Please wait

Enterprise server monitoring

Sponsored links
Web server monitoring tools for dedicated, cloud dedicated and virtual server. Website uptime monitor for enterprises, attorneys and online stores. Cloud based remote network monitoring software for everyone. 5-minute setup - our uptime monitor can serve as a professional alarm for websites. This website uptime monitoring service can watch your website every minute of its life, giving you complete overview of uptime : your website, uptime of your network, monitor of your ISP (internet service provider). You can set up server monitoring of your services in as low as 1 minute intervals, where you pay just for consumed ping requests to your website, not fixed fees as you used to be.

Sign up now

By signing-up I agree with your terms

338 IP addresses tracked
486,720 pings / day
91 server outages today

Professional server monitor is a service for monitoring of cloud application servers, hybrid cloud server or dedicated, private servers. Even if you are running your private cloud server, this tool can help you to achieve better results while creating a backup solution of your private cloud. can serve well for website owners, where our uptime monitor can serve as a professional alarm for websites. This website uptime monitoring service can watch your website every minute of its life, giving you a complete overview of uptime: your website, uptime of your network, monitor of your ISP (internet service provider). You can set up server monitoring of your services in as low as 1-minute intervals, where you pay just for consumed ping requests to your website, not fixed fees as you used to be.


Cloud server hosting

We can offer years of experience with cloud-based server hosting as well. What is the difference between classic dedicated server hosting, compare to cloud servers? The largest difference is immediate availability. Today, everything is very fast. It does not matter if you need Linux-based cloud hosting, or Windows-based (cloud servers provide the same choices as currently dedicated companies). The biggest proof of cloud-based hosting is the speed of delivery. We have partnered with the biggest players in cloud services, and so we can provide you excellent services when creating private cloud environment. Our customers usually say that the largest impact of moving to the cloud is spinning a new server instance in a matter of minutes, without the need to go physically anywhere. Our company can prepare you detailed cloud hosting pricing plan, so you can achieve higher price effectivity, compared to your current dedicated server based hardware costs. Cloud services can be significantly cheaper, than you current hardware, when used properly.


Is your site up or down?

This tools allows you to easily test, whether your website is up or down.


Compare Web hosting plans

We are monitoring services of our clients. We took the most used web hosting plans, converted their prices a merged it all into one, readable table.

Hosting CompanyPlan name
Price / mo


fluidhosting.comValueRUB721 500GB7.5GB99.526%
Description: create cloud server, cloud based server hosting, cloud application server
onlineustaad.comUnlimitedRUB173 UnlimitedUNlimitedPakistan Pakistan99.204%
Description: ruby server monitoring, gfi server monitor, wow mop private server
Webspace4AllBusinessX IIIRUB5,657 204800 MB150.00GBGermany Germany99.713%
Description: cloud based server backup solutions, server monitoring tool, cloud hosted servers
a-tech.comStandardRUB859 50GB5GBUnited States United States99.295%
Description: online server monitor, dedicated server with cpanel, create a cloud server
hostalite.comBasicRUB288 4GB500MBUganda Uganda99.118%
Description: dedicated server hosting australia, cloud based server backup, server backups
webbangladesh.netSilverRUB58 1GB1GBBagladesh99.877%
Description: server monitor android, raid server recovery, sql server recovery
netcup.deWebbaukasten XLRUB1,020 Unlimited250GBGermany Germany99.494%
Description: cloud backup services for servers, server monitoring cloud, windows server monitoring tools
web4u.czKompletRUB1,032 50GBCzech Republic Czech Republic99.031%
Description: exchange server monitoring, windows server recovery, server monitoring
3ix.orgExiteRUB69 100Gb40GBSingapore Singapore99.97%
Description: running wordpress on windows server, linux server monitoring, windows 2008 server backup
WebDynamicH100RUB865 1000 MB100 MBAustralia Australia99.895%
Description: cloud file servers, sql server backup strategy, small business server backup solutions
insiderhosting.comPersonalRUB576 10GB1GB99.29%
Description: systems management server, windows cloud servers, cloud backup servers
Net-Spacy IT-Services GmbHOwnCloud LRUB1,063 Unlimited100GBGermany Germany99.819%
Description: best server backup solution, server cloud canada, cost of cloud server
dihost.netBasicRUB135 Unlimited100GBAustria Austria99.476%
Description: back up servers, server on cloud, cloud server setup 5GB20GBSingapore Singapore99.466%
Description: cloud server host, cloud server services, server disaster recovery
infrenion.comEnterpriseRUB403 UnlimitedUnlimited99.245%
Description: how to backup server, performance monitor windows server 2008 r2, monitoring server performance
Digital PacificBusiness BasicRUB859 20000 MB2500 MBAustralia Australia99.365%
Description: online server backup solutions, monitoring server software, cloud vs server
tecsolutions.comStarterRUB127 25GB1GBNigeria Nigeria99.452%
Description: server image backup, sql server backup table, cloud virtual servers
SynServer - Powered by Plusserver AGHost BasicRUB709 Unlimited4GBGermany Germany99.982%
Description: cloud server solutions, window server backup, cloud backup for servers
Aztech NetworksBusinessRUB1,057 10000 MB1000 MBAustralia Australia99.349%
Description: hp server monitoring software, australian dedicated server hosting, servermonitor
adeska internet lösungenadeska//web 100GB ÖkoRUB1,204 Unlimited100GBGermany Germany99.107%
Description: server network monitoring software, windows server 2003 installation, server network monitoring,035 200GB30GB99.108%
Description: server backup system, online server backups, cloud based mail server
olm.netStarterRUB225 Unmetered5GBUnited States United States99.493%
Description: online server backup, windows server backup system state, cloud plex server
cirrushosting.comPersonalRUB571 50GBUnlimitedCANADA99.882%
Description: cloud server provider, server monitoring dashboard, simple server monitoring
Red RookStarterRUB634 Unlimited10 MBAustralia Australia99.87%
Description: cloud servers reviews, server 2008 image backup, sql server with check option
Profihost AGxt:Commerce HostingRUB2,109 Unlimited8GBGermany Germany99.692%
Description: backblaze server backup, creating a cloud server, web server monitoring tools
tierra.netEmail OnlyRUB285 0500MB99.379%
Description: cloud server costs, windows server 2003 group policy editor, best server backup
anixhost.comBasicRUB225 UnmeteredUnlimitedUnited States United States99.039%
Description: cloud backup server, datacenter server architecture, online backup servers
hostmydomainnow.comDeluxeRUB576 50GB15GB99.588%
Description: server backup tools, server cloud, server performance monitoring
InternodeStatic WindowsRUB576 500 MB10 MBAustralia Australia99.73%
Description: web server monitoring, build a cloud server, windows server 2008 system restore


