[{"data":1,"prerenderedAt":7832},["ShallowReactive",2],{"blog-en":3},[4,76,356,411,559,741,899,994,1426,2261,2459,2953,3351,3495,3613,3842,3948,4383,4584,5286,5457,5865,6083,6297,6530,6697,6889,7126,7220,7424,7573,7589],{"id":5,"title":6,"body":7,"category":63,"date":64,"description":13,"extension":65,"head":66,"image":67,"imageCredit":66,"imageCreditUrl":66,"locale":68,"meta":69,"navigation":70,"ogImage":66,"path":71,"robots":66,"schemaOrg":66,"seo":72,"sitemap":73,"stem":74,"__hash__":75},"blog\u002Fblog\u002Fen\u002F2026-03-30-neues-logo-neuer-auftritt.md","New logo, new look",{"type":8,"value":9,"toc":55},"minimark",[10,14,19,22,26,38,42,45,49,52],[11,12,13],"p",{},"Same logo for eight years. At some point you notice it doesn't fit anymore. The old design with the blue and green tiles was fine, but it looked like 2018 because it was from 2018.",[15,16,18],"h2",{"id":17},"the-new-logo","The new logo",[11,20,21],{},"A stylized \"B\" with two small squares. Simpler than before, one color instead of two. I wanted something that works as a tiny favicon and is immediately recognizable.",[15,23,25],{"id":24},"new-color","New color",[11,27,28,29,33,34,37],{},"The old brand color was a fairly unremarkable blue (",[30,31,32],"code",{},"#1577b8","). The new one is bolder, almost an indigo (",[30,35,36],{},"#2121f4","). I like it better, and it's a lot more visible on screen.",[15,39,41],{"id":40},"the-website","The website",[11,43,44],{},"Redid that too while I was at it. Less color on the pages, bigger type. Looks cleaner and gets out of the way of the actual content.",[15,46,48],{"id":47},"why-now","Why now?",[11,50,51],{},"Because a lot has changed in eight years. I do more than WHMCS modules these days: consulting, managed hosting, custom development. The old look just didn't match anymore.",[11,53,54],{},"Nothing changes about the products or the support. Just the visuals.",{"title":56,"searchDepth":57,"depth":57,"links":58},"",2,[59,60,61,62],{"id":17,"depth":57,"text":18},{"id":24,"depth":57,"text":25},{"id":40,"depth":57,"text":41},{"id":47,"depth":57,"text":48},"Company","2026-03-30","md",null,"\u002Fimg\u002Fblog\u002Fneues-logo-2026.png","en",{},true,"\u002Fblog\u002Fen\u002F2026-03-30-neues-logo-neuer-auftritt",{"title":6,"description":13},{"loc":71},"blog\u002Fen\u002F2026-03-30-neues-logo-neuer-auftritt","MsoLBNskzIHqlqfkorRAJBEdmJ4zmH8tIA8zz7qkB2k",{"id":77,"title":78,"body":79,"category":66,"date":345,"description":346,"extension":65,"head":66,"image":347,"imageCredit":348,"imageCreditUrl":349,"locale":68,"meta":350,"navigation":70,"ogImage":66,"path":351,"robots":66,"schemaOrg":66,"seo":352,"sitemap":353,"stem":354,"__hash__":355},"blog\u002Fblog\u002Fen\u002F2025-12-22-becker-connect-launch-2026.md","Becker Connect Platform – Launch in Q2 2026",{"type":8,"value":80,"toc":337},[81,98,102,109,124,135,139,150,153,169,176,180,191,194,222,232,236,239,242,274,278,285,302,309,313,316,334],[11,82,83,84,88,89,92,93,97],{},"We are excited to announce the launch of our new ",[85,86,87],"strong",{},"Becker Connect Platform"," in the ",[85,90,91],{},"second quarter of 2026",". In this article, we provide an exclusive preview of the current development stage and showcase ",[94,95,96],"em",{},"work-in-progress"," images of our integrations.",[15,99,101],{"id":100},"what-is-becker-connect","What is Becker Connect?",[11,103,104,105,108],{},"Becker Connect is our answer to the growing demands of modern hosting and IT companies for ",[85,106,107],{},"flexible, transparent, and audit-proof document and accounting processes",".",[11,110,111,112,115,116,119,120,123],{},"As providers of synchronization solutions, such as those linking ",[85,113,114],{},"WHMCS"," to ",[85,117,118],{},"sevDesk"," and ",[85,121,122],{},"Lexware Office",", we have been offering stable document synchronization solutions to our clients for years. However, these existing approaches are increasingly reaching technical and organizational limits.",[11,125,126,127,130,131,134],{},"A significant issue is the heavy reliance on ",[85,128,129],{},"IonCube-encrypted code"," in WHMCS add-ons. This complicates debugging and often leads to problems during updates. Additionally, WHMCS does not offer a ",[85,132,133],{},"native auto-update function"," for add-ons, causing security or functional updates to be implemented only after delays.",[15,136,138],{"id":137},"why-becker-connect","Why Becker Connect?",[11,140,141,142,145,146,149],{},"With Becker Connect, we have developed an ",[85,143,144],{},"independent platform"," that allows for the ",[85,147,148],{},"central consolidation of invoices, customers, and payments","—regardless of the source software used.",[11,151,152],{},"It's easy to connect multiple instances, including:",[154,155,156,160,163],"ul",{},[157,158,159],"li",{},"multiple WHMCS installations",[157,161,162],{},"various sevDesk or Lexware-Office clients",[157,164,165,166],{},"external payment providers like ",[85,167,168],{},"Stripe",[11,170,171,172,175],{},"The aim: a ",[85,173,174],{},"clear separation of operational billing and accounting"," without media disruptions or manual exports.",[15,177,179],{"id":178},"automated-flows-instead-of-manual-processes","Automated Flows Instead of Manual Processes",[11,181,182,183,186,187,190],{},"A central concept of Becker Connect is the so-called ",[85,184,185],{},"Flows",". These are ",[85,188,189],{},"automated processes"," that can be customized for each integration.",[11,192,193],{},"Practical examples include:",[154,195,196,199,202,208,215],{},[157,197,198],{},"Invoices generated in WHMCS are automatically transferred to sevDesk or Lexware Office",[157,200,201],{},"The document is created in the target accounting software and then sent back to WHMCS",[157,203,204,205],{},"WHMCS can still serve as a billing system while the ",[85,206,207],{},"primary accounting happens externally",[157,209,210,211,214],{},"PDF documents from WHMCS can alternatively be transferred as ",[85,212,213],{},"income receipts"," (instead of invoices) to accounting",[157,216,217,218,221],{},"Parallel scenarios, such as a ",[85,219,220],{},"system switch from WHMCS to external accounting software",", are possible",[11,223,224,225,228,229,108],{},"This makes Becker Connect applicable for ",[85,226,227],{},"data migrations"," as well as for ",[85,230,231],{},"hybrid setups",[15,233,235],{"id":234},"security-client-separation","Security & Client Separation",[11,237,238],{},"IT security is a crucial concern, especially for our tech-savvy hosting clients. Becker Connect was developed from the ground up with a comprehensive security concept.",[11,240,241],{},"Key features include:",[154,243,244,250,256,262,268],{},[157,245,246,249],{},[85,247,248],{},"Encrypted data transmission"," over modern TLS standards—from admin access to external integration",[157,251,252,255],{},[85,253,254],{},"Token-based authentication"," for connected services like Stripe, sevDesk, or Lexware Office",[157,257,258,261],{},[85,259,260],{},"Strict client separation",": All connected instances are unequivocally assigned to a client",[157,263,264,265],{},"Data is processed exclusively ",[85,266,267],{},"within the respective client",[157,269,270,273],{},[85,271,272],{},"Minimal permissions"," for external integrations based on the least-privilege principle, ensuring a clear segregation of billing and payroll data",[15,275,277],{"id":276},"gobd-compliance-audit-assurance","GoBD Compliance & Audit Assurance",[11,279,280,281,284],{},"Becker Connect assists companies in adhering to ",[85,282,283],{},"GoBD requirements",":",[154,286,287,293,299],{},[157,288,289,290],{},"Original invoices can ",[85,291,292],{},"not be altered after creation",[157,294,295,296],{},"All relevant activities are ",[85,297,298],{},"completely and transparently logged",[157,300,301],{},"Modifications, exports, and synchronizations are verifiable at any time",[11,303,304,305,308],{},"The platform is designed to be ",[85,306,307],{},"audit-proof"," from the ground up.",[15,310,312],{"id":311},"supported-interfaces-current","Supported Interfaces (Current)",[11,314,315],{},"For the launch, we support the following systems:",[154,317,318,322,326,330],{},[157,319,320],{},[85,321,114],{},[157,323,324],{},[85,325,118],{},[157,327,328],{},[85,329,122],{},[157,331,332],{},[85,333,168],{},[11,335,336],{},"Further integrations are already being planned.",{"title":56,"searchDepth":57,"depth":57,"links":338},[339,340,341,342,343,344],{"id":100,"depth":57,"text":101},{"id":137,"depth":57,"text":138},{"id":178,"depth":57,"text":179},{"id":234,"depth":57,"text":235},{"id":276,"depth":57,"text":277},{"id":311,"depth":57,"text":312},"2025-12-22","We are excited to announce the launch of our new Becker Connect Platform in the second quarter of 2026. In this article, we provide an exclusive preview of the current development stage and showcase work-in-progress images of our integrations.","\u002Fimg\u002Fblog\u002Fbecker-connect-launch-2026.webp","WikiImages","https:\u002F\u002Fpixabay.com\u002Fusers\u002FWikiImages-1897\u002F",{},"\u002Fblog\u002Fen\u002F2025-12-22-becker-connect-launch-2026",{"title":78,"description":346},{"loc":351},"blog\u002Fen\u002F2025-12-22-becker-connect-launch-2026","cXBa7Id-5WQqbrTWrM0nGxp0QlTaC6jDvhq5ToNvoqc",{"id":357,"title":358,"body":359,"category":66,"date":401,"description":363,"extension":65,"head":66,"image":402,"imageCredit":403,"imageCreditUrl":404,"locale":68,"meta":405,"navigation":70,"ogImage":66,"path":406,"robots":66,"schemaOrg":66,"seo":407,"sitemap":408,"stem":409,"__hash__":410},"blog\u002Fblog\u002Fen\u002F2025-12-05-shopify-ausfall-dezember-2025.md","Global Shopify Outage on December 5, 2025: Error 500 Due to Cloudflare Disruption",{"type":8,"value":360,"toc":395},[361,364,367,370,375,378,381,385,388,392],[11,362,363],{},"Since December 5, 2025, at 08:42 UTC, there has been a worldwide Shopify outage. Numerous users report encountering a 500 Internal Server Error when accessing online shops as well as internal Shopify services, often accompanied by a Cloudflare error message. This Shopify error is not the user's fault but lies on Shopify's side or their proxy infrastructure over Cloudflare. Current information indicates that the Shopify status page, support, customer shops, and the main website are inaccessible, suggesting a complete disruption of Shopify.",[11,365,366],{},"Users affected come from various regions, including Amsterdam, Germany, the USA (both West and East Coast), India, and London. The plethora of disruption reports confirms a global Shopify outage. Other services, like Claude AI, are also unavailable, again pointing towards a larger Cloudflare disruption. The last comparable Cloudflare outage occurred on November 18, 2025. Although Cloudflare reported at 09:02 UTC that only the API and dashboard were impacted, the actual outages have a significantly broader scope.",[11,368,369],{},"For Shopify users, the Error 500 cannot currently be resolved independently, as the disruption can only be addressed by Shopify or Cloudflare itself.",[371,372,374],"h3",{"id":373},"update-0911-utc","Update 09:11 UTC",[11,376,377],{},"Monitoring shows that provider Cloudflare is back online and requests are reaching the designated destinations again.",[11,379,380],{},"An official statement from Cloudflare is still pending.",[15,382,384],{"id":383},"what-is-cloudflare","What is Cloudflare?",[11,386,387],{},"Cloudflare is a globally used network and security service provider that speeds up websites through a global Content Delivery Network and protects them from attacks like DDoS. As Cloudflare acts as a reverse proxy between visitors and the actual servers, disruptions in its infrastructure can cause websites to become unreachable even if the underlying servers are functioning correctly. Many major platforms, including Shopify, use Cloudflare, which means outages at Cloudflare can immediately lead to global disruptions.",[15,389,391],{"id":390},"what-is-shopify","What is Shopify?",[11,393,394],{},"Shopify is one of the largest e-commerce platforms in the world, allowing businesses to run an online shop without their own servers or complex technical infrastructure. Essential functions such as shop, checkout, payment processing, management, and support run centrally via Shopify. If a Shopify outage occurs or there are problems with an intermediary service like Cloudflare, retailers and customers cannot access shops, place orders, or use administrative areas.",{"title":56,"searchDepth":57,"depth":57,"links":396},[397,399,400],{"id":373,"depth":398,"text":374},3,{"id":383,"depth":57,"text":384},{"id":390,"depth":57,"text":391},"2025-12-05","\u002Fimg\u002Fblog\u002Fshopify-ausfall-dezember-2025.webp","IqbalStock","https:\u002F\u002Fpixabay.com\u002Fusers\u002FIqbalStock-12845379\u002F",{},"\u002Fblog\u002Fen\u002F2025-12-05-shopify-ausfall-dezember-2025",{"title":358,"description":363},{"loc":406},"blog\u002Fen\u002F2025-12-05-shopify-ausfall-dezember-2025","6GOtrmQF6U-CeRzJ2OUZb4lQvNpJ11oULcusfCnn1Hg",{"id":412,"title":413,"body":414,"category":66,"date":549,"description":413,"extension":65,"head":66,"image":550,"imageCredit":551,"imageCreditUrl":552,"locale":68,"meta":553,"navigation":70,"ogImage":66,"path":554,"robots":66,"schemaOrg":66,"seo":555,"sitemap":556,"stem":557,"__hash__":558},"blog\u002Fblog\u002Fen\u002F2025-09-30-becker-connect-vorstellung.md","Introducing Becker Connect: Your Central Platform for Accounting Integration",{"type":8,"value":415,"toc":547},[416,420,423,427,430,435,438,443,469,474,500,505,531,536,539,544],[11,417,418],{},[85,419,413],{},[11,421,422],{},"Becker Connect is our new SaaS solution that unifies all our modules in one system. The goal: A central hub for synchronizing your business operations – simpler, more reliable, and free from the limitations of WHMCS.",[11,424,425],{},[85,426,101],{},[11,428,429],{},"Becker Connect links your accounting systems (lexoffice, sevDesk) with WHMCS and other platforms. Instead of separate integrations for each system, manage everything through a centralized portal.",[11,431,432],{},[85,433,434],{},"The Solution:",[11,436,437],{},"Becker Connect acts as a central mediator. All your systems connect to Becker Connect, and we manage the synchronization between them.",[11,439,440],{},[85,441,442],{},"Practical Examples:",[154,444,445,451,457,463],{},[157,446,447,450],{},[85,448,449],{},"Combining multiple invoicing systems",": Utilize lexoffice and sevDesk simultaneously – both communicate with WHMCS through Becker Connect",[157,452,453,456],{},[85,454,455],{},"Bidirectional synchronization",": Import invoices from WHMCS to lexoffice as records OR create invoices directly in lexoffice for WHMCS",[157,458,459,462],{},[85,460,461],{},"Centrally manage contacts",": Automatically synchronize customer data across all systems",[157,464,465,468],{},[85,466,467],{},"Migrate historical data",": Import and archive old invoices from sevDesk – your customers continue to have access even if you cancel sevDesk.",[11,470,471],{},[85,472,473],{},"Main Features:",[154,475,476,482,488,494],{},[157,477,478,481],{},[85,479,480],{},"Flexible invoice synchronization",": Import from WHMCS invoices to lexoffice or direct invoice creation in lexoffice for WHMCS",[157,483,484,487],{},[85,485,486],{},"Automation or manual control",": You decide at every step",[157,489,490,493],{},[85,491,492],{},"Advanced features",": Contact synchronization, payment assistant, transaction export (including Stripe data extract) included",[157,495,496,499],{},[85,497,498],{},"Data protection",": Server location in Germany, full data control",[11,501,502],{},[85,503,504],{},"Pricing & Upgrade Conditions:",[154,506,507,513,519,525],{},[157,508,509,512],{},[85,510,511],{},"New customers",": €14 net\u002Fmonth",[157,514,515,518],{},[85,516,517],{},"Existing customers",": €8.50 gross\u002Fmonth – guaranteed for life",[157,520,521,524],{},[85,522,523],{},"Buyers of the old version",": 12 months of free access (as long as support & updates are active)",[157,526,527,530],{},[85,528,529],{},"Add-on buyers",": All purchased features (contact sync, payment assistant, etc.) included permanently – at no extra cost (Only usable with an active main contract)",[11,532,533],{},[85,534,535],{},"Open Source:",[11,537,538],{},"All new WHMCS modules will be released fully open source without Ioncube.",[11,540,541],{},[85,542,543],{},"Access for Plugin Users:",[11,545,546],{},"Users of sevDesk and lexoffice plugins gain access to both interfaces.",{"title":56,"searchDepth":57,"depth":57,"links":548},[],"2025-09-30","\u002Fimg\u002Fblog\u002Fbecker-connect-vorstellung.webp","Lalmch","https:\u002F\u002Fpixabay.com\u002Fusers\u002FLalmch-1026205\u002F",{},"\u002Fblog\u002Fen\u002F2025-09-30-becker-connect-vorstellung",{"title":413,"description":413},{"loc":554},"blog\u002Fen\u002F2025-09-30-becker-connect-vorstellung","2dOIZ8jzGtSMEsnhJ8kWfM9LIg7xhMLNJljis-AhzgU",{"id":560,"title":561,"body":562,"category":66,"date":731,"description":566,"extension":65,"head":66,"image":732,"imageCredit":733,"imageCreditUrl":734,"locale":68,"meta":735,"navigation":70,"ogImage":66,"path":736,"robots":66,"schemaOrg":66,"seo":737,"sitemap":738,"stem":739,"__hash__":740},"blog\u002Fblog\u002Fen\u002F2025-07-17-421-misdirected-request-plesk.md","421 Misdirected Request after Apache Update on Plesk Server: Causes and Quick Solution",{"type":8,"value":563,"toc":723},[564,567,573,576,581,585,588,592,595,639,643,670,674,677,681,687,696,700],[11,565,566],{},"Many administrators and website owners using Plesk for Linux have faced the following error after a recent Apache update:",[11,568,569,572],{},[85,570,571],{},"421 Misdirected Request","\nThe client needs a new connection for this request because the requested hostname does not match the Server Name Indication (SNI) used.",[11,574,575],{},"This message often appears in the domain log as well:",[11,577,578],{},[30,579,580],{},"AH02032: Hostname default-xxx (default host as no SNI was provided) and hostname www.example.com provided via HTTP have no compatible SSL setup",[371,582,584],{"id":583},"cause","Cause",[11,586,587],{},"A new Apache version included security fixes (CVEs) that affect the interaction between Apache and nginx. These changes can lead to incompatibilities with SNI delivery, especially when nginx is used as a reverse proxy ahead of Apache. Often, automatic system updates are enabled, meaning that updates are installed without manual intervention.",[371,589,591],{"id":590},"solution","Solution",[11,593,594],{},"The recommended quick fix is to configure nginx to correctly forward SNI information. Follow these steps:",[596,597,598,604,613,621,634],"ol",{},[157,599,600,603],{},[85,601,602],{},"Log into the server via SSH","\nPreferably with a user who has root privileges.",[157,605,606,609,612],{},[85,607,608],{},"Execute the following command:",[610,611],"br",{},"bash",[157,614,615,618,620],{},[30,616,617],{},"echo -e \"proxy_ssl_server_name on;proxy_ssl_name \\$host;\" > \u002Fetc\u002Fnginx\u002Fconf.d\u002Ffixssl.conf && service nginx restart",[610,619],{},"This command creates a new configuration file for nginx and restarts the service.",[157,622,623,626,627,630,631,108],{},[85,624,625],{},"Note:","\nIf the folder ",[30,628,629],{},"\u002Fetc\u002Fnginx\u002Fconf.d\u002F"," does not exist, check the nginx configuration or create the folder. You may need to execute the command with ",[30,632,633],{},"sudo",[157,635,636],{},[85,637,638],{},"After this, the 421 Misdirected Request error should no longer occur and the websites should be accessible again.",[371,640,642],{"id":641},"important-notes","Important Notes",[154,644,645,654,660],{},[157,646,647,650,651,653],{},[85,648,649],{},"Root Privileges Required:"," The command must be executed with sufficient permissions (possibly use ",[30,652,633],{},").",[157,655,656,659],{},[85,657,658],{},"Automatic Updates:"," Check under Plesk > Tools & Settings > Update Settings to see if automatic system updates are enabled. This helps track when updates are installed.",[157,661,662,665,666,669],{},[85,663,664],{},"Rollback:"," If you encounter a 403 error after making the adjustment, remove the file ",[30,667,668],{},"\u002Fetc\u002Fnginx\u002Fconf.d\u002Ffixssl.conf"," and restart nginx.",[371,671,673],{"id":672},"conclusion","Conclusion",[11,675,676],{},"The \"421 Misdirected Request\" issue following Apache updates is currently widespread. The workaround described above provides a quick solution until developers provide a permanent fix.",[15,678,680],{"id":679},"self-promotion","Self-Promotion",[11,682,683,686],{},[85,684,685],{},"Constant updates, security vulnerabilities, or high licensing costs making life difficult?","\nWith our Managed Hosting and Reseller offerings, you can relax. We'll handle operations, maintenance, and security – reliably and cost-effectively.",[11,688,689],{},[690,691,695],"a",{"href":692,"rel":693},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Freseller-hosting",[694],"nofollow","Visit our Reseller Hosting",[15,697,699],{"id":698},"further-information","Further Information",[154,701,702,708,715],{},[157,703,704],{},[690,705,707],{"href":692,"rel":706},[694],"Reseller Hosting for agencies and hosts, made in Germany",[157,709,710],{},[690,711,714],{"href":712,"rel":713},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fblog\u002Fplesk\u002F421-misdirected-request-plesk-nach-apache-update-auf-plesk-server",[694],"Plesk Licenses, available at attractive rates",[157,716,717,718],{},"Source: ",[690,719,722],{"href":720,"rel":721},"https:\u002F\u002Fsupport.plesk.com\u002Fhc\u002Fen-us\u002Farticles\u002F33500191748887-Websites-hosted-in-Plesk-on-Ubuntu-22-04-are-not-accessible-after-a-recent-Apache-update-421-Misdirected-Request",[694],"Websites hosted in Plesk on Ubuntu 22.04 are not accessible after a recent Apache update: 421 Misdirected Request",{"title":56,"searchDepth":57,"depth":57,"links":724},[725,726,727,728,729,730],{"id":583,"depth":398,"text":584},{"id":590,"depth":398,"text":591},{"id":641,"depth":398,"text":642},{"id":672,"depth":398,"text":673},{"id":679,"depth":57,"text":680},{"id":698,"depth":57,"text":699},"2025-07-17","\u002Fimg\u002Fblog\u002F421-misdirected-request-plesk.webp","Pexels","https:\u002F\u002Fpixabay.com\u002Fusers\u002FPexels-2286921\u002F",{},"\u002Fblog\u002Fen\u002F2025-07-17-421-misdirected-request-plesk",{"title":561,"description":566},{"loc":736},"blog\u002Fen\u002F2025-07-17-421-misdirected-request-plesk","OPk-JMRJXySAY69bPve0n-qqdM--IRDP0WAlUUematk",{"id":742,"title":743,"body":744,"category":66,"date":889,"description":56,"extension":65,"head":66,"image":890,"imageCredit":891,"imageCreditUrl":892,"locale":68,"meta":893,"navigation":70,"ogImage":66,"path":894,"robots":66,"schemaOrg":66,"seo":895,"sitemap":896,"stem":897,"__hash__":898},"blog\u002Fblog\u002Fen\u002F2025-07-03-whmcs-email-templates-deutsch.md","WHMCS Email Templates in German Now Available for Free",{"type":8,"value":745,"toc":880},[746,750,757,764,768,771,797,801,804,813,817,820,837,841,860,864,870,877],[15,747,749],{"id":748},"introduction","Introduction",[11,751,752,753,756],{},"Professional customer communication is an essential part of any successful hosting or IT service business. Especially in the German-speaking region, customers expect a ",[85,754,755],{},"clear, formal language",", correct address forms, and legally compliant content – even (and especially) in automated system emails.",[11,758,759,760,763],{},"Anyone who uses WHMCS knows: while the standard templates are functional, they are ",[85,761,762],{},"linguistically quite basic",", mostly in English, and hardly adapted to local expectations. Translating, formatting, and personalizing these emails takes time and patience – especially if you value attention to detail.",[15,765,767],{"id":766},"the-benefits-of-professional-german-whmcs-email-templates","The Benefits of Professional German WHMCS Email Templates",[11,769,770],{},"Our thoroughly revised WHMCS email templates provide exactly what many WHMCS users have long missed:",[154,772,773,779,785,791],{},[157,774,775,778],{},[85,776,777],{},"German Language:"," correct, understandable, without translation errors",[157,780,781,784],{},[85,782,783],{},"Formal Address:"," automatic addressing with \"Dear Mr.