Building a relationship requires trust, and this is much more intense in a case where both parties most likely have and will never meet. Trust on the Internet is crucial, especially if this relationship is transactional; where money is involved. Even deeper is the fact that Data is new gold, so almost everything we do online must be safe. To build this relationship of trust is not easy, but there is growing pressure on website owners to create an environment that makes their users feel safe. SSL certificates are one of the key ways to do this because they ensure that the connection they have to this site is secure.
What is a Secure Sockets Layer (SSL)
SSL is a security protocol that ensures users that the connection between their computer and the website they visit is secure. When you connect, a lot of information passes between the two computers, including sensitive data such as credit card numbers, user ID numbers, and even passwords. Under normal circumstances, this data is sent in plain text, which means that if the connection was to be intercepted by a third party, the data could be stolen. The SSL protocol prevents this by imposing an encryption algorithm that will be used during the connection at both ends.
Only our application is running on the server. The technical and hardware support is the responsibility of the hosting company from which we lease such a server, while the software configuration is entirely on our side. Our contact with the hardware is provided by the SSH service, thanks to which we can install our own operating system, software and make any detailed configurations. On this type of hosting it is not possible to install a website or application immediately. You are also provided with FTP passwords, phpMyAdmin as if we were using the cheapest shared server, and additionally access to the root.
On such a hosting you can run a large service with any functions – in fact, you can do everything that a machine connected to the Internet offers. We have full access to the hardware resources of such a computer and the only limitation for the developer is its actual hardware configuration and operator policy/regulation. The advantage of dedicated hosting is this possibility of configuration. If you want to secure it properly, you will need advanced knowledge about server administration. The stability, security and reliability of hosting depends on us.
Shared hosting is more a service than actually leasing the server from a hosting company. As the name suggests, there are several, a dozen or even several dozen applications installed on this server from different users of such hosting. This type of hosting works well as a ready-made environment for small applications of websites and stores, as well as a test environment or a server for developers (although the latter may have configuration limitations of such a server).
The advantage of this type of hosting is the fact that it is very cheap and its popularity makes this type of hosting relatively stable. The cost of such hosting does not exceed the amount of bills for the cheapest telephone subscriptions. (20,00 – 35,00 / month). An additional advantage is that if you buy such a service, you can install your website immediately. Technical support is taken care of by the hosting provider and installing the site in such an environment is a matter of just a few clicks. Everything we need is already installed. Apache server, MySQL database (there are also offers with an independent private database server), phpMyAdmin, domains are connected thanks to friendly wizards and some will add to this the possibility of installing a free SSL certificate.
The disadvantage of this solution is the lack of configuration possibilities. We cannot change the configuration of the MySQL database server or even the environmental variables in PHP. Therefore, some applications will not be able to be installed on it. The second disadvantage may be the sharing itself. If several users start to “bend” using the resources of such a server at some point, all other applications may experience a slight performance degradation. This causes such hosting to have some rigid limits only to force users to use such platform “fairly”. The cure for all of this can be the “Burst” option, which allows for temporary use of more resources than we officially have to use, protecting ourselves from blocking the site when it needs more hardware resources once in a while. Users share their IP address with each other, which is also important for SEO and security issues, but I’ll write about it in detail another time.
Encryption with SSL protocol allows to secure the transmission between the server and user’s browser. This prevents unauthorized persons, such as hackers, from eavesdropping on the transmission in the Internet and then stealing from credit cards of unaware users. In short, SSL makes the server send the encryption key, which is verified by the browser for its validity and authenticity, before the content is transmitted to the user’s browser. This initiation makes the data sent for a person without a private key useless in a client-server relationship. An additional advantage of SSL certificates is the fact that in case of a possible key leak, the certificate can be revoked. Remember that the choice of hosting is better left to the developers. Taking into account the hardware requirements for web applications is a necessary step in the design phase. Thanks to this you will not limit the development of the application and it will work as it should throughout its operation taking into account the needs of its possible future development.