Why You Should (not) Do Your Own Hosting

Hosting your own website looks simple for those of us who have some technical skills. And it is. You could be up and running in an hour or so, hosting your own website on a computer in your office or at home, using the existing internet and computer.

It’s true, the basics are simple. You set up a web server, a database server, configure access to the computer in the router, point the DNS to your public IP and your website is online.

But like with all good things, most of the work is in the details.

I will try to compile a list of things that a web hosting provider thinks about (or should think about):

  1. Loading Speed: Google research shows that half of the visitors of the typical website drop off while they’re waiting for the website to load. Speed is a combination of how the website’s built, server hardware, server resources (such as processor power, memory etc.), software configuration, domestic/international bandwidth, server location, use of CDN etc. The choice of your web host and the plan you have with them affect many of these factors and thus the loading speed and your website’s revenue.
  2. Backup and restore options: Computers and harddisks crash, so what about those orders that came in today, are they gone too? Was the backup on the same server? Or were they stored off site? What about the backup from last month?
  3. Internet Connection: Regular internet providers (cable/dsl) to your home or office can typically download well, but have limitations. Especially with uploads. Your website gets uploaded to visitors, and that bandwidth is shared amongst all visitors, so a typical internet provider doesn’t provide enough bandwidth for your visitors. It’s also not reliable and when it’s down, your website and business is down too.
  4. Software updates: The minimum to keep your website somewhat secure is keeping the server software up to date. Testing if the updates work well are required too.
  5. Software configuration: The default settings of server software leaves a lot of holes for hackers to break in, also the default settings do not provide you with the best performance. Expert knowledge/experience is required to make changes to the configuration to make sure it works well for the specific hosting solution that is required.
  6. Firewall/Malware/Anti-virus Scanning: An ever increasing number of automated programs (bots) is trying to find holes in the websites themselves. When they succeed, the customer’s website is used to send spam, show embarrasing advertisements etc. Scanning websites and preventing access means website owners can be protected or at least alerted to fix the issues before their Google ranking is affected and negatively affects the business revenue.
  7. Support: Having deep knowledge and experience about hosting is something that accrues within a good web host over the years. Having access to that experience via email or over the phone is priceless.



When you host not from your home or office, but from a cloud provider such as Amazon AWS or Microsoft Azure, you at least have item #3 covered, the internet connection. All the other items still rely on your own technical skills to set up, develop and keep up to date.


When you should host your own website (or application):

  1. If your business is your website: for example if you’re eBay or Facebook (and this is not about the size of the business, but the core of the product) and web hosting is at the core of your product. The flexibility of in-house hosting gives you a competitive edge.
  2. When you have all of the above in house: an experience web hosting team, the software solutions and adding this complexity to your business is worth it.
  3. When you don’t care [about any of the above]. That’s fine. Just please keep things up to date so you don’t help spammers.

If you have feedback to add to the list please let us know.
If you need quality hosting in Bangkok, please fill out the form below so we can see how we can best work together.

WordPress Downgrade Plugin

By Rutger | August 14, 2020

If for some reason you run into an issue when you upgraded WordPress, you can simply restore the backup that you made (you made one, right?) If the issue is with WordPress core, and for example your theme does not (yet) support the new WordPress version, then it’s good to know there’s a downgrade plugin…

WordPress 5.5 “Eckstine”

By Rutger | August 11, 2020

[Upgrade issues? Check the downgrade plugin post] Here it is! WordPress 5.5 “Eckstine” is finally released. The 39th version of WordPress is named after the jazz musician Billy Eckstine. You can download the latest version of WordPress or update in your dashboard. With the new WordPress 5.5 “Eckstine”, your site gets new power as it is…

Two Factor Authentication (2FA) for Control Panel

By Rutger | August 11, 2020

The control panel already limits unauthorized login attempts to prevent anyone from accessing your sensitive information. You can also add an extra layer of protection by enabling two-factor authentication. Two-factor authentication also known as two-factor verification or 2FA is an additional step in the login process that requires users to present a piece of information that…

Google Resumes Its Attempt to Hides Full Addresses on Chrome 85

By Rutger | July 1, 2020

Over the years Google has tried to hide full URLs in Chrome’s address bar, despite the public backlash that came after every attempt, Google is pressing on with new plans to hide all parts of web addresses except the domain name. To test this, you have to download and install the Canary channel from the…

How to protect yourself from your ISP snooping on the websites you visit

By Rutger | June 21, 2020

TLDR; To prevent your ISP snooping on the websites you visit, you must not only change your browser settings, you most likely also need to change your DNS settings. Your Internet Service Provider (ISP) connects you to the internet, every request sent can be logged and tells your ISP which websites you visited, down to the hostnames…

Thai Database Leaks 8.3 Billion Internet Records

By Rutger | June 5, 2020

Thailand’s largest telecommunications company’s Advanced Info Service (AIS) urgently brought down one of its databases following a leak of more than 8 billion real-time internet records on millions of Thai internet users. The data breach was discovered by security researcher Justine Paine, who found an exposed ElasticSearch database online containing DNS queries and Netflow data…

What is the new Brave Browser about?

By Rutger | May 20, 2020

The internet took a deep dive into Brave Private Browser, to figure out why it has become increasingly popular to users. Here’s what you need to know to decide whether Brave’s for you.   What makes Brave browser special amongst other browsers is its speed and the privacy protection it provides to users, both a…

Keep your email safe from hackers and trackers using Firefox Private Relay

By Rutger | May 13, 2020

Firefox Private Relay is a new add-on service by Firefox maker Mozilla; the service is designed to reduce unwanted emails and spam by generating unique aliases acting as a proxy email service to hide the user’s email address from advertisers and spam operators when signing up for a web form. The service entered testing last month…

Zoom’s 5.0 Update Improves Encryption, Adds Meeting Security Features

By Rutger | May 7, 2020

As the COVID-19 virus spread across the globe, the business landscape was forced to make a number of swift changes. Almost overnight, the video conferencing app Zoom becomes the go-to option to hold lessons, business meetings, and sensitive discussions. The surge in popularity, the firm was also bombarded for issues related to its privacy and…

How to Change PHP Version of Your Websites

By Rutger | May 5, 2020

Update: PHP 7.4 is available (August 2020) While it is a best practice to always use the latest version of PHP, compatibility is also an important factor to consider before upgrading. Starting May 2020 it is now possible to choose which PHP version your account uses via the Control Panel.   Note: this is done per account (username),…