Last week, we participated in the Nasscom 2014 Product Conclave event (17-18 July) held for the first time in Kolkata by putting on display our cloud services and offerings. There was a substantial turnout of IT entrepreneurs from within the state and outside and the informative and insightful workshops and sessions were well attended. A palpable sense of buzz and  excitement was felt amongst the delegates who networked with each other making this a well appreciated event. Hopefully, this would be a regularly featured event in the city and we hope the turnout and participation would swell further in the coming years. Here are some pics from the event to enjoy.

These photos were taken by Indranil Mukherjee, a talented and aspiring Art entrepreneur and you can check out his blog at

Posted by admin under Industry Events

We have recently upgraded our shared hosting Plesk Panel webmail interface to use Roundcube instead of Horde webmail.

Roundcube is a free and open source webmail solution with a desktop-like user interface which is easy to install/configure and that runs on a standard LAMPP server. The skins use the latest web standards to render a functional and customizable UI. Roundcube includes other sophisticated open-source libraries such as PEAR, an IMAP library derived from IlohaMail the TinyMCE rich text editor, Googiespell library for spell checking or the WasHTML sanitizer by Frederic Motte.

Some screenshots are given below and more can be checked from the roundcube screenshots page as well.

Roundcube Logon Screen

Roundcube Logon Screen

Roundcube Main Interface

Roundcube Main Interface

Roundcube Email Compose

Roundcube Email Compose sports a Drag-n-Drop Area for Attachment Files

The Most Useful Option in Roundcube

Don’t forget this option in Roundcube – Show Preview Pane

This upgrade is free for all our clients and we have put up a more detailed KB guide at


Posted by jayabrata under Linux, Mail Service, Plesk Control Panel, Web Hosting

.htaccess is a configuration file for use on web servers running the Apache Web Server software. When an htaccess file is placed in a directory which is in turn ‘loaded via the Apache Web Server’, then the htaccess file is detected and executed by the Apache Web Server software. This htaccess files can be used to alter the configuration of the Apache Web Server software to enable/disable additional functionality and features that the Apache Web Server software has to offer. These facilities include basic redirect functionality, for instance if a 404 file not found error occurs, or for more advanced functions such as content password protection or image hot link prevention.

Basic Usages of a .htaccess file:


Redirects enable us to direct web site visitors from one document within your web site to another. This is useful for example, if you have moved your web site content and would like to redirect visitors from old links to the new content location.

To set-up redirects, create an htaccess file following the main instructions and guidance which includes the following text:

Redirect /old_dir/

The above line tells the Apache Web Server that if a visitor requests a documents located in the directory ‘old_dir’, then to display the document ‘index.html’ located in the directory ‘new_dir’.

Error documents

Creating custom error pages is very useful, it allows you to show web site visitors a friendly error message, for instance if a URL on your web site does not work. This avoids the unfriendly ’404 File Not Found’ error and allows you to display a friendly error, explaining possible solutions and guiding the visitor back into your web site content, rather than leaving them frustrated and lost.

To set-up custom error documents, create a .htaccess file following the main instructions and guidance which includes the following text:

ErrorDocument 404 /error_pages/404.html

The above line tells the Apache Web Server to display the document located at /error_pages/404.html (under your domain name/web site address) whenever a 404 (file not found) error occurs.

In this example, we have assumed you have created the error document and called it ’404.html’ and that you have placed it in a directory called ‘error_pages’ under your domain name. For example,

The document 404.html is a normal HTML document like the others in your web site and can display whatever content you wish, however we recommend including a ‘File Not Found’ message.

To setup further error documents, for example for ’401 Unauthorised’, ’403 Forbidden’, and ’500 Internal Server’ error messages, create a (dot)htaccess file following the main instructions and guidance which includes the following text:

ErrorDocument 401 /error_pages/401.html
ErrorDocument 404 /error_pages/404.html
ErrorDocument 500 /error_pages/500.html

Password protection

The password protection and authentication systems offered by the Apache Web Server are probably the most important use of .htaccess files. Very easily, we can password protect a directory (or multiple) of a web site which require a username and password to access. The login procedure for these secure directories is handled automatically by the web browser using a pop-up login interface (you’ve probably seen these before). Passwords are also encrypted using one of the best encryption methods available which ensures login credentials are kept secure.