\" or \"Dear Ms.\" through a custom field",[157,786,787,790],{},[85,788,789],{},"Structured Content:"," cleanly organized, clear information structure",[157,792,793,796],{},[85,794,795],{},"Ready to Use:"," usable in your WHMCS via SQL upload",[15,798,800],{"id":799},"example-addressing-with-custom-field","Example: Addressing with Custom Field",[11,802,803],{},"Our templates use a custom field in the client profile, which allows you to control the correct address. Once the customer selects \"Mr.\" or \"Ms.\" upon registration, the appropriate address is automatically inserted in every system email:",[805,806,811],"pre",{"className":807,"code":809,"language":810},[808],"language-text","{\n","text",[30,812,809],{"__ignoreMap":56},[15,814,816],{"id":815},"which-email-types-are-included","Which Email Types Are Included?",[11,818,819],{},"The templates cover all common WHMCS emails, including:",[154,821,822,825,828,831,834],{},[157,823,824],{},"Welcome after order",[157,826,827],{},"Invoice created, paid, overdue",[157,829,830],{},"Reminders and payment reminders",[157,832,833],{},"Ticket openings and responses",[157,835,836],{},"Product\u002Fservice reminders",[15,838,840],{"id":839},"download-now","Download Now",[11,842,843,844,847,848,856,857,108],{},"All existing ",[85,845,846],{},"WHMCS Managed Hosting customers"," can download and use the new, revised email templates ",[85,849,850,851],{},"immediately in the customer area at ",[690,852,855],{"href":853,"rel":854},"http:\u002F\u002Fportal.becker-software.de",[694],"portal.becker-software.de"," under ",[85,858,859],{},"\"Downloads\"",[371,861,863],{"id":862},"installation","Installation",[11,865,866,867],{},"Simply open phpMyAdmin and execute the provided SQL command. This automatically overwrites all existing standard email templates from WHMCS.\nImportant: Individually created email templates or templates generated by add-ons remain unaffected. ",[85,868,869],{},"Only the WHMCS standard templates are replaced.",[11,871,872,873,876],{},"Our templates are designed to be in German by default. Only customers who have explicitly ",[85,874,875],{},"enabled English as a language in their WHMCS"," will receive the English version of the emails.",[11,878,879],{},"If you use our Managed WHMCS Hosting, we will of course handle the complete installation of the email templates for you free of charge – including checking that all templates are correctly assigned.",{"title":56,"searchDepth":57,"depth":57,"links":881},[882,883,884,885,886],{"id":748,"depth":57,"text":749},{"id":766,"depth":57,"text":767},{"id":799,"depth":57,"text":800},{"id":815,"depth":57,"text":816},{"id":839,"depth":57,"text":840,"children":887},[888],{"id":862,"depth":398,"text":863},"2025-07-03","\u002Fimg\u002Fblog\u002Fwhmcs-email-templates-deutsch.webp","rawpixel","https:\u002F\u002Fpixabay.com\u002Fusers\u002Frawpixel-4283981\u002F",{},"\u002Fblog\u002Fen\u002F2025-07-03-whmcs-email-templates-deutsch",{"title":743,"description":56},{"loc":894},"blog\u002Fen\u002F2025-07-03-whmcs-email-templates-deutsch","1pkh75i6cMnKco3J9kkAZPBrFcB5qpq2QNByf-xeLhw",{"id":900,"title":901,"body":902,"category":66,"date":984,"description":906,"extension":65,"head":66,"image":985,"imageCredit":986,"imageCreditUrl":987,"locale":68,"meta":988,"navigation":70,"ogImage":66,"path":989,"robots":66,"schemaOrg":66,"seo":990,"sitemap":991,"stem":992,"__hash__":993},"blog\u002Fblog\u002Fen\u002F2025-04-28-teilausfall-april-2025.md","Post Mortem: Brief Outage on April 27, 2025 Due to Host Overload (Out of Memory)",{"type":8,"value":903,"toc":982},[904,907,912,950,956,962,968],[11,905,906],{},"On April 27, 2025, there was a brief outage within our infrastructure between 11:12 PM and 11:17 PM. The cause was a memory overload on one of our hosts, which became unresponsive. Our monitoring system triggered an alarm within a minute of the outage and notified the responsible on-call staff member.",[11,908,909],{},[85,910,911],{},"Timeline of the Incident:",[154,913,914,920,926,932,938,944],{},[157,915,916,919],{},[85,917,918],{},"11:12 PM"," – The host becomes unresponsive due to a memory overload.",[157,921,922,925],{},[85,923,924],{},"11:13 PM"," – The responsible on-call staff member begins the investigation.",[157,927,928,931],{},[85,929,930],{},"11:14 PM"," – The monitoring system triggers an alert.",[157,933,934,937],{},[85,935,936],{},"11:16 PM"," – The affected host is identified as the root cause. A live migration of affected virtual machines is initiated. Non-critical VMs are powered down to release resources.",[157,939,940,943],{},[85,941,942],{},"11:17 PM"," – The infrastructure is back online, and the migration is ongoing.",[157,945,946,949],{},[85,947,948],{},"11:19 PM"," – The host is fully back online. A live migration of the remaining VMs is conducted, which may lead to minimal performance dips in the minutes following.",[11,951,952,955],{},[85,953,954],{},"Cause of the Incident:","\nThe incident was caused by a memory overload on a host system. This resulted in the host being unable to respond to requests, temporarily affecting parts of the infrastructure.",[11,957,958,961],{},[85,959,960],{},"Remedial Actions:","\nAfter being alerted by the monitoring system, the host's overload was identified. Non-essential, non-critical VMs were promptly shut down, and a load distribution among the remaining systems was conducted. Simultaneously, a live migration of the affected virtual machines to other hosts was initiated. This quickly alleviated the host and restored the infrastructure.",[11,963,964,967],{},[85,965,966],{},"Reflection and Preventive Measures:","\nTo ensure such an incident is avoided in the future, we are implementing the following measures:",[596,969,970,976],{},[157,971,972,975],{},[85,973,974],{},"Adjusting Monitoring Thresholds:","\nWe will adjust the threshold for RAM consumption in the monitoring system so that an impending overload can be detected earlier, allowing timely response.",[157,977,978,981],{},[85,979,980],{},"Automatic Load Distribution:","\nMoving forward, we will introduce automatic load distribution for our non-critical VMs to preemptively prevent exceeding critical thresholds.",{"title":56,"searchDepth":57,"depth":57,"links":983},[],"2025-04-28","\u002Fimg\u002Fblog\u002Fteilausfall-april-2025.webp","a_roesler","https:\u002F\u002Fpixabay.com\u002Fusers\u002Fa_roesler-6184374\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-28-teilausfall-april-2025",{"title":901,"description":906},{"loc":989},"blog\u002Fen\u002F2025-04-28-teilausfall-april-2025","VmAfp5cSfctGcNJWAScmTz3LEUGc3CXSbhEjIKAufXU",{"id":995,"title":996,"body":997,"category":66,"date":1418,"description":1001,"extension":65,"head":66,"image":1419,"imageCredit":733,"imageCreditUrl":734,"locale":68,"meta":1420,"navigation":70,"ogImage":66,"path":1421,"robots":66,"schemaOrg":66,"seo":1422,"sitemap":1423,"stem":1424,"__hash__":1425},"blog\u002Fblog\u002Fen\u002F2025-04-25-open-source-webserver-apache.md","Top Open-Source Web Servers as Apache Replacements",{"type":8,"value":998,"toc":1410},[999,1002,1012,1016,1020,1023,1039,1045,1083,1086,1091,1102,1119,1122,1126,1129,1138,1144,1157,1163,1169,1175,1178,1184,1190,1193,1196,1200,1203,1208,1222,1236,1242,1268,1273,1302,1308,1312,1315,1321,1327,1330,1345,1355,1361,1367,1373,1378,1407],[11,1000,1001],{},"Apache, also known as Apache2, is essentially the standard in the PHP world. It is often installed automatically with many packages, making it nearly ubiquitous. Although it is widely used, and some IT veterans still swear by Apache, I have always found it somewhat cumbersome. The XML-structured approach for configuration seems a bit outdated to me now. Consequently, I've spent years exploring alternatives. In this article, I would like to introduce you to the web servers I've used during this time that represent a better choice than Apache for me.",[11,1003,1004,1005,1008,1009,1011],{},"Another example of Apache's well-known quirks is the ubiquitous ",[30,1006,1007],{},".htaccess"," file, which ends up in WordPress, Joomla, Drupal, and almost every open-source web system automatically. It allows URL rewrites, access rules, and other settings to be overridden per directory – yet every ",[30,1010,1007],{}," lookup slows down performance and complicates caching. Many modern web servers therefore forgo directory overrides, opting instead for centralized, clearly structured configuration files that can be reloaded without a performance penalty. These often sleeker approaches are precisely what I’m introducing in this article.",[15,1013,1015],{"id":1014},"the-alternatives","The Alternatives",[371,1017,1019],{"id":1018},"_1-nginx-pronounced-engine-x","1. Nginx (pronounced \"Engine X\")",[11,1021,1022],{},"After Apache2, Nginx is probably the second-best-known open-source web server and has made a name for itself in recent years, particularly as a powerful reverse proxy. Many hosts already deploy Nginx before Apache2 to deliver static assets like images or CSS\u002FJS files especially quickly. Even the widely used hosting software Plesk employs Nginx as a proxy layer in front of Apache2 to optimize loading times and better handle load spikes.",[11,1024,1025,1028,1029,1028,1032,1035,1036,1038],{},[85,1026,1027],{},"Configuration in"," ",[30,1030,1031],{},".conf",[85,1033,1034],{},"format","\nThe configuration files for Nginx are plain text files with the ",[30,1037,1031],{}," extension. Within them, you define hierarchies of contexts and directives:",[805,1040,1043],{"className":1041,"code":1042,"language":810},[808],"http {\n    server {\n        listen       \n",[30,1044,1042],{"__ignoreMap":56},[154,1046,1047,1053,1059,1065],{},[157,1048,1049,1052],{},[85,1050,1051],{},"http\u002F"," – Global context for protocol settings",[157,1054,1055,1058],{},[85,1056,1057],{},"server\u002F"," – Virtual host (domain level)",[157,1060,1061,1064],{},[85,1062,1063],{},"location\u002F"," – Path-based request routing",[157,1066,1067,1068,1071,1072,1071,1075,1078,1079,1082],{},"Directives like ",[30,1069,1070],{},"listen",", ",[30,1073,1074],{},"server_name",[30,1076,1077],{},"root",", or ",[30,1080,1081],{},"fastcgi_pass"," govern the individual functions",[11,1084,1085],{},"This simple, declarative format is very well-suited for versioning and automation.",[11,1087,1088],{},[85,1089,1090],{},"Scalability and Ecosystem",[154,1092,1093,1096,1099],{},[157,1094,1095],{},"Nginx's event-driven architecture handles thousands of simultaneous connections with minimal memory usage.",[157,1097,1098],{},"In container orchestrations like Kubernetes, Nginx is often found as an ingress controller.",[157,1100,1101],{},"A multitude of modules (e.g., for caching, compression, security headers) makes Nginx extremely flexible.",[11,1103,1104,1107,1108,1071,1111,1114,1115,1118],{},[85,1105,1106],{},"Site Caching","\nNginx can cache entire web pages and thus respond to requests from the cache multiple times – exactly as is done with this blog post. With directives like ",[30,1109,1110],{},"proxy_cache",[30,1112,1113],{},"proxy_cache_valid",", and finely granular ",[30,1116,1117],{},"location"," rules, we ensure that repeated accesses are served quickly without passing each request to the backend servers.",[11,1120,1121],{},"With Nginx, you get a solid, highly scalable web server that feels at home in modern cloud environments just as much as on classic VPS installations.",[371,1123,1125],{"id":1124},"_2-caddy","2. Caddy",[11,1127,1128],{},"Caddy is a relatively newer but extremely practical open-source web server based on Go, which stands out with a particularly simple configuration and some very practical features. A highlight is the built-in support for ACME (Let's Encrypt), which automatically and free of charge generates and renews SSL certificates – no need to manually apply for or configure a certificate.",[11,1130,1131,1134,1135,1137],{},[85,1132,1133],{},"Simple Configuration","\nCaddy uses a very simple and readable configuration file, typically called a \"Caddyfile.\" Instead of writing complex ",[30,1136,1031],{}," files, one defines the main server instructions in just a few lines:",[805,1139,1142],{"className":1140,"code":1141,"language":810},[808],"example.com {\n    root * \n",[30,1143,1141],{"__ignoreMap":56},[11,1145,1146,1147,1152,1153,1156],{},"In this example, a website running on \"",[690,1148,1151],{"href":1149,"rel":1150},"http:\u002F\u002Fexample.com",[694],"example.com","\" is configured. The web server serves files from the ",[30,1154,1155],{},"\u002Fvar\u002Fwww\u002Fhtml"," folder but also forwards requests to another server running on port 8080.",[11,1158,1159,1162],{},[85,1160,1161],{},"Integrated ACME Support","\nA standout feature of Caddy is automatic SSL certificate management. When you start Caddy, it immediately ensures that your websites are accessible via HTTPS. Caddy takes care of everything, from certificate request to installation to automatic renewal, without requiring any external configuration, making it highly user-friendly.",[11,1164,1165,1168],{},[85,1166,1167],{},"Load Balancing","\nCaddy also supports simple load balancing. You can specify multiple backend servers to which requests are distributed, better managing traffic and increasing fault tolerance. Here is a simple example:",[805,1170,1173],{"className":1171,"code":1172,"language":810},[808],"example.com {\n    reverse_proxy backend1.example.com backend2.example.com\n}\n",[30,1174,1172],{"__ignoreMap":56},[11,1176,1177],{},"Caddy automatically manages load distribution and offers reliable load balancing even without additional tools.",[11,1179,1180,1183],{},[85,1181,1182],{},"Support for Nginx Configuration Files","\nAnother standout feature of Caddy is the ability to import Nginx configuration files, making the transition to Caddy extremely simple for users switching from Nginx, as many configurations can be directly adopted without starting from scratch.",[11,1185,1186,1189],{},[85,1187,1188],{},"CLI and Simple Use Cases","\nCaddy can be started and configured effortlessly via the command line (CLI), making it ideal for simple use cases such as proxying, as a file server, or for smaller web applications. The server is ready to operate with a few commands, making it suitable for quick deployments.",[11,1191,1192],{},"I have frequently installed Caddy in the past when I needed a quick and simple solution for a web server or proxy – particularly in containerized environments. Caddy has often replaced Nginx, as it suffices for many of my requirements and offers a much simpler configuration.",[11,1194,1195],{},"Caddy convinces with a highly flexible and user-friendly approach and is particularly well-suited for projects requiring simple setup, SSL encryption, and load balancing.",[371,1197,1199],{"id":1198},"_3-haproxy","3. HAProxy",[11,1201,1202],{},"HAProxy is not a traditional web server with PHP-FPM support but a high-performance load balancer and reverse proxy. It shines in environments focused on high availability, traffic distribution, and extensive health checks.",[11,1204,1205],{},[85,1206,1207],{},"Usage Scenarios:",[154,1209,1210,1213,1216,1219],{},[157,1211,1212],{},"Distribution of HTTP(S) requests to multiple backend servers",[157,1214,1215],{},"SSL offloading and TLS termination",[157,1217,1218],{},"TCP load balancing (database proxies, SMTP, etc.)",[157,1220,1221],{},"Serves as a front door for microservices architectures",[11,1223,1224,1028,1226,1028,1229,1231,1232,1235],{},[85,1225,1027],{},[30,1227,1228],{},"haproxy.cfg",[85,1230,1034],{},"\nThe central configuration file ",[30,1233,1234],{},"\u002Fetc\u002Fhaproxy\u002Fhaproxy.cfg"," is divided into sections:",[805,1237,1240],{"className":1238,"code":1239,"language":810},[808],"\u003Cspan class=\"hljs-keyword\">global\u003C\u002Fspan>\n",[30,1241,1239],{"__ignoreMap":56},[154,1243,1244,1250,1256,1262],{},[157,1245,1246,1249],{},[85,1247,1248],{},"global",": System-wide settings (log, maximum connections, SSL parameters)",[157,1251,1252,1255],{},[85,1253,1254],{},"defaults",": Base configuration for all frontends and backends",[157,1257,1258,1261],{},[85,1259,1260],{},"frontend",": Defines which ports HAProxy listens on and where incoming connections are forwarded",[157,1263,1264,1267],{},[85,1265,1266],{},"backend",": List of target servers with health checks and load-balancing algorithm",[11,1269,1270],{},[85,1271,1272],{},"Important Features:",[154,1274,1275,1281,1287,1293],{},[157,1276,1277,1280],{},[85,1278,1279],{},"Health Checks"," (HTTP, TCP) ensure only healthy instances receive traffic.",[157,1282,1283,1286],{},[85,1284,1285],{},"SSL Offloading"," relieves backend servers from TLS processing.",[157,1288,1289,1292],{},[85,1290,1291],{},"Sticky Sessions"," (e.g., via cookies) can be enabled for stateful applications.",[157,1294,1295,119,1298,1301],{},[85,1296,1297],{},"Rate Limiting",[85,1299,1300],{},"Connection Throttling"," protect against overload.",[11,1303,1304,1307],{},[85,1305,1306],{},"Why HAProxy?","\nEven though HAProxy itself does not serve PHP-FPM processes, it perfectly complements any web server as a load distributor: You can run Nginx, Caddy, or Apache behind it and put HAProxy upfront to achieve maximum scalability and fault tolerance. We deploy HAProxy in demanding production environments where high availability and traffic management are required.",[371,1309,1311],{"id":1310},"_4-traefik","4. Traefik",[11,1313,1314],{},"Traefik is a modern, dynamically configurable reverse proxy and load balancer that stands out for its automatic service discovery and seamless integration in container and orchestration environments. Unlike traditional web servers or proxies, Traefik loads its configuration at runtime from external sources (Docker, Kubernetes, Consul, etc.) without requiring a restart.",[11,1316,1317,1320],{},[85,1318,1319],{},"Automatic Service Discovery and Dynamic Configuration","\nTraefik \"talks\" to your container orchestrator or registry and automatically recognizes new services. For instance, a simple Docker run with labels is all it takes for Traefik to promptly set up the HTTP router:",[805,1322,1325],{"className":1323,"code":1324,"language":810},[808],"\u003Cspan class=\"hljs-comment\"># Example: docker-compose.yml\u003C\u002Fspan>\n",[30,1326,1324],{"__ignoreMap":56},[11,1328,1329],{},"Traefik then automatically handles:",[154,1331,1332,1339,1342],{},[157,1333,1334,1335,1338],{},"Creation of the router (",[30,1336,1337],{},"webapp",")",[157,1340,1341],{},"Connection to the service-load-balancer object",[157,1343,1344],{},"Health checks and load balancing",[11,1346,1347,1350,1351,1354],{},[85,1348,1349],{},"Integrated ACME\u002FLet’s Encrypt Support","\nSimilar to Caddy, Traefik offers automatic TLS management. You simply specify your email and desired ACME provider in the ",[30,1352,1353],{},"static"," configuration, and Traefik handles request, issuance, and renewal:",[805,1356,1359],{"className":1357,"code":1358,"language":810},[808],"# \n",[30,1360,1358],{"__ignoreMap":56},[11,1362,1363,1366],{},[85,1364,1365],{},"Load Balancing and Middleware","\nTraefik comes with numerous middleware functionalities (rate limiting, IP whitelist, header manipulation, circuit breaker), which can be easily activated through configuration. The integrated round-robin or weighted load balancing automatically distributes traffic to your backends.",[11,1368,1369,1372],{},[85,1370,1371],{},"Observability and Dashboard","\nTraefik provides an integrated web dashboard and API, allowing you to view all active routers, services, and middlewares live. It also provides metrics (Prometheus, Datadog, etc.) and log data for your monitoring systems.",[11,1374,1375],{},[85,1376,1377],{},"Usage Scenarios",[154,1379,1380,1386,1392,1398,1404],{},[157,1381,1382,1385],{},[85,1383,1384],{},"Container Environments:"," Docker Swarm, Kubernetes (Ingress Controller)",[157,1387,1388,1391],{},[85,1389,1390],{},"Microservices Architectures:"," dynamic routing without restarts",[157,1393,1394,1397],{},[85,1395,1396],{},"SSL\u002FTLS Management:"," automatic certificate acquisition",[157,1399,1400,1403],{},[85,1401,1402],{},"API Gateway:"," central routing rules and security layer",[157,1405,1406],{},"Docker labels: Traefik integrates perfectly with Docker and can be dynamically configured with labels.",[11,1408,1409],{},"We prefer to use Traefik in projects where services change dynamically and zero-downtime configuration is desired. Thanks to its close integration with modern platforms, Traefik is often our first choice as an ingress or edge proxy in cloud environments.",{"title":56,"searchDepth":57,"depth":57,"links":1411},[1412],{"id":1014,"depth":57,"text":1015,"children":1413},[1414,1415,1416,1417],{"id":1018,"depth":398,"text":1019},{"id":1124,"depth":398,"text":1125},{"id":1198,"depth":398,"text":1199},{"id":1310,"depth":398,"text":1311},"2025-04-25","\u002Fimg\u002Fblog\u002Fopen-source-webserver-apache.webp",{},"\u002Fblog\u002Fen\u002F2025-04-25-open-source-webserver-apache",{"title":996,"description":1001},{"loc":1421},"blog\u002Fen\u002F2025-04-25-open-source-webserver-apache","65N7IeuK-7NefrIbZZrZS01XfxZ6s-iepueHNK-GrQg",{"id":1427,"title":1428,"body":1429,"category":66,"date":1418,"description":56,"extension":65,"head":66,"image":2252,"imageCredit":2253,"imageCreditUrl":2254,"locale":68,"meta":2255,"navigation":70,"ogImage":66,"path":2256,"robots":66,"schemaOrg":66,"seo":2257,"sitemap":2258,"stem":2259,"__hash__":2260},"blog\u002Fblog\u002Fen\u002F2025-04-25-proxmox-backup-server-einrichten.md","Proxmox Backup Server (PBS): The Ultimate Guide for Secure and Efficient Backups in Proxmox VE Environments",{"type":8,"value":1430,"toc":2217},[1431,1433,1436,1439,1443,1446,1450,1467,1470,1474,1477,1482,1496,1500,1508,1512,1523,1527,1534,1537,1540,1558,1561,1568,1571,1574,1585,1588,1595,1598,1601,1615,1618,1622,1625,1629,1632,1635,1661,1665,1668,1691,1694,1698,1701,1707,1711,1714,1717,1721,1724,1728,1735,1739,1785,1789,1796,1804,1810,1814,1834,1838,1841,1845,1903,1909,1913,1920,1924,1931,1939,1946,1950,1953,1985,1990,2001,2005,2031,2034,2038,2045,2049,2052,2056,2098,2102,2105,2108,2112,2115,2119,2122,2133,2136,2150,2153,2157,2160,2164,2178,2181,2185,2188,2205,2210,2214],[15,1432,749],{"id":748},[11,1434,1435],{},"Reliable backups are the backbone of any stable IT infrastructure. In the hosting sector and in virtualization