Blog Header Banner

Locked out of cPanel Again? Locked out of your Web Site?   no comments

Oct 21, 2014 @ 9:01am Ask the Expert,Web hosting

cpanelAvid readers of the blog know that I’m a slayer of tickets and protector of the Turnkey Internet realm of support tickets. If you have a support need with your software that you’ve purchased from Turnkey Internet, more than likely, I will be one of the team members who works on your issue. I wanted to write you gentleman and ladies, a post on a support request I see at least once a week if not more. I will start this article off by asking one question. Have you ever been locked out of your house? You walk out the house not thinking about the door, but then you realize that you need to go back into the house to grab your keys. However, the door is locked.


What will you do? If you’re a super prepared individual, you may have a spare key laying around somewhere, but if you’re like me, this may not be the case. So, what’s next? Maybe you start thinking, “hmmmm, I wonder if I have any windows unlocked?” You walk around the house hoping, praying, that you have a window unlocked. You soon discover, that you’re a very safety conscious individual and all of your windows are locked? Well, what do you do now? You have no spare key. No windows are unlocked. While that rock on the ground could easily go through the window, do you really want to pay money to get the window repaired?


This usually leaves you with no other option then contacting your local locksmith. Pay the ridiculous amount to have them drive out and let you back into your house in a matter of minutes. Now, what if that happens on your server? For the sake of this article, we will assume you have a server, VPS/Dedicated/Cloud, that has cPanel installed. You haven’t changed the password, but all of a sudden you can’t login to your cPanel or WHM anymore. What do you do? Well, if you purchased your services from Turnkey Internet, the quickest way would be to open a support ticket and have one our engineers allow you back in, but what if you’re a do it yourself type of person? Is there a back spare key you can use?


Now, just to be clear, I’m not talking about not being able to view your site in a browser, but specifically about your cPanel password, that you’ve not changed, no longer working. You may get the first thought that, holy crap, my account has been hacked. Someone has stolen my password and is slowly but surely stealing all of my data. While yes, this could be a possibility especially if you have an insecure password, e.g. CAT123, but what if you have a secure password. A 12 character password. It’s more less likely that your cPanel password has been stolen and more likely that you’re locked on our your account by cPHulk.


It’s very possible that you’ve heard of cPhulk before. For those of you who haven’t, the link below will explain exactly what cPHulk is:


cPhulk is a brute force protection software that is installed by cPanel by default. This little piece of software constantly monitors the server to ensure no one is brute forcing their way into your server. For users who do not know what brute forcing is, please see the link below:


To summarize that link, brute forcing is when a hacker tries every iteration possible to login to your account. They start with a dictionary of commonly used username and passwords and attempts to login to your account with each one. This is called a brute force attack and is what cPHulk is written to protect against. However, cPHulk can be a bit over zealous at times and end up blocking you out of your own accounts. So, how do you fix?


This fix assumes that you have root access to the server and a SSH client such as Putty to access the server.


  1. SSH to your server
  2. Type mysql
  3. Connect cphulkd;
  4. Delete from brutes;
  5. Delete from logins;


That will clear all IP’s currently blocked on the server and allow you to login to cPanel/WHM. At which point, you can go to Security Center -> cPHulk Brute Force Protection  and white list your own IP to keep this from occurring in the future. You’ve essentially just become your own cPanel locksmith. If you’re still having issues, you can always open a support ticket with us directly at:


Until next time…

Written by Jeremy on October 21st, 2014

Tagged with , , , , , ,

Colocation : Leveraging the Benefits of The Cloud With the Security of Owning The Infrastructure   no comments

Oct 14, 2014 @ 9:02am colocation,turnkey cloud

turnkey-internet-datacenter-pod-technology-colocationJeremy here again and this week we will be covering one topic: Colocation.


Have you ever heard of collocation? Did you know it is a GREAT way to grow your business whether a small or large business. You get the benefits of the Cloud, along with the performance and security of having your own servers, vpn devices, firewalls and infrastructure.  Before we delve too far into this topic, lets first define what collocation actually is. Directly from our friends over at Wikipedia:


colocation centre or colocation center (also spelled co-locationcollocationcolo, or coloc) is a type of data centre where equipment, space, and bandwidth are available for rental to retail customers. Colocation facilities provide space, power, cooling, and physical security for the server, storage, and networking equipment of other firms—and connect them to a variety of telecommunications and network service providers—with a minimum of cost and complexity.