Web Hosting Company Directory


Resize large images on Linux – recursive

Sometimes, we are in a situation, when client wanted to host his website under our environment. Our needs are that website must not use nearly unlimited files. In days of heavy-pixel cameras, it is not a problem to see images with 50+ MB images in size, which may cause many problems. Probably the worst is using hard drive space, followed by a need to backup insanely large directories, which takes time, and may harm another websites on the same server due to high load during backup. That’s why we use this script below, which use BASH combined with PHP functions, to check all client’s websites, and resize images, that are insanely large in size.  You can change any parameters as you need, of course you need approval from your clients to change their image size on-the-fly. By resizing images once, their CMS systems does not need to create thumbnails on user access, so even their webpages are loaded much faster (at least on the first page load or website recaching).


function getDirContents($dir){
    $results = array();
    $files = scandir($dir);

    foreach($files as $key => $value){
        if ($value=="..") {
        } else if ($value==".") {} else if(!is_dir($dir. DIRECTORY_SEPARATOR .$value)){
            $results[] = $value;
        } else if(is_dir($dir. DIRECTORY_SEPARATOR .$value)) {
            $results[] = $value;
            getDirContents($dir. DIRECTORY_SEPARATOR .$value);

function processFile($file) {
    if (substr($fs,-4)==".jpg") {
        echo $file."\n";
        if ($size>300000) {
            resizeImage($file,$fn,1600,1200,80);<..... />             
            echo "Size: ".$size." ".$dim[0]."x".$dim[1]."\n";
            if (is_file($fn)) {
                echo "New size: ".$size."\n";

function resizeImage($sourceImage, $targetImage, $maxWidth, $maxHeight, $quality = 80)
    // Obtain image from given source file.
    if (!$image = @imagecreatefromjpeg($sourceImage))
        return false;

    // Get dimensions of source image.
    list($origWidth, $origHeight) = getimagesize($sourceImage);

    if ($maxWidth == 0)
        $maxWidth  = $origWidth;

    if ($maxHeight == 0)
        $maxHeight = $origHeight;

    // Calculate ratio of desired maximum sizes and original sizes.
    $widthRatio = $maxWidth / $origWidth;
    $heightRatio = $maxHeight / $origHeight;

    // Ratio used for calculating new image dimensions.
    $ratio = min($widthRatio, $heightRatio);

    // Calculate new image dimensions.
    $newWidth  = (int)$origWidth  * $ratio;
    $newHeight = (int)$origHeight * $ratio;

    // Create final image with new dimensions.
    $newImage = imagecreatetruecolor($newWidth, $newHeight);
    imagecopyresampled($newImage, $image, 0, 0, 0, 0, $newWidth, $newHeight, $origWidth, $origHeight);
    imagejpeg($newImage, $targetImage, $quality);

    // Free up the memory.

    return true;


PID file check script in PHP

This script check for PID file creation time, and end the script in case it is newer than Xtime seconds. It is useful for running cron jobs and detection, whether the script should be running twice (check if it is still running).

function pidder($pid,$xtime=600) {
    if ((! is_file($pid)) || (isset($_GET["new"]))) {
        fputs($fp,date("Y-m-d H:i:s"));
    } else if ($time>$xtime) {
        fputs($fp,date("Y-m-d H:i:s"));
    } else {
        if (!isset($_GET["no"])) {
            Log::file("cron"," GORYCHLIK NO PID $time");
            die("PID $time");


What is SolarEdge monitoring

Date: 2017-09-15

As the title suggest, SolarEdge monitoring is monitoring software for solar power plant. The software is quite popular and has even the mobile application for the owners. They can monitor it from everywhere. It has many similarities to our Server monitoring service – sending an alert in case of something unusual or preplanned happened – you can set up alerts for downtime (same as malfunction solar panel), or you can be alerted when some task is completed (similar to reaching some level of output). Our monitoring solution can be even use to monitor server running the solar monitoring software. We can name it Monitoring^2


XBOX ONE - Streaming to Windows 10

Date: 2017-09-15

Sometimes in the life of each gamer there will be a situation where he has to interrupt the game because some of the loved ones want to watch the endless series of telenovela that is just running in the TV, just in the situation where the prosperity and reach of the desired achievement is at your fingertips.

