Web Hosting Review : Bluehost.com

Website hosting nowsadays is very competitive. Many web hosting companies offer tonnes of features at very competitive prices. With so many choices in mind, how do you choose the right host? I have tried many hosts over the years and finally landed on one that I feel has the most complete features that I need at the best possible price, ie BlueHost.
BlueHost provides hosting features that surpass the needs of large commercial websites:10 Gigabyte Hosting Space
Host 6 Domains on 1 Account!!!
2,500 POP/Imap Email Accounts
250 GIGS of Transfer
SSL, FTP, Stats
2000/2002/2003 Front Page Extensions
Free Domain Forever!
Superb/Responsive Support Engineers 

Reliability and Performance
So far, I have no problems with the speed and reliability of the server. Most of my sites hosted by them were never down. If you have google toolbar installed, just take a look at their page rank. Bluehost has a page rank of 8 which is rare for a web hosting company. This just shows how popular they are in the web. If you look at their awards page, you will realized that they have a long history of awards. This is a plus point because it shows that they care about their customers and more importantly, their performance is consistent.

They have a good support section in the website.  Based on my experience, most of their emails are answered within 2 working days. Though not the fastest around, their replies are honest and professional. Some hosts will answer you in such a way that you need to pay them more money to get your problems solved. Click here to visit their site.

How To Get Quality Traffic To Your Website

You must have heard of the term “Quality Links”. How about “Quality Traffic”? “Quality links” means that the one way links coming to your website are from reliable sources and the content is related to yours. For example, if your website is about web design and a link pointing to your site from the web design section of msn website is considered as a quality link. “Quality Traffic” means that the people who come to your website via whatever channels are actually looking for something and have better chances of using your services. They are looking for something specific and your website can provide the answer and make them stay longer. Quality links are important in search engine optimisation as to Quality Traffic to sales generation.
Forum / Blog
By participating in forums, you are exposing your url to anyone who is reading your post. For example, if you provide web design service, you might want to be more active in the web design section of the forum because you know that the people who are reading your post are people who are interested in web design. The clicks from these people are usually more valuable than clicks from any other tom, dick and harry. I would recommend using only one link in your signature to avoid confusion. Some people use alot of links in their signature for SEO purposes and that actually defeats the whole idea of getting quality traffic.

Many people leave their urls when participating in blog discussions. Like forums, people who take time to read the blog are interested in the topic. Depending on the popularity of the blog, your url in the blog comments may provide you with quality traffic.

Article Submission
Article submission to websites and discussion groups can reap great rewards. If your article is unique and good, it might be duplicated in many websites and invites alot of targeted readers. If the readers are impressed with the content, the chances of them reading the bio at the end would be high, and hence there is a good chance that they will click on your url. Many people write articles for different reasons and I find that many people like to stuff links in their content and bio. I, too operate an article website and sometimes, I saw an article so well written that I wanted to use it in my website but the bio spoiled everything. There were too many links in the author bio. I can understand from the search engine optimisation perspective of putting links in the bio but it will become harmful to my website (I am stingy about out-going links) and annoying for the reader if the bio is stuffed with links. Some links aren’t even related to the author.

Online Advertisement / PPC Programs
Another proven technique is to advertise urls or banners in established websites. If you noticed, Dell loves to advertise their products in MSN. Just imagine how many people are surfing msn everyday and how many people are looking at the banner…Intelligent use of words and banners can lead to high volume of targeted leads to your website. Such advertisements can be effective but very costly. Therefore, most people tend to use Pay-Per-Click (PPC) programs whereby your urls will only be displayed when certain keywords are searched. The most notorious of all PPC programs is Google Adwords.

Let us not all forget that the best way to get quality leads is via organic search engine results. Though it takes alot of hardwork and time to be ranked well in major search engines, the effort will be rewarded in a long run. Once you are ranked well in the Google especially, quality traffic becomes almost unstoppable.

Offline Advertisement
This is an area that is often overlooked. Sometimes words of mouth can be even more effective than all of the techniques mentioned above. I remembered how friendster used to spread like a virus sometime ago and everyone were talking about it everyday in schools, colleges..etc. This is how powerful peer pressure can be. As long as something becomes popular, everybody will go for it. Many traditional advertising techniques such as putting your urls in brochures, magazines, stands, t-shirts, cars…etc still works. Of all the offline advertising techniques, I found newspaper ads really effective especially if the newspaper is really popular. Offline advertisements may well worked better for people who do not use search engines alot.

There are other ways to get traffic but most of them are not really effective. I will list 2 commonly used techniques nowsadays:

Guaranteed Targeted Hits
There are companies that promised certain amount of quality hits for certain amount of money. This service is very attractive for new website owners because it is hard for a new website to get traffic. How does it work? By using pop-up advertisements. There are also unethical companies using automated scripts to generate hits. A quick way to determine if this technique works for you is to check your web statistics. If all the visitors from the “Guaranteed Targeted Hits” program does not go beyond the landing page or generate sales, then you should consider quitting the program. There are also cases that this technique actually works for some webmasters. For me, I will block all “pop-ups”, “pop-downs”, “pop-unders”…etc whatever.