You can read the full article at: To sum up colocation for you, collocation is when you use a datacenter to house your servers. This could be one server all the way up to a full rack of servers. Here at Turnkey Internet, we have several clients who lease several racks from us that house their entire IT(Information technology) department. Now, you may be wondering, how will this help me to grow my business? I feel the best way to answer that question is to list some of the benefits of collocation. I will then delve into a few of the benefits to show you would reap rewards from colocation


  • A predictable and operation expenditure model
  • Better access to space and power
  • Integrated, advanced components
  • Cutting-edge security system including lockable racks
  • Network connectivity
  • Cooling
  • Real-time live monitoring
  • 24/7 monitoring by engineers


Now that we’ve listed some of benefits, lets delve a bit deeper into a few of the benefits beginning with:


A predictable and operation expenditure model


When you have a small to medium size business chances are, you can’t afford to spend large quantities of money on your IT infrastructure. This could be everything from hiring a full-time IT engineer to setting up your own network infrastructure. The prices you would pay could exceed what you have budgeted for your business. For example, one of the most expensive items with owning a datacenter or housing your IT department will be the power. The power that each server uses. The power to keep the servers running 24×7. The power needed to run a generator or battery backup in case your office encounters a power failure. Power is just one example to use, but I used power to show that you may not know the amount per month you will be spending on just power alone. Factor in setting up redundant network, bandwidth pricing or the amount you have to pay your IT engineer to keep it running and your business could be looking at well over 6 figures.


This is where a major benefit of collocation stems from. You can sign up for a collocation contract at Turnkey Internet and receive one flat rate for all of those items. Your bill per month would be predictable as you would know each month how much you’re going to be paying to run your IT department. Colocation takes a lot of the variability out of the equation


Better access to space and power


Quick, does your office or business currently have enough space within it to run your IT department? Keep in mind that you will need ample space for the servers themselves. You will also need ample room to bring power into your business to run the server. Don’t forgot about cooling, batteries and a plethora of other options you will need to run your IT department. Do you currently have enough space in your business for those services? If not, collocation could be a great option as all you would need to is send your server into the datacenter. They will take care of spacing and power needs. You wouldn’t have to worry about your office overheating from 20 servers running and not enough room to disperse the heat. You could also include this under cooling.


Network connectivity


One of the biggest costs in running your IT department in house are the costs associated with keeping your network at 100%. This may seem like common sense since you’re running a business on the internet, but are you aware of how often your network can lose connectivity? This can be caused from a faulty network cable all the way to a full scale DDOS attack. Please see previous blog posts to learn about DDOS attacks. When an attack or faulty cable goes down, you entire business can become crippled. How will you send email? Is your site still online? Can you communicate with your customers? Most people only worry about these type of things when they can no longer use them, however, as a business owner, you do not have that luxury. You have to stay on top of your network to ensure that you’re able to connect with your customers and vice versa. While yes, you could do this yourself, but what if you’re not a fully qualified network engineer? Will you know all of the items you will need to keep your network secure and stable? This is where collocation comes into play. Since you’re paying a fee to collocate your server, network connectivity is taken care for you. Highly qualified network engineers will constantly monitor your network for any connectivity issues and remedy them should the need arise providing you with peace of mind


Listed above are just 3 GREAT reasons that collocation may be an option for your business. It will help streamline your business and provide you with piece of mind that your IT department is being handled by professionals. You can see our current collocation offers at: While this is by no means an all inclusive list of the benefits of collocation, it should at least provide you with a starting point to determine if collocation is right for your business


Until next time…




Written by Jeremy on October 14th, 2014

Tagged with , , , ,

Network Security – Does It Matter If I’m In The Cloud?   no comments

Oct 7, 2014 @ 9:09am internet security,turnkey cloud

network-security-in-the-cloudJeremy here again with another post for you this week. Today, we will be covering security. Namely, network security. Now, if I ask you, what exactly is network security, what would your answer be? If you’ve been in the hosting industry or Information Technology field for extended period time, you have no issue answering that question. However, for most readers, they may not be 100% certain on what exactly a network is and how it affects your hosting. For this article, lets first start with what exactly a network is in terms of your website and then we will get into securing that network so without further ado…


What is a network?


