Pages

Thursday, January 27, 2011

Smartphone Android Can Be Space Satellite

Android phones probably will not only serve as a smartphone or smart phone. A satellite development company in the UK have a crazy plan because planning to use satellite phones android as the brain.

Experiments are currently being undertaken by Surrey Satellite Technology Limited (SSTL) in Guildford, England, as part of the initiative using advances in technology to make the cost of the satellite be cheaper.

The idea of this project makes sense. As reported by the BBC, the SSTL assess modern smartphone is remarkable after 1 GHz processor equipped and has a large capacity memory, especially android phone that has an additional SD card slot.

Monday, January 24, 2011

Swiss WikiLeaker gets $7.5k fine

Former Swiss banker Rudolf Elmer, who on Monday handed Julian Assange a CD containing details of tax evasion by the wealthy, has escaped a jail term after facing a Swiss court on Wednesday.

Prosecutors for the Swiss bank Julius Bär accused its former employee of breaching Swiss banking secrecy laws over a previous leak to WikiLeaks.

The prosecution aimed to secure an eight month sentence against the former banker.

They alleged that Elmer stole the bank's client data after being fired from its Cayman Islands operations.

Elmer personally handed the CD to Assange at a press conference earlier this week.

The former banker was fined 7,500 Swiss Francs (AU$7,500) and handed a two year suspended sentence.

Do you Ubuntu - or do you do 'poo poo' Ubuntu?

The Ubuntu "server team" and Canonical are in inquisitive lot, they want to ask the community just exactly how it is using the Ubuntu Server Edition -- and in what kinds of organisations, scenarios, environments and/or deployments -- hence the Ubuntu Server Edition was born and is now in its third year.

Canonical says that Ubuntu Server Edition is one of the most popular operating systems on public cloud environments and has established itself as the core host Infrastructure-as-a-Service solution for private clouds. The company says that this has come about as a result of the OS proving that it can perform numerous standard and critical tasks in multiple environments.

Security Forecasts for 2011

What will 2011 hold for information security professionals? Last year I predicted a year of change. It did not happen. But we are incubating a major crisis: legacy systems are vulnerable; existing security technologies are breaking down; a dangerous monoculture is building; and an information tsunami is heading our way.
Today's security solutions will not meet tomorrow's demands. The longer we put off change, the greater the potential damage from a major incident. The security community is slow to react to a changing problem space, however, preferring gradual evolution to radical revolution. So don't hold your breath. Nevertheless, I expect to see three major shifts in thinking during 2011.
The first is that we are likely to experience a major security incident involving the integrity of our critical national infrastructure. Not quite Die Hard 4 perhaps, but sufficient to incentivise utility companies to tackle their long-standing security vulnerabilities. Building security into the systems development cycle will need to be taken out of the "too difficult" box. The long haul towards building acceptably secure information systems will begin.    

Librarians rewrite the book on disaster recovery

When flood waters threatened to breach the banks of the Brisbane River last Wednesday, the State Library of Queensland looked to be one of its first casualties.

Fortunately for the library and Queensland's bookworms, management had a well-developed disaster recovery plan that went beyond simple data backup and that included all the minutiae of surviving catastrophe so that librarians didn't have to make it up as they went along.

As the water started flowing into the basement levels, the library's client services director Rory McLeod and staff swung into action.

"It was about following basic disaster procedures," McLeod said.

"Once we knew water encroached into the basements we knew there was a chance that we would lose power so it was about getting [backup power] checked and online and taking down essential systems as quickly as we could."

The library systems were replicated and a library principle is "lots of copies keeps stuff safe - so it's quite easy for us to point people at different servers at other state libraries", he said. The collections were safe and systems were being brought back online as staff returned.

McLeod's confidence in being able to recover in the face of disaster was reinforced by a written and annually updated disaster plan that included what to do to physically secure and protect an installation and how to handle the inevitable staff absences at a time of great stress. It included disaster scenario planning procedures to cater for contingencies.

Rackspace launches system administrator app

Rackspace has launched an app that allows a CIO or system administrator to dial up or take down servers and storage moment by moment.

Hardware costs, ranging from a penny to 83p an hour are billed to the company credit card. Software pricing is more complicated, especially for virtualised SQL applications, the company said.The app gives the CIO a range of choices of hardware and operating environment.

Simply selecting and saving the choices spins up the configuration in seconds, or minutes if it’s a Microsoft environment.