environments like Proxmox VE, it's essential to back up data quickly, efficiently, and securely, and to be able to restore it in case of emergency.",[11,1437,1438],{},"At Becker Software, we have been using the Proxmox Backup Server (PBS) for years, a powerful and cost-free open-source solution specifically developed for Proxmox VE. In this article, we will show you how to set up, secure, and optimally use PBS — including our proven best practices from daily operations.",[371,1440,1442],{"id":1441},"what-is-the-proxmox-backup-server","What is the Proxmox Backup Server?",[11,1444,1445],{},"The Proxmox Backup Server is a backup solution specifically tailored to Proxmox Virtual Environment (Proxmox VE). It enables fast, incremental, and deduplicated backups of virtual machines and containers.",[371,1447,1449],{"id":1448},"benefits-at-a-glance","Benefits at a glance:",[154,1451,1452,1455,1458,1461,1464],{},[157,1453,1454],{},"Open-source software without licensing costs",[157,1456,1457],{},"Seamless integration with Proxmox VE",[157,1459,1460],{},"Dedicated, secure backup format",[157,1462,1463],{},"Incremental backups and deduplication for efficient storage",[157,1465,1466],{},"High security and comprehensive rights management",[11,1468,1469],{},"Compared to other solutions like Veeam or Bareos, PBS stands out due to its tight integration with Proxmox VE and its simple management via a modern web interface.",[371,1471,1473],{"id":1472},"system-requirements-and-preparation","System Requirements and Preparation",[11,1475,1476],{},"To ensure that the Proxmox Backup Server runs stably and performs well, the following prerequisites should be met:",[1478,1479,1481],"h4",{"id":1480},"hardware-recommendation","Hardware Recommendation:",[154,1483,1484,1487,1490,1493],{},[157,1485,1486],{},"At least 4 CPU cores (amd64)",[157,1488,1489],{},"8 GB RAM recommended (better 16 GB+), according to the manufacturer’s specifications, 4 GB should be sufficient.",[157,1491,1492],{},"Separate redundant data storage (SSD or Enterprise HDD depending on the data volume), alternatively, external network-based storage.",[157,1494,1495],{},"1 Gbit\u002Fs network or faster.",[1478,1497,1499],{"id":1498},"software-prerequisites","Software Prerequisites:",[154,1501,1502,1505],{},[157,1503,1504],{},"Latest PBS ISO file from the Proxmox website. Download the ISO from the Proxmox website.",[157,1506,1507],{},"Ability to mount ISO via IPMI, iLO, or USB.",[1478,1509,1511],{"id":1510},"network-and-security","Network and Security:",[154,1513,1514,1517,1520],{},[157,1515,1516],{},"Separate VLAN or dedicated network for backups.",[157,1518,1519],{},"Firewall rules for access protection.",[157,1521,1522],{},"Optional: VPN for offsite backup targets.",[371,1524,1526],{"id":1525},"installation-step-by-step","Installation Step by Step",[596,1528,1529],{},[157,1530,1531],{},[85,1532,1533],{},"Download and Install PBS ISO",[11,1535,1536],{},"First, we download the latest Proxmox Backup Server ISO image directly from the official Proxmox website. This ensures that we are always working with the latest, securely patched version.",[11,1538,1539],{},"Here’s how to proceed:",[154,1541,1542,1549,1552,1555],{},[157,1543,1544,1545,108],{},"Go to the download page at ",[690,1546,1547],{"href":1547,"rel":1548},"https:\u002F\u002Fwww.proxmox.com\u002Fen\u002Fdownloads",[694],[157,1550,1551],{},"Select the Proxmox Backup Server section and download the ISO file.",[157,1553,1554],{},"Next, transfer the ISO image to a USB stick using tools like Rufus or balenaEtcher.",[157,1556,1557],{},"Boot the target server from this USB stick and follow the installation wizard.",[11,1559,1560],{},"During the installation, select the appropriate installation drive and confirm the remaining steps.",[596,1562,1563],{"start":57},[157,1564,1565],{},[85,1566,1567],{},"Partition the Disk and Choose the System Drive",[11,1569,1570],{},"In the next step, we define which hard drive will be the system drive for the Proxmox Backup Server. This is critical for stable and high-performance operation.",[11,1572,1573],{},"Our best practices:",[154,1575,1576,1579,1582],{},[157,1577,1578],{},"We use a separate SSD or NVMe drive for the operating system.",[157,1580,1581],{},"Additional drives for backup storage are not mounted during installation but only after the initial configuration.",[157,1583,1584],{},"The default partitioning scheme of Proxmox is adjusted if necessary, especially if specific RAID or LVM configurations are desired.",[11,1586,1587],{},"Once the installation assistant finishes partitioning, we move on to network configuration.",[596,1589,1590],{"start":398},[157,1591,1592],{},[85,1593,1594],{},"Network Configuration and Assign Hostname",[11,1596,1597],{},"A stable and clearly defined network configuration is crucial for backup servers. We set the hostname and network settings during the installation process.",[11,1599,1600],{},"Key points to pay attention to:",[154,1602,1603,1606,1609,1612],{},[157,1604,1605],{},"Assign a unique hostname based on our internal naming scheme, e.g., pbs01.domain.local.",[157,1607,1608],{},"The IP address is assigned statically, not via DHCP, to ensure reliable accessibility.",[157,1610,1611],{},"The gateway and DNS servers are entered according to our network structure.",[157,1613,1614],{},"For future Let's Encrypt certificates or DNS-based services, the hostname should be externally resolvable.",[11,1616,1617],{},"Once this step is completed, the server will boot and be ready for the first login via the web interface.",[371,1619,1621],{"id":1620},"initial-configuration-create-datastore","Initial Configuration: Create Datastore",[11,1623,1624],{},"Once the installation is complete and the Proxmox Backup Server is accessible via the web interface, we make the first basic configuration. The most important step here is creating a datastore, the location for your backups.",[1478,1626,1628],{"id":1627},"why-a-separate-datastore","Why a Separate Datastore?",[11,1630,1631],{},"A datastore in PBS is nothing more than a directory on a disk that is used to store backups. The great advantage is that the backups are not tied to a specific file system or complex database. The data is directly stored as files and directories in a well-structured and traceable folder system.",[11,1633,1634],{},"Here’s how to create the datastore:",[154,1636,1637,1643,1646,1652,1658],{},[157,1638,1639,1640,108],{},"In the web interface, navigate to ",[85,1641,1642],{},"Datastore → Create",[157,1644,1645],{},"Select the desired drive where the backups will be stored.",[157,1647,1648,1649,108],{},"Next, define a directory, e.g., ",[30,1650,1651],{},"\u002Fmnt\u002Fdatastore01",[157,1653,1654,1655,653],{},"Give the datastore a unique name (e.g., ",[30,1656,1657],{},"pbs-backup01",[157,1659,1660],{},"Save it — the datastore is now available for backup jobs.",[371,1662,1664],{"id":1663},"how-pbs-stores-the-backups-internally","How PBS Stores the Backups Internally",[11,1666,1667],{},"The Proxmox Backup Server uses a very robust and well-thought-out backup format:",[154,1669,1670,1676,1682],{},[157,1671,1672,1675],{},[85,1673,1674],{},"Deduplicated Chunk Files:","\nThe actual data of your VMs and containers is split into small, encrypted chunks. Each chunk is stored as a single file on the backup storage and is only stored once, even if it appears in multiple backups. This saves a tremendous amount of storage space.",[157,1677,1678,1681],{},[85,1679,1680],{},"Metadata Files:","\nFor each backup, metadata and an index are created. This data tells which chunks belong to which backup and how to reassemble them. This metadata is the key to performing restores.",[157,1683,1684,1687,1688,1690],{},[85,1685,1686],{},"Robustness through File-Based Concept:","\nThe great advantage:\nYou can easily move the entire backup directory (i.e., the entire datastore folder) to another Proxmox Backup Server — for example, via rsync, ZFS snapshot, or physical disk swap.",[610,1689],{},"As long as the metadata files are available, the new server can fully read and restore the backups, even if the data is encrypted.",[11,1692,1693],{},"This creates an extremely fail-safe and flexible backup structure, which is also excellent for offsite backups and disaster recovery scenarios.",[371,1695,1697],{"id":1696},"our-recommendation","Our Recommendation",[11,1699,1700],{},"We recommend creating a separate datastore for each backup strategy or cluster. This ensures clarity and simplifies permissions management.",[11,1702,1703,1706],{},[85,1704,1705],{},"Tip:","\nIf you ever need to move the backup directory to a new system, simply copy the directory structure and rebind the datastore in the new PBS. Within minutes, all backups will be available again — without needing to reinstall or restore a database.",[15,1708,1710],{"id":1709},"backup-users-and-permission-management","Backup Users and Permission Management",[11,1712,1713],{},"An often underestimated but critically important aspect of setting up a backup system is careful user rights management. Especially in conjunction with Proxmox VE as the backup source, careless permission assignment can lead to accidental or malicious deletion of backups.",[11,1715,1716],{},"We place particular emphasis on ensuring that no host or automated process can remove backups. In this section, we’ll show you how we enforce this using the Proxmox Backup Server (PBS) permission management.",[371,1718,1720],{"id":1719},"why-is-this-so-important","Why is this so important?",[11,1722,1723],{},"If a Proxmox VE host is granted unrestricted rights on the datastore, a compromise or misconfiguration could delete the entire backup directory. This is a critical risk that we proactively mitigate.",[371,1725,1727],{"id":1726},"our-solution-backup-user-with-restricted-permissions","Our solution: Backup user with restricted permissions",[11,1729,1730,1731,1734],{},"For each Proxmox VE host that writes backups to PBS, we create a dedicated user. This user gets only the necessary rights to create and read backups—but ",[85,1732,1733],{},"no"," delete permissions.",[1478,1736,1738],{"id":1737},"how-we-set-up-the-backup-user","How we set up the backup user",[154,1740,1741,1747,1753,1760,1782],{},[157,1742,1743,1744,108],{},"In the PBS web interface, navigate to ",[85,1745,1746],{},"Permissions → User",[157,1748,1749,1750,108],{},"Create a new user, e.g. ",[30,1751,1752],{},"pve01-backup@pbs",[157,1754,1755,1756,1759],{},"Generate an ",[85,1757,1758],{},"API token"," for this user (to be used by Proxmox VE for backups).",[157,1761,1762,1763,1766,1767,1770,1771],{},"Under ",[85,1764,1765],{},"Permissions → Datastore",", assign the ",[85,1768,1769],{},"DatastoreBackup"," role to this user on the relevant datastore:",[154,1772,1773,1776],{},[157,1774,1775],{},"Allows creating and reading backups",[157,1777,1778,1781],{},[85,1779,1780],{},"Does not allow"," deleting backups",[157,1783,1784],{},"Optionally, assign a strong password for web-interface login if needed.",[1478,1786,1788],{"id":1787},"defining-permissions-at-the-datastore-level","Defining permissions at the datastore level",[11,1790,1791,1792,1795],{},"Permissions in PBS are ",[85,1793,1794],{},"datastore-specific",". That means:",[154,1797,1798,1801],{},[157,1799,1800],{},"A user can only operate on the datastore(s) for which they have explicit rights.",[157,1802,1803],{},"You can manage access granularity per datastore.",[11,1805,1806,1809],{},[85,1807,1808],{},"Our security principle:"," Each host that writes backups only gets write and read rights on its own datastore. Backups authenticate via API tokens, and deletion is explicitly disabled.",[371,1811,1813],{"id":1812},"advantages-of-this-approach","Advantages of this approach",[154,1815,1816,1822,1828],{},[157,1817,1818,1821],{},[85,1819,1820],{},"Minimized risk from compromised hosts:"," A compromised Proxmox VE host cannot delete backups.",[157,1823,1824,1827],{},[85,1825,1826],{},"Clean separation of permissions:"," Each host uses its own API token and only accesses its designated datastore.",[157,1829,1830,1833],{},[85,1831,1832],{},"Full control:"," Only a dedicated PBS admin can perform deletions.",[15,1835,1837],{"id":1836},"creating-and-managing-backup-jobs-in-proxmox-ve","Creating and Managing Backup Jobs in Proxmox VE",[11,1839,1840],{},"Once PBS is up and running with the datastore and restricted users in place, we configure automated backup jobs on the Proxmox VE hosts. This ensures your VMs and containers are backed up reliably and regularly.",[371,1842,1844],{"id":1843},"how-we-create-backup-jobs-in-proxmox-ve","How we create backup jobs in Proxmox VE",[596,1846,1847,1853,1860,1892,1898],{},[157,1848,1849,1850,108],{},"In the Proxmox VE web interface, select ",[85,1851,1852],{},"Datacenter → Backup",[157,1854,1855,1856,1859],{},"Click ",[85,1857,1858],{},"Add"," to create a new backup job.",[157,1861,1862,1863],{},"Configure:",[154,1864,1865,1874,1880,1886],{},[157,1866,1867,1028,1870,1873],{},[85,1868,1869],{},"Backup Mode:",[85,1871,1872],{},"Snapshot"," for consistent live backups",[157,1875,1876,1879],{},[85,1877,1878],{},"Storage:"," Your PBS datastore",[157,1881,1882,1885],{},[85,1883,1884],{},"Schedule:"," e.g. daily at 02:00",[157,1887,1888,1891],{},[85,1889,1890],{},"Email notification:"," Enable on success and failure",[157,1893,1762,1894,1897],{},[85,1895,1896],{},"Selection Mode",", choose all VMs\u002Fcontainers or a defined subset.",[157,1899,1855,1900,1902],{},[85,1901,1858],{}," to include them in the job.",[11,1904,1905,1908],{},[85,1906,1907],{},"Authentication detail:"," We authenticate to PBS using the API token of the backup user. This keeps permissions minimal—deletion is not possible, greatly enhancing security.",[15,1910,1912],{"id":1911},"prune-jobs-and-retention-policies","Prune Jobs and Retention Policies",[11,1914,1915,1916,1919],{},"To prevent your datastore from filling with outdated backups, we configure ",[85,1917,1918],{},"Prune Jobs",". These define how many backups per VM\u002Fcontainer to keep and when to remove older versions.",[371,1921,1923],{"id":1922},"prune-simulator-test-your-rules-safely","Prune Simulator: Test your rules safely",[11,1925,1926,1927,1930],{},"The PBS ",[85,1928,1929],{},"Prune Simulator"," lets you:",[154,1932,1933,1936],{},[157,1934,1935],{},"Simulate against existing backup history and planned retention rules",[157,1937,1938],{},"See exactly which backups would be pruned—risk-free",[11,1940,1941,1942],{},"Find it here:\n",[690,1943,1944],{"href":1944,"rel":1945},"https:\u002F\u002Fpbs.proxmox.com\u002Fdocs\u002Fprune-simulator\u002F",[694],[371,1947,1949],{"id":1948},"recommended-retention-settings-for-production-systems","Recommended retention settings for production systems",[11,1951,1952],{},"We use these proven defaults:",[154,1954,1955,1961,1967,1973,1979],{},[157,1956,1957,1960],{},[85,1958,1959],{},"keep-last:"," 7 (Always keep the last 7 backups)",[157,1962,1963,1966],{},[85,1964,1965],{},"keep-daily:"," 14 (Retain the last 14 daily backups)",[157,1968,1969,1972],{},[85,1970,1971],{},"keep-weekly:"," 4 (Keep 4 weekly backups)",[157,1974,1975,1978],{},[85,1976,1977],{},"keep-monthly:"," 12 (Keep the last 12 monthly backups)",[157,1980,1981,1984],{},[85,1982,1983],{},"keep-yearly:"," 1 (At least one annual backup)",[11,1986,1987],{},[85,1988,1989],{},"Advantages:",[154,1991,1992,1995,1998],{},[157,1993,1994],{},"Ample coverage for daily restores and long-term archives",[157,1996,1997],{},"Automatic cleanup of outdated backups",[157,1999,2000],{},"Deduplication keeps old backups space-efficient",[371,2002,2004],{"id":2003},"setting-up-the-prune-job-in-pbs","Setting up the Prune Job in PBS",[596,2006,2007,2016,2019,2022,2025,2028],{},[157,2008,2009,2010,2013,2014,108],{},"In PBS, go to ",[85,2011,2012],{},"Datastore → Prune Jobs"," and click ",[85,2015,1858],{},[157,2017,2018],{},"Select the target datastore.",[157,2020,2021],{},"Define the prune schedule (e.g. daily at 03:30).",[157,2023,2024],{},"Enter retention rules (see above).",[157,2026,2027],{},"Choose the API token for authentication.",[157,2029,2030],{},"Activate and save.",[11,2032,2033],{},"Your backup storage stays tidy and performant.",[15,2035,2037],{"id":2036},"pbs-sync-jobs-for-offsite-backups","PBS Sync Jobs for Offsite Backups",[11,2039,2040,2041,2044],{},"To further secure your data, we configure ",[85,2042,2043],{},"Sync Jobs"," between multiple PBS instances. This replicates backups to a secondary server—e.g., another datacenter, branch office, or encrypted off-site storage.",[371,2046,2048],{"id":2047},"why-sync-jobs","Why Sync Jobs?",[11,2050,2051],{},"Storing backups on one server is risky. Hardware failure, ransomware, or a site outage can render all backups unavailable. Regular synchronization to a second PBS minimizes this risk.",[371,2053,2055],{"id":2054},"how-we-set-up-sync-jobs","How we set up Sync Jobs",[154,2057,2058,2064,2068,2095],{},[157,2059,2060,2061,108],{},"In PBS, navigate to ",[85,2062,2063],{},"Datastore → Sync Jobs",[157,2065,1855,2066,108],{},[85,2067,1858],{},[157,2069,1862,2070],{},[154,2071,2072,2078,2084,2089],{},[157,2073,2074,2077],{},[85,2075,2076],{},"Remote Datastore:"," Target on the remote PBS",[157,2079,2080,2083],{},[85,2081,2082],{},"Local Datastore:"," Source datastore",[157,2085,2086,2088],{},[85,2087,1884],{}," e.g. nightly at 03:00",[157,2090,2091,2094],{},[85,2092,2093],{},"Remove Vanished:"," Optional—deletions from the source can mirror to the target (we usually disable for safety)",[157,2096,2097],{},"Authenticate with a dedicated, restricted API token.",[371,2099,2101],{"id":2100},"how-the-sync-works","How the sync works",[11,2103,2104],{},"PBS transfers only new or changed deduplicated chunks and their metadata. This reduces network load and speeds up replication. Thanks to robust metadata, restores on the target PBS are fully possible.",[11,2106,2107],{},"Even if a sync is interrupted, it resumes seamlessly without data loss.",[15,2109,2111],{"id":2110},"maintenance-and-monitoring-keeping-pbs-in-view","Maintenance and Monitoring: Keeping PBS in View",[11,2113,2114],{},"Ensuring long-term reliability means ongoing maintenance and monitoring of PBS.",[371,2116,2118],{"id":2117},"backup-status-monitoring","Backup status monitoring",[11,2120,2121],{},"We integrate PBS into our central monitoring system to track:",[154,2123,2124,2127,2130],{},[157,2125,2126],{},"Datastore health",[157,2128,2129],{},"Sync job status",[157,2131,2132],{},"System resource usage",[11,2134,2135],{},"We enable email alerts for:",[154,2137,2138,2141,2144,2147],{},[157,2139,2140],{},"Failed backups",[157,2142,2143],{},"Low storage warnings",[157,2145,2146],{},"Connectivity issues with Proxmox VE hosts",[157,2148,2149],{},"Sync errors on offsite backups",[11,2151,2152],{},"This ensures immediate awareness of issues and rapid response.",[371,2154,2156],{"id":2155},"direct-smtp-notifications-without-sendmailpostfix","Direct SMTP notifications without Sendmail\u002FPostfix",[11,2158,2159],{},"Both PBS and Proxmox VE allow you to configure SMTP directly in the web interface—no local MTA (Sendmail or Postfix) required.",[11,2161,2162],{},[85,2163,1989],{},[154,2165,2166,2169,2172,2175],{},[157,2167,2168],{},"Quick, easy setup",[157,2170,2171],{},"Reliable email alerts",[157,2173,2174],{},"Full control over sender address and SMTP credentials",[157,2176,2177],{},"TLS\u002FSSL and authentication support",[11,2179,2180],{},"We use this method consistently to avoid extra services that need securing.",[371,2182,2184],{"id":2183},"regular-maintenance","Regular maintenance",[11,2186,2187],{},"Our operational routine includes:",[154,2189,2190,2193,2196,2199,2202],{},[157,2191,2192],{},"Checking available storage on all datastores",[157,2194,2195],{},"Reviewing logs and notification reports",[157,2197,2198],{},"Performing test restores to verify backup integrity",[157,2200,2201],{},"Monitoring and renewing SSL certificates",[157,2203,2204],{},"Applying PBS system updates and security patches",[11,2206,2207,2209],{},[85,2208,625],{}," We recommend a full test restore at least monthly to confirm your backups are actually restorable.",[371,2211,2213],{"id":2212},"automated-logging","Automated logging",[11,2215,2216],{},"All backup and sync jobs are automatically logged. Logs are accessible via the PBS web interface and API, providing a complete audit trail of all operations.",{"title":56,"searchDepth":57,"depth":57,"links":2218},[2219,2228,2233,2236,2241,2246],{"id":748,"depth":57,"text":749,"children":2220},[2221,2222,2223,2224,2225,2226,2227],{"id":1441,"depth":398,"text":1442},{"id":1448,"depth":398,"text":1449},{"id":1472,"depth":398,"text":1473},{"id":1525,"depth":398,"text":1526},{"id":1620,"depth":398,"text":1621},{"id":1663,"depth":398,"text":1664},{"id":1696,"depth":398,"text":1697},{"id":1709,"depth":57,"text":1710,"children":2229},[2230,2231,2232],{"id":1719,"depth":398,"text":1720},{"id":1726,"depth":398,"text":1727},{"id":1812,"depth":398,"text":1813},{"id":1836,"depth":57,"text":1837,"children":2234},[2235],{"id":1843,"depth":398,"text":1844},{"id":1911,"depth":57,"text":1912,"children":2237},[2238,2239,2240],{"id":1922,"depth":398,"text":1923},{"id":1948,"depth":398,"text":1949},{"id":2003,"depth":398,"text":2004},{"id":2036,"depth":57,"text":2037,"children":2242},[2243,2244,2245],{"id":2047,"depth":398,"text":2048},{"id":2054,"depth":398,"text":2055},{"id":2100,"depth":398,"text":2101},{"id":2110,"depth":57,"text":2111,"children":2247},[2248,2249,2250,2251],{"id":2117,"depth":398,"text":2118},{"id":2155,"depth":398,"text":2156},{"id":2183,"depth":398,"text":2184},{"id":2212,"depth":398,"text":2213},"\u002Fimg\u002Fblog\u002Fproxmox-backup-server-einrichten.webp","blickpixel","https:\u002F\u002Fpixabay.com\u002Fusers\u002Fblickpixel-52945\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-25-proxmox-backup-server-einrichten",{"title":1428,"description":56},{"loc":2256},"blog\u002Fen\u002F2025-04-25-proxmox-backup-server-einrichten","CZQwiQeEdjQpcqYdQ28DQasNFW1hcF_aVu00_DVL_hU",{"id":2262,"title":2263,"body":2264,"category":2448,"date":1418,"description":2449,"extension":65,"head":66,"image":2450,"imageCredit":2451,"imageCreditUrl":2452,"locale":68,"meta":2453,"navigation":70,"ogImage":66,"path":2454,"robots":66,"schemaOrg":66,"seo":2455,"sitemap":2456,"stem":2457,"__hash__":2458},"blog\u002Fblog\u002Fen\u002F2025-04-25-sicherheitsfragen-passwort-resets.md","Why Security Questions and Forced Password Resets Are Risky—And Why We Prefer Modern Alternatives",{"type":8,"value":2265,"toc":2442},[2266,2278,2288,2292,2303,2306,2317,2320,2324,2330,2334,2337,2348,2353,2364,2370,2374,2377,2383,2386,2392,2395,2401,2404,2408,2411,2424,2431],[11,2267,2268,2269,1071,2272,1078,2275,108],{},"Password authentication has been a part of the web landscape for decades. On our platform, we continue to offer the traditional password login. At the same time, we are increasingly embracing modern passwordless methods like ",[85,2270,2271],{},"passkeys",[85,2273,2274],{},"OAuth2 login",[85,2276,2277],{},"one-time codes via email",[11,2279,2280,2281,119,2284,2287],{},"The reason: Traditional security methods pose risks and pitfalls - notably ",[85,2282,2283],{},"security questions",[85,2285,2286],{},"enforced regular password resets",". In this article, we illustrate why these methods are problematic and what lessons we learned from a specific phishing test conducted for a client.",[371,2289,2291],{"id":2290},"why-we-no-longer-use-security-questions","Why We No Longer Use Security Questions",[11,2293,2294,2295,2298,2299,2302],{},"Many will remember: ",[94,2296,2297],{},"\"What was the name of your first pet?