If you’re reading this article, more than likely, you’re on a computer connected to the internet. The computer that you’re reading this article on is more than likely in a local network. Before we get too carried away, lets define what a local network is. Directly from our friends over at Wikipedia:


A local area network is a computer network that connects computers within a limited range such as homes, schools, libraries or office building. To ground the idea further in your mind, lets say that you have purchased a desktop PC, a laptop and have a cellphone from your local electronics store. You also purchased a router as well. Your router is a piece of networking technology that creates a local area network for your home and then allows you to connect to the internet. When your devices connect to the router, it places them into a local area network. This allows the devices to communicate with one another. It also allows them to communicate with the rest of the world via the internet.


You have different types of networks such as a WAN or Wide Area Network. This network is a much larger type and usually covers broad areas such as a college campus or metropolitan area. Now you may be asking, what does this have to do with my website? Well, glad you asked. You see, when you purchase hosting from Turnkey Internet, you’re paying to host your site on our network. This is what people generally mean when they purchase hosting. They are paying a provider to be included in their network and give their website a home.


As you have already gathered, if something was to go wrong with the network, your site may go off-line. This leads us to our next topic


Why do I need to secure my network?


If you are hosting in the cloud – you still connect over your network.  While cloud hosting from Turnkey Internet lets your be assured that your site is on a network that has multiple layers of network security, however, this article isn’t about securing our network at Turnkey Internet, but how you can take some preventative steps to secure your own network. Maybe you have a dedicated server and you’re managing the server yourself. Knowing how to secure the network your server is located on goes a LONG way to ensure you’re providing your customers with a top notch website.


You may thinking, well what do I need to protect my network from? Many network security threats spread over the internet with most common including:


  • Viruses, worms and Trojan horses
  • Spyware and Adware
  • Zero-day attacks
  • Hacker attacks
  • Denial of service attacks
  • Data interception and theft
  • Identity theft


While this is no way an all inclusive list, those items listed above are the most common type of network threats you will find on the internet. Now some of those attacks have to be mitigated at network level such as Denial of Service attacks. You can read about denial of service attacks below:


Some of the other network attacks you can help mitigate at a server level which you can read about below


How do I secure my network?


In order to truly secure your network, you must understand that there is no one single solution that will protect you from every threat listed above. In fact, a highly secure network has multiple layers of security. If one layer fails, another layer just takes its place. Network security is best accomplished through hardware and software.  The software should be updated in regular intervals to ensure that you’re running the most up to date version. Ideally, a network security system will contain many parts with all parts working together.  This helps to ensure maximum security and minimize maintenance and improve security.


Your most common type of network components are listed below:


  • Anti-virus software
  • Malware detection
  • Firewall that blocks unauthorized access
  • Intrusion prevention systems that will identify fast spreading threats such as a zero day attack
  • Virtual private networks(VPN) setup to provide secure remote access


If you have a few or all of those components working together, you will help ensure your network remains stable. Effective network security targets a variety of threats and stops them from entering or spreading through your network. This will protect the usability, reliability, integrity and safety of your network and data.


Here at Turnkey Internet, we have multiple layers of network security. From our DDOS protection system which monitors our entire network and instantly notifies us of a DDOS attack. We also install and configure firewalls on all of our shared servers. We run daily malware detection scans as well as constantly update software to ensure we’re protected from the latest threats. Doing these things helps us to provide a secure and reliable network for all our customers. It may be time you invested in your own network security.