Fortunately, it is now possible to solve this situation without any unnecessary argument or disagreement. Xbox ONE can stream the game, so like send pictures to PC / laptops and soon to mobile phones. The only condition is Windows 10 on the device (PC / notebook or smartphone) that must be connected to the same router (the same subnet) along with the Xbox.

First, make sure you have streaming enabled in Console settings, more precisely in Preferences, (default is enabled). In Windows 10, we expect you to be logged in under your Microsoft account, which is the same as the console, running the application with the appropriate Xbox name. Then connect to your ONE console via the Connect option. You can also see the console name (you can use the name change in the console settings). If your console does not automatically shows to you, connect to it by entering its IP address. There is also button "More" where you will find the option to connect to your console automatically or to delete connection data, in case that you have more consoles in the house and want to connect to the other.

Now select "Stream" to the choice - stream. It depends on the game, although it would be right to say that the entire console can be controlled via a joypad attached to the PC (and we do not have to remind that even here you can play with the ONE driver) or a joypad still attached to the console (assuming you within reach of the console's connectivity, this is approximately 10 meters under ideal conditions). At the same time, you see not only the running game but also the entire dashboard.

At this point, it is good to remember that the quality of the transfer depends on the quality and location of your router. The most common situation is that both PC and Xbox ONE are connected to the router via an Ethernet cable. Definitely it will not hurt to do Test Streaming and turn on the WMM mode on a Wi-Fi router that prefers speed-sensitive data traffic such as streaming games. If possible, use a 5GHz 802.11AC or N network. But even if you're connected wirelessly and the gameplay does not meet your requirements, it's possible to reduce the quality of the video encoding by changing a "Video Encoding Level" menu to improve the response. I still remember that the Wi-Fi signal is weaker when the wall is between and even worse if the wall is in the panel apartment (due to metal rods inside the concrete).

You can turn off streaming at any time with "stop streaming". With this app you control the console and it can also be turned on or off while controlling the volume of your TV. With this streaming, you cannot record a game via the console or send it to Twitch, but you can record and capture images directly on your PC. You cannot stream video applications, ie content protected by HDCP and Blu-ray player due to copyright.

Some users find that audio and video are stuttering for them at regular intervals, in which case open the properties of your wireless card driver (the fastest way is to enter "Show Network Connections" in the search menu on the Start menu, then click your connection with the right mouse button and here select "Configure") to select the "Advanced" menu. If your Wi-Fi adapter is from Intel, set Roaming Aggression to 1 (lowest). If Qualcomm (Atheros), then give the Valid Tracking Range to "120".


6 Plugins for Import - Exporting Products from WooCommerce

Date: 2017-09-15

Occasionally, respectively especially when you build a new site, you need to get a lot of products into the web store. The following plug-ins can help you achieve that. Some are purely Import or Export data, others handle both. In particular, the rule applies to importing that the terminology and structure of input files need to be studied in precisely, mostly in the form of .csv file. In the area of import it is highly important, that you have to try it all over several times with a sample data, before you can import hundreds or thousands of items. You would certainly not be glad to find out after a few day or weeks of running business, that there is a bug in each product and you will need to manually fix it or ask the administrator to edit the database. This could be action, which could also mean a fatal system failure. Most plugins can only handle text data, but there are also plugins that can import images as well.

WooCommerce CSV exporter

Simple export of products and their variants into a CSV file

WooCommerce CSV Loader

Simple import of products and their variations from a CSV file

Uploading images via URL or local file path, skips duplicates

Imports the hierarchical structure of categories

WP Ultimate CSV Importer Plugin

Supports importing posts, pages, users and roles, comments, custom fields, authors, tags, categories and e-shop items

Imports external / internal images in conjunction with any post

Imports classic videos and videos from YouTube

SEO import support, duplicate subtitle solutions, better alternative to XML

And many more features...

WooCommerce XLS Export Lite

Simple export of products and their variants into XLS file

Overview and access to all previously exported XLS files

Import Products from any XML or CSV to WooCommerce

Simple import of products and their variations from XML and CSV files

Import any XML or CSV File to WordPress

4-step import process, intuitive interface with the ability to import by dragging the mouse

Allows you to import any XML or CSV file

Customize the fields into which data is to be imported

Importing Images to Media Gallery

Download and import files from external sources


Looking for "facebook initiar sesion"? Why are you doing this?

Date: 2017-09-15

Based on qualified estimates from our popular Semrush analytics tool, we have found out that the phrase "facebook initiar sesion" has been searched for approximately half a million people on Google's search engine in the US over the past year. Respective more than 500,000 times was typed on Google search engine. It is no surprise to think that it is a search for a login page on Facebook, which is the world's most popular social networking site.

Interestingly, it's a search from the US. This is probably done by the Spanish-speaking part of the population. Thanks to this we can use this knowledge in advertising within the US. When it is not good to focus only on an English-speaking audience as it would be offered, however, other world languages must be included as well. The US is not just an English-speaking country. The number itself does not tell us much, but compared to the English phrase: "facebook login", which was searched, by people in the US in the same period, 55 million times. Statistically, we can say in simple terms that the Spanish-speaking audience accounts for 1% of the US traffic. However, this number is considerably exaggerated and unusable for marketing campaign purposes. We do not know whether other Spanish-speaking residents just do not use English as well when they are on Facebook or have a switched language interface to English from a computer vendor.