\""," or ",[94,2300,2301],{},"\"Where did you go to school?\""," The idea was to provide an extra security layer in case the password was forgotten.",[11,2304,2305],{},"The problem with this:",[154,2307,2308,2311,2314],{},[157,2309,2310],{},"Such information is often publicly accessible or easily guessed.",[157,2312,2313],{},"Many users provide simple or the same answers repeatedly.",[157,2315,2316],{},"In practice, security questions offer attackers additional access possibilities rather than real protection.",[11,2318,2319],{},"Therefore, we consistently refrain from using security questions.",[371,2321,2323],{"id":2322},"the-risks-of-enforced-password-resets","The Risks of Enforced Password Resets",[11,2325,2326,2327,108],{},"A widespread concept in companies and platforms is the requirement to change passwords regularly. At first glance, this seems like a sensible security measure. However, we've found that it ",[85,2328,2329],{},"can cause more harm than good",[1478,2331,2333],{"id":2332},"a-real-life-example-from-our-practice","A Real-life Example from Our Practice:",[11,2335,2336],{},"During a client project, we carried out a covert phishing test at the client's request. The goal was to assess the company's security awareness training. We:",[154,2338,2339,2342,2345],{},[157,2340,2341],{},"Registered a domain that closely resembled the real company's domain.",[157,2343,2344],{},"Created a deceptively realistic login page with the company logo and original colors.",[157,2346,2347],{},"Sent emails to employees that appeared to indicate a regular password reset was due.",[11,2349,2350],{},[85,2351,2352],{},"The Result:",[154,2354,2355,2358,2361],{},[157,2356,2357],{},"Several managers with elevated rights and administrative access were among the first to \"reset\" their password on the fake site.",[157,2359,2360],{},"None of the recipients noticed the misleading domain in the sender's address or the URL.",[157,2362,2363],{},"The visual replica of the real site was enough for the branding to seem authentic.",[11,2365,2366,2369],{},[85,2367,2368],{},"Conclusion:"," Enforced password resets at fixed intervals make such attacks even easier. Since users are regularly prompted to change their passwords, a related email quickly becomes routine and goes unquestioned.",[371,2371,2373],{"id":2372},"why-passwordless-methods-make-sense","Why Passwordless Methods Make Sense",[11,2375,2376],{},"The weaknesses of traditional password methods can be largely eliminated through modern authentication techniques:",[1478,2378,2380],{"id":2379},"passkeys-security-keys",[85,2381,2382],{},"Passkeys & Security Keys",[11,2384,2385],{},"Biometric and hardware-supported methods without password entry. Login occurs via FaceID, fingerprint, or device PIN and is phishing-resistant thanks to public-key encryption.",[1478,2387,2389],{"id":2388},"one-time-codes-via-email",[85,2390,2391],{},"One-Time Codes via Email",[11,2393,2394],{},"Instead of a fixed password, users receive a code via email for each login. This is technically as secure as traditional password resets — but without the risks of password reuse or outdated hashing algorithms.",[1478,2396,2398],{"id":2397},"oauth2-social-login",[85,2399,2400],{},"OAuth2 \u002F Social Login",[11,2402,2403],{},"Log in with existing accounts from providers like Google, Microsoft, or Apple, including their security standards and multi-factor authentication.",[371,2405,2407],{"id":2406},"our-approach","Our Approach",[11,2409,2410],{},"While we continue to offer traditional password login, we consciously avoid:",[154,2412,2413,2418],{},[157,2414,2415],{},[85,2416,2417],{},"Security questions",[157,2419,2420,2421],{},"and enforced ",[85,2422,2423],{},"password resets",[11,2425,2426,2427,2430],{},"Instead, we recommend ",[85,2428,2429],{},"passwordless authentication"," as the preferred method, promoting security awareness through training and transparent communication.",[11,2432,2433,2436,2441],{},[85,2434,2435],{},"Want to make your own authentication system more secure and user-friendly?",[690,2437,2440],{"href":2438,"rel":2439},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fcontact-us",[694],"Contact us","— we support you in integrating modern login methods and tailored security concepts into your applications.",{"title":56,"searchDepth":57,"depth":57,"links":2443},[2444,2445,2446,2447],{"id":2290,"depth":398,"text":2291},{"id":2322,"depth":398,"text":2323},{"id":2372,"depth":398,"text":2373},{"id":2406,"depth":398,"text":2407},"Software","Password authentication has been a part of the web landscape for decades. On our platform, we continue to offer the traditional password login. At the same time, we are increasingly embracing modern passwordless methods like passkeys, OAuth2 login, or one-time codes via email.","\u002Fimg\u002Fblog\u002Fsicherheitsfragen-passwort-resets.webp","stevepb","https:\u002F\u002Fpixabay.com\u002Fusers\u002Fstevepb-282134\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-25-sicherheitsfragen-passwort-resets",{"title":2263,"description":2449},{"loc":2454},"blog\u002Fen\u002F2025-04-25-sicherheitsfragen-passwort-resets","5ZLptvLc9FXQggFOeMRMrl8KdtiNkc1nUltF-vap5pQ",{"id":2460,"title":2461,"body":2462,"category":66,"date":2942,"description":2943,"extension":65,"head":66,"image":2944,"imageCredit":2945,"imageCreditUrl":2946,"locale":68,"meta":2947,"navigation":70,"ogImage":66,"path":2948,"robots":66,"schemaOrg":66,"seo":2949,"sitemap":2950,"stem":2951,"__hash__":2952},"blog\u002Fblog\u002Fen\u002F2025-04-24-kein-backup-kein-mitleid.md","No Backup, No Pity – A Bitter Truth from Experience",{"type":8,"value":2463,"toc":2924},[2464,2470,2473,2482,2488,2491,2505,2508,2511,2515,2518,2522,2525,2531,2534,2540,2547,2551,2562,2568,2579,2583,2593,2599,2607,2611,2621,2627,2633,2652,2658,2664,2691,2697,2703,2714,2720,2731,2735,2746,2753,2758,2775,2781,2813,2823,2829,2839,2842,2850,2853,2870,2873,2879,2882],[11,2465,2466,2469],{},[85,2467,2468],{},"\"No Backup, No Pity\""," – that was one of the first sentences my IT teacher drilled into me in vocational school. Back then, I thought it was a bit exaggerated. Until the day this statement turned out to be absolutely true.",[11,2471,2472],{},"We were supposed to create a website for a non-profit organization as part of a class project. Everything was prepared, the client stood punctually in front of the classroom, the excitement was great – and suddenly: panic. The central project server was dead. Hardware defect. No RAID, no backups – nothing. Outcome: Anyone who had secured their work locally or on a USB stick could present. The rest were left empty-handed. XAMPP on the laptop became a last resort. An experience that I’ll never forget.",[11,2474,2475,2478,2479],{},[85,2476,2477],{},"What was then a school project, I unfortunately still encounter today – in companies."," Sometimes it’s local data on an old computer, sometimes unsecured data on a NAS without a backup concept. And eventually, when something really does happen – whether it’s hardware failure, a cyberattack, or user error – the drama is big. But then the rule is: ",[85,2480,2481],{},"No Backup, No Pity.",[15,2483,2485],{"id":2484},"which-data-should-i-back-up",[85,2486,2487],{},"Which Data Should I Back Up?",[11,2489,2490],{},"The topic of data backup is neglected in many firms. IT is there to function – but without a clean process and backup strategy, everything is like a patchwork quilt:",[154,2492,2493,2496,2499,2502],{},[157,2494,2495],{},"Data on notebooks, desktops, and tablets",[157,2497,2498],{},"Files on NAS and external hard drives",[157,2500,2501],{},"Calendars and emails in various inboxes",[157,2503,2504],{},"Data in cloud services, CRM, or ERP systems",[11,2506,2507],{},"So, the right question is not \"What should I back up?\" but rather: Where are the data that are important for my company located?",[11,2509,2510],{},"Often, it is more sensible to back everything up than to try to be selective. Especially if no one has the full overview.",[371,2512,2514],{"id":2513},"best-practice","Best Practice:",[11,2516,2517],{},"Central data storage. No local data. Whether on a NAS, a file server, or a cloud service – the client is just the access device. Companies with thin clients and terminal servers work according to this principle. But even without terminal servers, this is possible with central network drives and clean permissions management.",[371,2519,2521],{"id":2520},"advantage","Advantage:",[11,2523,2524],{},"If a device breaks, the effort is minimal. Set up a new device, log in the user, done.",[15,2526,2528],{"id":2527},"overview-of-backup-types",[85,2529,2530],{},"Overview of Backup Types",[11,2532,2533],{},"In the IT world, there are three basic types of backups:",[371,2535,2537],{"id":2536},"_1-full-backup",[85,2538,2539],{},"1. Full Backup",[11,2541,2542,2543,2546],{},"A ",[85,2544,2545],{},"full backup"," saves all selected data completely – regardless of whether they have changed since the last backup or not.",[11,2548,2549],{},[85,2550,2521],{},[154,2552,2553,2559],{},[157,2554,2555,2556],{},"Simplest restoration.\n",[85,2557,2558],{},"Disadvantage:",[157,2560,2561],{},"Requires a lot of storage space and time.",[371,2563,2565],{"id":2564},"_2-incremental-backup",[85,2566,2567],{},"2. Incremental Backup",[11,2569,2570,2571,2574,2575,2578],{},"An ",[85,2572,2573],{},"incremental backup"," only backs up the data that has changed since the ",[85,2576,2577],{},"last"," backup. There is usually an initial full backup followed by daily incremental backups.",[11,2580,2581],{},[85,2582,2521],{},[154,2584,2585,2590],{},[157,2586,2587,2588],{},"Very space-saving and quick.\n",[85,2589,2558],{},[157,2591,2592],{},"To fully restore, you need the latest full backup and all subsequent incremental backups. If one fails, the data between them is lost.",[371,2594,2596],{"id":2595},"_3-differential-backup",[85,2597,2598],{},"3. Differential Backup",[11,2600,2542,2601,2604,2605,108],{},[85,2602,2603],{},"differential backup"," saves all data that has changed since the last ",[85,2606,2545],{},[11,2608,2609],{},[85,2610,2521],{},[154,2612,2613,2618],{},[157,2614,2615,2616],{},"Faster than a full backup, but more comprehensive than an incremental backup.\n",[85,2617,2558],{},[157,2619,2620],{},"Requires more storage space than an incremental backup but less than daily full backups.",[11,2622,2623,2626],{},[85,2624,2625],{},"In practice",", we often see mixed forms – usually a weekly full backup combined with daily incremental backups.",[15,2628,2630],{"id":2629},"how-should-i-create-backups",[85,2631,2632],{},"How Should I Create Backups?",[11,2634,2635,2636,2639,2640,2643,2644,2647,2648,2651],{},"There are countless backup storage options — but not everything that sounds like a backup is one. It’s important to know: Services like ",[85,2637,2638],{},"Google Drive, Dropbox, or OneDrive"," are ",[85,2641,2642],{},"not full backups",". They sync data, which is actually the biggest problem in the event of data loss or encryption: ",[85,2645,2646],{},"If the encrypted or deleted file is synchronized, it is gone everywhere.","\nAdditionally, from a ",[85,2649,2650],{},"GDPR perspective, storing personal data on US services"," is tricky and often not permissible.",[371,2653,2655],{"id":2654},"offline-backups",[85,2656,2657],{},"Offline Backups",[11,2659,2660,2663],{},[85,2661,2662],{},"Offline backups"," are still trusted, but here too the storage medium matters:",[154,2665,2666,2672,2682],{},[157,2667,2668,2671],{},[85,2669,2670],{},"Flash storage",", like USB sticks or SD cards, wears out quicker than you might think. Ask a photographer how they feel when the card with the employee photos suddenly becomes unreadable.",[157,2673,2674,2677,2678,2681],{},[85,2675,2676],{},"External hard drives (HDDs)"," with large capacity are cheap but mechanically fragile. Another problem: ",[85,2679,2680],{},"Bit rot",". This is the gradual data loss over years, even if the drive is not in use. Magnetic information fades, and suddenly the file is corrupted without anyone ever using the hard drive.",[157,2683,2684,2687,2688],{},[85,2685,2686],{},"SSDs"," are technically more robust, shockproof, and far more reliable. Theoretically, they shouldn’t experience bit rot. Still: ",[85,2689,2690],{},"In IT, the basic principle is that everything that can break will eventually break.",[11,2692,2693,2694],{},"Therefore, the most important thing in any backup strategy is: ",[85,2695,2696],{},"Create redundancies.",[371,2698,2700],{"id":2699},"online-backups-nas-solutions",[85,2701,2702],{},"Online Backups & NAS Solutions",[11,2704,2705,2706,2709,2710,2713],{},"In addition to classic offline backups, ",[85,2707,2708],{},"online backups"," are playing an increasingly important role – especially in conjunction with ",[85,2711,2712],{},"NAS systems"," (like those from Synology or QNAP).",[11,2715,2716,2717,284],{},"A good example is ",[85,2718,2719],{},"Synology Active Backup for Business",[154,2721,2722,2725,2728],{},[157,2723,2724],{},"This solution allows whole servers, virtual machines, PCs, and even Microsoft 365 or Google Workspace data to be backed up automatically.",[157,2726,2727],{},"The backups are stored centrally on the NAS and can be managed via versioning.",[157,2729,2730],{},"It’s important to note:\nThe backups should also be encrypted on the NAS itself and ideally stored in a separate, write-protected folder.",[11,2732,2733],{},[85,2734,1989],{},[154,2736,2737,2740,2743],{},[157,2738,2739],{},"Automated, centralized backup of all key systems.",[157,2741,2742],{},"Flexible restoration options – from individual files to the entire system.",[157,2744,2745],{},"Combined with external backup synchronization, modern and secure backup concepts can be implemented.",[11,2747,2748,2749,2752],{},"Many NAS systems also offer their own ",[85,2750,2751],{},"cloud sync and offsite backup services",". For example, a Synology NAS can upload all backups, encrypted, to an external backup server or a certified German cloud solution.",[11,2754,2755],{},[85,2756,2757],{},"This is particularly important when it comes to adhering to the 3-2-1 backup rule:",[154,2759,2760,2765,2770],{},[157,2761,2762],{},[85,2763,2764],{},"3 copies of the data",[157,2766,2767],{},[85,2768,2769],{},"on 2 different media",[157,2771,2772],{},[85,2773,2774],{},"1 of which is at an external location",[15,2776,2778],{"id":2777},"summary-of-the-most-important-backup-rules",[85,2779,2780],{},"Summary of the Most Important Backup Rules:",[596,2782,2783,2788,2793,2798,2803,2808],{},[157,2784,2785],{},[85,2786,2787],{},"Always encrypt backups.",[157,2789,2790],{},[85,2791,2792],{},"Store encryption keys securely offsite.",[157,2794,2795],{},[85,2796,2797],{},"Store backups in a write-protected manner.",[157,2799,2800],{},[85,2801,2802],{},"Set up offsite backups.",[157,2804,2805],{},[85,2806,2807],{},"Set up automated online backups using NAS backup tools like Active Backup.",[157,2809,2810],{},[85,2811,2812],{},"Perform regular restore tests.",[11,2814,2815,2818,2819,2822],{},[85,2816,2817],{},"My Tip:","\nIn the end, what matters is not ",[85,2820,2821],{},"how many backups you have",", but whether they work in an emergency.",[15,2824,2826],{"id":2825},"a-recent-case-ht-hosting",[85,2827,2828],{},"A Recent Case: HT-Hosting",[11,2830,2831,2832,2835,2836,108],{},"Recently, the provider ",[85,2833,2834],{},"HT-Hosting"," ceased operations following a devastating cyber attack. According to their own statement, the Proxmox VE Cluster was \"destroyed.\" The last backup status is unclear – customer reviews criticize that communication was sparse and apparently ",[85,2837,2838],{},"not all data could be restored",[11,2840,2841],{},"In a statement on Trustpilot, they admitted:",[2843,2844,2845],"blockquote",{},[11,2846,2847],{},[94,2848,2849],{},"\"We are working with data recovery specialists to recover as much data as possible.\"",[11,2851,2852],{},"That doesn’t sound like a well-structured emergency plan. Although it was offered to upload backups to other providers, the key questions remain unanswered:",[154,2854,2855,2860,2865],{},[157,2856,2857],{},[85,2858,2859],{},"How old was the backup?",[157,2861,2862],{},[85,2863,2864],{},"Why wasn’t a complete restoration possible?",[157,2866,2867],{},[85,2868,2869],{},"Was there an emergency documentation?",[11,2871,2872],{},"Such incidents are not rare. Many hosts and companies only realize in an emergency that their backup concept is full of holes. By the time that happens, it’s too late.",[15,2874,2876],{"id":2875},"how-can-i-prevent-this",[85,2877,2878],{},"How Can I Prevent This?",[11,2880,2881],{},"Key points for a solid backup and recovery concept:",[596,2883,2884,2890,2896,2912,2918],{},[157,2885,2886,2889],{},[85,2887,2888],{},"Central Data Storage:","\nData doesn’t belong on local devices but on central servers, NAS systems, or cloud services.",[157,2891,2892,2895],{},[85,2893,2894],{},"Regular, verified backups:","\nA backup is only as good as its restore test. Regular restoration tests are mandatory.",[157,2897,2898,2901,2902,1071,2905,2908,2909,108],{},[85,2899,2900],{},"Define a Backup Strategy:","\nCombination of ",[85,2903,2904],{},"full",[85,2906,2907],{},"incremental",", and possibly ",[85,2910,2911],{},"differential backups",[157,2913,2914,2917],{},[85,2915,2916],{},"Multiple Backup Locations:","\nAt least one offsite backup (e.g., in another branch or at a reputable cloud provider).",[157,2919,2920,2923],{},[85,2921,2922],{},"Emergency Plan and Documentation:","\nWho is responsible for what and when? What is done in case of a failure? How is recovery performed? This must be documented in writing.",{"title":56,"searchDepth":57,"depth":57,"links":2925},[2926,2930,2935,2939,2940,2941],{"id":2484,"depth":57,"text":2487,"children":2927},[2928,2929],{"id":2513,"depth":398,"text":2514},{"id":2520,"depth":398,"text":2521},{"id":2527,"depth":57,"text":2530,"children":2931},[2932,2933,2934],{"id":2536,"depth":398,"text":2539},{"id":2564,"depth":398,"text":2567},{"id":2595,"depth":398,"text":2598},{"id":2629,"depth":57,"text":2632,"children":2936},[2937,2938],{"id":2654,"depth":398,"text":2657},{"id":2699,"depth":398,"text":2702},{"id":2777,"depth":57,"text":2780},{"id":2825,"depth":57,"text":2828},{"id":2875,"depth":57,"text":2878},"2025-04-24","\"No Backup, No Pity\" – that was one of the first sentences my IT teacher drilled into me in vocational school. Back then, I thought it was a bit exaggerated. Until the day this statement turned out to be absolutely true.","\u002Fimg\u002Fblog\u002Fkein-backup-kein-mitleid.webp","rohitdarbari","https:\u002F\u002Fpixabay.com\u002Fusers\u002Frohitdarbari-16904916\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-24-kein-backup-kein-mitleid",{"title":2461,"description":2943},{"loc":2948},"blog\u002Fen\u002F2025-04-24-kein-backup-kein-mitleid","OIZCPnQ4-LNtZv_ZULhIs0cW4NNYkI9SFXe5fdP39MY",{"id":2954,"title":2955,"body":2956,"category":66,"date":2942,"description":3341,"extension":65,"head":66,"image":3342,"imageCredit":3343,"imageCreditUrl":3344,"locale":68,"meta":3345,"navigation":70,"ogImage":66,"path":3346,"robots":66,"schemaOrg":66,"seo":3347,"sitemap":3348,"stem":3349,"__hash__":3350},"blog\u002Fblog\u002Fen\u002F2025-04-24-vitalpbx-telefonsystem.md","VitalPBX – Affordable, Powerful Self-Hosted Telephone System Based on Asterisk",{"type":8,"value":2957,"toc":3328},[2958,2965,2972,2978,2985,2990,3010,3016,3019,3045,3051,3054,3072,3078,3081,3128,3134,3137,3140,3160,3166,3176,3182,3191,3259,3265,3276,3280,3283,3288,3305,3311,3322],[11,2959,2960,2961,2964],{},"In many companies, the classic telephone system has long been replaced by flexible, software-based systems. Those who want to rely on a reliable and inexpensive telephone system sooner or later come across ",[85,2962,2963],{},"Asterisk"," — the world's most widely used open-source telephony platform.",[11,2966,2967,2968,2971],{},"Today, we would like to introduce you to ",[85,2969,2970],{},"VitalPBX",": A modern, user-friendly interface for Asterisk, which is ideal for self-hosting and offers significantly more comfort and control than a manual Asterisk configuration.",[15,2973,2975],{"id":2974},"what-is-vitalpbx",[85,2976,2977],{},"What is VitalPBX?",[11,2979,2980,2981,2984],{},"VitalPBX is a ",[85,2982,2983],{},"VoIP telephone system based on Asterisk"," that is installed and operated as a self-hosted solution. It combines the flexibility and stability of Asterisk with a modern, web-based administration interface. VitalPBX is suitable for both small business premises and larger companies with multiple locations and remote employees.",[11,2986,2987],{},[85,2988,2989],{},"Highlights:",[154,2991,2992,2995,2998,3001,3004,3007],{},[157,2993,2994],{},"Free community version (expandable with paid add-ons)",[157,2996,2997],{},"Modern web interface for configuration",[157,2999,3000],{},"Comprehensive call rules and call routing functions",[157,3002,3003],{},"Support for VoIP providers and SIP trunks",[157,3005,3006],{},"Integration of fax, voicemail, and conference rooms",[157,3008,3009],{},"API and webhook interfaces for custom applications",[15,3011,3013],{"id":3012},"why-we-recommend-vitalpbx",[85,3014,3015],{},"Why We Recommend VitalPBX",[11,3017,3018],{},"Many of our customers are looking for an alternative to traditional cloud telephone systems, where they can retain control over their infrastructure. VitalPBX perfectly fills this gap:",[154,3020,3021,3027,3033,3039],{},[157,3022,3023,3026],{},[85,3024,3025],{},"Self-hosting:"," The system can run on either dedicated hardware or in a data center.",[157,3028,3029,3032],{},[85,3030,3031],{},"No monthly license fees"," (Community Edition).",[157,3034,3035,3038],{},[85,3036,3037],{},"Asterisk compatibility"," with all the advantages of open-source telephony.",[157,3040,3041,3044],{},[85,3042,3043],{},"Easy-to-understand web interface",", even without in-depth Linux or Asterisk knowledge.",[15,3046,3048],{"id":3047},"installation-and-first-steps",[85,3049,3050],{},"Installation and First Steps",[11,3052,3053],{},"Installing VitalPBX is straightforward:",[596,3055,3056,3066,3069],{},[157,3057,3058,3061,3062],{},[85,3059,3060],{},"Download the ISO image"," from ",[690,3063,3064],{"href":3064,"rel":3065},"https:\u002F\u002Fwww.vitalpbx.org\u002Fdownloads\u002F",[694],[157,3067,3068],{},"Installation on a VM or physical machine.",[157,3070,3071],{},"Network configuration and web interface access through the web interface.",[15,3073,3075],{"id":3074},"features-at-a-glance",[85,3076,3077],{},"Features at a Glance",[11,3079,3080],{},"VitalPBX offers many features that you would expect from a modern telephone system:",[154,3082,3083,3088,3093,3098,3103,3108,3113,3118,3123],{},[157,3084,3085],{},[85,3086,3087],{},"SIP accounts and VoIP trunks",[157,3089,3090],{},[85,3091,3092],{},"Number plans and call routing",[157,3094,3095],{},[85,3096,3097],{},"Multi-level IVRs (voice menus)",[157,3099,3100],{},[85,3101,3102],{},"Voicemail