Until next time…

Written by Jeremy on October 7th, 2014

Tagged with , , ,

Is your wordpress web site under attack? Over 90,000 hacker bots may be knocking on your door!   no comments

Sep 12, 2014 @ 9:50am Web hosting

wordpress-site-attackHowdie do Turnkey Lovers,


I have a quick question for you, have you ever heard of wordpress? My guess is since you’re reading this blog, you’ve heard of wordpress any may even be using on your own website, but for those who are first time readers, I will give a brief overview. Here is a quick overview from


WordPress is web software you can use to create a beautiful website or blog. We like to say that WordPress is both free and priceless at the same time. The core software is built by hundreds of community volunteers, and when you’re ready for more there are thousands of plugins and themes available to transform your site into almost anything you can imagine. Over 60 million people have chosen WordPress to power the place on the web they call “home” — we’d love you to join the family.


WordPress is one of the most popular site building pieces of software currently on the internet. Sure, you have Joomla which is almost the same as wordpress, but has slight differences with its configuration. For this article, however, we will be focusing purely on wordpress. As you can see in the overview above, over 60 million people have chosen to use wordpress  which is quite a large pool of users on the internet. Now, what if someone decided to launch an attack on wordpress based sites? They would have a pretty large base of users to attack and could affect hundreds or possibly, thousands of websites. Well, this attack has already happened and still running at this very instance.


On an off for the last few months, A botnet of over 90,000 machines, has been attempting to globally brute force and hack into wp-login.php which is the file that WordPress users use to login to WordPress. The attack is sending thousands of requests at one time to attempt to login to your WordPress installation via wp-login.php in an attempt to gain access to make it part of the growing botnet. To shed some light on what a bonet is, directly from Wikipedia:


botnet is a collection of Internet-connected programs communicating with other similar programs in order to perform tasks. This can be as mundane as keeping control of an Internet Relay Chat (IRC) channel, or it could be used to send spam email or participate in distributed denial-of-service attacks. The word botnet is a combination of the words robot and network. The term is usually used with a negative or malicious connotation.


Well, you may be wondering, if I have a site on a server with Turnkey Internet, how are my sites being protected?  Since day 1 of the wide scale attacks,  we’ve enabled a server wide ACL that blocks all access to wp-login.php unless the IP is whitelisted. This ACL or access control list, keeps the attack at bay. Due to the fact that the botnet is targeting wp-login.php directly, we can deney all access to users we specifically allow. When the attack runs, our servers return a 403 page and the attack moves on. You may be saying, “Sure, that works, but is there anything that I can do as a client on my end to help relieve the attack?’


Listed below is the recommended code that you add to your sites .htaccess file in your public_html folder to add an extra layer of security (you’ll need to edit ‘’ to be the domain you are setting it up on):


<IfModule mod_rewrite.c>

RewriteEngine On


RewriteCond %{REQUEST_URI} .(wp-comments-post|wp-login)\.php*

RewriteCond %{HTTP_REFERER} !.** [OR]

RewriteCond %{HTTP_USER_AGENT} ^$

RewriteRule (.*) http://%{REMOTE_ADDR}/$ [R=301,L]



This in conjunction with our ACL will prevent the attack from affecting your site(s).


Additional recommendations:

-Changing your default admin username for wp-admin to a different username as the attack is specifically targeting the admin username.


-Placing a browser-based password on wp-login.php


The link immediately below will explain how to do this:


Additional information about the attack can be found here:


Using the tips we’ve provided above, this will help to keep the attack from affecting your site. It will also increase the security of your wordpress based site as well. We hope this will help all clients and not just those at Turnkey Internet, but any client globally who may be having issues with the wordpress attack on their sites.


Until next time

Written by Jeremy on September 12th, 2014

Tagged with , , , , ,

DNS – The Domain Name System And The Cloud   no comments

May 26, 2014 @ 9:25am Web hosting

Howdie do Turnkey Lovers,


For this article, I thought I would take you a little into my world as an engineer/technician at Turnkey Internet. Before we begin, as usual, I like to ask you a question. Today’s question, “What is DNS?” It seems that every day I speak with a client about this mysterious creature named DNS. Most people I speak with either fall into 2 categories:


  • People who know what DNS is
  • People who do not know what DNS is


In this post, we’re going to deal with people on the second bullet point. To begin, we first must get the technical jargon out of the way before going any further. The worse is when you’re reading a post and the author is using acronyms that you do not know what they stand for. I’ve been guilty of this already in this post and should clear it up before moving forward.


