by admin | Jul 12, 2024 | Blog News - English, Payment Modes
To make cash transfer from your mobile phone with TIGO line to our bank account make sure that your TIGO PESA account has enough cash to perform the transfer.
- In the phone call screen type *150*01# and press call button
- Select # 7 – Financial services
- Select # 1 – TIGO-PESA to Bank
- Select from the list # 1 – CRDB
- Select # 1 to Enter Bank Account Number
- Enter Bank Account Number (Our account no. is 01J1034874900)
- Enter amount you want to pay
- Enter PIN to confirm
Wait for the completion message from TIGO and CRDB. If the transaction is unsuccessful, please repeat from step no. 1 above
SEND US PAYMENT NOTIFICATION:
IMPORTANT! Remember to include the following references:
- Invoice #
- Payment Ref #.
- Sender name that appear in the receipt or mobile number used to send the money,
- Amount sent
- Domain to be attached with.
- Scanned copy of the original deposit slip for bank transactions.
- Remember also to keep the payment evidence as may be requested in the future for verification
SEND US PAYMENT NOTIFICATION:
IMPORTANT!
Your order won’t be processed until evidence of payment is sent to us. Please send the following as the evidence of payment:
- Attach or reply the latest received Invoice # plus
- CRDB Bank Success Transfer Message OR
- Scanned copy of the original deposit slip if deposited physical to the bank or via agents.
NB: Remember also to keep the payment evidence as the same may be requested in the future for verification
136
by admin | Jul 12, 2024 | Blog News - English, Website Monitoring, Website Security, Website Suspension
Unsettled Bills
A website can be suspended due to unsettled bills related to that domain or website. It can be web hosting annual fee, domain registration fee, the website design charges not paid or other critical reasons
Violation of server terms and conditions
The website can also be suspended if it violates server terms and conditions. These terms vary according to the host but common ones are:
- Email spamming
- Server resource over usage eg. Over CPU usage, physical memory over use, Virtual memory over use, too many processes normally over ten (10) processes etc
- It can also can be suspended if it is under attack or hacked. The hacking can originate from admin or backend access, database injection or cross platform scripting.
How is the website attacked?
Backend or Administrator access
The access through the backend are normally caused by using either weak password, common words, and easy to guess usernames.
SQL Injection
SQL injection is a code insertion method, used to attack database-driven web applications, in which evil SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
Cross-site scripting -XSS
Cross–site scripting (XSS) is a kind of computer security hole typically found in web applications. XSS allows assailant to insert client-side scripts into web pages viewed by other users. This is normally used for phishing, stealing users important information like passwords and credit card numbers
Bugs
A scrip bug is an error, flaw, failure or fault in a web application that causes it to allow attacker insert harmful codes/commands to that applications
Poor coded scripts
Poorly coded scripts in many cases originate from students who are still learning or from developers with insufficient coding skills and experiences. The poor coded scripts can also originate from pre release software or beta
Cross-Site Request Forgery (CSRF)
Cross-site request forgery is abbreviated as CSRF is a type of harmful exploit of a website where unlawful commands are sent from a user that the web application trusts.
DDoS Attack
A distributed denial-of-service(DDoS) attack takes place when multiple systems flood the bandwidth or resources of a targeted server, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.
Server security misconfiguration
Security Misconfiguration arises when Security settings are defined, implemented, and maintained as defaults. Good security requires a secure configuration defined and deployed for the application, web server, database server, and platform.
Email spamming
There are two types of email spamming
- Bulk emails are sent to your email server from unanimous senders
- Bulk email are sent to third parties in bulk via your email server by spoofing means
How to protect your website from Attacks
Backend or administrator access
Always use difficult to guess usernames and strong passwords. Password from 8 and above characters that contains at least 4 character types from Capital, small letters, numbers and special characters can reduce the risk.
Parallel to this deploy to your website login attempt limiters and firewalls. This can reject all dictionary or related bots that guess your username and passwords.
Implement also webmaster reporting mechanism if something changes from your website. You may go far by limit logins from know IP addresses or countries. If you don’t have any deal to specific country, then block your website from appearing from those vulnerable countries. If at all you don’t need public presence then block search engine bots and any other bots from visiting your website
SQL Injection
You may need to use difficult to guess usernames and password for your database. Password from 8 and above characters that contains at least 4 character types from Capital, small letters, numbers and special characters can reduce the risk. Implement webmaster reporting mechanism if something changes from your database. You may go far by limit logins from know IP addresses or countries. If you don’t have any deal to specific country, then block your website from appearing from those vulnerable countries. If at all you don’t need public presence then block search engine bots and any other bots from visiting your website
Cross-site scripting -XSS, Bugs,
Buy scripts from reputable and known providers. Avoid cheap scripts. Also deploy backend security mechanism as described above. For script with bugs that are from known genuine vendors or developers, pl;ease make sure you immediately update all outdated scripts or uninstall if the vendor did not release the update patch on time
Poor coded scripts
Buy scripts from reputable and known providers. Avoid cheap scripts. Also deploy backend security mechanism as described above
Cross-Site Request Forgery (CSRF)
Always deploy security monitors, scanners and blockers for unauthorized outbound and inbound communications
Server security misconfiguration
Check your server configuration regularly and if any misconfiguration detected correct it and or communicate to the server admin/ tech personnel for correct configuration. In many cases let the web server have the optimal security setting
DDoS Attack
- The best way to stop DDoS Attack is tto use the web application Firewall
- Monitor the DDoS Attack continuously in order to device the better option of preventing the attack
Email spamming
There are two types of email spamming
- Bulk emails are sent to your email server from unanimous senders
- Bulk email are sent to third parties in bulk via your email server by spoofing means
Protect bulk emails spamming from unanimous senders
For the first case you can use mails assassin
To enable SpamAssassin in cPanel, follow these steps:
- In the Mail section of the cPanel home screen, click Spam Assassin™.