with email notification",[157,3104,3105],{},[85,3106,3107],{},"Call recording",[157,3109,3110],{},[85,3111,3112],{},"Conference rooms",[157,3114,3115],{},[85,3116,3117],{},"Fax integration",[157,3119,3120],{},[85,3121,3122],{},"Central phone book",[157,3124,3125],{},[85,3126,3127],{},"Push notifications via mail and webhooks",[15,3129,3131],{"id":3130},"extensibility-and-modules",[85,3132,3133],{},"Extensibility and Modules",[11,3135,3136],{},"VitalPBX can be extended with numerous modules — from advanced call center functions to security features such as Geo-IP blocking or automatic blacklists.",[11,3138,3139],{},"Some interesting add-ons:",[154,3141,3142,3148,3154],{},[157,3143,3144,3147],{},[85,3145,3146],{},"VitalPBX Call Center:"," ACD, queues, agent management.",[157,3149,3150,3153],{},[85,3151,3152],{},"VitalPBX Reports:"," Advanced call statistics and dashboards.",[157,3155,3156,3159],{},[85,3157,3158],{},"Multi-tenant support"," (ideal for resellers and providers of PBX as a service).",[15,3161,3163],{"id":3162},"how-much-does-it-cost",[85,3164,3165],{},"How much does it cost?",[11,3167,3168,3169,3172,3173,108],{},"The ",[85,3170,3171],{},"Community Edition of VitalPBX"," is free and already includes the full feature set for small to medium-sized installations. Paid add-ons and support licenses are optional and priced fairly. A particularly worthwhile investment is the ",[85,3174,3175],{},"Starter License",[371,3177,3179],{"id":3178},"starter-license-for-only-200-usd",[85,3180,3181],{},"Starter License for only 200 USD",[11,3183,3168,3184,3186,3187,3190],{},[85,3185,3175],{}," enhances your VitalPBX installation with numerous premium features that make your telephone system even more powerful and flexible. For a one-time payment of only ",[85,3188,3189],{},"200 USD",", you can benefit from the following advantages:",[154,3192,3193,3199,3205,3211,3217,3223,3229,3235,3241,3247,3253],{},[157,3194,3195,3198],{},[85,3196,3197],{},"VitXi WebRTC Softphone:"," 10 user licenses for browser-based telephony.",[157,3200,3201,3204],{},[85,3202,3203],{},"Music on Hold From Streaming:"," Configure music on hold from external sources like internet radio.",[157,3206,3207,3210],{},[85,3208,3209],{},"Multiple Emails in the Extension:"," Ability to link multiple email addresses to a single extension.",[157,3212,3213,3216],{},[85,3214,3215],{},"CEL CDR Events Report:"," Detailed records of all call events.",[157,3218,3219,3222],{},[85,3220,3221],{},"Unlimited extensions:"," The removal of the limit on 12 extensions present in the Community Edition.",[157,3224,3225,3228],{},[85,3226,3227],{},"Rebranding Add-On Module:"," Allows rebranding of the VitalPBX interface.",[157,3230,3231,3234],{},[85,3232,3233],{},"50 Provisioning Devices:"," Support for up to 50 provisioning-capable devices.",[157,3236,3237,3240],{},[85,3238,3239],{},"Voicemail MP3 Attachment:"," Voicemails are sent as an MP3 attachment via email.",[157,3242,3243,3246],{},[85,3244,3245],{},"Multiple Emails Settings for VM:"," Voicemail can be sent to multiple email addresses.",[157,3248,3249,3252],{},[85,3250,3251],{},"Phone Books Add\u002FEdit\u002FDelete External Contacts:"," Ability to add, edit, or delete external contacts in the phone book.",[157,3254,3255,3258],{},[85,3256,3257],{},"Time Conditions TZ Setting:"," Associate time conditions with specific time zones.",[371,3260,3262],{"id":3261},"why-choose-the-starter-license",[85,3263,3264],{},"Why Choose the Starter License?",[11,3266,3267,3268,3271,3272,3275],{},"Although the Community Edition already offers many features, the Starter License ensures that you work with ",[85,3269,3270],{},"fewer restrictions"," and benefit from additional ",[85,3273,3274],{},"powerful features",". For just 200 USD, you get a significant expansion of your VitalPBX environment, which is especially suitable for growing companies and advanced requirements.",[15,3277,3278],{"id":672},[85,3279,673],{},[11,3281,3282],{},"If you are looking for a powerful yet affordable self-hosted telephone system that is based on the proven Asterisk standard, VitalPBX is an excellent choice. We use VitalPBX in our own projects and with clients who value flexibility, data sovereignty, and independence from cloud providers.",[11,3284,3285],{},[85,3286,3287],{},"Advantages at a Glance:",[154,3289,3290,3293,3296,3299,3302],{},[157,3291,3292],{},"Free basic version",[157,3294,3295],{},"Self-hosting without dependency on third-party providers",[157,3297,3298],{},"Easy operation via web interface",[157,3300,3301],{},"Flexible VoIP integration and numbering management",[157,3303,3304],{},"Extensive expansion options",[15,3306,3308],{"id":3307},"intrigued",[85,3309,3310],{},"Intrigued?",[11,3312,3313,3314,3317,3318,3321],{},"We are happy to advise you and, if desired, take over the installation, setup, and operation of your VitalPBX system — whether on your hardware, in a data center, or your cloud environment. We are also happy to offer you the setup of a ",[85,3315,3316],{},"VitalPBX instance."," In addition, you can get ",[85,3319,3320],{},"affordable trunking"," for your SIP endpoints through us to make your VoIP communication reliable and cost-effective.",[11,3323,3324],{},[690,3325,3327],{"href":2438,"rel":3326},[694],"Get in Touch",{"title":56,"searchDepth":57,"depth":57,"links":3329},[3330,3331,3332,3333,3334,3335,3339,3340],{"id":2974,"depth":57,"text":2977},{"id":3012,"depth":57,"text":3015},{"id":3047,"depth":57,"text":3050},{"id":3074,"depth":57,"text":3077},{"id":3130,"depth":57,"text":3133},{"id":3162,"depth":57,"text":3165,"children":3336},[3337,3338],{"id":3178,"depth":398,"text":3181},{"id":3261,"depth":398,"text":3264},{"id":672,"depth":57,"text":673},{"id":3307,"depth":57,"text":3310},"In many companies, the classic telephone system has long been replaced by flexible, software-based systems. Those who want to rely on a reliable and inexpensive telephone system sooner or later come across Asterisk — the world's most widely used open-source telephony platform.","\u002Fimg\u002Fblog\u002Fvitalpbx-telefonsystem.webp","6689062","https:\u002F\u002Fpixabay.com\u002Fusers\u002F6689062-6689062\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-24-vitalpbx-telefonsystem",{"title":2955,"description":3341},{"loc":3346},"blog\u002Fen\u002F2025-04-24-vitalpbx-telefonsystem","6c4dJ0GjaEkN8f9Ph_khNWcX5Rw29YY0C7WMi-vBwbg",{"id":3352,"title":3353,"body":3354,"category":66,"date":3485,"description":3358,"extension":65,"head":66,"image":3486,"imageCredit":3487,"imageCreditUrl":3488,"locale":68,"meta":3489,"navigation":70,"ogImage":66,"path":3490,"robots":66,"schemaOrg":66,"seo":3491,"sitemap":3492,"stem":3493,"__hash__":3494},"blog\u002Fblog\u002Fen\u002F2025-04-23-managed-plesk-agenturen.md","Managed Plesk for Agencies: Professional Reseller Hosting for Modern Web Service Providers",{"type":8,"value":3355,"toc":3478},[3356,3359,3363,3366,3371,3385,3389,3392,3406,3409,3413,3416,3421,3438,3442,3445,3450,3464,3468,3471],[11,3357,3358],{},"For agencies, web designers, and IT service providers, professional hosting is a crucial component of their offerings. With the new reseller hosting based on Managed Plesk by Becker Software, you receive a powerful platform specifically developed for this: centrally manageable, flexibly scalable, and technically supported by experienced Linux administrators.",[15,3360,3362],{"id":3361},"why-managed-plesk-is-ideal-for-agencies","Why Managed Plesk is Ideal for Agencies",[11,3364,3365],{},"The Plesk interface is rightly considered one of the best solutions for hosting management. It allows you to easily control customer accounts, domains, email services, and more—all through a central interface. With Managed Plesk Reseller Hosting, you additionally benefit from a preconfigured, performance-optimized environment that you can use immediately.",[11,3367,3368],{},[85,3369,3370],{},"Highlights at a Glance:",[154,3372,3373,3376,3379,3382],{},[157,3374,3375],{},"Reseller module for central customer and package management",[157,3377,3378],{},"Individual rates and resource allocation per customer",[157,3380,3381],{},"Automated daily backups & Let’s Encrypt certificates",[157,3383,3384],{},"White-label interface—your branding, no provider identification",[15,3386,3388],{"id":3387},"your-brand-your-hosting-platform","Your Brand, Your Hosting Platform",[11,3390,3391],{},"A professional appearance is the be-all and end-all in the agency business. That's why the reseller hosting is completely white-label—your customers only see your brand, your domain, and your design. From the login screen to the nameserver:",[154,3393,3394,3397,3400,3403],{},[157,3395,3396],{},"Own nameservers (e.g. ns1.yourdomain.com)",[157,3398,3399],{},"Unbranded Plesk interface",[157,3401,3402],{},"Custom logo and email sender",[157,3404,3405],{},"Completely brand-free hosting experience",[11,3407,3408],{},"This way, you strengthen your customers' trust—and increase your brand loyalty without having to operate your own servers.",[15,3410,3412],{"id":3411},"flexibly-scalefrom-startup-to-agency-network","Flexibly Scale—from Startup to Agency Network",[11,3414,3415],{},"With the four reseller rates—Basic, Plus, Pro, and Enterprise—you cover all agency sizes. Start small and grow as needed—without failures or reinstallation. The hosting scales with your business—technically and financially.",[11,3417,3418],{},[85,3419,3420],{},"Example Services:",[154,3422,3423,3426,3429,3432,3435],{},[157,3424,3425],{},"Up to 600 customer accounts",[157,3427,3428],{},"Up to 500 GB SSD storage & 5 TB traffic (fair use)",[157,3430,3431],{},"Multi-domain hosting, email mailboxes, DNS management",[157,3433,3434],{},"Developer features like SSH, Composer, Node.js, Git",[157,3436,3437],{},"GDPR-compliant hosted in German data centers",[15,3439,3441],{"id":3440},"support-by-experienced-linux-administrators","Support by Experienced Linux Administrators",[11,3443,3444],{},"Technical support is often the Achilles' heel in hosting—not here. Instead of waiting loops or call centers, you get direct contact with experienced Linux admins who are deeply familiar with the subject. They help you quickly and competently—whether it's DNS problems, backup recoveries, or configuration questions.",[11,3446,3447],{},[85,3448,3449],{},"The Difference:",[154,3451,3452,3455,3458,3461],{},[157,3453,3454],{},"Direct contact person with system know-how",[157,3456,3457],{},"Practical assistance with server and hosting questions",[157,3459,3460],{},"Fast response times, no forwarding",[157,3462,3463],{},"Ideal for agencies with technical responsibility",[15,3465,3467],{"id":3466},"managed-plesk-for-agencieshosting-on-a-new-level","Managed Plesk for Agencies—Hosting on a New Level",[11,3469,3470],{},"The new reseller hosting with Managed Plesk is the perfect solution for agencies wanting to offer their customers professional hosting—under their own name, with full control and supported by true experts in the background. With flexible packages, modern technology, and white-label branding, you create a hosting experience that fits your agency.",[11,3472,3473],{},[690,3474,3477],{"href":3475,"rel":3476},"https:\u002F\u002Fwww.becker-software.de\u002Fen\u002Freseller-hosting",[694],"👉 Get started now and make hosting a core competency of your agency—with Managed Plesk and support from Linux admins.",{"title":56,"searchDepth":57,"depth":57,"links":3479},[3480,3481,3482,3483,3484],{"id":3361,"depth":57,"text":3362},{"id":3387,"depth":57,"text":3388},{"id":3411,"depth":57,"text":3412},{"id":3440,"depth":57,"text":3441},{"id":3466,"depth":57,"text":3467},"2025-04-23","\u002Fimg\u002Fblog\u002Fmanaged-plesk-agenturen.webp","This_is_Engineering","https:\u002F\u002Fpixabay.com\u002Fusers\u002FThis_is_Engineering-11384528\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-23-managed-plesk-agenturen",{"title":3353,"description":3358},{"loc":3490},"blog\u002Fen\u002F2025-04-23-managed-plesk-agenturen","I7aMLtefOmddk8bdJlDMSt9PxC7gHBY7_v6zhzoNzqQ",{"id":3496,"title":3497,"body":3498,"category":66,"date":3485,"description":3504,"extension":65,"head":66,"image":3604,"imageCredit":3605,"imageCreditUrl":3606,"locale":68,"meta":3607,"navigation":70,"ogImage":66,"path":3608,"robots":66,"schemaOrg":66,"seo":3609,"sitemap":3610,"stem":3611,"__hash__":3612},"blog\u002Fblog\u002Fen\u002F2025-04-23-netzwerkausfall-april-2025.md","Network Outage on April 21, 2025 – Incident Report",{"type":8,"value":3499,"toc":3596},[3500,3505,3511,3537,3543,3546,3549,3555,3558,3564,3567,3587,3593],[11,3501,3502],{},[94,3503,3504],{},"On April 21, 2025, at 9:32 PM, it was observed that external access to the network infrastructure was restricted. This limitation was triggered by an alert from our external monitoring system. An on-call employee was immediately notified through our external monitoring.",[15,3506,3508],{"id":3507},"timeline-of-the-incident",[85,3509,3510],{},"Timeline of the Incident",[154,3512,3513,3519,3525,3531],{},[157,3514,3515,3518],{},[85,3516,3517],{},"9:32 PM"," – Alert from external monitoring due to interrupted external connections.",[157,3520,3521,3524],{},[85,3522,3523],{},"9:35 PM"," – On-call staff begin to analyze the network connections.",[157,3526,3527,3530],{},[85,3528,3529],{},"9:40 PM"," – The cause is identified, and initial measures are initiated.",[157,3532,3533,3536],{},[85,3534,3535],{},"9:50 PM"," – The network infrastructure is fully operational again.",[15,3538,3540],{"id":3539},"cause-analysis",[85,3541,3542],{},"Cause Analysis",[11,3544,3545],{},"The outage was caused by human error in conjunction with an automated system process. During an automated system update, an IPv4 Link-Local Unicast address was removed from the router configuration. This address was intended as a connection channel between two routers and was used by the Keepalived service to dynamically switch the gateway in the event of a failover. The removal of this address prevented the keep-alive connection between the routers from being established, which led to the outage.",[11,3547,3548],{},"The situation was further complicated as the redundant router was unavailable due to planned maintenance at that time. As a result, there was no fallback option, leading to a total interruption of external access to the systems.",[15,3550,3552],{"id":3551},"remediation-measures",[85,3553,3554],{},"Remediation Measures",[11,3556,3557],{},"After identifying the problem, the removed address was reinserted into the configuration, and a router reboot was performed. These measures led to a complete restoration of the network infrastructure within 18 minutes.",[371,3559,3561],{"id":3560},"reflection-and-preventive-measures",[85,3562,3563],{},"Reflection and Preventive Measures",[11,3565,3566],{},"To prevent similar incidents in the future, the following steps have been decided:",[154,3568,3569,3575,3581],{},[157,3570,3571,3574],{},[85,3572,3573],{},"Increase Redundancy",": Future maintenance will ensure that a complete failover path remains active, and no critical infrastructure is operated without a backup.",[157,3576,3577,3580],{},[85,3578,3579],{},"Stabilization of System Updates",": Automatic updates will be adjusted to prevent the accidental removal of essential configuration elements such as link-local addresses.",[157,3582,3583,3586],{},[85,3584,3585],{},"Enhanced Monitoring and Configuration Management",": Changes to network-critical components will be monitored more closely and documented transparently in the future.",[15,3588,3590],{"id":3589},"summary",[85,3591,3592],{},"Summary",[11,3594,3595],{},"The network outage on April 21, 2025, was caused by the unintended removal of an essential IPv4 Link-Local address for the Keepalived system during an automated system update. The simultaneous absence of a redundant router during planned maintenance exacerbated the incident. However, the issue was fully resolved within 18 minutes due to a rapid response. Specific technical and organizational measures have already been implemented to prevent future outages.",{"title":56,"searchDepth":57,"depth":57,"links":3597},[3598,3599,3600,3603],{"id":3507,"depth":57,"text":3510},{"id":3539,"depth":57,"text":3542},{"id":3551,"depth":57,"text":3554,"children":3601},[3602],{"id":3560,"depth":398,"text":3563},{"id":3589,"depth":57,"text":3592},"\u002Fimg\u002Fblog\u002Fnetzwerkausfall-april-2025.webp","Lucent_Designs_dinoson20","https:\u002F\u002Fpixabay.com\u002Fusers\u002FLucent_Designs_dinoson20-1455439\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-23-netzwerkausfall-april-2025",{"title":3497,"description":3504},{"loc":3608},"blog\u002Fen\u002F2025-04-23-netzwerkausfall-april-2025","sqfDmqHVemzFfDhgSFZZaT0eXLSvm6xxs3TiITlU6yM",{"id":3614,"title":3615,"body":3616,"category":2448,"date":3832,"description":3620,"extension":65,"head":66,"image":3833,"imageCredit":3834,"imageCreditUrl":3835,"locale":68,"meta":3836,"navigation":70,"ogImage":66,"path":3837,"robots":66,"schemaOrg":66,"seo":3838,"sitemap":3839,"stem":3840,"__hash__":3841},"blog\u002Fblog\u002Fen\u002F2025-04-18-buchhaltungssoftware-langzeittest.md","Long-term Test of Accounting Software: Our Alternatives to sevDesk & Co.",{"type":8,"value":3617,"toc":3826},[3618,3621,3625,3628,3631,3634,3666,3669,3674,3700,3707,3711,3714,3728,3731,3735,3749,3756,3760,3763,3783,3786,3791,3805,3808,3815,3817,3820],[11,3619,3620],{},"As an IT service provider with high standards for automation and quality, it was important for me to find accounting software that not only meets legal requirements but also seamlessly integrates into our workflows. Over the past few years, we've tested various solutions in real-life operations – each for at least one year. Here's our experience report.",[15,3622,3624],{"id":3623},"lexoffice-20182020-active-again-since-2022","Lexoffice (2018–2020, active again since 2022)",[11,3626,3627],{},"We started using Lexoffice in 2018. At the time, it was available free for a year through a partnership with the \"Founder Portal.\" This was ideal as we wanted a professional solution, not to fuss with Word templates.",[11,3629,3630],{},"However, Lexware Office lacked an API back then – a deal-breaker for us as a software house, leading us to leave the software in 2020. Since 2022, we've been using Lexoffice again because a public API was finally introduced, addressing our main concern.",[11,3632,3633],{},"What I particularly appreciate about Lexware Office:",[154,3635,3636,3642,3648,3654,3660],{},[157,3637,3638,3641],{},[85,3639,3640],{},"Outstanding Software Quality",": I haven’t encountered a single bug thus far. Everything is well-thought-out, clearly communicated, and stable.",[157,3643,3644,3647],{},[85,3645,3646],{},"Intelligent Validations",": Incorrect tax rates or missing VAT IDs are instantly detected. The software actively helps in creating correct bookings.",[157,3649,3650,3653],{},[85,3651,3652],{},"Helpful Guidance",": Be it in the event of continued salary payments during illness or issues with the N26 bank connection – Lexoffice explains what's happening and how to handle it.",[157,3655,3656,3659],{},[85,3657,3658],{},"AI Assignment",": Lexoffice is truly advanced in receipt recognition and automatic linking with bank transfers. It even covers the costs of payment transfers. It's almost magical to see thousands of records automatically created and accurately assigned.",[157,3661,3662,3665],{},[85,3663,3664],{},"Amazon Business Integration",": For companies regularly ordering on Amazon, the direct integration with Amazon Business is extremely beneficial. Lexware Office automatically retrieves all expenses, including properly grouped invoices, which saves a lot of effort, especially with confusing Amazon documents.",[11,3667,3668],{},"This blend of user-friendliness, quality, and automation makes Lexoffice our best solution.",[11,3670,3671],{},[85,3672,3673],{},"Packages and Prices (as of 2025):",[154,3675,3676,3682,3688,3694],{},[157,3677,3678,3681],{},[85,3679,3680],{},"Package S:"," €6.90\u002Fmonth (Record expenses)",[157,3683,3684,3687],{},[85,3685,3686],{},"Package M:"," €11.90\u002Fmonth (Invoices, offers, X-invoice, reminders)",[157,3689,3690,3693],{},[85,3691,3692],{},"Package L:"," €19.90\u002Fmonth (Submit VAT returns, income statement, asset management)",[157,3695,3696,3699],{},[85,3697,3698],{},"Package XL:"," €29.90\u002Fmonth (Public API, receipt via email, English and EU invoices)",[11,3701,3702],{},[690,3703,3706],{"href":3704,"rel":3705},"https:\u002F\u002Foffice.lexware.de\u002Fpreise\u002F",[694],"All Lexware Office Prices and Versions",[15,3708,3710],{"id":3709},"sevdesk-2020","sevDesk (2020)",[11,3712,3713],{},"We actively used the alternative, sevDesk, for a year. The software is very flexible, offers an extensive API, and allows for custom booking accounts. This is a significant plus for developers. Nevertheless, this openness comes with its challenges.",[154,3715,3716,3722],{},[157,3717,3718,3721],{},[85,3719,3720],{},"Bank Connection through Third-Party Providers",": We faced frequent issues here, particularly with N26. This instability disrupted our workflow.",[157,3723,3724,3727],{},[85,3725,3726],{},"Faulty Booking Logic",": We encountered faulty income statement calculations on client projects or issues during document import with large datasets.",[11,3729,3730],{},"We had to intervene multiple times with our PHP scripts to fix errors. For those familiar with it, sevDesk can be highly effective – for everyone else, it's more of a liability.",[11,3732,3733],{},[85,3734,3673],{},[154,3736,3737,3740,3743,3746],{},[157,3738,3739],{},"Free: €0 – Permanently (3 invoices per month)",[157,3741,3742],{},"Invoice: €8.90\u002Fmonth (Unlimited invoices, offers, payment reminders)",[157,3744,3745],{},"Accounting: €19.90\u002Fmonth (Multiple reminder levels, AI document capture, income statement, link bank account)",[157,3747,3748],{},"Accounting Pro: €27.90\u002Fmonth (API, BWA, cost centers)",[11,3750,3751],{},[690,3752,3755],{"href":3753,"rel":3754},"https:\u002F\u002Fsevdesk.de\u002Fpreise\u002F",[694],"All sevDesk Prices and Features",[15,3757,3759],{"id":3758},"papierkram-briefly-tested-no-permanent-use","Papierkram (briefly tested, no permanent use)",[11,3761,3762],{},"Papierkram follows a very clear approach. I particularly liked:",[154,3764,3765,3771,3777],{},[157,3766,3767,3770],{},[85,3768,3769],{},"Integrated Time Tracking",": Times can be invoiced directly.",[157,3772,3773,3776],{},[85,3774,3775],{},"Customizable Templates with Liquid Syntax",": Very helpful for individual automation.",[157,3778,3779,3782],{},[85,3780,3781],{},"Structured Reminders",": Much better handled compared to some other software.",[11,3784,3785],{},"Unfortunately, Papierkram was dropped because there was no API available at the time of testing (before June 2023). This was added later. However, it remains an interesting solution for freelancers or small entrepreneurs.",[11,3787,3788],{},[85,3789,3790],{},"Packages and Prices:",[154,3792,3793,3796,3799,3802],{},[157,3794,3795],{},"Free: €0.00 (Basic features, offers, invoices)",[157,3797,3798],{},"S: €12.90 (Time tracking, income statement, bank account integration, document customization CSS, max 1 user)",[157,3800,3801],{},"M: €24.90 (Customer portal, installment invoices, create data fields, max 5 users +€2.90 per user, API)",[157,3803,3804],{},"L: €49.90 (Unlimited users, €2.90 per user, more API queries)",[11,3806,3807],{},"Data import from Lexoffice and sevDesk is possible, facilitating a switch.",[11,3809,3810],{},[690,3811,3814],{"href":3812,"rel":3813},"https:\u002F\u002Fwww.papierkram.de\u002Fpreise\u002F#funktionen-im-detail",[694],"Packages & Prices of the Online-Accounting Software Papierkram",[15,3816,673],{"id":672},[11,3818,3819],{},"We've returned to Lexoffice. The initially missing API is now available, the quality of the software is excellent, and the validation and assistance features significantly ease our daily operations. For us as an IT company focused on automation, Lexoffice is the ideal choice.",[11,3821,3822,3825],{},[85,3823,3824],{},"Note on the Listed Prices:","\nAll listed prices are monthly costs and were carefully researched at the time of publication. Special offers or limited-time promotions are not included. Despite regular updates, we do not guarantee the accuracy, completeness, or timeliness of price information. Changes by providers are possible at any time.",{"title":56,"searchDepth":57,"depth":57,"links":3827},[3828,3829,3830,3831],{"id":3623,"depth":57,"text":3624},{"id":3709,"depth":57,"text":3710},{"id":3758,"depth":57,"text":3759},{"id":672,"depth":57,"text":673},"2025-04-18","\u002Fimg\u002Fblog\u002Fbuchhaltungssoftware-langzeittest.webp","Firmbee","https:\u002F\u002Fpixabay.com\u002Fusers\u002FFirmbee-663163\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-18-buchhaltungssoftware-langzeittest",{"title":3615,"description":3620},{"loc":3837},"blog\u002Fen\u002F2025-04-18-buchhaltungssoftware-langzeittest","G_L6QJ-wwE_U4hdf0-oK55jPkJri40WqIb_-7yBINcs",{"id":3843,"title":3844,"body":3845,"category":2448,"date":3832,"description":3849,"extension":65,"head":66,"image":3939,"imageCredit":3940,"imageCreditUrl":3941,"locale":68,"meta":3942,"navigation":70,"ogImage":66,"path":3943,"robots":66,"schemaOrg":66,"seo":3944,"sitemap":3945,"stem":3946,"__hash__":3947},"blog\u002Fblog\u002Fen\u002F2025-04-18-freescout-addons.md","The Most Important FreeScout Add-ons",{"type":8,"value":3846,"toc":3926},[3847,3850,3854,3857,3861,3864,3868,3871,3875,3878,3882,3885,3889,3892,3896,3899,3903,3906,3910,3913,3917,3920,3923],[11,3848,3849],{},"FreeScout can be tailored precisely to individual needs through many practical extensions. Currently, we use over 30 add-ons—some are essential for our daily work, while others are purely for comfort. In this article, I'll showcase a selection of the add-ons we actively utilize and why we recommend them.",[15,3851,3853],{"id":3852},"what-we-use-and-why","What We Use and Why",[11,3855,3856],{},"FreeScout can be expanded with a variety of add-ons—many of which are paid but available at fair one-time prices with lifetime updates. Here, I'll outline the extensions we actively use and which ones are particularly valuable for our daily support.",[371,3858,3860],{"id":3859},"whmcs-integration-free-third-party-developer","WHMCS Integration (Free, Third-Party Developer)",[11,3862,3863],{},"At the top of our list: the WHMCS module. It displays important customer data directly in FreeScout's sidebar—invoices, booked services, and domains included. This saves us clicks, time, and eliminates the constant switching to the WHMCS backend.",[371,3865,3867],{"id":3866},"whatsapp-integration","WhatsApp Integration",[11,3869,3870],{},"Yes, there's an integration. Unfortunately, it's only available through third-party providers with recurring costs starting at $30 USD per month, plus fees per message—currently too expensive for us, but functionally, it would be an extremely powerful expansion.",[371,3872,3874],{"id":3873},"spam-filter","Spam Filter",[11,3876,3877],{},"The spam filter was a game-changer for us. Since its implementation, no bizarre offers end up in the inbox anymore—especially not from Indian SEO \"miracle workers\" and \"app developers\" wanting to scale our platform. The filter learns over time and reliably keeps our inbox clean.",[371,3879,3881],{"id":3880},"sent-folder","Sent Folder",[11,3883,3884],{},"A small yet practical feature: the sent folder. You can quickly access previously answered inquiries—extremely useful for longer threads.",[371,3886,3888],{"id":3887},"send-later","Send Later",[11,3890,3891],{},"As a night owl, I truly appreciate this feature. I can compose offers at night and have them automatically sent the next morning—perfect for ensuring your communication lands in the client's inbox at the ideal time.",[371,3893,3895],{"id":3894},"saved-replies","Saved Replies",[11,3897,3898],{},"With pre-saved responses, we automate salutations, greetings, and frequent text passages. It saves time daily—a true classic in the helpdesk workflow.",[371,3900,3902],{"id":3901},"mail-signing-encryption","Mail Signing & Encryption",[11,3904,3905],{},"Recommended if you wish to encrypt with SMIME. Anyone who only wants to sign should be cautious: some mail servers mistakenly interpret it as an encrypted message, which can lead to misunderstandings.",[371,3907,3909],{"id":3908},"keyboard-shortcuts","Keyboard Shortcuts",[11,3911,3912],{},"Purchased, tested, but deactivated. Reason: With CTRL+Enter, messages are sent immediately—unfortunately, this cannot be disabled, leading to too many \"Oops\" moments for us.",[371,3914,3916],{"id":3915},"api-webhooks","API & Webhooks",[11,3918,3919],{},"Indispensable for us, as we've integrated FreeScout into our new customer portal (BBilling). It enables automated processes, synchronizations, and external tools.",[11,3921,3922],{},"We also deploy many other add-ons, such as Dark Mode, Reports, Workflows, Custom Fields, Telegram Notifications, Custom Folders, and more. Most of them run seamlessly and specifically enhance FreeScout with the additional functions we need.",[11,3924,3925],{},"Thinking of using FreeScout productively? The add-ons make the difference between a simple inbox and a professional support tool.",{"title":56,"searchDepth":57,"depth":57,"links":3927},[3928],{"id":3852,"depth":57,"text":3853,"children":3929},[3930,3931,3932,3933,3934,3935,3936,3937,3938],{"id":3859,"depth":398,"text":3860},{"id":3866,"depth":398,"text":3867},{"id":3873,"depth":398,"text":3874},{"id":3880,"depth":398,"text":3881},{"id":3887,"depth":398,"text":3888},{"id":3894,"depth":398,"text":3895},{"id":3901,"depth":398,"text":3902},{"id":3908,"depth":398,"text":3909},{"id":3915,"depth":398,"text":3916},"\u002Fimg\u002Fblog\u002Ffreescout-addons.webp","congerdesign","https:\u002F\u002Fpixabay.com\u002Fusers\u002Fcongerdesign-509903\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-18-freescout-addons",{"title":3844,"description":3849},{"loc":3943},"blog\u002Fen\u002F2025-04-18-freescout-addons","xG_ETGsZy-D-B1t_lgP5pjyBSfaM8OvqcEL7r8ejFiY",{"id":3949,"title":3950,"body":3951,"category":2448,"date":3832,"description":4373,"extension":65,"head":66,"image":4374,"imageCredit":4375,"imageCreditUrl":4376,"locale":68,"meta":4377,"navigation":70,"ogImage":66,"path":4378,"robots":66,"schemaOrg":66,"seo":4379,"sitemap":4380,"stem":4381,"__hash__":4382},"blog\u002Fblog\u002Fen\u002F2025-04-18-freescout-helpdesk.md","Free Helpdesk with FreeScout: Why We Switched from WHMCS",{"type":8,"value":3952,"toc":4351},[3953,3964,3967,3971,3978,3989,4000,4004,4007,4061,4065,4076,4083,4094,4101,4105,4112,4119,4130,4134,4137,4141,4144,4154,4158,4161,4169,4173,4176,4184,4188,4191,4199,4203,4206,4214,4218,4221,4229,4233,4236,4244,4248,4251,4254,4258,4261,4269,4273,4276,4284,4288,4291,4299,4303,4306,4314,4318,4321,4329,4333,4336,4344],[11,3954,3955,3956,3959,3960,3963],{},"In everyday customer interactions, a reliable helpdesk system is essential. However, great helpdesk software doesn't need to be expensive — quite the opposite: Since the beginning of 2024, we have been using ",[85,3957,3958],{},"FreeScout",", a ",[85,3961,3962],{},"free helpdesk"," that is professional, flexible, and completely open-source.",[11,3965,3966],{},"Previously, we used the WHMCS ticketing system for many years. But over time, the interface became increasingly cluttered, and the built-in spam filtering was hardly usable. This prompted us to rethink our approach. Today we are convinced: Switching to FreeScout was the right move.",[371,3968,3970],{"id":3969},"what-is-freescout","What is FreeScout?",[11,3972,3973,3974,3977],{},"FreeScout is a ",[85,3975,3976],{},"free helpdesk system"," based on the Laravel framework. It offers classic support functions such as ticket management, automatic responses, notifications, assignments, and much more — similar to well-known solutions like ZenDesk or Freshdesk, offered as SaaS services.",[11,3979,3980,3981,3984,3985,3988],{},"The project was first published on ",[85,3982,3983],{},"September 23, 2018",", on GitHub and has been actively developed since then. FreeScout isn't backed by a large company but rather a small development team from Russia that provides the project under the ",[85,3986,3987],{},"AGPLv3 License"," (Affero General Public License) — an open-source license that ensures free access to source code, even for hosted web services.",[11,3990,3991,3992,3995,3996,3999],{},"The difference is: FreeScout is ",[85,3993,3994],{},"not a subscription model"," but ",[85,3997,3998],{},"a self-hosted open-source solution"," — without monthly costs, without hidden fees.",[371,4001,4003],{"id":4002},"technical-details","Technical Details:",[11,4005,4006],{},"(For our self-hosted enthusiasts)",[154,4008,4009,4015,4021,4027,4033,4043,4049,4055],{},[157,4010,4011,4014],{},[85,4012,4013],{},"Technology",": PHP 8.x, Laravel 10.x+, MySQL\u002FMariaDB\u002FPostgres, Composer",[157,4016,4017,4020],{},[85,4018,4019],{},"Platform",": Fully self-hostable on Linux servers (e.g., with Apache or NGINX) (Works on Plesk)",[157,4022,4023,4026],{},[85,4024,4025],{},"Deployment",": Classic via web server or through Docker container",[157,4028,4029,4032],{},[85,4030,4031],{},"User Interface",": Modern, responsive, mobile-friendly",[157,4034,4035,4038,4039,4042],{},[85,4036,4037],{},"Languages",": English, ",[85,4040,4041],{},"German",", Chinese, Danish, Finnish, French, Italian, Japanese, Kazakh, Korean, Croatian, Dutch, Norwegian, Persian, Polish, Portuguese, Russian, Spanish, Swedish, Slovak, Czech, Turkish, Hungarian.",[157,4044,4045,4048],{},[85,4046,4047],{},"Integration",": Support for IMAP, SMTP, Webhooks, Slack (module), Telegram (module), LDAP (module), REST API (module), etc.",[157,4050,4051,4054],{},[85,4052,4053],{},"Security",": Two-factor authentication, role and permission management, GDPR-compliant usage possible",[157,4056,4057,4060],{},[85,4058,4059],{},"Scalability:"," Search optimization with Meilisearch for large datasets (module)",[15,4062,4064],{"id":4063},"why-we-use-freescout","Why We Use FreeScout",[11,4066,4067,4068,4071,4072,4075],{},"We weren't actively looking for a \"free helpdesk.\" Instead, FreeScout convinced us for entirely different reasons: The system is based on ",[85,4069,4070],{},"Laravel",", a framework we work with daily — and that makes FreeScout particularly interesting for us because we can easily expand and integrate it deeply. The ",[85,4073,4074],{},"range of functions"," is surprisingly extensive without feeling overloaded.",[11,4077,4078,4079,4082],{},"For me personally, FreeScout feels more like an ",[85,4080,4081],{},"intelligent email inbox",": clear, fast, yet equipped with everything a professional ticketing system needs – from notes and assignments to automations.",[11,4084,4085,4086,4089,4090,4093],{},"What I also really appreciate is the fair extension concept: The paid add-ons are extremely affordable, include ",[85,4087,4088],{},"lifetime updates",", and still come under an ",[85,4091,4092],{},"open-source license",". I am happy to support such models because they enable sustainable software development without a subscription obligation.",[11,4095,4096,4097,4100],{},"And what ultimately made it a must-have solution for me: the ",[85,4098,4099],{},"spam filter",". Since we started using FreeScout, our support inbox has been free from Indian princes, dubious SEO offers, and overzealous app developers from around the world wanting to \"scale our platform.\" For that alone, I wouldn't give up FreeScout.",[15,4102,4104],{"id":4103},"open-source-with-optional-extensions","Open Source with Optional Extensions",[11,4106,4107,4108,4111],{},"FreeScout is not just a free helpdesk, but also a thoughtful business model: The base is free, and developers support themselves through ",[85,4109,4110],{},"optional premium modules"," with lifetime licenses. For us as a company, this is a fair solution: We only pay for features we actually need — and keep full control over our data.",[11,4113,4114],{},[690,4115,4118],{"href":4116,"rel":4117},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fblog\u002Fsoftware\u002Ffreescout-addons",[694],"=> Which FreeScout Add-ons we use is covered in this article.",[11,4120,4121,4124,4125,108],{},[85,4122,4123],{},"FreeScout Hosting by Becker Software (Ad)","\nUse FreeScout for your helpdesk directly on our servers. Hosting for FreeScout starting at just €2.90 per month. Benefit from free installation by our qualified customer support. Find more information on our ",[690,4126,4129],{"href":4127,"rel":4128},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fweb-hosting",[694],"web hosting page",[15,4131,4133],{"id":4132},"all-freescout-features-explained","All FreeScout Features Explained",[11,4135,4136],{},"Although FreeScout is kept simple, it can be extensively expanded. To help you assess whether FreeScout is suitable for your company, we have explained all features below.",[371,4138,4140],{"id":4139},"unlimited-users-inboxes-and-tickets","Unlimited Users, Inboxes, and Tickets",[11,4142,4143],{},"There are no artificial limitations on the number of support agents or inboxes. There is also no limit on the number of tickets.",[11,4145,4146,4149,4150,4153],{},[85,4147,4148],{},"Useful when:"," you want to scale without additional costs\n",[85,4151,4152],{},"Useful for:"," growing teams, startups, companies with multiple brands\u002Finboxes",[371,4155,4157],{"id":4156},"internal-notes-and-mentions-paid","Internal Notes and Mentions (Paid)",[11,4159,4160],{},"Agents can leave each other notes on a ticket or tag colleagues with @mentions in a conversation — without the customer noticing.",[11,4162,4163,4165,4166,4168],{},[85,4164,4148],{}," multiple people work on a ticket or consultations are needed\n",[85,4167,4152],{}," support teams with more complex inquiries or handovers",[371,4170,4172],{"id":4171},"automatic-replies-and-workflows-paid","Automatic Replies and Workflows (Paid)",[11,4174,4175],{},"FreeScout can send automatic replies upon receiving a message, apply specific rules, and automate many recurring tasks with workflows.",[11,4177,4178,4180,4181,4183],{},[85,4179,4148],{}," you want to standardize support processes\n",[85,4182,4152],{}," helpdesks with clear workflows or high volume",[371,4185,4187],{"id":4186},"collision-detection","Collision Detection",[11,4189,4190],{},"If multiple agents open the same ticket, this is indicated to prevent accidental duplicate responses.",[11,4192,4193,4195,4196,4198],{},[85,4194,4148],{}," several staff are working simultaneously in the system\n",[85,4197,4152],{}," teams with a lot of parallel ticket processing",[371,4200,4202],{"id":4201},"customer-satisfaction-rating-paid","Customer Satisfaction Rating (Paid)",[11,4204,4205],{},"After a ticket is closed, the customer can provide a rating — for quick feedback and better quality assurance.",[11,4207,4208,4210,4211,4213],{},[85,4209,4148],{}," you want to continually improve support\n",[85,4212,4152],{}," everyone who values customer satisfaction",[371,4215,4217],{"id":4216},"saved-replies-paid","Saved Replies (Paid)",[11,4219,4220],{},"Templates for frequent replies save time and ensure consistent communication.",[11,4222,4223,4225,4226,4228],{},[85,4224,4148],{}," similar inquiries keep coming in\n",[85,4227,4152],{}," hosting providers, software support, internal IT departments",[371,4230,4232],{"id":4231},"spam-filter-paid","Spam Filter (Paid)",[11,4234,4235],{},"The integrated spam filter learns over time and ensures that the inbox remains clean — without external tools or custom rules.",[11,4237,4238,4240,4241,4243],{},[85,4239,4148],{}," you receive many irrelevant inquiries\n",[85,4242,4152],{}," everyone who uses support addresses publicly",[371,4245,4247],{"id":4246},"mobile-app","Mobile App",[11,4249,4250],{},"FreeScout comes with a free mobile app, making working from a phone convenient. Even though the mobile app is just a web integration, it is very convenient with paid push notifications.",[11,4252,4253],{},"Useful when: you like to work from your phone\nUseful for: people who travel a lot.",[371,4255,4257],{"id":4256},"push-notifications-paid","Push Notifications (Paid)",[11,4259,4260],{},"Support staff receive instant notifications of new or updated tickets — on desktop or mobile.",[11,4262,4263,4265,4266,4268],{},[85,4264,4148],{}," you want to respond quickly, even on the go\n",[85,4267,4152],{}," small teams, freelancers, on-call services",[371,4270,4272],{"id":4271},"customer-management-paid","Customer Management (Paid)",[11,4274,4275],{},"With the CRM module, customer data, contacts, and individual fields can be managed — directly in the helpdesk.",[11,4277,4278,4280,4281,4283],{},[85,4279,4148],{}," you want to keep support and customer data in one place\n",[85,4282,4152],{}," B2B companies, agencies, hosting providers",[371,4285,4287],{"id":4286},"integration-with-whmcs-community-module","Integration with WHMCS (Community Module)",[11,4289,4290],{},"With the WHMCS module, you can see customer data, contracts, domains, and invoices directly in the ticket — without switching to WHMCS.",[11,4292,4293,4295,4296,4298],{},[85,4294,4148],{}," you manage hosting customers\n",[85,4297,4152],{}," web hosts and resellers with WHMCS systems",[371,4300,4302],{"id":4301},"api-webhooks-paid","API & Webhooks (Paid)",[11,4304,4305],{},"FreeScout offers a full-fledged REST API and webhooks for integration with other systems.",[11,4307,4308,4310,4311,4313],{},[85,4309,4148],{}," you want to automate processes or integrate FreeScout into your own tools\n",[85,4312,4152],{}," developers, system integrators, internal tools",[371,4315,4317],{"id":4316},"dark-mode-paid","Dark Mode (Paid)",[11,4319,4320],{},"For comfortable working in dark environments — the dark mode for the entire UI.",[11,4322,4323,4325,4326,4328],{},[85,4324,4148],{}," you have long support shifts\n",[85,4327,4152],{}," everyone who prefers dark interfaces",[371,4330,4332],{"id":4331},"attachments-screenshots-and-images","Attachments, Screenshots, and Images",[11,4334,4335],{},"Attachments can be viewed directly in the conversation, and screenshots can be pasted via copy & paste.",[11,4337,4338,4340,4341,4343],{},[85,4339,4148],{}," you frequently handle technical inquiries with images\n",[85,4342,4152],{}," IT support, agencies, designers",[11,4345,4346],{},[690,4347,4350],{"href":4348,"rel":4349},"https:\u002F\u002Ffreescout.net\u002Fmodules\u002F",[694],"=> You can find a list of all modules on the FreeScout module page.",{"title":56,"searchDepth":57,"depth":57,"links":4352},[4353,4354,4355,4356,4357],{"id":3969,"depth":398,"text":3970},{"id":4002,"depth":398,"text":4003},{"id":4063,"depth":57,"text":4064},{"id":4103,"depth":57,"text":4104},{"id":4132,"depth":57,"text":4133,"children":4358},[4359,4360,4361,4362,4363,4364,4365,4366,4367,4368,4369,4370,4371,4372],{"id":4139,"depth":398,"text":4140},{"id":4156,"depth":398,"text":4157},{"id":4171,"depth":398,"text":4172},{"id":4186,"depth":398,"text":4187},{"id":4201,"depth":398,"text":4202},{"id":4216,"depth":398,"text":4217},{"id":4231,"depth":398,"text":4232},{"id":4246,"depth":398,"text":4247},{"id":4256,"depth":398,"text":4257},{"id":4271,"depth":398,"text":4272},{"id":4286,"depth":398,"text":4287},{"id":4301,"depth":398,"text":4302},{"id":4316,"depth":398,"text":4317},{"id":4331,"depth":398,"text":4332},"In everyday customer interactions, a reliable helpdesk system is essential. However, great helpdesk software doesn't need to be expensive — quite the opposite: Since the beginning of 2024, we have been using FreeScout, a free helpdesk that is professional, flexible, and completely open-source.","\u002Fimg\u002Fblog\u002Ffreescout-helpdesk.webp","geralt","https:\u002F\u002Fpixabay.com\u002Fusers\u002Fgeralt-9301\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-18-freescout-helpdesk",{"title":3950,"description":4373},{"loc":4378},"blog\u002Fen\u002F2025-04-18-freescout-helpdesk","wGO0cWnO7wAS8u0oYbGpbZv26nWCywX6jA4VY9hbguk",{"id":4384,"title":4385,"body":4386,"category":66,"date":3832,"description":4390,"extension":65,"head":66,"image":4577,"imageCredit":733,"imageCreditUrl":734,"locale":68,"meta":4578,"navigation":70,"ogImage":66,"path":4579,"robots":66,"schemaOrg":66,"seo":4580,"sitemap":4581,"stem":4582,"__hash__":4583},"blog\u002Fblog\u002Fen\u002F2025-04-18-plesk-lizenzen-guenstig.md","Plesk Licenses - Affordable Options Available Here",{"type":8,"value":4387,"toc":4564},[4388,4391,4394,4407,4414,4418,4421,4425,4441,4453,4464,4476,4486,4492,4501,4507,4529,4532,4538,4545,4551,4554],[11,4389,4390],{},"As of November 28, 2024, Plesk has once again increased prices for all base licenses—a move that hasn't completely surprised many, but is certainly noticeable. Those dealing with license costs will have noticed: Not only have prices risen, but the availability has also changed.",[11,4392,4393],{},"With several hosting providers, Plesk licenses are now only available in combination with their own server contracts. Many people now come across notes like:",[2843,4395,4396],{},[11,4397,4398,4401,4402],{},[85,4399,4400],{},"“Plesk licenses are only valid in combination with our Dedicated Server \u002F V-Server contracts.”","\nSource: ",[690,4403,4406],{"href":4404,"rel":4405},"http:\u002F\u002Fip-projects.de",[694],"ip-projects.de",[11,4408,4409,4410,4413],{},"This particularly complicates matters for those operating their own servers—be it in a data center, with a third-party provider, or in-house. But don't worry: They still exist—",[85,4411,4412],{},"Plesk licenses for self-hosting"," at fair prices. And I'll show you where.",[15,4415,4417],{"id":4416},"provider-directory","Provider Directory",[11,4419,4420],{},"The displayed (gross) prices were last updated on April 18, 2025. For comparison, we have chosen the Plesk Web Host (VPS) as the highest license.",[371,4422,4424],{"id":4423},"_1-nuxoa-gmbh-2606","1. NUXOA GmbH - €26.06",[11,4426,4427,4430,4431,4434,4435,4440],{},[85,4428,4429],{},"NUXOA GmbH"," offers ",[85,4432,4433],{},"Plesk licenses"," at competitive prices at ",[690,4436,4439],{"href":4437,"rel":4438},"https:\u002F\u002Fmanager.nuxoa.de\u002Fde\u002Fcat\u002F19",[694],"nuxoa.de",". As an established provider, it's worth checking out their offer, especially for cost-effective solutions.",[371,4442,4444],{"id":4443},"_2-noezde-3199",[85,4445,4446,4447,4452],{},"2. ",[690,4448,4451],{"href":4449,"rel":4450},"http:\u002F\u002Fnoez.de",[694],"noez.de"," – €31.99",[11,4454,4455,4456,4459,4460,4463],{},"At ",[690,4457,4451],{"href":4449,"rel":4458},[694],", Plesk licenses are often ",[85,4461,4462],{},"significantly