DNS stands for Domain Name System. DNS (Domain Name System) is a naming system for computers, services or any resource connected to the internet. It translates IP addresses to a domain name. For example, would translate to To see this for yourself, open a web browser and enter in the address bar, Go ahead, I will wait.


Our main website,  should of immediately opened in your web browser. That in a nut shell is what DNS is and does. Now, let’s see if we can delve a little deeper into on how this works. I’m a big believer in using real world examples to teach different concepts. Not everyone can visualize an IP address, but what about your mailing address? Or the cross streets that you may live on? Are you getting the theme here? To help you understand exactly how DNS works, let’s use the real world example of driving to your friends house


For this example, let’s say you received a phone call from a buddy who said to swing on by to his/her new place for a house warming. Your friend has just recently moved. Now, how do you find him? You would need some piece of information that would allow you know which house is your buddy’s house. This piece of information would be the mailing address. Using the mailing address, you can enter your buddies address into a GPS(Global Positioning System) and be navigated directly to the house warming. The mailing address or your home address would be the equivalent of your IP address. Your IP address on the internet is where your files reside that display your website.


You may be saying, “Yes, that’s pretty clear, but you said DNS converts an IP to a domain name. What does my mailing address have to do with that?” In order to answer that question, we must first ask, how do you get your actual mail delivered? I’m talking about the mailman walking to your home and placing bills into your mailbox. How does the mailman know where to go? Sure, he has your mailing address, but where is that information stored? If you guessed the Post Office, you would be correct.


Let’s say someone writes you a letter and drops it off at the post office. Post office workers look up your name in their system to find your mailing address. The letter is then given to the corresponding mailman to be delivered to your home address. This is what DNS does in a nutshell. You sign up for a domain name which you purchased through TurnKey Internet. The place you just purchased the domain from is your registrar which means they registered your domain name in their system. This process is of registering your domain in their system is what keeps other users from being able to buy your domain. In our example above, the post office would be the registrar. You registered your home address with the post office so when someone drops a letter off a the post office, the mail can be routed to your home via mailmen.


This is what name servers do. After purchasing a domain from a register, such as TurnKey Internet, you create name servers at the registrar to inform the rest of the internet where your website resides. Much the same way the post office uses mailing addresses to deliver mail to your home.


You see, when you view items in real world scenarios, it can help to shed some light on concepts that you may not fully understand such as DNS. There are more avenues that you can take with DNS, but the general method is still the same.


For example, let’s say you move your website to a different host, you would need to update your registrar with the new name servers to point to the new location for your site. It’s the same as when you move to a new home and have to request a change of address from the post office. The post office then updates all its files and records to reflect the new address. This could include sending your new address out to businesses that you’ve dealt with as well. The rest of the world has to be updated to your new address. On the internet, this is what is called propagation. It’s when your new name server and IP information are updated across the internet so that everyone knows where your new site resolves after changing hosts. This can take 24 to 48 hours


Well, I hope that helps to clear up some confusion on this matter. I didn’t include too much technical jargon as this article is more about getting you to understand how DNS works at a very high level. I hope with this information, it will help you to better understand how the DNS works and how your hosting works here at Turnkey Internet.



Until next time


The Great Google Update (lions, tigers, bears, and panda’s oh my!)   no comments

May 14, 2014 @ 9:21am Web hosting

Google-Panda-and-PenguinHowdie do Turnkey Lovers,


I have a quick question for you. When you think of Google, what is the first thing that comes to mind? If you’re like most people, the first thing may be Search engine or Gmail. For the purposes of this post, we will focus on the search engine aspect of Google. Now, when you think of panda’s, what is the first thing that comes to your mind? Is it a cute, loveable creature that is known for eating bamboo. Bamboo being the favorite food for pandas. My last question is, how are these two items related?