All of this information is more of an interesting fact than a case study. We were surprised by this high number, which is ridiculously small compared to the English version. However, both numbers show the huge popularity of social networks and the fact that many people do not use bookmarks in their browsers.


The end of 32 bits: support for old architecture on Linux is ending

Linux distributions are gradually announcing the end of 32-bit support for the x86 architecture. Instead, they recommend users switch to the 64-bit AMD64 architecture. How are individual distributions?

The AMD64 architecture has been with us for 17 years, the first Opteron processor with its support came out in 2003 - more than 14 years ago. Linux came up with architecture support shortly thereafter, virtually all newer processors were now 64 bits. So, if you do not own a ten year old netbook with the first line of Intel Atom processors (for example Eee 1000H), you have 64-bit architecture hardware.

At the same time the ammount of memory is growing, today's 4 GB is considered to be minimal, typically we encounter 8 GB or more. The amount of addressable memory is only one of the advantages of AMD64, the software translated for this architecture can benefit from a larger number of registers, SSE and SSE2 instructions, or an NX bit. There are very few reasons to stay with the 32-bit system.

If we remove the old hardware, then users either use the old architecture out of stubbornness or rather by mistake. They are used to clicking 32 on the download image, so they do it. No matter how long it has been done unnecessarily.

However, software and distribution engineers are responding to this and 32-bit support is reduced for the long term. Every other architecture is worth the energy, the time to build, the server space, and especially the time it takes to test and support. But there is no need to do anything like this - if only a minimal number of user needs it, and no developer already has enough old hardware, so he does not have enough reason to deal with anything like that.

Ubuntu ends with a 32-bit desktop

The latest release came from Canonical, who decided that the next version of Ubuntu will no longer have 32-bit desktop installation images. Server versions will still be 32-bit, as well as some Ubuntu derivatives intended for older hardware.

But here is just a matter of time. As soon as Ubuntu ceases to maintain a central repository with 32-bit bundles, it's likely that derivatives will not have enough power to create it yourself. These are usually small projects that work largely on the work of Ubuntu developers and just fine-tune desktop environments.

Additionally, this time may not be as far away as Canonical's original plans spoke about ending 32 bit support with version 16.10. So, Ubuntu has an annual delay, but if it were left behind, it would be possible to close the 32-bit port in roughly two years. It is likely that things will not go like this quickly, but it still shows that it will not be a matter for a decade, but rather for a few years.

Arch Linux is no longer releasing 32bit versions

Arch Linux stopped publishing 32-bit images in February this year (2017). Still running their support, but by the end of the year they will be moved into unsupported architectures. The official announcement of this plan says there is little interest from users, developers, and communities. Starting in November, developers will not have to rely on the i686 architecture in packages - older processors are no longer supported for a long time.

If the members of the community are interested, they can continue to support the project, and the project will provide them with a patronage. However, it is unlikely to be active, key developers have refused to develop 32 bits, so it's really all in the community. If anyone is going to need a 32-bit Arch, he'll have to put his hand to the work.

The Manjaro Linux distribution, which directly builds the desktop system on the Ark, is also the same. At the same time with the 32-bit abandonment of Arch, of course, this chapter closes 32 bits development for Manjar. In order to confirm this step, bittorrent installation images download statistics were also presented: 64 bits downloaded by 86% of users, leaving only 14% on 32 bits.

Tails gave it up with version 3.0

The Tails distribution, which focuses on user security and privacy, has left the support of 32-bit processors this summer (2017). The new version 3.0 is based on fresh Debian 9 Stretch and has just been released for AMD64. Developers explain this by supporting the new architecture to dramatically increase system security by offering the already mentioned NX bit or PIE support for binaries and the ASLR.

Fedora does not have 32 bits for Cloud and Server

Fedora is still holding its 32-bit version, but has ended Cloud support some time ago. The main reason is the very small number of users of this variant and the effort to save time for compilation and testing. Similarly, the release of Fedora 24 has ended support for 32-bit processors at the Server variant. On the old computer, you can only install the latest Workstation.

CentOS 7 does not support i386 anymore

With the release of the seventh, CentOS has officially ceased to support the i386 32-bit platform and is based only on AMD64. This is, of course, due to the fact that you do not install RHEL on 32-bit machines anymore. Images marked as AltArch (alternative architecture) can be obtained from the SIG community project. But you'll need a PAE-enabled processor.

openSUSE Leap is just for AMD64

In openSUSE, the situation changed with the arrival of Leap, in 2015. The new version of the distribution did not offer any 32-bit images anymore, and this January (2017) ended support for the latest 32-bit openSUSE 13.2. So, users of the green chameleon system in the log are no longer able to use the old architecture.

…and more

Also, many smaller distributions have, for various reasons, stopped supporting 32-bit processors. For example: BackTrack, Kali Linux and Sabayon. A lot of distribution, of course, still supports the support even though older processors are being cut off from the bottom. For example, Debian, for example, ended 486 in Squeeze years ago, with the latest release of Stretch then stopped supporting 586.

32 bits on retreat

It certainly does not matter that in a few months it will not be possible to run 32-bit Linux. Ubuntu 16.04 LTS is supported by 2021, so you can use your older computer few more years. For a long time, there will also be dedicated distributions that focus on less powerful machines or on old hardware support.

