep a finger on the pulse of your system operation and run your business without any risk of technical failure!</p>
<p style="text-align: justify;"><span style="display: block; text-align: center;"><a style="text-decoration: none; display: inline-block; margin: 28px 0px 28px 0px;" href="http://www.modulesgarden.com/products/whmcs/whmcs_analyzer/features"><span style="-webkit-border-radius: 3px; -moz-border-radius: 3px; border-radius: 3px; background: #6198fd; color: #ffffff; padding: 15px 20px; text-decoration: none;"><strong>Learn More!</strong></span></a></span></p>
<div id="balloon_parent_div_ab" class="kisb" style="visibility: hidden; position: absolute; left: 333px; top: 307px;">
<div class="kl_abmenu">Dodaj do listy blokowanych banerów</div>
</div>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/whmcs-analyzer/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Practical Tips To Defend Against DDoS Attacks</title>
		<link>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks</link>
		<comments>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks#comments</comments>
		<pubDate>Wed, 29 Apr 2015 14:03:27 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tutorial]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1834</guid>
		<description><![CDATA[Imagine your average day at work. Managing orders, monitoring transactions, providing services, just as usual&#8230; but then, out of nowhere, your website has just disappeared and all orders and services have gone down. If something like this happens to you, &#8230; <a href="https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">Imagine your average day at work. Managing orders, monitoring transactions, providing services, just as usual&#8230; but then, out of nowhere, your website has just disappeared and all orders and services have gone down. If something like this happens to you, then there is a strong possibility that you have become yet another victim of  Distributed Denial of Service (DDoS) attack.<strong><span id="more-1834"></span></strong></p>
<p style="text-align: justify;">DDoS attacks have become one of the most common disastrous attacks on the Internet. The number of attacks along with their size and intensity has increased substantially: in the space of just last year 57% rise in total DDoS attacks have been reported. That is why we want to share with you some of practical tips to defend against DDoS attacks and actions worth taking while experiencing the attack to minimize losses:</p>
<p style="text-align: justify;"><strong>1.</strong> One of the well-known approaches to handling DDoS attacks is over-provisioning. In order to scotch the attack and reduce its impact on your clients you need to provision for far more traffic than you usually expect to receive. How much should be enough? Estimate the largest amount of traffic that you have ever had, multiply it by ten and adapt your hardware infrastructure to cope with this level of traffic. It will make much more difficult for an attacker to generate enough traffic to bring down your company&#8217;s network.</p>
<p style="text-align: center;"><img class="size-full wp-image-1835 aligncenter" src="https://www.blog.modulesgarden.com/wp-content/uploads/2015/03/DDoS-Attacks-In-Q4-2014-Per-Country.png" alt="DDoS Attacks In Q4 2014 Per Country" width="534" height="480" /></p>
<p style="text-align: justify;"><strong>2.</strong> If you are experiencing DDoS attack you need to consider disconnect<span style="font-size: medium;">ing</span><span style="font-size: medium;"> from a network. It will result in </span><span style="font-size: medium;">taking your business off-line and </span><span style="font-size: medium;">cutting off access to all your products and services but at the same time it will prevent from further utilizing network resources.</span></p>
<p style="text-align: justify;"><strong>3.</strong> Additionally, you can perform DNS redirection by changing an &#8220;A&#8221; record which provides servers with the IP address of your domain. Keep in mind that you have to notify your clients about it so they can enter new IP address in order to keep using services of current network provider. This method is as effective as quickly DNS propagation is proceeded. It may take even a few hours and often requires a direct contact with a hosting service provider.</p>
<p style="text-align: justify;"><strong>4.</strong> IP addresses are cached by servers around the world for a specific period of time (measured in seconds) which is known as &#8220;Time to live&#8221; (TTL). Usually, default TTL value is 86400 seconds (24 hours), which may be far too long if you are under DDoS attack. You can reduce losses by controlling TTL value: the shorter TTL value, the quicker you will be able to redirect all web site requests to a new IP address. You need to, however, bear in mind that shorter TTL value means more frequent requests which, in turn, increases the load on your DNS host.</p>
<p style="text-align: justify;"><strong>5.</strong> Changing DNS or even migrating to another server may be not sufficient to completely resolve the problem. If an attacker finds out what your intentions are, the attack will be redirected to a new target and everything may start all over again. Therefore, it is also worth giving some thought to cloud-based traffic scrubbing services which are able to quickly filter out malicious software from data stream. Data cleansing service providers are the first line of defence against high-volume DDoS attacks &#8211; they have sufficient bandwidth and proper tools to filter network traffic which stems DDoS packets within the cloud and pass normal traffic to the company network.</p>
<p style="text-align: center;"><img class=" wp-image-1836 aligncenter" title="DDoS Attacks In Q4 2014 Per Industry" src="https://www.blog.modulesgarden.com/wp-content/uploads/2015/03/DDoS-Attacks-In-Q4-2014-Per-Industry.png" alt="" width="533" height="532" /></p>