To begin, decide which directory you would like to password protect (note that all files and subdirectories within the directory will be password protected), then create an .htaccess file following the main instructions and guidance which includes the following text:

AuthName “Member’s Area Name”
AuthUserFile /path/to/password/file/.htpasswd
AuthType Basic
Require valid-user

The first line tells the Apache Web Server the secure directory is called ‘Member’s Area Name’, this will be displayed when the pop-up login prompt appears. The second line specifies the location of the password file. The third line specifies the authentication type, in this example we are using ‘Basic’ because we are using basic HTTP authentication and finally the fourth line specifies that we require valid login credentials, this line can also be used to specify a specific username, e.g. ‘require user username’ would require the username ‘username’. You would use this if you were password protecting an administration area, rather than setting up a public password protected directory.

The location of the password file can be anywhere on your web server, the ‘/location/of/password/file/’ must be replaced with the full/absolute path to the directory containing the password file, and the ‘.htpasswd’ file must exist, this can however be called anything. We use the filename ‘.htpasswd’ because the server will recognise the filename and will hide it from visitors. Note, some servers do require the password file be located in the same directory as the .htaccess file. It is also important to use a full/absolute server path for the location of the password file, a relative path, or any variation of a URL will not work.

The password file would contain something similar to the following text:


Now, you cannot just make up the password, on Unix/Linux servers they must be encrypted by the server, on Windows servers you do just use a plain text password as Windows does not offer any encryption methods. You can have any number of user records in your password file, one account per row, separating the username and password with a colon. If you don’t have the Server access, please ask your Service provider to enable this feature. Please control Panel has this inbuilt feature.

Deny visitors by IP address

The visitor blocking facilities offered by the Apache Web Server enable us to deny access to specific visitors, or allow access to specific visitors. This is extremely useful for blocking unwanted visitors, or to only allow the web site owner access to certain sections of the web site, such as an administration area.

To set-up visitors restrictions and blocking, create a .htaccess file following the main instructions and guidance which includes the following text:

order allow,deny
deny from
deny from 123.45.6.
allow from all

The above lines tell the Apache Web Server to block visitors from the IP address ’′ and ’123.45.6.’, note the second IP address is missing the fourth set of digits, this means any IP address which matches the firth three set of digits will be blocked, e.g. ’′ and ’′ would be blocked.

To set-up blocking of all visitors except yourself, create a .htaccess file following the main instructions and guidance which includes the following text:

order allow,deny
allow from
deny from all

The above lines tell the Apache Web Server to block all visitors except those with the IP address ’′, which you should replace with your own IP address.

You may add any number of ‘deny from’ and ‘allow from’ records after the ‘order allow,deny’. Note the change from ‘allow from all’ to ‘deny from all’ on the bottom line, this is important and must be changed depending on your requirements. If you want to allow your visitor access, you would use ‘allow from all’ and place ‘deny from’ lines above.

Blocked visitors will be shown a ’403 Forbidden’ error message.

Hot link prevention techniques

Hot link prevention refers to stopping web sites that are not your own from displaying your files or content, e.g. stopping visitors from other web sites. This is most commonly used to prevent other web sites from displaying your images but it can be used to prevent people using your JavaScript or CSS (cascading style sheet) files. The problem with hot linking is it uses your bandwidth, which in turn costs money, hot linking is often referred to as ‘bandwidth theft’.

Using htaccess we can prevent other web sites from sourcing your content, and can even display different content in turn. For example, it is common to display what is referred to as an ‘angry man’ images instead of the desired images.

Note, this functionality requires that ‘mod_rewrite’ is enabled on your server. Due to the demands that can be placed on system resources, it is unlikely it is enabled so be sure to check with your system administrator or web hosting company.

To set-up hot link prevention for ‘.gif’, ‘.jpg’ and ‘.css’ files, create a (dot)htaccess file following the main instructions and guidance which includes the following text:

RewriteEngine on
RewriteCond %{HTTP_REFERER} !^$
RewriteCond %{HTTP_REFERER} !^http://(www\.)?*$ [NC]
RewriteRule \.(gif|jpg|css)$ – [F]

The above lines tell the Apache Web Server to block all links to ‘.gif’, ‘.jpg’ and ‘.css’ files which are not from the domain name ‘’. Before uploading your htaccess file ensure you replace ‘’ with the appropriate web site address.

To set-up hot link prevention for ‘.gif’, ‘.jpg’ files which displays alternate content (such as an angry man image), create a (dot)htaccess file following the main instructions and guidance which includes the following text:

RewriteEngine on
RewriteCond %{HTTP_REFERER} !^$
RewriteCond %{HTTP_REFERER} !^http://(www\.)?*$ [NC]
RewriteRule \.(gif|jpg)$ [R,L]

The above lines tell the Apache Web Server to block all links to ‘.gif’ and ‘.jpg’ files which are not from the domain name ‘’ and to display the file ‘’ instead. Before uploading your (dot)htaccess file ensure you replace ‘’ with the appropriate web site address.