However, it is necessary to realize that 64-bit processors are nearly two decades with us and developers do not usually want to spend time supporting very old hardware. Large distributions and projects will therefore soon also stop support the 32-bit processors, and there will be only smaller projects of enthusiasts who are worth maintaining broad hardware support. Perhaps because it owns a ThinkPad that is old but still works very well.


Security perceptions: the ATM opens the gates

Date: 2017-09-15

Malware for banking and ATMs, an inspiring SSH study that helped many attackers, and there is also a mention of DoubleLocker, the working Android ransomware.

Security news

You do not have much money? Invest in Cutlet Maker. You can get your money back on every corner - this malware toolkit focuses on ATMs of various production. With the Stimulator and COdeccalc programs delivered in the same $ 5,000 package, you first check how much cash is in the ATM and then generate a password to unlock the GUI interface toolkit. Then, at least according to sellers, you will start to take money. Commonly available on every decent criminal forum.

Additionally, malware is unique because its goal is not to misuse customer data, but directly exploits specific APIs without the need to interact with the customer itself. Malware has first discovered by Kaspersky Security Company in May 2017 at AlphaBay (later closed after the FBI raid) and now publishes a complete analysis.
The offer also includes extensive documentation; Instructions for use and access to instructional video tutorials; how to properly use malware - maybe there will be tips on how to make sure that you are not see by a security camera when you go with a sack on to the ATM.

Our observations

Do you have Lenovo? Update! At the beginning of October 2017, an update was released silently, correcting four vulnerabilities on tablets and phones. Specifically, they refer to the Lenovo Service Framework Factory, through which alerts, bids, and upgrades flow. One of the vulnerabilities, for example, was that the private key to communication between Lenovo devices and servers was found on the Internet as part of the official manufacturer's demo application.
Vulnerability has existed since at least May 2017. If a potential attacker knew it, he would not have to bother up with counting a private key from the public key (as is possible with Infineon cryptographic chips).
A few days ago, Venafi released a study on the use of SSH in company practice. This study has shown many shortcomings. Now it looks like the study has been read by some attackers and they have massively scanned publicly available web folders that could contain SSH keys by keywords like "root", "ssh" or "id_rsa". Wordfence researchers have seen a sharp rise, especially in the hours immediately following the release of the above-mentioned study. Webmasters are particularly encouraged to check if they have accidentally added SSH keys to one of their versioning systems.
The smart watch for kids may not be as clever as it might seem. Watches provide parents with the ability to communicate with their children, including the ability to track their location. Children can also use a special SOS button to automatically call their parents. Unfortunately, some types of watches do not use encrypted communications to transfer and store data. This allows attackers, using simple hacking techniques, to eavesdrop on clock calls, detect or even change the GPS position. Some manufacturers who used unencrypted communications temporarily withdrew their products from the sale. It is beautiful that a lot of devices that have the name "smart" are not always as clever as they would expect.
Google has decided to extend the login security to its services. Google itself also indicated that this safety supplement was created mainly for those who face increased risk for some reason or are more paranoid than other users. When a user decides to use "Advanced Protection", the escaped password may not be a problem. The principle of protection is based on two physical keys - one in the form of USB for computers and one on the principle of Bluetooth for mobile devices. These keys use cryptography and digital signatures to verify for Google that the owner reports to the app. Only knowing the password will be inadequate. Google also announced that Chrome will use antivirus protection from ESET. This is a step that should extend the scope of malware detection through the Chrome Cleanup add-on.
The current version of DoubleLocker malware is targeted at Android phones. After infecting the device, it blocks the device by PIN, encrypts files on your phone, and requires payment in Bitcoines. The required amount is about $ 54 and must be paid within 24 hours. The only way to get rid of the ransomware is to reset it to factory settings. Because the root of the source code is based on a banking trojan, Android may soon get poisonous cocktails that rob the bank, encrypt and change the PIN.


How to work with mobile targeting on PPC Facebook ads?

Date: 2017-09-15

The fact that users using mobile phones behave differently from desktop users is a well-known fact. Of course, everyone using AdWords is working with this information. But do you use both device targeting and Facebook PPC ads? If not, my article tells you why to use it and how to set your targeting.

Why cell phone targeting for Facebook PPC ads?

Just as Google AdWords allows you to set up mobile-only campaigns, Facebook also lets you choose which devices your ads will show. But why is it useful on Facebook?

The number of users entering Facebook via mobile devices is rising every year. This is confirmed by statistics. In December 2012, over 1,000 users worldwide had Facebook worldwide, with more than 680 million people using this social network via mobile phones.

Users coming to Facebook through a mobile app often show different behaviours, mainly due to the fact that the application has a slightly different user interface than we know on desktops. In the mobile app, we only see the channel of the selected posts, and even the format of the posts shown is different from what we know from a classical computer. That's why it's important to consider when choosing your ads to choose what devices to show your ads on.

Different mobile ads on Facebook

As I mentioned, the ads displayed on desktop devices and mobile apps are somewhat different. The differences are mainly due to the format of their display, and also by seeing ads in the mobile app only in the channel of the selected posts.

Because the app does not have a right side column, so neither do ads nor anywhere else.

Mobile targeting settings

Now that you have an idea of how your mobile apps look, you'll be sure you'll be interested in where to target the selected devices.

One of the options is directly from the Facebook Ads interface in the "Wide Category" menu. Here you select the "Mobile Users" option to set your targeting to only mobile devices.

However, if you want to target only desktop devices, and only on the channel of selected posts, then you will need to choose another method. Set the targeting through Power Editor. If you're already using it, you'll know that you only run it in Google Chrome and none of the other if you have not used it yet, then you've just learned that you can run Power Editor only through Google Chrome.