Admins can do the following from their smartphones or iPads:

List all Cloud Servers in their rackspace account

    * Create new Cloud Servers (including from any existing backups)
    * Delete Cloud Servers
    * Resize Cloud Servers
    * Perform Hard and Soft Reboots

Orascom Telecom CEO meets North Korean leader

The CEO of Egypt's Orascom Telecom has been given a rare honor during his current trip to Pyongyang: an audience with Kim Jong-il and dinner hosted by the reclusive leader for the businessman whose firm owns a majority of North Korea's only 3G cellular network.

Naguib Sawiris arrived in the North Korean capital on Friday and was received on Sunday by Kim Jong-il, the Korea Central News Agency reported on Monday.

Kim Jong-il, "warmly welcomed his DPRK visit taking place at a time when Orascom′s investment is making successful progress in different fields of the DPRK, including telecommunications," the report said.

Orascom holds a 75 percent stake in Cheo Technology, which operates North Korea's only 3G cellular network.

The network, the remaining stake in which is held by the government, uses the Koryolink service name. It has seen fast growth in subscribers and currently claims more than 300,000 accounts in just the two years since its launch.

Exclusive: Flood victims get real-time payments

The Federal Government has already paid over $166 million in relief payments to victims of Australia’s flood crisis, thanks in part to a systems integration project some decade in the making.

The flood crisis is the first real test of a workflow process set-up between welfare agency Centrelink and the Reserve Bank of Australia (RBA) which allows for thousands of payments to be made into flood victims' bank accounts in close to real-time.

Centrelink is making use of the Reserve Bank’s Real-Time Gross Settlement (RTGS) system, developed in the late 90s to settle large value wholesale payments to reduce settlement risks.

(For example, should an investment company purchase $100 million in bonds from another, the RTGS system would be used to cut down the time between the transaction being approved and the money from seller’s bank appearing in the accounts of the buyer.)

Federal Government agencies – which are customers of the Reserve Bank – have been able to access this capability for some time, but the workflow between their systems and those of the RBA was biased toward these large, one-off transactions rather than large numbers of relatively smaller payments made to individuals or small businesses.

Australia mandates Microsoft's Open Office XML

Australia's Department of Finance has released a desktop policy that required all agencies to adopt Office Open XML as the standard document format - a move that in the short term ensures Microsoft's Office suite remains embedded in government.  

The Whole-of-Government Common Operating Environment (WofG COE) Policy [pdf] mandates that an agency's productivity suite "must have the ability to read and write the endorsed file format" that complies with the ECMA-376 version Office Open XML (OOXML) standard.

That particular OOXML standard was rejected by the International Standards Organisation (ISO) because it was littered with Windows-platform dependencies, according to its opponents.

The ODF Alliance, backed by IBM and Google, has warned about the adoption of the ECMA-376 standard by governments.

"The use of ECMA-376 essentially ties the adopter to Microsoft Office," the lobby group warned in October last year in a document entitled "What Government's Need to Know".

That standard, it pointed out, contained "many Windows-platform dependencies" that Microsoft was forced to remove under the ISO process in order to get it approved as ISO-29500 -- a standard that the Microsoft Office 2010 product has so far failed to comply with.

Ubuntu 'trusted client' secures Windows and Citrix

Trusted Client, an Ubuntu-based encrypted clean boot utility, has received its Common Criteria certification and been included in the Defence Signals Directorate Evaluated Product List.

The device is designed to allow secure and safe access to a corporate or government network - even if the host machine is infected with malware.

Developed by UK-based encryption specialist Becrypt, Trusted Client is a hardened version of Ubuntu 9.04 that has been cut down to its bare components - about 500mb - and then bundled with Windows deployment tools. This is all wrapped in a layer of encryption and deployed on a standard USB drive.

David Jones, senior product consultant at Becrypt explained that in order to bypass any malware on an untrusted PC, users just boot from the Trusted Client memory stick. The PC then requests a username and password before loading Ubuntu.

The potentially infected hard drive is completely ignored.

"We boot the machine from the USB stick so you come from a known clean starting point. We never allow users to see the hard drive, we never touch it - we assume it is dirty. Instead we use the available RAM on the machine as our work area.

Defence seeks info-sharing proposals

The Defence Signals Directorate has invited vendors to propose commercial tools for sharing classified data between high and low security networks.