Do you feel you’re back in high school yet with the metaphors and pandas? If you haven’t figured it out yet, what pandas and google search have in common, I will help you a bit. When you go to Google and enter a search term, you’re immediately greeted with a page that shows the sites that could match the query you’re looking for. The pages are listed in a ranking. With the 1st site being the most likely result to match your query and the last result, being the furthest away from your query


You’re probably saying, “Hey, I know that. I know that Google ranks sites. What does this have to do with pandas?” Well my friend, did you know that the algorithm used to rank sites is called Google Panda? I bet you thought I was never going to connect Google with pandas :)


Google has recently released a blog post that shows that the Google Panda algorithm has been officially patented which you can read about here:


However, this article isn’t about that update. This article is about Google Panda’s update that is being released to help smaller businesses to gain better rankings. You can read about it here:


You may be wondering, what does this have anything to do with Turnkey Internet and how does this affect my hosting? I would ask you back, would you like your site rankings increased? Have you ever wondered how sites are ranked so high in Google? Well to answer those questions, we must first delve a little deeper into what Google Panda actually is.


Google Panda was introduced in February 2011. The algorithm was released to help deal with low quality sites or thin sites. These are sites that you visit and are just flooded with advertisements when you view the site. It could be scrolling down the site or clicking a link and you’re instantly bombarded with advertisements. Google in 2011, wanted to fix this by creating an algorithm that would check sites content and rank those higher on in search results. This is what is known as Panda.


Several iterations of the algorithm have been released since its inception in 2011. These revisions were set to increase scrutiny and make it harder for sites to command the first page of site rankings. However, at times, this became to stringent for small businesses. A small business site may not have content that is updated every day. They may only update their sites once a week for a new special.


This resulted in some legitimate sites being listed lower on Google as smaller business may not have the funds to purchase additional resources to increase their page rankings. With this new update, Google is promising to help smaller businesses have high ranking sites within the Google databases. Google did do a softer update last year in July to help in this aspect as well which you can read about here:



Now, you may be saying, how does this affect me? Well, I you’ve been working on improving your site ranks for your business, Google’s new Panda update will make it easier for you. You just need to ensure that you’re following some basic guidelines:


  1. Make sure you have valid site content
  2. Make sure you have valuable keywords that relate to your site throughout the page
  3. Try to use “pretty” links instead of long, hard to deciper links. E.g instead of
  4. Try to develop some content on the site even if it’s a weekly update that shows your new specials


There are many other options that you can take, but knowing that Google is updating Google Panda to help smaller businesses get better page rankings is a welcome update in many our eyes here at Turnkey Internet


Until next time Turnkey Lovers

Earth Day Means Thinking about the Earth and being Green Every Day   no comments

May 8, 2014 @ 10:49am green,Web hosting

turnkey internet greend datacenterHowdie do Turnkey lovers,


Do you ladies and gentleman know what Tuesday, April 22nd 2014 is all about? Don’t worry, you don’t have to pull out your almanac or open Google to find what’s so special about, Tuesday, April 22nd 2014. The day was EARTH DAYYYYY!!!! Ok, you may not be as excited as I am about Earth day, but it’s a day that is lauded as the day for the environment.  This could be going out to help with cleaning up an old playground or maybe picking up trash on the side of the road. Literally, anything that is good for the environment is appreciated on this day. Hey, you may even find your garbage man may have a little bit of pep to his or her step.


Ok, ok that may be a bit overboard about the garbage man, but it is a day where support for environmental protection is at an all time high. Now, you may be saying, “This is a webhosting company, why do they care about Earth Day?” Well my friend, almost every day at Turnkey Internet is some form of Earth day. How? How can everyday at Turnkey Internet be a version of Earth day? Well to answer that question, I  must first ask a question back to you


  1. Do you have electricity in your home/workplace that you used to view this post ?


Those are pretty straightforward questions, right? They may even seem redundant as since you’re reading this post, you should have some form of electricity powering the machine you’re viewing this post on and more than likely, that machine is a desktop or laptop. You may be saying, “Yea, so what? What does this have to do with EarthDay and Turnkey Internet?”