- Click Enable Spam Assassin.
- To enable auto-deletion of spam messages, select a score level under Filters, and then click Auto-Delete Spam.
Protect bulk emails spamming via you email server
For the second case you can use SPF or disabling PHP Mail function in cpanel
Using SPF to control email spoofing and phishing
Adding an SPF record to your DNS zone file is the best way to stop spammers from spoofing your domain. In addition, an SPF Record will reduce the number of legitimate e-mail messages that are flagged as spam or bounced back by your recipients’ mail servers.
This is an easy way to control phishing and email spoofing.
Disabling PHP Mail function in cpanel
- While in Cpanel go to Software section
- Select PHP Version
- Switch to PHP Options
- in send mail path select /bin/true
- Then click apply and save the PHP setting
How to avoid website suspension?
Pay bills ontime
Always pay your bills ontime. In order not to miss when you are required to pay your bills do the following:
- Give your web host the emails that you commonly use and are active. If the emails is not in use immediate report to the web host for emails replacement and it is recommended to always provide extra email and phone
- You may need premium notification services like those that uses sms notification if you do not frequently use you email
- Request the web host to notify the next bill at least 60 or 30 days before
- Set your phone, tablet or computers to notify you before the deadline. You can even use email functions like calendar from your emails or third party websites
- If your website is an important asset to you or your business, plan always to pay longer payment plans
Monitor your website security
After you have secured your website, it is not the end, monitor the security of your website within your website or from third party services. The third party services common one is www.CloudFlare.com, www.websitedefender.com, www.wix.com, www.verisign.co.uk, www.uptimerobot.com etc For more websecurity info go to http://seo.co.tz/website-security-management-for-seo/
by admin | Jul 12, 2024 | Blog News - English, Webmaster
Font, colors, graphics, sound and slogans, USP and other texts phrases are constituent of website branding that we will also ask the customers to have or look for. If the customer does not have all or some of these important items, especially logo, graphics, slogan, USPs etc, we will create with additional cost.
by admin | Jul 12, 2024 | Webmaster
You can host a website in Tanzania with InfoCom Center Ltd at a reasonable price. The plans are: Basic budget Web Hosting Plan, Premium web hosting plan and Unlimited web hosting plan
Our web hosting plans are
Basic Web Hosting Plan (Suitable for personal, small size and none popular website)
You get
- Free regular domain (.com, .net, .org, .info)
- 500MB of disk space
- 5GB of Bandwidth
- Unlimited MySQL databses
- Unlimited databse space
- Unlimited emails accounts
- Unlimited sub-domains
- Unlimited parked domains
- Unlimited addon domains
- Unlimited FTP Accounts
- Free online scrips like joomla. drupal, wordpress etc
- And much more features and applications
Premium Web Hosting Plan (Suitable for medium sized websites with moderate popularity)
You get
- Free regular domain (.com, .net, .org, .info)
- 2000MB of disk space
- 20GB of Bandwidth
- Unlimited MySQL databses
- Unlimited databse space
- Unlimited emails accounts
- Unlimited sub-domains
- Unlimited parked domains
- Unlimited addon domains
- Unlimited FTP Accounts
- Free online scrips like joomla. drupal, wordpress etc
- And much more features and applications
Unlimited Web Hosting Plan (Suitable for medium sized websites with moderate popularity)
You get
- Free regular domain (.com, .net, .org, .info)
- Unlimited disk space
- Unlimited Bandwidth
- Unlimited MySQL databses
- Unlimited databse space
- Unlimited emails accounts
- Unlimited sub-domains
- Unlimited parked domains
- Unlimited addon domains
- Unlimited FTP Accounts
- Free online scrips like joomla. drupal, WordPress etc
- And much more features and applications
by admin | Jul 12, 2024 | Blog News - English, SEO, Webmaster
Why optimized website photos For Good SEO? Of all reasons, alternative text that tell about the photo is highly recommended for optimal users experience. It is a good idea to link also the image text to the title of the page that host the photo. Good looking and attractive photos which are self explanatory attract many website visitors to your website and hence more leads with more sales from the website. On the other hand, bad photos chase away website visitors and hence make life more difficult. If you means business, invest time, money and skills on getting smart, good and professional photos for your website
Good photo must talk by their own. Arranged in folders with relevant keywords as folders’ names and photo names detailed with activity description.
Above all photo must meet the following attributes:
- Must be digital photos
- Must have a resolution of not less than 1024px
- Not too dark or too bright
- Must be natural photos
- Must be sharp and fine tuned focused photos
- Must be taken from professional cameras
Must be digital photos
A digital photo is not only the one in electronic form, but it must be taken by a digital camera and never scanned from the hard copy photo
Must have a resolution of not less than 1024px
The resolution can be vertical pixels of 1024 or horizontal pixels’ of 1024. We may accept photos below this range but they will be only for webpage thumbs and not gallery photos
Not too dark or too bright
This is straight clear, you’re smart photos will attract many web site visitors. Likewise bad photos will chase them away
Must be natural photos
Photo which are natural in color reflect the original object and therefore will not mislead the website visitor or customer.
Sharp and fine tuned focused photos
The texture of a good photo is fine and sharp. This attributes help viewer to note the actual appearance of the object as it look from original viewing.
Must be taken from professional and brand cameras
Professional photos are all branded photos cameras with both options, manual and automatic functions. Most cameras manufactured by not limited to Canon, Nikon, Pentax, Fujifilm, Olympus, Sony, Panasonic, Kodak, Konica Minolta, Ricoh, Leica, Yashica, Samsung, Toshiba, Lemix, Casio etc