The national intelligence agency sought to inform itself on commercially available software applications and associated hardware to improve how information was shared between agencies.

A Defence spokesman declined to disclose a timeline and budget for the project, noting that purchasing decisions had not yet been made.

Facebook to begin reporting financials

Facebook is preparing to open its books this year or early in 2012 to give investors a glimpse into the financial workings of the world's largest social network, after it sealed an oversubscribed US$1.5 billion round of financing led by Goldman Sachs.

The financing, US$1 billion of which is from Goldman Sachs' overseas clients and US$500 million from Goldman itself and Russian investment firm Digital Sky Technologies, gives the company a projected value of US$50 billion, setting the stage for what could be one of the largest initial public offerings next year.

Facebook, founded in a Harvard dorm room in 2004, said it would begin to file public financial reports no later than April 30, 2012, in a statement detailing the new investment.

United States securities regulations require companies with more than 499 shareholders to disclose financial information whether they are publicly traded or not. Facebook expects to exceed that number some time this year.

Apple's App Store Hits 10 Billion Downloads

After two and a half years (or so) of existence Apple's iOS App Store has seen 10 billion downloads.

To celebrate, Apple is handing out one $10,000 iTunes gift card. Folks were entered into the drawing by downloading an app from the App Store or visiting Apple's website between January 6 and the download of the 10 billionth app.

Contest aside; this marks a huge milestone for Apple and the storefront launched a few years ago to go along with Apple's iPhone SDK.

Apple CEO Steve Jobs first publicly demonstrated the then-new App Store in March of 2008 along with the iPhone 2.0 software, calling it "an application we've written to deliver apps to the iPhone."

Red Hat plans expansion for Brisbane office

Enterprise Linux vendor Red Hat plans to expand its Brisbane support operation, revealing that some US Red Hat customers time support calls according to when calls are likely to be answered by Australian staff.

First established in 1999 as a sales and marketing office, Red Hat’s Brisbane HQ now employs around 100 staff and largely concentrates on support (including maintenance of the company's 2500 software manuals) and R&D (with a heavy emphasis on localisation, graphics and IPV6).

Paul Gampe, vice president of the engineering services and operations group at Red Hat said the company planned to hire more Brisbane-based staff in 2011 and that the Brisbane operation would lease an additional floor for its CBD headquarters.

Brisbane is one of the five "follow-the-sun" support centres operated by Red Hat, a role it first took on in 2001 to help service Japanese-speaking clients.

However, that multi-lingual factor was no longer its key attraction, Gampe said during a presentation at Linux.conf.au 2011 in Brisbane.

"It's not so much our Asian language skills which have been the greatest asset, it's been the Aussie attitude and how much it's appreciated by the West Coast. There's a large segment [of customers] who wait for support to roll over because they like the friendliness."

Gampe disputed the notion that tech support and R&D work would invariably end up in Asian markets where basic labour costs are cheaper.

"We've grown together as opposed to having to lose jobs to India and China."

He also said Australian economic stability made growing a company within Australia (and Brisbane in particular) easier.

"Wild fluctuation in exchange rates or cost of living can [otherwise] make your budget planning very difficult," he said.

Sepaton unveils next-gen private cloud OS

Sepaton today announced the next-generation operating system for its grid-based deduplication, backup appliance, the S2100-ES2.

The new 64-bit operating system, combined with Intel's new Westmere processor, runs the updated appliance at twice the speeds of its predecessor, the company said.

The updated S2100-ES2 appliance has a maximum throughput of 1,500MB/sec throughput per node or as much as 43.2TB/hr. The system initially will scale to 8-nodes; the company has qualified up to 16 nodes in its labs, said Linda Mentzer, vice president of product and program management at Sepaton.

The S2100-ES2 series consists of its version 6.0 OS running on Intel 2U (3.5-in high) commodity servers with Hitachi Data Systems AMS 2100 storage arrays. Like all grid-based architectures, as more nodes are added, both processing power and storage capacity increase.

There S2100-ES2 appliance is available in two models -- the 1910, which has 1TB serial ATA (SATA) drives, and the 2910, which has comes with 2TB capacity SATA drives.

Alcohol and poor diet linked to UK breast cancer rates

Women in Britain are more likely to be be diagnosed with breast cancer than those in most other developed countries because of their unhealthy lifestyles, according to a new study.
Analysis of data collected by the respected World Health Organisation shows Britain has higher rates of the potentially fatal disease than the USA, Australia, Germany and Spain.