These are the general features of htaccess file; you can find more information from your Website developer and Server Administrator.

Posted by hriday under Linux, Web Hosting

If you have been wondering on what would happen to the emails saved in your Gmail account if ever Gmail crashed and or your account gets locked out by Google (yes, they can block access to your account if it violates the Gmail TOS), then GmailVault could be the solution you need!

GmailVault is a utility that allows you to backup your Gmail emails and chat on your local computer, along with all the labels, that are present in your Gmail account. This makes it a local replica of your gmail account, that works at a blazing fast speed. Whenever you connect to internet, it will automatically connect and get emails from your Gmail account. Even if you have mistakenly deleted an important email from your Gmail account, you still find and restore that from your local archive. The extended search features of GmailVault also makes it extremely easy to find an old email from potentially millions of archived emails.
GmailVault comes with innovative mail storage technology developed by DigitalGlue which drastically compresses the storage space required for archiving very large amount of emails. GmailVault is free software and meant for personal use and you can go ahead and download this application from

BTW, If you are a business and are looking for a simple, yet effective solution to backup and archive all your email communication on the cloud, have a look at the Diadem MailVault email monitoring and archiving solution, which is developed by the same crew behind GmailVault.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Posted by jayabrata under Apps

We are pleased to announce that we have successfully completed the acquisition of the hosting and domain registration division of Showtime Media Pvt. Ltd, India.

This acquisition will bring in corporate clients such as BATA, VISA Steel, NCS Computech, Dhunseri Tea, Anmol Biscuits to name a few, into the fold of the already existing 1500+ clients in India and worldwide that Diadem Technologies provides web hosting services to.

Based in Kolkata, India, Showtime Media Pvt. Ltd is a part of a full service media and content creation studio which focuses on providing original, vibrant, and effective design solutions. Some of the services provided by them include Web site development, online reputation management, Search engine optimization, interactive content, copywriting, films, and product photography, among many other services. Showtime Media have been providing web hosting and domain registration services to some of the major corporate in Kolkata.As such, their web hosting business perfectly complements ours and this will provide  further boost to our presence in the web hosting domain in India and worldwide.

The acquisition was successfully completed on July 1st.Not only will this bring many more clients, we will continue to build on our existing services. We look forward to continue to bring quality and excellence to each and every one of our clients by providing them 24X7 support, reliable network infrastructure and more diverse hosting services along with several other hosting and email related services in the near future.

Keep checking this blog for more updates on our web hosting services, special offers and more.

You can visit our website for information on web hosting solutions.

Posted by jranjana under News & Updates
1 Comment hosting on Windows 2008 R2With application development gaining more popularity with web developers, there are significant advantages of hosting on Windows server 2008.

Although web hosting was available since Windows Server 2003, Windows 2008 Web Hosting has certain advantages in this area, which forced almost every webhost into switching to Windows Server 2008 R2 platform for hosting. The main advantage lies in fact that Windows 2008 R2 comes ready with IIS 7.5, out-of-the-box. IIS 7.5 is the default application version, when web server role is added to the server.

  • Windows 2008 Web hosting benefits from the fact IIS 7.5 supports any version of dotnet framework between version 2 and 4. Hence a wider range of web application development technologies are supported in Windows 2008 R2 hosting service for
  • The next point of advantage remains in the detailed IIS Application settings available in IIS 7.5. settings can be fine tuned quickly, per web application basis, meeting the requirements of the application developer, in IIS 7.5 on Windows 2008 hosting.
  • The third big advantage is the availability of Integrated Pipeline mode for applications, which induces significant performance boost for the applications running there. Still you can choose to run certain sites or applications, under Classic mode, for compatibility with legacy web applications, that do not support Integrated Pipeline mode.
  • Since IIS 7.0 onwards, one can choose to install a new or completely remove or replace installed modules, including Microsoft’s built-in modules. One can disable a module at the server, site, or application level.  Adding a very advanced application level firewall module like mod_security, at server level is a easy task on Windows 2008 hosting server, still this can be disabled for certain sites or applications, which may conflict with its rule sets.
  • Windows 2008 R2 is inherently more secure than Windows 2003 server. The detailed firewall rules of Windows Advanced Firewall in Windows Server 2008 R2 let server administrators to fine tune the server’s firewall against a host of malicious hacking attacks from the public network. Various anti intrusion tools takes advantage of this advanced firewall and effectively blocks any brute-force attack from the internet.