Hits Exchange Network
Some websites offer hit exchanges, ie you visit my website and I visit yours. It usually works on a point system. The more websites you visit, the more points you get and the system will show your links more frequently, bringing in more hits for you. There is usually a timer to make sure that you visit the site for at least 20 or 30secs before you can move on to the next. I must admit that this is a very good and cheap way to get free traffic but the traffic is not targeted. Most users in the network visit your site just to get points and they do not take your content seriously. I have joined many such networks and none actually works for me.

Quality Online Traffic is important for anyone who provides an online service or runs an online business. Visitors who arrived at your site with a purpose are more likely to make purchases. This article discussed some of the common ways to bring in quality traffic for your website, some online and some offline. There are of cause many other ways not covered in this article.

PHP: Things To Take Note When Writing Login Scripts

Almost every website nowsadays will have some sort of a login system. If you decide to write a login script yourself in PHP, this article will provide some important pointers on the security of the script you are writing. This article will talk on a common login hacking technique known as The SQL Injection Attack. This is not new in the programmer’s world but worth taking note especially when you are new to programming.There are hackers everywhere, so beware! 
When the user submits a form consisting of the username and password, all the variables will be store in the $_POST array after submitting. You can get the values of the array easily using:

$usr = $_POST[‘username’];
$pwd = $_POST[‘password’];

Where “username” and “password” are the names of the textfields in your form.

How do you deal with these values?
You probably verify it against your database. If the username and password matches at least one record in the database, you will let this user proceed on to the secure area, else you will probably throw an error, prompting the user to re-login. During the verification process, your SQL statement might look like this:

SELECT * FROM `user_table`  where username=’$usr’ AND password=’$pwd’

Re-looking at the SQL statement, if someone leaves username empty and writes “ ‘  OR username LIKE ‘%” in the password field, then your whole SQL statement becomes:

SELECT * FROM `user_table`  where username=’ ‘ AND password=’ ‘ OR username LIKE ‘ % ‘

This statement means selecting all the records in the table. If your criteria of letting the user proceed is that the return number of records is more than 0 (at least one user found), then this SQL statement will return all records, meaning that the user will be able to slip pass through the verification process. This type of hacking is famously known as The SQL injection attacks.

One good way to prevent this from happening is to make sure the $_POST array is safe from escape strings such as ‘ and “. You can filter your $_POST array using

$usr = mysql_real_escape_string($_POST[‘username’]);
$pwd = mysql_real_escape_string($_POST[‘password’]);

There are of course other ways to do it but the idea is to let you know that you have to be very careful in handling the data retrieved from forms, epecially more so for usernames and passwords.

Important Linux Directories

There are many variants of Linux used in different computer systems today. Luckily, most Linux developers employ a common naming and utilization scheme that makes different variants of Linux easy to use and maintain. This article will discuss some important and common directories in many popular Linux distributions.
Each user of a Linux system is assigned a special directory, called “home” direectory, that represents their private space on the system. For example, if a user of the system is called tom, the home directory of tom will be /home/tom. Tom has the right to create any files and directories under his home directory. This is also the default location when tom logs into the system.

This is the home directory of the adminstrator or super user.

In addition to personal hard disk space in the home directories, users are also given special access to shared temporary space in the /tmp directory. Linux systems often implement quotas on user accounts to prevent anyone from using too much disk space. The /tmp directory allows all users access to additional space to meet short term needs without charging the space against their quota. All files placed in this directory are deleted automatically after a few days.

This directory stores all the configuration files needed for the operating system. For example, startup configuration scripts are found in /etc/rc.d and network configuration scripts are found in /etc/sysconfig. Normal users cannot modify the files in /etc.

/bin and /usr/bin
Most system commands are stored as binary files only in machine readable format. Commands appropriate for use by ordinary users are either placed in the /bin or /usr/bin directory. Core commands like rm, mv, ls, cd go into /bin while supplementary utilities like compilers, firefox browser and openoffice go into /usr/bin.

/sbin and /usr/sbin
Like /bin and /usr/bin, /sbin and /usr/sbin store commands to be used only by the super user, ie root user. These include commands for attaching and removing hardware, starting and stopping the system…etc.

This directory stores all the frequently changed files in the system. For example, incoming, outgoing mails, system logs, websites, ftp file archives…etc.

There are only a few directories to know to really start using Linux. If you understand what the main directories are, then exploring the sub-direectories becomes much easier. If you are lost while navigating the directories, always use “cd /” to return back the the root, “cd ..” to go up one level or use “pwd” to find out where you are. Another command “which xxx” tells you where certain commands are located.