cheaper than directly through Plesk",". The provider has been established for years and offers hassle-free transactions—ideal for those looking for a cost-effective license solution without renting servers there.",[371,4465,4467],{"id":4466},"_3-skrimeeu-4997-on-offer-for-2499-as-of-april-14-2025",[85,4468,4469,4470,4475],{},"3. ",[690,4471,4474],{"href":4472,"rel":4473},"http:\u002F\u002FSkrime.eu",[694],"Skrime.eu"," – €49.97 (On offer for €24.99 as of April 14, 2025)",[11,4477,4478,4481,4482,4485],{},[690,4479,4474],{"href":4472,"rel":4480},[694]," also offers an interesting alternative. Regular discount promotions are available here, and—this is the crucial point—the ",[85,4483,4484],{},"licenses are not tied to a specific hoster",". This means Plesk can be used on your own server or with any provider.",[371,4487,4489],{"id":4488},"_4-röth-beck-reselling-of-plesk-licenses-price-on-request",[85,4490,4491],{},"4. Röth & Beck – Reselling of Plesk Licenses (Price on request)",[11,4493,4494,4495,4500],{},"It's worth checking out ",[690,4496,4499],{"href":4497,"rel":4498},"https:\u002F\u002Froeth-und-beck.de\u002Fplesk-reselling",[694],"Röth & Beck",". There, resellers can independently determine IP bindings. This means full flexibility in license assignment—perfect if you use multiple systems or changing environments.",[371,4502,4504],{"id":4503},"_5-ionos-vserver-including-plesk",[85,4505,4506],{},"5. IONOS vServer including Plesk",[11,4508,4509,4510,4517,4518,4521,4522,4525,4526],{},"A real insider tip is the ",[690,4511,4514],{"href":4512,"rel":4513},"https:\u002F\u002Fwww.ionos.de\u002Fserver\u002Fvps",[694],[85,4515,4516],{},"vServer offer from IONOS",". Although the price may seem higher at first glance, a second look is worthwhile: For ",[85,4519,4520],{},"under €10 per month",", you get ",[85,4523,4524],{},"4 vCPU cores, 8 GB RAM and 240 GB NVMe storage","—and here's the kicker: The ",[85,4527,4528],{},"Plesk Web Admin Edition is already included!",[11,4530,4531],{},"This is an extremely attractive combination of performance and license value, especially for smaller projects, test environments, or as a central management instance. So if you're considering using Plesk and don’t yet have a server—definitely check out IONOS.",[15,4533,4535],{"id":4534},"tip-ask-your-own-provider",[85,4536,4537],{},"Tip: Ask your own provider",[11,4539,4540,4541,4544],{},"If you already operate a vServer or Dedicated Server with a provider, be sure to ask directly there. Many hosters offer ",[85,4542,4543],{},"provider-bound Plesk licenses"," that are often significantly cheaper than standalone licenses. These licenses are usually only usable on the provider's servers but are very attractive in terms of price. A quick glance at the customer portal or an email to support can pay off—especially if you already use existing infrastructure.",[15,4546,4548],{"id":4547},"do-you-know-another-good-source",[85,4549,4550],{},"Do you know another good source?",[11,4552,4553],{},"Have you discovered other providers where you can get Plesk licenses cheaply and independent of the server provider?",[11,4555,4556,4563],{},[85,4557,4558,4559],{},"Feel free to email us at ",[690,4560,4562],{"href":4561},"mailto:info@becker-software.de","info@becker-software.de","—we'll update the list and keep the article up to date!",{"title":56,"searchDepth":57,"depth":57,"links":4565},[4566,4575,4576],{"id":4416,"depth":57,"text":4417,"children":4567},[4568,4569,4571,4573,4574],{"id":4423,"depth":398,"text":4424},{"id":4443,"depth":398,"text":4570},"2. noez.de – €31.99",{"id":4466,"depth":398,"text":4572},"3. Skrime.eu – €49.97 (On offer for €24.99 as of April 14, 2025)",{"id":4488,"depth":398,"text":4491},{"id":4503,"depth":398,"text":4506},{"id":4534,"depth":57,"text":4537},{"id":4547,"depth":57,"text":4550},"\u002Fimg\u002Fblog\u002Fplesk-lizenzen-guenstig.webp",{},"\u002Fblog\u002Fen\u002F2025-04-18-plesk-lizenzen-guenstig",{"title":4385,"description":4390},{"loc":4579},"blog\u002Fen\u002F2025-04-18-plesk-lizenzen-guenstig","YTcGvvImljAP6-WENkI5-FCj-31tNQaspJ3BziazWOA",{"id":4585,"title":4586,"body":4587,"category":66,"date":5275,"description":5276,"extension":65,"head":66,"image":5277,"imageCredit":5278,"imageCreditUrl":5279,"locale":68,"meta":5280,"navigation":70,"ogImage":66,"path":5281,"robots":66,"schemaOrg":66,"seo":5282,"sitemap":5283,"stem":5284,"__hash__":5285},"blog\u002Fblog\u002Fen\u002F2025-04-17-bad-bots-schutz.md","When Bad Bots Rattle Your Website",{"type":8,"value":4588,"toc":5252},[4589,4595,4602,4605,4608,4623,4627,4630,4656,4663,4677,4681,4691,4696,4700,4713,4717,4724,4728,4731,4737,4740,4746,4752,4758,4764,4767,4773,4779,4786,4792,4819,4826,4833,4839,4877,4884,4891,4911,4917,4924,4927,4933,4936,4942,4946,4955,4959,4962,4968,4974,4980,4985,4990,4992,4998,5004,5010,5013,5019,5024,5061,5065,5067,5073,5078,5081,5087,5090,5096,5098,5105,5109,5112,5118,5121,5127,5130,5136,5139,5145,5149,5156,5159,5165,5168,5171,5177,5180,5185,5191,5193,5201,5214,5220,5226,5232,5238,5240,5243,5249],[11,4590,4591,4592,108],{},"The internet is loud, crowded, and most importantly: ",[85,4593,4594],{},"constantly under surveillance",[11,4596,4597,4598,4601],{},"No, not by humans – but by ",[85,4599,4600],{},"bots",". Automated programs that crawl the web 24\u002F7. Some help index sites (e.g., Googlebots), but others are much more aggressive: They scan websites for vulnerabilities, look for login forms, test passwords, or collect email addresses for spam.",[11,4603,4604],{},"If you run a website or server, you might not notice it immediately. But your logs tell you otherwise:\nUnfamiliar IPs, strange requests, suspicious URLs.",[11,4606,4607],{},"In this article, I'll show you:",[154,4609,4610,4613,4616],{},[157,4611,4612],{},"What scanner bots do on the internet",[157,4614,4615],{},"Why you should protect yourself against them",[157,4617,4618,4619,4622],{},"And how you can implement protection practically with ",[85,4620,4621],{},"Fail2Ban"," to block these bots",[15,4624,4626],{"id":4625},"what-do-these-bots-actually-do","What do these bots actually do?",[11,4628,4629],{},"Here are some typical examples of \"malicious\" bots:",[154,4631,4632,4638,4644,4650],{},[157,4633,4634,4637],{},[85,4635,4636],{},"Directory Scanner"," – searches your site for \u002Fadmin, \u002Flogin, \u002Fphpmyadmin, etc.",[157,4639,4640,4643],{},[85,4641,4642],{},"Login-Brute-Forcer"," – attempts passwords on WordPress, Mail, or FTP.",[157,4645,4646,4649],{},[85,4647,4648],{},"Scraper"," – copies content, product data, or customer lists.",[157,4651,4652,4655],{},[85,4653,4654],{},"Email Collector"," – gathers email addresses from legal notices or contact forms.",[11,4657,4658,4659,4662],{},"These bots are often not just annoying but ",[85,4660,4661],{},"a real security risk",". Because they can:",[154,4664,4665,4668,4671,4674],{},[157,4666,4667],{},"Generate server load",[157,4669,4670],{},"Prepare real attack attempts",[157,4672,4673],{},"Discover vulnerabilities",[157,4675,4676],{},"Get your emails on spam lists",[371,4678,4680],{"id":4679},"protective-measures-what-can-i-do","Protective measures: What can I do?",[11,4682,4683,4684,4687,4688],{},"In addition to firewalls and regular software updates, there is a ",[85,4685,4686],{},"very effective measure"," to actively combat these attacks: => ",[85,4689,4690],{},"Detect – React – Block",[11,4692,4693,4694,108],{},"You can do this using the tool ",[85,4695,4621],{},[15,4697,4699],{"id":4698},"tutorial-blocking-scanner-bots-with-fail2ban","Tutorial: Blocking scanner bots with Fail2Ban",[11,4701,4702,4704,4705,4708,4709,4712],{},[85,4703,4621],{}," is an excellent tool that monitors log files on your server and automatically ",[85,4706,4707],{},"blocks IP addresses"," when suspicious patterns are detected. Here, we focus specifically on ",[85,4710,4711],{},"identifying scanner bots"," that search for non-existent .php files.",[371,4714,4716],{"id":4715},"example-protecting-against-suspicious-http-requests-for-dynamic-websites","Example: Protecting against suspicious HTTP requests (for dynamic websites)",[11,4718,4719,4720,4723],{},"The following tutorial checks the ",[85,4721,4722],{},"logfile"," of your web server and automatically blocks IP addresses that repeatedly search for non-existing .php files (e.g., attacks by scanners or brute force attempts).",[371,4725,4727],{"id":4726},"_1-adjust-nginx-config","1. Adjust NGINX Config",[11,4729,4730],{},"Add the following log format to your NGINX Config",[805,4732,4735],{"className":4733,"code":4734,"language":810},[808],"log_format  fail2banlog    \n",[30,4736,4734],{"__ignoreMap":56},[11,4738,4739],{},"In the location block:",[805,4741,4744],{"className":4742,"code":4743,"language":810},[808],"access_log \u002F\n",[30,4745,4743],{"__ignoreMap":56},[371,4747,4446,4749],{"id":4748},"_2-install-fail2ban-on-debianubuntu",[85,4750,4751],{},"Install Fail2Ban (on Debian\u002FUbuntu)",[11,4753,4754,4755,4757],{},"First, you need to install ",[85,4756,4621],{}," on your server. Use the following command:",[805,4759,4762],{"className":4760,"code":4761,"language":810},[808],"sudo apt install fail2ban\n",[30,4763,4761],{"__ignoreMap":56},[11,4765,4766],{},"After installation, ensure that the Fail2Ban daemon is running:",[805,4768,4771],{"className":4769,"code":4770,"language":810},[808],"sudo systemctl enable fail2ban sudo systemctl start fail2ban\n",[30,4772,4770],{"__ignoreMap":56},[371,4774,4469,4776],{"id":4775},"_3-create-a-filter-file-for-nginx-bad-bot-detection",[85,4777,4778],{},"Create a filter file for NGINX Bad Bot Detection",[11,4780,4781,4782,4785],{},"Create a ",[85,4783,4784],{},"filter file"," to detect specific attacks, such as when non-existent .php files are requested.",[805,4787,4790],{"className":4788,"code":4789,"language":810},[808],"sudo nano \u002Fetc\u002Ffail2ban\u002Ffilter.d\u002Fnginx-bot-detection.conf\n",[30,4791,4789],{"__ignoreMap":56},[154,4793,4794,4807,4813],{},[157,4795,4796,4799,4800,2298,4803,4806],{},[85,4797,4798],{},"failregex:"," This is the key element. It looks for requests where a .php file is requested, ending in an HTTP status ",[85,4801,4802],{},"404 (not found)",[85,4804,4805],{},"403 (forbidden)",". This means that a bot asks for a non-existent file and receives an error message.",[157,4808,4809,4812],{},[85,4810,4811],{},"ignoreregex:"," Here, you can define additional requests that shouldn't be filtered, but in this case, it remains empty.",[157,4814,4815,4818],{},[85,4816,4817],{},"journalmatch:"," Ensures that only NGINX logs are considered.",[371,4820,4822,4823],{"id":4821},"_4-create-a-jail-file-nginx-bot-detection","4. ",[85,4824,4825],{},"Create a Jail File (nginx-bot-detection)",[11,4827,4828,4829,4832],{},"Now create a ",[85,4830,4831],{},"Jail file"," that instructs Fail2Ban to use the filter file and automatically block IP addresses.",[805,4834,4837],{"className":4835,"code":4836,"language":810},[808],"sudo nano \u002Fetc\u002Ffail2ban\u002Fjail.d\u002Fnginx-bot-detection.local[nginx-bot-detection] enabled = \n",[30,4838,4836],{"__ignoreMap":56},[154,4840,4841,4847,4853,4859,4865,4871],{},[157,4842,4843,4846],{},[85,4844,4845],{},"enabled:"," Activates the rule.",[157,4848,4849,4852],{},[85,4850,4851],{},"port:"," The standard web port for HTTP and HTTPS.",[157,4854,4855,4858],{},[85,4856,4857],{},"logpath:"," The path to the NGINX log file. Make sure to specify the correct path.",[157,4860,4861,4864],{},[85,4862,4863],{},"maxretry:"," The number of attempts allowed within findtime (10 minutes) before the IP address is blocked.",[157,4866,4867,4870],{},[85,4868,4869],{},"bantime:"," The duration for which an IP address is blocked (here, 1 hour).",[157,4872,4873,4876],{},[85,4874,4875],{},"action:"," Defines the actions taken upon violation, such as notifications, IP blocks, and reporting to AbuseIPDB.",[371,4878,4880,4881],{"id":4879},"_5-abuseipdb-configuration-optional","5. ",[85,4882,4883],{},"AbuseIPDB Configuration (optional)",[11,4885,4886,4887,4890],{},"If you want to use AbuseIPDB to report malicious IP addresses, you need to store your ",[85,4888,4889],{},"API key"," in the Fail2Ban configuration.",[596,4892,4893,4904],{},[157,4894,4895,4896,4901,4902,108],{},"Register on ",[690,4897,4900],{"href":4898,"rel":4899},"https:\u002F\u002Fwww.abuseipdb.com\u002F",[694],"AbuseIPDB"," and obtain your ",[85,4903,4889],{},[157,4905,4906,4907,4910],{},"Edit the ",[85,4908,4909],{},"action.d\u002Fabuseipdb.conf"," file:",[805,4912,4915],{"className":4913,"code":4914,"language":810},[808],"sudo nano \u002Fetc\u002Ffail2ban\u002Faction.d\u002Fabuseipdb.conf\n",[30,4916,4914],{"__ignoreMap":56},[371,4918,4920,4921],{"id":4919},"_6-restart-fail2ban","6. ",[85,4922,4923],{},"Restart Fail2Ban",[11,4925,4926],{},"After all configurations are completed, restart Fail2Ban to apply the changes:",[805,4928,4931],{"className":4929,"code":4930,"language":810},[808],"sudo systemctl restart fail2ban\n",[30,4932,4930],{"__ignoreMap":56},[11,4934,4935],{},"You can check the status of Fail2Ban to ensure that everything is working correctly:",[805,4937,4940],{"className":4938,"code":4939,"language":810},[808],"sudo fail2ban-client status\n",[30,4941,4939],{"__ignoreMap":56},[15,4943,4945],{"id":4944},"tutorial-ban-scanner-bots-via-ssh-with-fail2ban","Tutorial: Ban Scanner Bots via SSH with Fail2Ban",[11,4947,4948,4950,4951,4954],{},[85,4949,4621],{}," offers an excellent way to protect against brute-force attacks and scanner bots that attempt to infiltrate your server via ",[85,4952,4953],{},"SSH",". This guide shows you how to set up Fail2Ban to monitor SSH login attempts and block IP addresses that repeatedly enter incorrect passwords.",[596,4956,4957],{},[157,4958,4751],{},[4960,4961],"hr",{},[11,4963,4964,4965,4967],{},"If you haven't installed ",[85,4966,4621],{}," yet, you can do so with the following commands:",[805,4969,4972],{"className":4970,"code":4971,"language":810},[808],"sudo apt update sudo apt install fail2ban\n",[30,4973,4971],{"__ignoreMap":56},[11,4975,4976,4977,4979],{},"Once the installation is complete, ensure that ",[85,4978,4621],{}," starts automatically:",[805,4981,4983],{"className":4982,"code":4770,"language":810},[808],[30,4984,4770],{"__ignoreMap":56},[596,4986,4987],{"start":57},[157,4988,4989],{},"Check Default SSH Fail2Ban Configuration",[4960,4991],{},[11,4993,4994,4995,4997],{},"Fail2Ban already includes a default configuration for ",[85,4996,4953],{}," protection, which you can adjust.",[11,4999,5000,5001,5003],{},"Open the file responsible for ",[85,5002,4953],{}," monitoring:",[805,5005,5008],{"className":5006,"code":5007,"language":810},[808],"sudo nano \u002Fetc\u002Ffail2ban\u002Fjail.local\n",[30,5009,5007],{"__ignoreMap":56},[11,5011,5012],{},"If this file doesn't exist, create it and add the following lines:",[805,5014,5017],{"className":5015,"code":5016,"language":810},[808],"[sshd] enabled  = \n",[30,5018,5016],{"__ignoreMap":56},[11,5020,5021],{},[85,5022,5023],{},"Explanation of the settings:",[154,5025,5026,5031,5040,5045,5050,5055],{},[157,5027,5028,5030],{},[85,5029,4845],{}," Activates SSH protection.",[157,5032,5033,5035,5036,5039],{},[85,5034,4851],{}," Defines the port being monitored (default ",[85,5037,5038],{},"22"," for SSH).",[157,5041,5042,5044],{},[85,5043,4857],{}," The path to the log file where failed login attempts are recorded. On most Linux servers, this is \u002Fvar\u002Flog\u002Fauth.log.",[157,5046,5047,5049],{},[85,5048,4863],{}," The maximum number of failed attempts allowed before an IP address is blocked (here, 5 attempts).",[157,5051,5052,5054],{},[85,5053,4869],{}," The duration for which an IP address is banned (here, 1 hour).",[157,5056,5057,5060],{},[85,5058,5059],{},"findtime:"," The period during which maxretry failed attempts are counted (here, 10 minutes).",[596,5062,5063],{"start":398},[157,5064,4923],{},[4960,5066],{},[11,5068,5069,5070,5072],{},"After adjusting the configuration, restart ",[85,5071,4621],{}," to make the changes effective:",[805,5074,5076],{"className":5075,"code":4930,"language":810},[808],[30,5077,4930],{"__ignoreMap":56},[11,5079,5080],{},"You can check the status of Fail2Ban to ensure that SSH monitoring runs correctly:",[805,5082,5085],{"className":5083,"code":5084,"language":810},[808],"sudo fail2ban-client status sshd\n",[30,5086,5084],{"__ignoreMap":56},[11,5088,5089],{},"This command shows you the number of currently blocked IPs and provides an overview of the active rules.",[596,5091,5093],{"start":5092},4,[157,5094,5095],{},"Additional SSH Security Measures (optional)",[4960,5097],{},[11,5099,5100,5101,5104],{},"Besides Fail2Ban monitoring, there are other ",[85,5102,5103],{},"recommendations"," you can implement to make SSH even more secure:",[371,5106,5108],{"id":5107},"a-change-the-default-ssh-port","a) Change the Default SSH Port",[11,5110,5111],{},"The default SSH port is 22 and is often targeted by bots. To change this, edit the file \u002Fetc\u002Fssh\u002Fsshd_config:",[805,5113,5116],{"className":5114,"code":5115,"language":810},[808],"sudo nano \u002Fetc\u002Fssh\u002Fsshd_config\n",[30,5117,5115],{"__ignoreMap":56},[11,5119,5120],{},"Change the line:",[805,5122,5125],{"className":5123,"code":5124,"language":810},[808],"\u003Cspan class=\"hljs-selector-id\">#Port\u003C\u002Fspan>\n",[30,5126,5124],{"__ignoreMap":56},[11,5128,5129],{},"to a different number, e.g.,:",[805,5131,5134],{"className":5132,"code":5133,"language":810},[808],"Port 2222\n",[30,5135,5133],{"__ignoreMap":56},[11,5137,5138],{},"After saving the file, restart the SSH service:",[805,5140,5143],{"className":5141,"code":5142,"language":810},[808],"sudo systemctl restart ssh\n",[30,5144,5142],{"__ignoreMap":56},[371,5146,5148],{"id":5147},"b-use-ssh-keys-instead-of-passwords","b) Use SSH Keys Instead of Passwords",[11,5150,5151,5152,5155],{},"Use ",[85,5153,5154],{},"SSH keys"," instead of passwords for logging in. This is a much more secure method and prevents brute-force attacks on your password.",[11,5157,5158],{},"Generate an SSH key:",[805,5160,5163],{"className":5161,"code":5162,"language":810},[808],"ssh-keygen -t rsa -b 4096\n",[30,5164,5162],{"__ignoreMap":56},[11,5166,5167],{},"Add the public key to ~\u002F.ssh\u002Fauthorized_keys on your server to disable password login.",[11,5169,5170],{},"Edit the file \u002Fetc\u002Fssh\u002Fsshd_config and set:",[805,5172,5175],{"className":5173,"code":5174,"language":810},[808],"PasswordAuthentication no\n",[30,5176,5174],{"__ignoreMap":56},[11,5178,5179],{},"Restart the SSH service after the change:",[805,5181,5183],{"className":5182,"code":5142,"language":810},[808],[30,5184,5142],{"__ignoreMap":56},[596,5186,5188],{"start":5187},5,[157,5189,5190],{},"AbuseIPDB Integration (optional)",[4960,5192],{},[11,5194,5195,5196,5198,5199,108],{},"If you want to use ",[85,5197,4900],{}," to report malicious IPs, you can integrate it into ",[85,5200,4621],{},[596,5202,5203,5208],{},[157,5204,5205],{},[85,5206,5207],{},"Register API Key on AbuseIPDB",[157,5209,5210,5213],{},[85,5211,5212],{},"Adjust Fail2Ban Configuration"," by entering the API key. Edit the file \u002Fetc\u002Ffail2ban\u002Faction.d\u002Fabuseipdb.conf and add your API key.",[805,5215,5218],{"className":5216,"code":5217,"language":810},[808],"\u003Cspan class=\"hljs-comment\"># AbuseIPDB config\u003C\u002Fspan>\n",[30,5219,5217],{"__ignoreMap":56},[11,5221,5222,5223,5225],{},"Add the ",[85,5224,4900],{}," command to the file \u002Fetc\u002Ffail2ban\u002Fjail.local:",[805,5227,5230],{"className":5228,"code":5229,"language":810},[808],"action = %(action_mwl)s          %(action_abuseipdb)s[abuseipdb_category=\n",[30,5231,5229],{"__ignoreMap":56},[596,5233,5235],{"start":5234},6,[157,5236,5237],{},"Monitor Fail2Ban Logs",[4960,5239],{},[11,5241,5242],{},"To ensure Fail2Ban is working, you can monitor the log files. Fail2Ban logs all actions:",[805,5244,5247],{"className":5245,"code":5246,"language":810},[808],"sudo tail -f \u002F\n",[30,5248,5246],{"__ignoreMap":56},[11,5250,5251],{},"This allows you to see in real-time which IPs are being blocked.",{"title":56,"searchDepth":57,"depth":57,"links":5253},[5254,5257,5271],{"id":4625,"depth":57,"text":4626,"children":5255},[5256],{"id":4679,"depth":398,"text":4680},{"id":4698,"depth":57,"text":4699,"children":5258},[5259,5260,5261,5263,5265,5267,5269],{"id":4715,"depth":398,"text":4716},{"id":4726,"depth":398,"text":4727},{"id":4748,"depth":398,"text":5262},"2. Install Fail2Ban (on Debian\u002FUbuntu)",{"id":4775,"depth":398,"text":5264},"3. Create a filter file for NGINX Bad Bot Detection",{"id":4821,"depth":398,"text":5266},"4. Create a Jail File (nginx-bot-detection)",{"id":4879,"depth":398,"text":5268},"5. AbuseIPDB Configuration (optional)",{"id":4919,"depth":398,"text":5270},"6. Restart Fail2Ban",{"id":4944,"depth":57,"text":4945,"children":5272},[5273,5274],{"id":5107,"depth":398,"text":5108},{"id":5147,"depth":398,"text":5148},"2025-04-17","The internet is loud, crowded, and most importantly: constantly under surveillance.","\u002Fimg\u002Fblog\u002Fbad-bots-schutz.webp","analogicus","https:\u002F\u002Fpixabay.com\u002Fusers\u002Fanalogicus-8164369\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-17-bad-bots-schutz",{"title":4586,"description":5276},{"loc":5281},"blog\u002Fen\u002F2025-04-17-bad-bots-schutz","GyTCy_m3N3A1Z0oEcPUUibv6zs0R3HRjRIhfSNOYvjg",{"id":5287,"title":5288,"body":5289,"category":66,"date":5275,"description":5293,"extension":65,"head":66,"image":5450,"imageCredit":2451,"imageCreditUrl":2452,"locale":68,"meta":5451,"navigation":70,"ogImage":66,"path":5452,"robots":66,"schemaOrg":66,"seo":5453,"sitemap":5454,"stem":5455,"__hash__":5456},"blog\u002Fblog\u002Fen\u002F2025-04-17-brutto-netto-steuerausweisung.md","Gross or Net? Choosing the Right Tax Declaration for Clients in Hosting and IT Services",{"type":8,"value":5290,"toc":5447},[5291,5294,5297,5302,5304,5307,5310,5313,5316,5319,5324,5326,5329,5352,5355,5360,5362,5365,5368,5371,5374,5377,5382,5384,5387,5390,5393,5398,5400,5403,5406,5411,5413,5416,5419,5422,5425,5429,5435,5441],[11,5292,5293],{},"As a hosting provider or IT service provider, the issue of correct invoicing and tax declaration is unavoidable. Particularly, the question of when and how to declare value-added tax (VAT) regularly raises uncertainties—both when calculating offers and issuing invoices.",[11,5295,5296],{},"In this article, I will address the essential points about correct tax declaration (gross\u002Fnet) and explain typical pitfalls that can occur, especially in B2B and B2C transactions.",[596,5298,5299],{},[157,5300,5301],{},"Principle: Net Prices in B2B, Gross Prices in B2C",[4960,5303],{},[11,5305,5306],{},"B2B (Business-to-Business): Most commercial customers expect net prices. The VAT is then shown separately on the invoice. It is important here: The recipient of the service must be entitled to deduct input tax.",[11,5308,5309],{},"B2C (Business-to-Consumer): End customers are only interested in the gross price. The final price, including VAT, must be stated in offers, price lists, and invoices.",[11,5311,5312],{},"Example:",[11,5314,5315],{},"Offer to a company: “Web hosting package for €10.00 plus 19% VAT.”",[11,5317,5318],{},"Offer to a private individual: “Web hosting package for €11.90 (incl. 19% VAT).”",[596,5320,5321],{"start":57},[157,5322,5323],{},"Tax Declaration on the Invoice: Mandatory Information According to § 14 UStG",[4960,5325],{},[11,5327,5328],{},"For a proper invoice—especially in B2B transactions—the following must be included:",[154,5330,5331,5334,5337,5340,5343,5346,5349],{},[157,5332,5333],{},"Name and address of both parties",[157,5335,5336],{},"Tax number or VAT ID of the issuer",[157,5338,5339],{},"Invoice number",[157,5341,5342],{},"Service period\u002Fdate",[157,5344,5345],{},"Net amount",[157,5347,5348],{},"VAT amount and rate",[157,5350,5351],{},"Gross amount",[11,5353,5354],{},"If one of these items is missing, the customer cannot deduct input tax—which often leads to follow-up questions or even payment delays.",[596,5356,5357],{"start":398},[157,5358,5359],{},"Reverse Charge Procedure: Do Not Declare Tax!",[4960,5361],{},[11,5363,5364],{},"When offering services to EU countries or customers outside the EU, it depends on the type of service and the location of the client. For B2B transactions with foreign entrepreneurs, the reverse charge procedure often applies.",[11,5366,5367],{},"Important:",[11,5369,5370],{},"Do not declare VAT!",[11,5372,5373],{},"Note on the invoice: “The recipient is responsible for VAT.”",[11,5375,5376],{},"This also applies to customers outside the EU (e.g., Switzerland, USA): No German VAT is charged, but it should be documented that it is a service to a third country. It is recommended to use the text “Service not subject to domestic taxes” on the invoice.",[596,5378,5379],{"start":5092},[157,5380,5381],{},"VAT Exemption for Small Businesses",[4960,5383],{},[11,5385,5386],{},"If you operate as a small business according to § 19 UStG, no VAT may be declared—neither in offers nor on invoices. However, a corresponding note is mandatory, for example:",[11,5388,5389],{},"“According to § 19 UStG, no VAT is charged.”",[11,5391,5392],{},"Caution: If VAT is mistakenly declared, it must still be paid to the tax office, even if it should not have been calculated.",[596,5394,5395],{"start":5187},[157,5396,5397],{},"Practical Tip: Uniform Pricing System & Transparent Communication",[4960,5399],{},[11,5401,5402],{},"Particularly when serving both B2C and B2B customers, it is advisable either to label gross prices as a standard (e.g., in the online shop) and add the net amounts in parentheses, or to clearly differentiate whether it is a business or a private person during onboarding\u002Fcheckout.",[11,5404,5405],{},"Additionally, a note during support or offer creation such as:\n“All prices are subject to statutory VAT – where applicable.”",[596,5407,5408],{"start":5234},[157,5409,5410],{},"Case Example: WHMCS & Reverse Charge – The Price Remains the Same, but Not the Tax",[4960,5412],{},[11,5414,5415],{},"A common case in practice involves the hosting billing system WHMCS, which is used by many providers in the B2B sector.",[11,5417,5418],{},"Example:\nYou operate WHMCS in gross mode (“Inclusive Tax”) because you have both B2C and B2B customers. An Austrian customer with a valid UID is correctly recognized as a reverse charge recipient. WHMCS then does not show VAT on the invoice—correct so far.",[11,5420,5421],{},"Problem:\nThe customer now sees an invoice for the gross price—without tax. In effect, they pay the same amount as a German end customer with VAT. This is incorrect because VAT should not be charged for B2B services to EU countries. The customer pays too much.",[11,5423,5424],{},"Why does this happen?