<p style="text-align: justify;"><strong>6.</strong> You may also take into consideration some additional services, such as CloudFlare. They monitor network traffic and collect data that are used as a basis to assess the risk of possible attacks. Thanks to this, each attack attempt is thwarted before it does any damage. What is more, in case of a serious attack, they are able to restore a webpage and revert back any negative changes using previously made backup files. This way, users may not even notice the malfunction.</p>
<p style="text-align: justify;">Destructive power of DDoS attacks cannot be disregarded. <span style="font-size: medium;">Every company needs to ensure its</span> sustained operation <span style="font-size: medium;">and resource availability by remaining vigilant and taking all possible measures </span><span style="font-size: medium;">to mitigate the risk of </span><span style="font-size: medium;">being hit before it happens.</span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Preventing Problems With Software Implementation</title>
		<link>https://www.blog.modulesgarden.com/preventing-problems-with-software-implementation</link>
		<comments>https://www.blog.modulesgarden.com/preventing-problems-with-software-implementation#comments</comments>
		<pubDate>Thu, 11 Dec 2014 12:21:36 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[custom software]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[software implementation]]></category>
		<category><![CDATA[tutorial]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1687</guid>
		<description><![CDATA[In the early 16th century Dutch philosopher Desiderius Erasmus famously said: &#8220;Prevention is better than cure&#8221; but we bet he had no idea how much this sentence&#8217;s significance will expand through the next 500 years. Nowadays, in the world dominated &#8230; <a href="https://www.blog.modulesgarden.com/preventing-problems-with-software-implementation">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">In the early 16th century Dutch philosopher Desiderius Erasmus famously said: &#8220;Prevention is better than cure&#8221; but we bet he had no idea how much this sentence&#8217;s significance will expand through the next 500 years.<strong><span id="more-1687"></span></strong></p>
<p style="text-align: justify;">Nowadays, in the world dominated by information technology, Erasmus&#8217;s words of wisdom can be interpreted in a completely new way. Their meaning may be successfully transfered into various fields not necessarily related to medicine.</p>
<p style="text-align: justify;">Nobody needs to be told that it is better and easier to prevent health problems than cure them. In this article we want to show you that the exact same idea applies to any sort of software problems. If you own or plan to purchase modules, or introduce custom software solutions to your business, the following tips will be the best guide to ensure the safety of yours and your clients&#8217; systems.</p>
<p style="text-align: justify;"><strong>1. Prepare Test Environment</strong><br />
The first thing to do before going live, especially if you own a custom made module, is testing it in the development environment. You should check the features and try out all functions of the product to make sure that it will integrate well with your system and avoid any problems after implementation. If something goes wrong in the testing phase, we are always at your disposal to find a solution.</p>
<p style="text-align: justify;">If you do not know how or have no time to organise test environment, keep in mind that we can do it for you!</p>
<p style="text-align: justify;"><strong>2. Make A Backup</strong><br />
Data protection should be a priority for every business owner. Loss of information may cause severe damage to companies of all sizes. That is why we highly recommend you to make a backup before introducing any changes to your system. This way you will be able to quickly restore the data in case of any unexpected deletion. In other words, keeping backup files will allow you to easily revert back the changes if something does not go the way it should.</p>
<p style="text-align: justify;">To convince yourself how important data protection is, take a look at the following table showing the cost of re-creating merely 20 MB of data:</p>
<p style="text-align: justify;"><img class="alignnone size-full wp-image-1709" src="https://www.blog.modulesgarden.com/wp-content/uploads/2014/12/Table-Of-Data-Re-creating-Costs.jpg" alt="Table Of Data Re-creating Costs" width="585" height="136" /></p>
<p style="text-align: justify;"><strong>3. Installation Service</strong><br />
Not certain how to handle the process of installation? You can have it done capably by our specialist within 48 hours from purchasing the product. Simply tick &#8216;Installation Service&#8217; field while ordering.</p>
<p style="text-align: justify;"><strong>4. Use The Help Of Professional</strong><br />
The configuration of the environment is a complex process. Doing all the required steps properly is extremely important because your system&#8217;s efficiency depends on that. You can manage it on your own with the help of tutorials available on our Wiki but if you are not sure how to proceed, call on professionals. In particular, if you order a custom made product, turn to our support team for necessary help with its configuration.</p>
<p style="text-align: justify;"><strong>5. Choose The Right Moment</strong><br />
When you want to implement a module or other software solution, especially if it is custom made, make sure that you are able to devote enough time for it and nothing will distract you. Avoid times when you are overloaded with work. Also, keep in mind that our support may be limited during weekends so it may be better to proceed with implementation on working days.</p>
<p style="text-align: justify;"><strong>6. Test The Software</strong><br />