All the above advantages of Windows 2008 hosting, have contributed to a near total shifting of hosting services, to this platform in last two years. As a leading web hosting service provider in India, Diadem Technologies has never lagged behind, when new technology arrived. Diadem Technologies has completely switched to Windows 2008 R2 hosting platform for hosting its webhosting offerings, almost two years ago. We are currently in the process of launching the Windows 2012 hosting platform with IIS 8 / 4.5 and SQL Server 2012 support, which is expected to be launched within a few months.

Posted by jayabrata under Windows Server
1 Comment

These days, nearly all junk emails messages carry fake sender addresses. The victims whose addresses are being abused often suffer from the consequences, because their reputation gets affected and they have to waste their time sorting out misdirected bounce messages.

You probably have experienced one kind of abuse or another of your e-mail address yourself in the past, e.g. when you received an error message saying that a message allegedly sent by you could not be delivered to the recipient, although you never sent a message to that address. Or you nay have received spam mails which have been sent from your e-mail ID.

These types of SPAM technique are called Sender address forgery or Spoof Mail. It is a threat to users and companies.

There is a Solution for that!

SPF: Sender Policy Framework

The Sender Policy Framework (SPF) is an open standard specifying a technical method to prevent sender address forgery. More precisely, the current version of SPF — called SPFv1 or SPF Classic — protects the envelope sender address, which is used for the delivery of messages.

Even more precisely, SPFv1 allows the owner of a domain to specify their mail sending policy, e.g. which mail servers they use to send mail from their domain. The technology requires two sides to play together:

(1) The domain owner publishes this information in an SPF record in the domain’s DNS zone, and when someone else’s mail server receives a message claiming to come from that domain, and then,

(2) The receiving server can check whether the message complies with the domain’s stated policy. If, e.g., the message comes from an unknown server, it can be considered a fake.

Once you are confident about the authenticity of the sender address, you can finally “take it for real” and attach reputation to it. Furthermore, additional kinds of policies are planned for a future version of SPF, such as asserting that all of a domain’s outgoing mail is S/MIME or PGP signed.

An Example Policy

Let’s look at an example to give you an idea of how SPF works. Bob owns the domain He also sometimes sends mail through his account.  TXT  “v=spf1 mx ip4:  a:pluto. -all”

The parts of the SPF record mean the following:

v=spf1 : this identifies the TXT record as an SPF string. SPF version 1.

mx : the incoming mail servers (MXes) of the domain are authorized to also send mail for If you add more MX servers in the future, they’ll automatically be allowed, too.

ip4: is allowed to send mail from The MX servers for are allowed to send mail from the Host is authorized, too send mail everything considered legitimate by (outside mail server) is legitimate for, too

-all : No other servers are allowed to send mail from This is a good default for sites particularly concerned about forgery.

This example demonstrates but a small part of SPF’s expressiveness. Do not take it as a guideline for building your own record — things might not work out as you expect and legitimate messages might get blocked! Instead, learn more about the record syntax, or get the complete picture by studying the full specification or contact your hosting service provider.

Today Gmail, Hotmail, Rediffmail, Microsoft, Redhat, IBM, Citi Bank and most of the leading Service Providers and Companies use SPF and so do we for blocking out unwanted junk emails from reaching our clients inboxes.

Read More about SPF at:

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...

Posted by hriday under Mail Service

It has been a while since we have recommended a service or solution on this blog, so I am excited to share with you one of the truly wonderful things to happen in the city for a while. If you are like me and are an avid reader of books on management, biographies, self-help and magazines you are probably making a nice little hole in your pocket and running out of storage space to store your books and journals. As an alternative, I had been signing up for the digital versions of the books and magazines on my iPad but I have always found the touch and feel of paper to be a more soulful experience then to squint and stare at a digital screen and develop some very sore hands in the process.

So, I was walking by my office a couple of weeks back and out of some overgrown creepers, I was able to spot the signage of Just Books CLC and out of curiosity I walked in to find out more about this place. Once inside, I was met with some very courteous staff at Just Books and they walked me through the entire process of what makes Just Books community library chain, different and better then most standalone libraries. All the details are available on the Just Books CLC website – and I would like to summarise some of the key benefits which appealed to me:

  • The library is just a short walk from my office, which makes it very convenient for me to change my books at ease. However for clients who would like to avail of a doorstep delivery service, its available across the city for a very nominal fee of Rs. 50 pm.
  • Their membership plans pricing is surprisingly low, when you consider their total collection of over 0.5 million books across all their locations and the quality of those books.
  • The technology behind issuing, returning and searching for books is truly innovative and convenient for the members. There are no queues for returning or issuing new books and the staff are always ready to help if you are stuck in the process.
  • If a book is not available at this library you can request for it from any of their other libraries and it will be made available to you within a week or two and you will be notified about it over SMS and email.
  • The library is tidy, well organised and the books are well maintained by an efficient team.