The first step is to run Power Editor, download the latest changes, create a new campaign and advertisements.

In the preparation of a new ad, you will classically set the required attributes as the name and type of ad. Choosing an ad type will affect whether you can choose to target your device.

So if you want to show ads only on desktop devices and only on the channel of selected posts, then select "Advertising" as your ad type. Here you can customize your viewing on selected devices and placements with "For a Facebook Page" or "For a Facebook Page using a Page Post". By positioning on a Facebook ad, I mean displaying either in the channel of selected posts or in the right-hand side column.

  • You can choose from 5 options where your ad will appear.

If you only want to target mobile phones, you can choose as the "Mobile Only Ad" ad type, and you only have a primary targeting of mobile-only targeting. You can refine your targeting by specifying the type of device on which your ads will appear. You can only choose to view on your Android device or on your iOS device.

Targeting mobile devices is not possible when you are targeting a website, ie out of Facebook, or promoting a Facebook event.

Selecting different devices and locations allows you to create several identical versions of campaigns that will differ only by targeting these devices, and to test which of your campaigns (ads) delivers better results.


WWW and its capabilities

Date: 2017-09-15

In order to understand how HTTP and HTML work, it is necessary to explain how the communication on the World Wide Web looks. The WWW works on the client-server model.

URL (Uniform Resource Locator)

Looks like this:

  • the schema identifies a service through which information can be obtained (ftp, http, telnet, ...)
  • specific part has the following form:: @: /
  • not all parts are mandatory, depending on the schema used

HTTP (HyperText Transfer Protocol)

One of the main features of HTTP is that it is undeclared (= each requirement is judged separately regardless of previous actions), which avoids a number of problems but some others appear

Definition of a document placement on the Internet is done using the following URL:

http: //: /?

- computer is the specified domain name or IP address of the computer

- port is for default 80 for http, but can be set differently

- The job specifies the location of the document within the server, if it is missing, you will usually get the home page of the server

The original text was originally meant to search for the text only, but today it has a wider meaning if the URL does not designate a static document, it is passed through the parameters that affect the program's activity, such as PHP, CGI.

The standard extension for www documents is .html, but servers running on different versions of MS-Windows with short (3-character) extensions use the .htm extension, for pages that the server modifies when they are sent, they have the suffix .shtml

HTML (HyperText Markup Language)

It is the language in which static (unchanging) websites are created. Contains special commands to indicate different parts of a page (e.g.,) by which the client displaying the page knows that it should highlight, underline, etc.

- The same page displayed by different clients may not look the same, depending on the configuration!

- You can also use scripts (such as CGI), so pages can also be dynamic.

CGI (Common Gateway Interface)

Also called gateways are programs that create an HTML document as a result of their work

Can be essentially any program if it meets 2 conditions:

  1. Can get information as defined by CGI
  2. The result of the activity is an HTML document that sends to its standard output

The programs used for this purpose are Perl, Unix shell, C ++, C, PHP

Translation to run the CGI script looks like this:

  1. The client sends a query whose URL points to a CGI script. It can also pass additional data, such as searched text
  2. The server determines that the request has to be serviced by an external program, runs it, and passes through the CGI interface the necessary information.
  3. The script runs, processes the data, and creates an HTML document based on the standard output that passes the server as a result.
  4. The server sends the result of the CGI script to the client.

It is relatively slow because each process must be run for each request

Proxy (or proxy cache)

It is a server that represents another computer (more precisely a group of computers) relative to the WWW server.

They were due to overflowing of the lines (one information was transferred to each request separately, which is quite uneconomical)

If the proxy receives a request for a particular website, it not only sends it to the applicant, but recognizes the HTTP header if it can save it (it can not be dynamic, with static time in the header it can store) and does so. Once the proxy is asked for the same page, it does not contact the WWW server, but passes the page that it has stored so it does not burden the line unnecessarily.

Of course, there is a problem with the possible age of the document, but if you put CTRL + reload, the page will be requested from the WWW server and you will get it updated.

Can work as Parent or Sibling.

Parent always asks for a higher level (whether it's another proxy or source server)

Sibling is at the same level more, and when asked, first examine their siblings to find out if they have the required document and look for a higher level when they find negative.

It also has a security function, because both the packet of requests and the answer to it is ending its path and the proxy creates new packets, which it sends further (meaning they are the same)


Propably the best way to get data from the user for processing

It has two parts:

  1. The HTML page, which is a visible part and through the input fields, provides information. It contains a link to the CGI script that will process the information you enter.
  2. A CGI script that processes information from the form and sends the resulting HTML page

It is important to know that HTTP communication is intercepted and data does not go encrypted, for HTTP Secured (HTTPS)

PHP scripting language

The code is written to the HTML of the page, but it is surrounded by special characters. It is often used to process specified data from forms and to handle databases

Dynamic pages

This are any pages that contain, in addition to HTML, another part, such as PHP, CGI script,

linking to SQL databases

Database is the place to store all sorts of information. Access to the data contained in it is provided by DBMS (DataBase Management System)

DBMS includes: Oracle, MS SQL Server, Informix, PostgreSQL, MySQL, and more

The way of communicating with the DBMS is similar to communicating with the WWW server. Most often, DBMS is continuously running as a daemon on Unix or as a Windows NT service on a particular port. At this port, it expects requests from other apps, and then responds.