That form of electricity is more than likely from a fossil fuel. What exactly is a fossil fuel? A fossil fuel is a fuel that is formed by natural processes such as coal. Using these type of fuels can lead to all sort of environmental issues such as Greenhouse gases being released into the environment. These gases can result in harmful effects to the environment and the people within it which results in a higher carbon footprint. You can read more about forms of electricity and fossil fuels here:


The reason I’m even mentioning this is because technology has reached a point in time where different forms of electricity can be created. These different forms can be any of the following listed below and many others:


  1. Solar power – converting energy from the sun to electricity
  2. Hydroelectric Power – Converting energy from water to electricity


Now both of these forms of power conversion each have their pros and cons, but they also have one thing in common: a zero carbon footprint. What exactly is a zero carbon footprint? The Zero Carbon Footprint is the measure of the amount of green house gases produced by burning fossil fuels. The higher the footprint, the worse for the environment. How does this factor into Turnkey Internet? Well, we utilize both, solar power and hydroelectric power, within our datacenter.


On top of our building, we have many different solar panels that convert solar energy directly to electric power to power the datacenter, but not only that, we also receive power from Niagara Falls that directly power the datacenter as well.


That means that our datacenter currently has a zero-carbon footprint which is the most effective way to ensure you leave a good mark on the environment. Every day when I walk into work and look at our datacenter, it makes me proud to know that we’re not damaging the environment. That we are helping to sustain the environment  by using outside of the box methods to power the AWESOME datacenter that is Turnkey Internet.


You can read more about our forms of power at:


Since it’s Earth Day, I wanted to bring light to the effectiveness on our power consumption at Turnkey Internet.


Until next time

Written by Jeremy on May 8th, 2014

Tagged with , , , , ,

Secure Virtual Desktops!   no comments

Jan 30, 2014 @ 2:08pm Web hosting

I was recently asked by a potential client in the financial services field if we had the ability to provide them with a safe and secure virtual desktop platform for some work-from-home staffing they were about to setup. My response of course was that we could provide a secure platform that will have multiple layers of security and further explained how you could go about this.

Anytime you have remote staff logging into a corporate environment with devices other than those supplied and locked down by that particular company’s IT department, you need to be sure the connections will be secure. In this case it would be remote users logging in from their home computers,   so you have to be sure the Virtual Desktop deployment would be setup utilizing multiple layers of security in the following manner.

The first layer of security entails locking down the virtual desktop itself to restrict the ability of the users by properly setting the permission levels to avoid downloads to the desktop that might cause it to be compromised. Secondly to ensure you have a secure connection, a VPN tunnel should be setup between the Home PC, Mac, Thin Client, iPad or Tablet and the URL assigned as the login to the Virtual Desktop. This will provide you with a secure encrypted connection between the two.

Virtual Desktop Security

As you can see in the schematic by setting up an SSL Certificate on the login page, an additional layer of encryption would then added. Once you are have secured the login page each user should login with credentials complete with a minimum of 12 character alpha numeric passwords. Once the username and password are accepted the connection protocol begins utilizing another layer of encryption to connect to the Virtual Desktop. Now finally you have entered the virtual desktop environment that should be hosted in an SSAE 16 Certified data center which ensures the facility is compliant to host secure infrastructure. From this vantage point the computing as well as the connection protocol is completely secure with three layers of encryption and ready to transfer any type of protected data staff would then have access to.

Virtual Desktops are becoming the standard for many types of industry verticals and organizations. The key reasoning is security, accessibility and mobility. You can setup connection protocols from just about any device capable of accessing the internet. Your information and data always stays in the data center and is not available on your local device unless you are connected. Therefor if your laptop, tablet or smartphone is ever lost or stolen your data would never be compromised.

For more information on Virtual Desktops and Hosted VDI please visit

Written by Tim Kirsch on January 30th, 2014

Tagged with , ,

TurnKey Internet launches cloud based hosted server reseller platform   no comments

Jan 30, 2014 @ 12:06pm turnkey cloud

cloud-serverLATHAM, NEW YORK (January 30th, 2014) – Sustainable IT solutions provider TurnKey Internet, Inc. announced that it has launched their all new cloud server reseller platform targeted at channel partners, IT service companies and cloud based service providers. 


For more information please see


TurnKey’s cloud server reseller platform allows access to a fully automated white-labeled product line of enterprise-class cloud-hosted servers featuring over 100 pre-loaded Microsoft Windows Server and Linux Server template choices hosted on the world-class platform within TurnKey Internet’s SSAE 16 Type 2 and ENERGY STAR® certified datacenter in New York. 