In only 10 of the 50 countries assessed by the researchers do women have a higher chance of being diagnosed with breast cancer than those in the UK.

The experts said that many of the 46,000 breast cancer cases in the UK each year could be avoided if British women drank less, ate more healthily or took more exercise.


More than a quarter of women who develop the disease in Britain die from it, as survival rates have remained low despite record investment in the NHS under Labour.

Professor Martin Wiseman, medical and scientific adviser for the World Cancer Research Fund, which compiled the new study, said: “We know that people in high-income countries are more likely to be overweight, to drink a lot of alcohol and to be inactive.

Sunday, January 23, 2011

Beware Stuxnet Impact On Windows 7

Stuxnet threat not only to shadow the user's computer with a system of 'supervisorycontrol and data acquisition "(SCADA), which is widely used in oil and gascompanies. Windows 7 and Vista users will also need to be alert.

The first threat, Alfons said, the victim Stuxnet so can not store data or run certain programs. This is because disk space is reduced due to swelling Winsta file.

Then, he went on, the computer may hang or slow. Plus the network connection thatcan be disconnected.

That's because Stuxnet perform injection on some Windows system files. Includessvchost.exe, which is associated with a network connection, as well as relatedlsass.exe computer activity.

Antivirus Software, Free Online Virus Scan

The free antivirus programs listed on this page allow you to detect computer viruses, remove or repair infected files, prevent infection, detect and remove email viruses, etc. There are also free online virus scanning services available for those who prefer (or need to) scan for virus that way.

Note that a number of the free antivirus software listed have limited support for scanning spyware and other types of non-virus malware that their commercial equivalents provide. If you are looking for commercial antivirus software, one that comes highly recommended by security-conscious people is the Avira Antivir Premium  (which is very light on resources and consistently has a very high detection rate). Also popular among many computer users is Norton Antivirus,  which also has a Mac OS X version.

Free Hard Disk and Partition Imaging and Backup Software


The hard disk and partition imaging software take a snapshot of your hard disk so that you can restore your system at a later time to the exact same state the system was when you imaged the disk or partition. This is useful for system recovery in case of a hard disk disaster. The term "image" is used because such software often copy the state of the hard disk sector by sector to your image. Hence if your hard disk was (say) defragmented with certain software occupying certain sectors when you backed up, it will be returned to that same state when you restore your backup. The image utilities often do not allow fine control what you backup - you can specify the partitions or hard disks to back up, but you usually will not be able to specify which folders to exclude or include. They are useful for backing up your system drive or partition, that is, the drive that you placed your operating system on. Hard disk imaging software are sometimes also used to clone a hard disk to another (useful for the times you change or upgrade your hard disk).

Spam volume reduced, But more Threatening danger

Monthly reports traffic conditions junk messages (Spam) of the world showing a decline. But on the other hand, it increases the level of danger Spam.

In a monthly report Symantec Messaging and Web Security from security companySymantec stated that the world's spam volume has decreased.

In October 2010, according to the report which quoted on Wednesday (11/24/2010),the global spam volume in October 2010 adalh 86.6 percent.

This figure represents 22.5 percent decline from October 2009. Compared to August 2010, declining even reached 47 percent.

Because of this decline is believed to arrest gang spammers Zeus, terminationSpamIt.com site and also turned off the servers associated Bredolab botnet in the Netherlands.

Email Spam Reduced in 2011

A recent survey conducted Internet security firm discovered the global email volumehas decreased. And usually, in a single day there are about 67 billion spammessages. The decline came after the long holiday period of Christmas and the end of the year ends.

Such information is referred to internet security firm Symantec and Netwitnes.Unfortunately, no mention certain magnitude of the decline.

As quoted by the BBC on Wednesday (01/12/2011), Symantec and Netwitnes detectRustock botnet, a network of infected computers on a massive scale 'stirring' billions of spam emails per day, mysteriously stop the action in early December.

Facebook disabled Access to Addresses and Telephone Numbers

Facebook, which has just mentioned his plan to give access to the home address and telephone number Facebooker for application developers, now disable the feature.

This decision followed the emergence of criticism about the risks of the policy up for it. A spokesman for Facebook, Douglas Purdy seeks to explain the benefits of the feature and re-assure users that their data will be safe.