The most commonly used SQL language (Structured Query Language)

In combination with PHP scripts with SQL statements, you can access databases over the Web.

Various SQL servers have different protocols. The client should therefore be able to communicate multiple protocols, which is impractical. That's why ODBC was created on Windows platforms. This is the interface between the client and the SQL server, so the ODBC client, whose driver transfers the request to the so-called native protocol understood by all SQL servers, communicates it to the client after receiving the response. Currently, ODBC is implemented on most versions of Unix.

Most of the DBMS used is a relational data model (based on relational algebra, which is the mathematical apparatus on which the relational data model builds), such data being arranged in tables

P. number           Name                   Address               Salary

1024                     Peter Borg          La Guardia 256 16384

1354                     John Nash           Tall road 5          12150

1684                     Jenny Mitchell    Cm street 16      13504

...                          ...                         ..... ...                         ..... ...

You can see an example of the table above. Name, address, salary, and personal number are attribute names. The column or attribute is highlighted under the name. The highlighted line is called a record.

We need something to work with information in the spreadsheet so we can select the record you need. This is what the primary key is. This must of course be unique (no 2 entries must have an entry in the same key attribute as the same). In our example of the table it would be a personal number.

Data database can contain multiple tables, each identified by its name. Information from different tables can be related, they may have different relationships among themselves. In this case, one attribute (column), a so-called foreign key, is added to the table associated with another, which determines which records are related.

Table can have more foreign keys, but the primary one only!


Ten of the best games for Linux for the past 10 years.

Date: 2017-09-15

We have selected ten of the best titles that have been released for Linux over the last 10 years.

Tomb Raider (2013)

So far, the penultimate part of Lary Croft's story is different. This is testified by the fact that Tomb Raider is simply and simply named. Lara was gay and the story was darker and more engaging than before. Combined with excellent audiovisual processing, this is an experience. On the other hand, the action side of the game is somewhat easier, and the duels are generally tailored to less experienced and console players, so there's no real challenge in this area.

Price: 20 euros.

Payday 2 (2013)

The second part, Payday at first glance looks like a soulless shooter, which is indeed, but it does not end there. If you want to be successful as bank robbers, you have to think strategically and also carefully choose what you need to improve your mission - especially weapons, of course. Although the game also offers a single player campaign, you can enjoy it with three other buddies. Just because of artificial (not) intelligence that will not cooperate with you much. Graphics are average, but they match hardware requirements so you can play Payday 2 on older computers as well.

Price: 20 euros.

Factorio (2016)

Although we wanted to include only final games in the selection, we have to make an exception here. The small Czech studio Wube Software created a game that sold over a half a million copies in a few months and which 98 out of 100 players give thumb up. Factorio is a strategy where your primary goal is to extract raw materials, process them in huge automated factories (of course you must build) and survive. Retro is not just a design but also a difficulty - do not expect to get something for free. The game is very playable in the preliminary approach and stability problems are not.

Price: 20 euros.

F1 2015 (2015)

Racing games are one of the latest genres that are not so well represented on Linux. It will be a bit better for F1 2015, the official Formula 1 championship game. Do not be fooled by not very good ratings. This is partly due to the fact that the F1 2015, as well as other year-long titles, does not bring many new ones. If you are a Formula 1 fan, the game does not disappoint you due to good technical processing and faithful realism. However, there is a lack of careers, which has not been missed in previous years.

Price: 50 eur.

Medieval II: Total War (2006)

Medieval II is already a bit older, but we can put it in the golden strategy fund. Take a combination of a turn-based strategy where you deal not only with war, but also with politics and real-time strategies. You're already thrown into the battles and your troops are in full control. As the name suggests, the plot is set in the Middle Ages, specifically in Europe, Africa and the Middle East. Despite the age of the game, it is still a relatively popular multiplayer that is newly integrated into Steam.

Price: 20 euros.

Dying Light (2015)

Polish Techland has set another dead horror called Dying Light on Dead Island, which has earned even better ratings. The goal is clear: by all means, try to survive in a world-controlled zombie. Dying Light with the naked eyelashes or brutality does not save. If you enjoyed the Left 4 Dead 2, know that Dying Light is even sharper and also features an RPG system that adds another game level. There is no real story, but if you want a raw horror experience, you're on the right track.

Price: 50 eur.

XCOM 2 (2016)

XCOM 2 had a tricky task - to follow up on XCOM: Enemy Unknown, according to many of the best 2012 games. Even though 100% was not enough to meet expectations (for example, fewer possibilities and initially a nice line of bugs), it is definitely a dignified successor. The aim of this turn-based strategy is to clean a given area from an emblem using a small troop of soldiers. So nothing very original, but the story is pretty good, and especially gameplay and artificial intelligence are tuned into detail. The fundamental improvement of this piece is the procedural map generator, so the game will constantly supply you with new levels.

Price: 50 eur.

Stellaris (2016)

In Paradox they can do great strategis and they are also very fond of publishing for Linux. Stellaris is another of their turn-based grand strategies, but the story moves from history to space. When building your galactic empire, you will conquer other planets. The beauty of such games lies in the fact that war is definitely not the only way. Politics, diplomacy, agreements, and even violations, play a major role. But it is up to you, what kind of ruler you decide to be. We also have to commend developers for not forgetting and still editing and adding new content after releasing the game.

Price: 40 euros.