The new cloud server reseller platform offers channel partners the ability to establish a reseller channel and address the hosting needs of a wide range of customers across different markets without having to build and deploy their own cloud-based infrastructure.  Resellers are given access to a fully automated web interface to manage their clients by allocating resources such as virtual servers, ip addresses, bandwidth, memory and disk space as well as the ability to select from multiple operating system templates.


 “TurnKey has always derived a significant portion of its business from channel partners,” said Adam Wills, CEO of TurnKey Internet.  “We have been focused on expanding offerings that resonate within the channel partner community, and are pleased to release our new cloud reseller platform allowing complete white-label access to provision and manage cloud-based servers on our existing enterprise based TurnKey Cloud platform.”.


The new cloud server reseller platform lets channel partners, web designers, web resellers and IT companies offer enterprise class cloud based servers without any cost investment.  Resellers can set their own prices, server plans, and bundle the cloud server offering with their own unique services to create a unified cloud-based offering to their clients.


About Turnkey Internet

Founded in 1999, TurnKey Internet, Inc. is a full-service green data center and leading provider of sustainable web hosting and IT solutions. From its SSAE 16 Type 2 and ENERGY STAR® certified facility in Latham, NY—New York’s Tech Valley Region—TurnKey offers web hosting, communication services, web-based IT systems, software as a service (SaaS), enterprise colocation services, and computing as a service to clients in more than 150 countries. For more information, please call (518) 618-0999 or visit

TurnKey Internet’s green data center wins New York State Environmental Excellence Award   no comments

Dec 11, 2013 @ 11:41am Announcement,green

The award from the New York State Department of Environmental Conservation recognized TurnKey’s innovative facility design and outstanding commitment to environmental sustainability, social responsibility and economic viability

LATHAM, NEW YORK (December 11, 2013) – Sustainable IT solutions provider TurnKey Internet, Inc. announced that it has been awarded the 2013 Environmental Excellence Award by the New York State Department of Environmental Conservation for TurnKey’s work on transforming a vacant, former post office building into one of the nation’s leading high-tech, sustainable data centers.


The award from the New York State Department of Environmental Conservation recognized TurnKey’s innovative facility design and outstanding commitment to environmental sustainability, social responsibility and economic viability.  Turnkey’s  innovative green data center sets a benchmark for the data center industry through use of ultra-efficient cooling, unified power systems and renewable energy sources that create a carbon neutral facility.



TurnKey’s sustainable data center includes a roof-top solar array, backed by hydro-electric renewable power sources and cutting-edge cooling technologies that minimize energy consumption.   TurnKey’s green data center is one of only two ENERGY STAR® certified data centers in New York and one of just 39 in the United States.


In recognition of their commitment to the environment, TurnKey Internet has seen several prestigious titles and certifications this year including the United States Environmental Protection Agency (EPA) officially naming its Latham, New York facility an ENERGY STAR® certified data center.  In April, the company announced their implementation of the New York State Governor’s ReCharge New York hydroelectric power system. This, combined with the solar power the facility generates on site, allowed them to achieve a zero carbon footprint. Additionally, they announced their SSAE 16 Type 2 security certification earlier in the year.


“We are honored by New York State’s recognition of our facility and our ongoing commitment to sustainability,” said Adam Wills, president and CEO of TurnKey Internet. “Data centers are massive power consumers, and the industry as a whole is expected to be larger polluters than the airline industry by 2020. TurnKey has created a zero carbon foot print facility and a working blue print for ultra-efficient data centers that we hope will be adopted by other facilities across the globe to help create a sustainable environment.


 IMG_2242About Turnkey Internet

Founded in 1999, TurnKey Internet, Inc. is a full-service green data center and leading provider of sustainable web hosting and IT solutions. From its SSAE 16 Type 2 and ENERGY STAR® certified facility in Latham, NY—New York’s Tech Valley Region—TurnKey offers web hosting, communication services, web-based IT systems, software as a service (SaaS), enterprise colocation services, and computing as a service to clients in more than 150 countries. For more information, please call (518) 618-0999 or visit