According to him, up can make people become more vigilant when they provide access to this data. However, due to many concerns arise, up to temporarily turn off the feature.

The threat of data theft through the BlackBerry Browser

Content filtering method is carried out Research In Motion is suppose to have a negative impact is quite dangerous, ie, theft of data sites that are accessible via the BlackBerry browser.

RIM utilize DNS Nawala to perform filtering sites that are accessible through BlackBerry. But the way it is feared could be used dedemit cyberspace to commit a crime, such as data theft.

"If there are hackers who managed to hack DNS Nawala, then all data could be retrieved. For example, username and password, whether it's internet banking or other accounts," said Irvan Nasrun, practitioners and Head of Internet Domain Name Internet Service Providers Association of Indonesia (APJII).

The method used by RIM in performing filtering porn sites use DNS Nawala namely DNS spoofing, IP switch from one web to another location. Despite implementing a layered security system, but still only users still worried about how far Newsletters survive.

Eric Schmidt Sell Shares Worth USD 335 Million

Having stepped down from his position as Chief Executive Officer of Google, Eric Schmidt at the Internet giant to sell its shares were valued at USD 335 million.

In a filing to the Securities and Exchange Commission (SEC), Schmidt said he sold about 534 thousand shares of Google Class A property.

Reported by the Business Review and quoted on Saturday (22/01/2011), after selling his majority stake, he still has a 2.7 percent stake in Google and holds about 9.1 percent of the voting power of the company thanks to Google's class B shares Current shareholding Schmidt on Google is worth around USD 5.77 billion.

Schmidt was soon officially release Google's reign as CEO in April. His replacement, not a stranger to Google, which is none other than Google itself one of the founders, Larry Page.

Free Anonymous Surfing, Free Proxies

Anonymous surfing allows you to surf the web without leaving a trail of particulars about your browser, your computer system, your country, IP address, list of fonts installed on your computer (yes, websites can find that out from your browser too, if they want to), etc. This is usually done by entering the address (URL) of the site you wish to go to at the free anonymous surfing proxy site. The latter will then retrieve the page and present it to you. The site you visit will not receive any particulars about your system or your IP address because the proxy will not have transmitted such particulars to it.

If you are particularly concerned about privacy and anonymity while surfing, you should note that, when using most of the free anonymous surfing facilities, the URLs you visit and the content of those pages are easily gleaned by others. If absolute privacy is your concern, you might want to explore a commercial solution such as Anonymizer Universal  which will encrypt all your traffic (including your URLs) in a Virtual Private Network (VPN) giving you privacy from people snooping your connection (say) when you're connected via wireless broadband, and even privacy from your ISP. (Incidentally, if you use Anonymizer, you might want to try the coupon code "TFC15OFF" (without the quotes) to get 15% off the usual price. The code only works with the above link.)

Free Internet/Network Bandwidth Monitors and Meters

This page lists free tools that let you monitor how much data you're transferring through your computer/network. It is mainly for people who use Internet Service Providers (ISPs) that charge according to how much data you transfer per month. For example, at the time this was written, a US ISP, Comcast, allows its users 250 GB of data traffic per month. Those that exceed that amount of traffic will have to pay for the excess data transferred. The utilities on this page are primarily meant for those who want to monitor their Internet usage, for example, to make sure that they don't exceed the traffic limit or to make sure that their ISP is not overcharging them.

(There is also a tool on this page that measures time spent connected on a dial-up connection, for those who need that sort of monitor.)

Free Mail Servers

The free mail servers (sometimes called Mail Transfer Agents, or MTA for short) on this page allow you to transmit email from one computer to another, using something called the Simple Mail Transfer Protocol, or SMTP for short. For example, it can receive email from an email client (software) and send it to another system. They can also allow email clients to retrieve its stored messages using either the Post Office Protocol, or POP3 for short, or the Internet Message Access Protocol, or IMAP. The email servers can either deliver the messages directly to the destination (end-to-end delivery) or relay them to another mail server for further transmission.

Budget Web Hosting

Listed on this page are cheap web hosts (commercial web hosts, of course) and brief reviews of the hosts. Note: only where I have information pertaining to the host will there be a review. What constitutes a "budget web host" for the purpose of this page? Essentially I just use common sense (my definition of it!), looking at the price of the package and its features. A package which costs $20 or under per month might make it here. On the other hand, a package that costs more (eg $30) but providing additional features (eg an exceptional amount of data transfer or free web design) might also make it here. Most of these web hosts have more than one package available. To keep each description from being overly-long, I often only list their cheapest package on this page. You can click the link to find out more about the other packages if that host interests you.