Even if you tried out a module in the test environment do not forget to do it once again after going live. Check if all functions work as expected and if not, use previously made backup files to undo changes.</p>
<p style="text-align: justify;">Remember that we do our best to provide you with high quality custom software development but we cannot predict everything. Make sure to go through all of above-mentioned steps to minimise the risk of any adverse effects. And in case something goes wrong, do not hesitate to contact ModulesGarden!</p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/preventing-problems-with-software-implementation/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>More Security? Yes Please!</title>
		<link>https://www.blog.modulesgarden.com/more-security-yes-please</link>
		<comments>https://www.blog.modulesgarden.com/more-security-yes-please#comments</comments>
		<pubDate>Fri, 03 Oct 2014 11:01:26 +0000</pubDate>
		<dc:creator>Piotr Dołęga</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1466</guid>
		<description><![CDATA[A month ago we introduced a brand new new licensing system to increase the security and stability of our modules. That was just the beginning of the internal improvements in our company. The next step is making sure that your &#8230; <a href="https://www.blog.modulesgarden.com/more-security-yes-please">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">A month ago we introduced a brand new new licensing system to increase the security and stability of our modules. That was just the beginning of the internal improvements in our company. The next step is making sure that your valuable data are perfectly safe.<strong><span id="more-1466"></span></strong></p>
<p style="text-align: justify;">Recently we have added a completely new functionality to all of our ticket&#8217;s submitting forms. This is a nice, green field with ‘Secure Message’ title.</p>
<p style="text-align: center;"><img class="aligncenter  wp-image-1470" src="https://www.blog.modulesgarden.com/wp-content/uploads/2014/10/ModulesGarden-Support-Secure-Message.png" alt="ModulesGarden Support - Secure Message" width="714" height="1366" /><br />
All data filled in that field are additionally encrypted and stored on a secured server. In this way, your confidential data, like access details to your system, will be even safer than before.</p>
<p style="text-align: justify;">Do not hesitate to make good use of this attribute! <img src='https://www.blog.modulesgarden.com/wp-includes/images/smilies/icon_wink.gif' alt=';)' class='wp-smiley' /> </p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/more-security-yes-please/feed</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Improvements Of Security And Stability</title>
		<link>https://www.blog.modulesgarden.com/improvements-of-security-and-stability</link>
		<comments>https://www.blog.modulesgarden.com/improvements-of-security-and-stability#comments</comments>
		<pubDate>Fri, 29 Aug 2014 14:34:56 +0000</pubDate>
		<dc:creator>Piotr Dołęga</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1406</guid>
		<description><![CDATA[A couple of days ago we dealt with a huge DDoS attack which caused downtime of our website and breakdown of our licensing system. As soon as we to stood on our own feet, we begun working on entirely new &#8230; <a href="https://www.blog.modulesgarden.com/improvements-of-security-and-stability">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">A couple of days ago we dealt with a huge DDoS attack which caused downtime of our website and breakdown of our licensing system. As soon as we to stood on our own feet, we begun working on entirely new solution that was supposed to drastically improve the security and stability of our services, especially the modules.<strong><span id="more-1406"></span></strong></p>
<p style="text-align: justify;">And so it happened. Today we finished the first phase of the plan through reorganising our whole server and network structure, and applying security improvements. That will result in minimization the risk of downtimes and interruptions in the delivery of services. But most importantly, we finished the massive update of all the modules to implement a far better license verification mechanisms. In this way, even if the licensing servers are down, the proper work of your modules will not be interrupted.</p>
<p style="text-align: justify;">To benefit from the mentioned improvements you will need to upgrade your modules. To do so, simply log in to our <span style="text-decoration: underline;"><span style="color: #3366ff;"><a title="ModulesGarden Client Area" href="https://www.modulesgarden.com/manage/" target="_blank"><span style="color: #3366ff; text-decoration: underline;">client area</span></a></span></span>, download the latest versions released today (29.08.2014) and follow this simple <span style="text-decoration: underline;"><span style="color: #3366ff;"><a title="How To Update Modules" href="http://www.docs.modulesgarden.com/Modules_Update" target="_blank"><span style="color: #3366ff; text-decoration: underline;">instruction</span></a></span></span>.</p>
<p style="text-align: justify;">Please note, that you do not have to update the modules, but it is highly recommended.  In case you do not update your modules, we can not guarantee you the adequate stability at the time of serious server failures. However, they will work correctly. The decision belongs to you but we are convinced that there is no reason to postpone this task.</p>
<p style="text-align: justify;">Soon, we will implement additional improvements like for example secure message system into our ticket system. It will further enhance the safety of your valuable data provided in the tickets. We will keep you posted.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/improvements-of-security-and-stability/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