Saints Row IV (2013)

The famous Grand Theft Auto series for Linux did not work well and did not work well in Wine. If you would like to play something from a similar brand on Linux, the choice is clear: Saints Row. Against the guitarist he is still much more crazy, more vulgar and brutal. All these elements are subjected to humor, but it does not fit everybody. Also here is that the campaign is a bit extra. The main thing is that you have a great world where you can do anything that matters to you. For Linux, the second and third volumes were also released (the only one for consoles).

Price: 15 eur.

Gremlins, Inc. (2016)

Not too well-known, but well-deserved. At first glance, it is a well illustrated combination of gremlins and steampunk. A nice change is also the character of the game. No heroism is done here, invested, politically, cheated, blackmailed, etc. While there is also a single player mode, you will not be able to use the board against your computer. For multiplayer you need 2-6 players, of course you can connect through Steam. The duration of one game, of course, varies, with a normal range of about 30 to 120 minutes.

Price: 15 eur.


Does your facebook profile repel your customers?

Date: 2017-09-15

The company's Facebook page is not enough just to have, it needs to work on it. Why? Because while a good site can attract potential customers, the bad one can effectively discourage them from buying. Does not your facebook page really work against you? Learn how to get to know and change for the better.

The biggest addicts to Facebook are allegedly women. Not only do they use it daily, they communicate with friends, find out what's new with their friends, but also news around the world. But above all, it is a platform for women, which often makes them buy things they do not even need.

And that's it, Facebook influences our decision. You know it, you pick a thing, and when you browse the seller's site you will see if it has Facebook. Most of us will look at his profile and he will decide whether to buy or not. Unfortunately, many companies working on Facebook do not realize this clearly enough. So how do you manage your facebook profile to keep away your potential clients?

The Facebook page is not necessary for everyone

We all create a page. But taking care of her and communicating with her can only be a handful of brave men. What am I going to have a page that is about nothing? Unlike to hurt me and distort my thinking about me and my products.

In an empty and non-communicating profile, you would say, "We will not take care of our customers either". In the worst case, it may sound like: "Customer care is futile."

If you do not have enough time or content for your profile, I'll give you an advise for a million bucks: Shut it down. Communicate differently with the client, find a way that suits you and you will have fun.

Do not interfere with fans who do not respond

When I make an opinion about the company using Facebook, I definitely give comments on posts and visitors' posts. And if I see it has a profile of 50,000 fans, but those posts have no "Like" or comment, there is something wrong.

Do not buy fans. Do not make a paid campaign to collect fans when you see that they are not responding to posts. The visitor has such a profile acting dead, without a soul.

You have time, but do not have ideas?

Creativity and ideas are the foundation for viral content on all social networks. If you feel like you are constantly giving the same posts all the time, sit down, make an audit of your posts. See what posts you are giving (Are they more often textual or visual? Are you creating your own, or are you sharing others?) And evaluate what kind of posts your fans are reacting to.

Or let yourself be consulted. The best of your ideas will help your friends. Ask them what they lack, what they like on Facebook, what is attracting them. Ask.

Visual content in each post

Photos and videos are the foundation of every good and viral content. So do not forget to add a picture to each of your posts that will underscore your idea and add emotional information to you.

  • Take your phone and record reporting videos - vlogs are in and the users enjoy them. You can record how it looks at you at the factory, packaging room, at the reception desk, in the company, just about anything that connects users with you.
  • Talk to an enthusiastic colleague, friend, acquaintance, and make him a vlog for his products. Can cast videos where they rate your products. There's plenty to do, just dive into the world of youtubers, vloggers and bloggers, watch the world's brands and their communication, and have habadays in time.
  • Photograph and tell stories with photos. Try the multi image post.
  • For a single photo on a post, edit the photo with the filter. Try Pixlr Express for example. Filters love both Instagram and Facebook. The filter can improve any photo. And the young generation is just cool.

Facebook chat instead of a quick call

Especially young people prefer to chat rather than make calls. So, if someone writes you through Messaging, respond as quickly as possible. At working hours, preferably within an hour.

No answer is equal to ignoring the customer.

The Bookmark tab is like a contact on the Web site

Without it, no one will find you. I often search for a business address using a Facebook page. Especially if you do not have a mobile site, this will only be a good thing on Facebook. The bookmark is readily displayed on mobile devices, and if filled in, a potential client with a taste finds an address and stops with you.

  • Fill in the exact address. When a user clicks on the address, the user gets to the map and can navigate Google maps to the destination.
  • In particular, the phone number will allow you to get in touch quickly with you.
  • Remember to link to web pages.

There are plenty of ways to make use of the facebook page. Of course, every branch of business asks for its own. Do not bind with trends or a sentence: "Are not you on Facebook? Facebook is the foundation! "Facebook is not a necessity, it is a great way of communication, but you must be able to grasp it.



Proč se v USA hledá „facebook iniciar sesion“?
Dle kvalifikovaných odhadů z našeho oblíbeného analytického nástroje Semrush jsme vyčetli, že frázy: „facebook iniciar sesion“ hledalo na vyhledávači Google v USA za poslední rok přibližně půl mi..

Free variant


  • Non commerce
  • 1 website
  • 10 minutes interval

Basic variant

RUB 709 / Mo

  • Professional usage
  • Up to 100 websites
  • 1 minute interval

Unlimited variant

RUB 6,238 / Mo

  • Professional usage
  • Up to 1000 websites
  • 10 seconds interval

Sign up now

By signing-up I agree with your terms

↑ Back to TOP ↑