Make It Easy for Visitor to Check Your Price List

Some websites try to hide the price list for their products. Some of these sites only display the price of the item after you hit the "Buy" or "Order" button, or worse, only after you have created an account on their site. Others have a price list, but bury the link to the price list somewhere deep in their site in a place not easily accessible from the main page or the products page.

I'm not exactly sure what the reason behind this is. Possibly, they think that if the customer does not see the price until they click the "Buy" or "Order" button, they will be more likely to buy the item. This reasoning is fallacious.

Make Money From Your Website

Now that you've created a website, how do you make money from it? There are at least two ways in which sites can make money:

Advertising Revenue
Selling Goods and Services
I shall deal with the second case, "Selling goods and services", in another article. In this article, I will address the issue of how your site can actually make money from advertising.

Making Money From Advertising
If you look at many websites, you will probably notice that there are banner advertisements displayed on most pages. If you are a newcomer to the scene, you might think that you must either be a company or that your site must be famous before you can get advertisers, just as it is the case in hardcopy publications.

Installing Your Own Search Engine Script

The ideal way, in my opinion, is to install your own Perl search engine script or PHP search engine script. This requires you to have the facility to install and run PHP or Perl scripts on your web account. You don't need to be able to write one. There are numerous free search engine scripts that you can adapt for your site. You can find a list of these on the Free Search Engine Perl Scripts (for Perl scripts) and the Free Php Search Engine Scripts (for PHP scripts) pages.

In general there are two types of PHP or Perl search engine scripts. One will search your entire website for the relevant article each time your visitor invokes the search engine. The other creates an index of your site and only searches the index when the visitor uses the engine. The former is easier to configure and use for the newcomer, but quickly becomes sluggish when your website grows big. The latter is more efficient, but often requires you to remember to re-index your site each time you change your pages.

Step by step Create Your Own Website

Get Your Domain Name
The first thing you need to do before anything else is to get yourself a domain name. A domain name is the name you want to give to your website. For example, the domain name of the website you're reading is "thesitewizard.com". To get a domain name, you have to pay an annual fee to a registrar for the right to use that name. Getting a name does not get you a website or anything like that. It's just a name. It's sort of like registering a business name in the brick-and-mortar world; having that business name does not mean that you also have the shop premises to go with the name.

Detailed information on getting a good domain name can be found in the article Tips on Choosing a Good Domain Name.

After you read that, you will need to know the steps to registering a domain name and the things you need to look out for when registering. You can find a detailed guide in the article How to Register Your Own Domain Name.

It may also be wise to take a look at some of the Important Precautions to Take When Buying a Domain Name, just so that you don't commit the same mistakes that some newcomers make when buying a domain name.

Virtual Private Servers (VPS) Commercial Web Hosting

Have you ever wanted to put your website into its own machine but do not need all the power and space of a full dedicated web server? Virtual Private Servers, or VPS, fill that intermediate space. VPS are basically virtual machines, much like one that you might run on your own computer to mimic another PC running within your computer. To the web server and operating system running within the VPS, it appears as though they own the entire computer. Each VPS has a certain amount of disk space, RAM and bandwidth allocated.

Web hosts that provide VPS often give their customers virtually complete control over their VPS, allowing them root access (or administrator's access). You can thus usually install and run any software you want into your VPS, host any number of domains you wish, and so on. You are basically the boss of your own virtual server.

Choosing a Commercial Web Host

Reliability and speed of access
Not only should the web host be reliable and fast, it should guarantee its uptime (the time when it is functional). Look for a minimum uptime of 99%. In fact, even 99% is actually too low - it really should be 99.5% or higher. The host should provide some sort of refund (eg prorated refund or discount) if it falls below that figure. Note though that guarantees are often hard to enforce from your end - the host usually requires all sorts of documentation. However, without that guarantee, the web host will have little incentive to ensure that its servers are running all the time.

Data Transfer (Traffic/Bandwidth)
Data transfer (sometimes loosely referred to as "traffic" or "bandwidth") is the amount of bytes transferred from your site to visitors when they browse your site.