It came as a surprise to me that this is the only JustBooks CLC in Kolkata and I truly hope that this would be the first of many such libraries in the days ahead as this is a truly innovative concept and a win-win model for all people concerned.

As for me, I am making the most of this opportunity to catch up on some of the books I most wanted to read and I would strongly recommend this place as one of the best kept secrets in the city!

Just Books CLC Kolkata Centre:

Contact :
033 – 40012211; 8981853672

Working Hours :
Hours 10:00 AM TO 9:00 PM, MONDAY HOLIDAY

Address :


1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Posted by hriday under Experiences

Applies to:

Windows 2008 R2 Parallels Virtuozzo Containers


While logging into Administrator account through RDP on a VPS after a reboot, a blank screen or recycled svchost.exe property page is shown. Rebooting the VPS does not resolve the issue.


This problem is caused by corruption of the Administrator account profile.


On the hardware node run the following command from command prompt, in order to enter the container.

vzctl enter <Container_ID>

(Conatiner_ID can be obtained by running the vzlist –a command.)

Now you will get the C:\Windows\system32> prompt in the terminal, indicating that you have entered the container. In the C:\Windows\system32> prompt run the following commands, in order to create another account and make it a member of Administrators group on the container.

net user <username> <password> /add
net localgroup administrators <username> /add

Now RDP into the affected container, using this new username and password.

After you successfully login into the container, make sure from task manager that Administrator account is not logged into the container. If Administrator account is still logged into the container, then log off Administrator from Task Manager, running with elevated privilege.

Then copy all important files from C:\Users\Administrator folder to another folder for safekeeping and delete the C:\Users\Administrator folder.

Next login into the Administrator account. This account will use a temporary profile path due to absence of C:\Users\Administrator folder. Now create the C:\Users\Administrator folder again.

Then go to the windows Control Panel. Inside control panel select Small Icon view and click the User Accounts icon or link.

Inside User Accounts click on the Configure advanced user profile properties link on the left panel. It will popup User Profiles dialog.

Inside User Profiles dialog, select the Default Profile and then click Copy To button. It will pop up the Copy To dialog.

In Copy profile to section, browse and select the path C:\Users\Administrator and in Permitted to use section click change and select the Administrator user. Then click Ok.

Now the Confirm Copy message box will pop up with the message – “C:\Users\Administrator already exists. The current contents of this directory or this file will be deleted during this operation. Are you sure you want to continue?”. Click Ok to confirm.

Now logoff from Administrator account and login again. Now the account will use the permanent profile path C:\Users\Administrator and everything should be fine.
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...

Posted by jayabrata under Virtualisation, Windows Server

We were facing an httpd process overload problem that was occurring frequently every week on our server. The server is a shared hosting server holding Over 300 domains with Apache 2.2.3, MySql 5.0.45 and PHP 5.2.6. Occasionally httpd process were getting timed out, consuming 90% to 100% CPU load alone.  Some PHP or Perl script that may be using too much of memory and CPU, but it was not possible or to check each and every script or put 300 domains offline one by one or remove any suspicious scripts because of that, since this was a production server.

“top” command returns only Apache’s child process, which is not as much helpful because it does not provide website name.  But there is a way or a tool to trace down the name of the website that is causing the overload.

The Status module (mod_status) allows a server administrator to find out how well their server is performing. A HTML page is presented that gives the current server statistics in an easily readable form. If required this page can be made to automatically refresh.

The details given are:

* The number of children serving requests.
* The number of idle children.
* The status of each child, the number of requests that child has performed and the total number of bytes served by the child (*)
* A total number of accesses and byte count served (*).
* The time the server was started/restarted and the time it has been running for
* Averages giving the number of requests per second, the number of bytes served per second and the average number of bytes per request (*).
* The current percentage CPU used by each child and in total by Apache (*).
* The current hosts and requests being processed (*).

Details marked “(*)” are only available with ExtendedStatus On.

Configure Apache mod_status

Open your httpd.conf file:

# vi /etc/httpd/conf/httpd.conf

Append / modify (or uncomment) directives as follows:

ExtendedStatus On

<Location /server-status>

SetHandler server-status

Order deny,allow

Deny from all

Allow from


Replace with your Network IP range or workstation IP address. Save and close the file. Restart httpd server:

# service httpd restart

For full status report type:

# service httpd fullstatus

To view status report type URL – http://Server IP/server-status

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Posted by hriday under Linux