\nWHMCS does not automatically recalculate the net price from the gross price in case of a reverse charge situation, leading to the gross price being erroneously treated as net.",[371,5426,5428],{"id":5427},"solution-options","Solution Options:",[11,5430,5431,5434],{},[85,5432,5433],{},"Option 1:"," Switch WHMCS to “Exclusive Tax” mode and maintain net prices—this is the cleanest solution for pure B2B shops.",[11,5436,5437,5440],{},[85,5438,5439],{},"Option 2:"," Workaround via hook: subsequently reduce the gross price for reverse charge customers by the tax.",[11,5442,5443,5446],{},[85,5444,5445],{},"Option 3:"," Adjust price logic and communication in the ordering process, e.g., note: “Prices include VAT – reduced on invoice for reverse charge.”",{"title":56,"searchDepth":57,"depth":57,"links":5448},[5449],{"id":5427,"depth":398,"text":5428},"\u002Fimg\u002Fblog\u002Fbrutto-netto-steuerausweisung.webp",{},"\u002Fblog\u002Fen\u002F2025-04-17-brutto-netto-steuerausweisung",{"title":5288,"description":5293},{"loc":5452},"blog\u002Fen\u002F2025-04-17-brutto-netto-steuerausweisung","oi7NpgaDODjsPVM3te-FftMZDRN_ViO1eW8cAyRXM20",{"id":5458,"title":5459,"body":5460,"category":66,"date":5275,"description":5855,"extension":65,"head":66,"image":5856,"imageCredit":5857,"imageCreditUrl":5858,"locale":68,"meta":5859,"navigation":70,"ogImage":66,"path":5860,"robots":66,"schemaOrg":66,"seo":5861,"sitemap":5862,"stem":5863,"__hash__":5864},"blog\u002Fblog\u002Fen\u002F2025-04-17-mail-eigene-domain.md","Setting Up a Custom Domain Email Address – Here's How",{"type":8,"value":5461,"toc":5844},[5462,5473,5476,5479,5483,5490,5507,5514,5540,5556,5560,5564,5567,5570,5574,5590,5594,5604,5607,5618,5625,5629,5636,5699,5706,5710,5713,5716,5727,5742,5745,5749,5756,5762,5765,5772,5778,5781,5788,5794,5797,5804,5810,5813,5820,5826,5829,5837],[11,5463,5464,5465,5472],{},"When I see a company car, neatly branded with a logo, phone number, and website—only to find ",[94,5466,5467,5468,5467],{},"\"",[690,5469,5471],{"href":5470},"mailto:maxi-handwerk@gmail.com","maxi-handwerk@gmail.com"," plastered on the back—I cringe on behalf of the owner.",[11,5474,5475],{},"Someone has invested time and money into a good public presentation: wrapping, design, brand image. But couldn't spare a few euros a month for a custom domain email address? It doesn't add up for me. And I'm sure many potential clients feel the same way.",[11,5477,5478],{},"As a freelance professional or entrepreneur, it's crucial to convey trust, reliability, and professionalism from the outset. Having a custom email domain is a significant part of this. Let me explain why it's so important.",[15,5480,5482],{"id":5481},"what-is-a-domain-anyway","What Is a Domain Anyway?",[11,5484,5485,5486,5489],{},"Simply put, a ",[85,5487,5488],{},"domain"," is your personal internet address. For example:",[154,5491,5492,5497,5502],{},[157,5493,5494],{},[85,5495,5496],{},"your-name.com",[157,5498,5499],{},[85,5500,5501],{},"tile-layer-meyer.com",[157,5503,5504],{},[85,5505,5506],{},"holistic-practice-smith.com",[11,5508,5509,5510,5513],{},"With such a domain, you can not only create your own website but also ",[85,5511,5512],{},"set up email addresses"," with your name, such as:",[154,5515,5516,5524,5532],{},[157,5517,5518],{},[85,5519,5520],{},[690,5521,5523],{"href":5522},"mailto:info@tile-layer-friedrichs.com","info@tile-layer-friedrichs.com",[157,5525,5526],{},[85,5527,5528],{},[690,5529,5531],{"href":5530},"mailto:practice@holistic-practice-mustermann.com","practice@holistic-practice-mustermann.com",[157,5533,5534],{},[85,5535,5536],{},[690,5537,5539],{"href":5538},"mailto:contact@your-company.com","contact@your-company.com",[11,5541,5542,5543,5546,5547,1071,5550,1078,5553,108],{},"This immediately looks ",[85,5544,5545],{},"professional","—unlike ",[94,5548,5549],{},"@gmail.com",[94,5551,5552],{},"@outlook.com",[94,5554,5555],{},"@yahoo.com",[15,5557,5559],{"id":5558},"why-is-a-custom-email-address-better","Why Is a Custom Email Address Better?",[371,5561,5563],{"id":5562},"_1-looks-professional-and-impresses","1. Looks Professional and Impresses",[11,5565,5566],{},"Using a Gmail or Outlook address often seems \"amateurish.\" But you want to be taken seriously, right?",[11,5568,5569],{},"A custom email with your domain signals:\n✅ I run a business\n✅ I am reachable\n✅ I value my customers",[371,5571,5573],{"id":5572},"_2-free-isnt-always-goodespecially-in-business","2. Free Isn't Always Good—Especially in Business",[11,5575,5576,5577,1071,5579,5582,5583,5586,5587,108],{},"Many spam and scam emails come from free email providers. Spam filters are aware of this. Emails from ",[94,5578,5549],{},[94,5580,5581],{},"@hotmail.com",", or similar addresses are often sent ",[85,5584,5585],{},"straight to the spam folder",", particularly in B2B settings. A custom domain minimizes this risk, ensuring your emails are ",[85,5588,5589],{},"taken more seriously and safely delivered",[371,5591,5593],{"id":5592},"_3-stay-flexible-even-if-things-change","3. Stay Flexible Even if Things Change",[11,5595,5596,5597,5603],{},"If you use an email like ",[94,5598,5599],{},[690,5600,5602],{"href":5601},"mailto:company.schmidt@gmail.com","company.schmidt@gmail.com",", switching later can be problematic. Customers may have saved that address—continuing to send you emails even if you've moved on.",[11,5605,5606],{},"With a custom domain, you can:",[154,5608,5609,5612,5615],{},[157,5610,5611],{},"Change addresses easily",[157,5613,5614],{},"Create forwarding (e.g., if an employee leaves, redirect their emails)",[157,5616,5617],{},"Set up auto-replies (e.g., \"Our new email address is …\")",[11,5619,5620,5621,5624],{},"You remain ",[85,5622,5623],{},"fully flexible",", even when things change.",[371,5626,5628],{"id":5627},"_4-more-controlmore-options","4. More Control—More Options",[11,5630,5631,5632,5635],{},"Your own email system allows you to ",[85,5633,5634],{},"manage much more"," than you might expect:",[154,5637,5638,5656,5671,5687,5693],{},[157,5639,5640,5643,5644,1071,5650],{},[85,5641,5642],{},"Individual mailboxes for employees",": e.g., ",[94,5645,5646],{},[690,5647,5649],{"href":5648},"mailto:anna@company.com","anna@company.com",[94,5651,5652],{},[690,5653,5655],{"href":5654},"mailto:max@company.com","max@company.com",[157,5657,5658,5661,5662,1071,5665,1071,5668],{},[85,5659,5660],{},"Email addresses for departments",": ",[94,5663,5664],{},"support@",[94,5666,5667],{},"info@",[94,5669,5670],{},"finance@",[157,5672,5673,5676,5677,5683,5684],{},[85,5674,5675],{},"Set up forwarding",": e.g., emails to ",[94,5678,5679],{},[690,5680,5682],{"href":5681},"mailto:finance@company.com","finance@company.com"," go to both you ",[85,5685,5686],{},"and your accountant",[157,5688,5689,5692],{},[85,5690,5691],{},"Customize spam filters",": Decide which senders are blocked, and which are not",[157,5694,5695,5698],{},[85,5696,5697],{},"Set up autoresponders",": Automated responses during vacations or changed business hours",[11,5700,5701,5702,5705],{},"Build an email system that ",[85,5703,5704],{},"grows with your business","—whether you're flying solo or have a small team.",[371,5707,5709],{"id":5708},"_5-keep-your-data-secure","5. Keep Your Data Secure",[11,5711,5712],{},"Many free email providers store data overseas. If you handle client data (appointments, invoices, names), this could be a privacy issue.",[11,5714,5715],{},"By choosing a German hosting provider, you receive:",[154,5717,5718,5721,5724],{},[157,5719,5720],{},"German-based servers",[157,5722,5723],{},"Legal security (GDPR compliant)",[157,5725,5726],{},"Clear points of contact for support",[11,5728,5729,5732,5733,5736,5737],{},[85,5730,5731],{},"(Advertisement—honestly meant)","\n👉 ",[85,5734,5735],{},"Mail hosting with a custom .de domain starting at €1.99 including VAT per month:","\n➡️ ",[690,5738,5741],{"href":5739,"rel":5740},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Femail-hosting",[694],"www.becker-software.de\u002Fde\u002Femail-hosting",[11,5743,5744],{},"If you need help—I'm here. Reach out to me, call, or let's set it up together. It's worth it.",[15,5746,5748],{"id":5747},"where-can-i-get-email-hosting","Where Can I Get Email Hosting?",[11,5750,5751,5752,5755],{},"If you're thinking now, \"Okay, convinced—but ",[85,5753,5754],{},"where can I get such an email address with a custom domain?","\"—here are five established providers in Germany, each with its own strengths:",[11,5757,5758,5761],{},[85,5759,5760],{},"IONOS by 1&1"," – The all-rounder for beginners and small businesses",[11,5763,5764],{},"IONOS is one of Europe's largest hosting providers, offering simple email packages with domain registration. The easy-to-use web interface is great for beginners, perfect for those who want everything from one source—website, domain, and email.",[11,5766,5767],{},[690,5768,5771],{"href":5769,"rel":5770},"https:\u002F\u002Fwww.ionos.de\u002Foffice-loesungen\u002Feigene-email-adresse",[694],"To IONOS Email",[11,5773,5774,5777],{},[85,5775,5776],{},"Strato"," – Start economically with a solid base",[11,5779,5780],{},"Part of the United Internet Group like IONOS, Strato offers affordable email hosting entry deals, including a domain. Ideal for starting on a tight budget with a reputable German provider.",[11,5782,5783],{},[690,5784,5787],{"href":5785,"rel":5786},"https:\u002F\u002Fwww.strato.de\u002Fmail\u002F",[694],"To Strato Email",[11,5789,5790,5793],{},[85,5791,5792],{},"dogado"," – For freelancers and small teams with high standards",[11,5795,5796],{},"dogado targets business customers, providing professional email and cloud services focused on data protection and GDPR compliance. A sensible choice if you prioritize support, security, and scalable solutions.",[11,5798,5799],{},[690,5800,5803],{"href":5801,"rel":5802},"https:\u002F\u002Fwww.dogado.de\u002Fdomains-emails\u002Feigene-e-mail-adresse",[694],"Dogado - Email Mailbox",[11,5805,5806,5809],{},[85,5807,5808],{},"Mailbox.org"," – Privacy Made in Germany",[11,5811,5812],{},"Mailbox.org is known for its focus on security and privacy. The ad-free email mailboxes are operated entirely in Germany. Perfect for freelancers in sensitive fields like consulting, healthcare, or law.",[11,5814,5815],{},[690,5816,5819],{"href":5817,"rel":5818},"https:\u002F\u002Fmailbox.org\u002Fde\u002Fbusiness-mail#geschaeftskundentarife",[694],"To Mailbox.org Business Rates",[11,5821,5822,5825],{},[85,5823,5824],{},"Hetzner"," – For tech-savvy with a high demand for control",[11,5827,5828],{},"Hetzner is a powerful provider with a more technical focus. It provides no \"DIY kits,\" but personalized servers, domains, and mail server solutions that you can configure yourself. Ideal if you want to dive deeper or have someone knowledgeable.",[11,5830,5831,5832,5836],{},"A secret tip => ",[690,5833,5834],{"href":5834,"rel":5835},"https:\u002F\u002Fmailcow.email\u002F",[694],"for running your own mail server.",[11,5838,5839],{},[690,5840,5843],{"href":5841,"rel":5842},"https:\u002F\u002Fwww.hetzner.com\u002F",[694],"To Hetzner",{"title":56,"searchDepth":57,"depth":57,"links":5845},[5846,5847,5854],{"id":5481,"depth":57,"text":5482},{"id":5558,"depth":57,"text":5559,"children":5848},[5849,5850,5851,5852,5853],{"id":5562,"depth":398,"text":5563},{"id":5572,"depth":398,"text":5573},{"id":5592,"depth":398,"text":5593},{"id":5627,"depth":398,"text":5628},{"id":5708,"depth":398,"text":5709},{"id":5747,"depth":57,"text":5748},"When I see a company car, neatly branded with a logo, phone number, and website—only to find \"maxi-handwerk@gmail.com\" plastered on the back—I cringe on behalf of the owner.","\u002Fimg\u002Fblog\u002Fmail-eigene-domain.webp","StefanHoffmann","https:\u002F\u002Fpixabay.com\u002Fusers\u002FStefanHoffmann-152440\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-17-mail-eigene-domain",{"title":5459,"description":5855},{"loc":5860},"blog\u002Fen\u002F2025-04-17-mail-eigene-domain","mQ8z9lReikXb0_YwUeZif7gFmMYFFe4npEU9UgBYKa4",{"id":5866,"title":5867,"body":5868,"category":66,"date":6075,"description":5872,"extension":65,"head":66,"image":6076,"imageCredit":2451,"imageCreditUrl":2452,"locale":68,"meta":6077,"navigation":70,"ogImage":66,"path":6078,"robots":66,"schemaOrg":66,"seo":6079,"sitemap":6080,"stem":6081,"__hash__":6082},"blog\u002Fblog\u002Fen\u002F2025-04-16-rechnungsstellung-whmcs-deutschland.md","Invoicing with WHMCS in Germany",{"type":8,"value":5869,"toc":6065},[5870,5873,5879,5883,5894,5898,5902,5905,5910,5922,5928,5933,5944,5951,5955,5958,5966,5970,5973,5987,5991,6006,6014,6018,6021,6033,6039,6042,6049,6051,6062],[11,5871,5872],{},"My name is Martin Becker, owner of Becker Software – and if you're like me, a B2B hosting provider, you're all too familiar with the chaos of invoices, reminders, formatting issues, tax consultants, and frustration. Often, invoicing is the most vexing part of daily operations in the hosting business.",[11,5874,5875,5876,5878],{},"In this post, I want to show you how we managed to develop a professional and legally compliant accounting system using ",[85,5877,114],{},", despite its quirks. Perhaps you'll find some useful insights here too.",[371,5880,5882],{"id":5881},"why-choose-whmcs","Why Choose WHMCS?",[11,5884,5885,5886,5889,5890,5893],{},"Admittedly, WHMCS is not perfect. It has become expensive, especially when compared to alternatives like ",[85,5887,5888],{},"Blesta",". However, ",[85,5891,5892],{},"no other system offers as many extensions, integrations, and a large community.","\nIf you wish to automate cPanel, Plesk, domains, DNS, SSL, and more, WHMCS is usually the go-to – particularly if you aim to sell your services widely.",[15,5895,5897],{"id":5896},"our-customizations","Our Customizations",[371,5899,5901],{"id":5900},"_1-the-troublesome-whmcs-pdf-format","1. The Troublesome WHMCS PDF Format",[11,5903,5904],{},"WHMCS comes with an American-style invoice template. No proper item numbers, no space for tax rates, no DATEV-compatible layout. Reminders? Laughable – only via email, no proper PDF for postal delivery.",[11,5906,5907],{},[85,5908,5909],{},"Our Solution:",[154,5911,5912,5919],{},[157,5913,5914,5915,5918],{},"For a long time, we used the ",[85,5916,5917],{},"PDF-Template Module from Plambee.de"," – making invoices usable in WHMCS according to German standards.",[157,5920,5921],{},"Yet, we occasionally had to manually transfer each invoice into Lexware Office so our accountant had access.",[11,5923,5924,5925],{},"Eventually, this became too cumbersome – so we developed our own module that directly connects ",[85,5926,5927],{},"WHMCS and Lexware Office.",[11,5929,5930],{},[85,5931,5932],{},"Results:",[154,5934,5935,5938,5941],{},[157,5936,5937],{},"Invoices are automatically generated in Lexoffice",[157,5939,5940],{},"We send professional PDFs created by Lexoffice.",[157,5942,5943],{},"Reminders? No problem – directly from Lexoffice via email or postal service.",[11,5945,5946,5947,5950],{},"👉 ",[85,5948,5949],{},"WHMCS handles creation, while Lexware Office manages the flow."," It doesn’t get better than this.",[371,5952,5954],{"id":5953},"_2-the-era-of-e-invoicing","2. The Era of E-Invoicing",[11,5956,5957],{},"The urgency of e-invoicing has caught up with us all – but with the Lexoffice module, we managed to tackle two issues at once. Lexoffice already supports e-invoices, including XRechnung & ZUGFeRD.",[11,5959,5960,5961],{},"If you're eager to learn more about the e-invoicing mandate, I recommend this article:\n👉 ",[690,5962,5965],{"href":5963,"rel":5964},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fblog\u002Frecht\u002Fdie-e-rechnung-kommt-whmcs-hoster-aufgepasst",[694],"E-Invoice Alert for WHMCS Hosts",[371,5967,5969],{"id":5968},"_3-terminations-but-with-a-system","3. Terminations – But With a System",[11,5971,5972],{},"WHMCS by default allows immediate cancellations by customers – this was somewhat problematic for us in the B2B sector. We wanted a controlled cancellation process that included:",[154,5974,5975,5978,5981,5984],{},[157,5976,5977],{},"A legally compliant cancellation button under §312k BGB",[157,5979,5980],{},"A confirmation process",[157,5982,5983],{},"Cancellation at the end of the contract's term",[157,5985,5986],{},"A final invoice",[11,5988,5989],{},[85,5990,5909],{},[154,5992,5993,6000,6003],{},[157,5994,5995,5996],{},"A dedicated cancellation button on our website:\n👉 ",[690,5997,5998],{"href":5998,"rel":5999},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fcancel-contract",[694],[157,6001,6002],{},"We modified WHMCS's cancellation process – no immediate deactivation, only a request.",[157,6004,6005],{},"Cancellation is manually confirmed, then WHMCS automatically generates a final invoice and properly terminates the service at the contract's end.",[11,6007,6008,6009],{},"Find more details in this post:\n👉 ",[690,6010,6013],{"href":6011,"rel":6012},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fblog\u002Fhosting\u002Fkundigungsbuttons-bei-hosting-anbietern-anforderungen-strafen-und-unsere-umsetzung",[694],"Cancellation Buttons for Hosting Providers – Requirements, Penalties, and Our Approach",[371,6015,6017],{"id":6016},"_4-the-start-of-the-month-invoicing-day","4. The Start of the Month = Invoicing Day",[11,6019,6020],{},"A classic scenario: a customer orders on 02\u002F01, but by 02\u002F18, they've already received the next invoice. WHMCS typically calculates based on the order date. This led to considerable confusion among our clients.",[11,6022,6023,6025,6026,3959,6029,6032],{},[85,6024,5909],{},"\nWe adjusted our cron jobs and billing cycles so that ",[85,6027,6028],{},"on the 1st of each month",[85,6030,6031],{},"comprehensive invoice"," for all due services is created.",[11,6034,6035,6036,108],{},"This provides clarity and uniformity – and honestly: I prefer when the accounting is ",[94,6037,6038],{},"neatly laid out on the table",[11,6040,6041],{},"👉 Technical details including cron job adjustments are found in this post:",[11,6043,6044],{},[690,6045,6048],{"href":6046,"rel":6047},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fblog\u002Fwhmcs-tipps\u002Fwhmcs-rechnungen-zum-monatsanfang",[694],"WHMCS Invoices at the Start of the Month",[15,6050,673],{"id":672},[11,6052,6053,6054,6057,6058,6061],{},"WHMCS is far from perfect – but it is ",[85,6055,6056],{},"customizable",". If you're willing to invest some effort (or hire development), you can transform WHMCS into a ",[85,6059,6060],{},"legally compliant, professional, and fully integrated platform"," that can handle Lexoffice, e-invoices, and German termination logic.",[11,6063,6064],{},"If you have any questions or need assistance – feel free to reach out. I’m happy to share what we've created.",{"title":56,"searchDepth":57,"depth":57,"links":6066},[6067,6068,6074],{"id":5881,"depth":398,"text":5882},{"id":5896,"depth":57,"text":5897,"children":6069},[6070,6071,6072,6073],{"id":5900,"depth":398,"text":5901},{"id":5953,"depth":398,"text":5954},{"id":5968,"depth":398,"text":5969},{"id":6016,"depth":398,"text":6017},{"id":672,"depth":57,"text":673},"2025-04-16","\u002Fimg\u002Fblog\u002Frechnungsstellung-whmcs-deutschland.webp",{},"\u002Fblog\u002Fen\u002F2025-04-16-rechnungsstellung-whmcs-deutschland",{"title":5867,"description":5872},{"loc":6078},"blog\u002Fen\u002F2025-04-16-rechnungsstellung-whmcs-deutschland","xmXuefjYSZpAaf7Cyn5pcBgausiFlxlhcXATAv5qJDw",{"id":6084,"title":6085,"body":6086,"category":66,"date":6075,"description":6287,"extension":65,"head":66,"image":6288,"imageCredit":6289,"imageCreditUrl":6290,"locale":68,"meta":6291,"navigation":70,"ogImage":66,"path":6292,"robots":66,"schemaOrg":66,"seo":6293,"sitemap":6294,"stem":6295,"__hash__":6296},"blog\u002Fblog\u002Fen\u002F2025-04-16-was-ist-whmcs.md","What is WHMCS? - The Complete Solution for Web Hosting Automation",{"type":8,"value":6087,"toc":6278},[6088,6094,6098,6111,6113,6116,6151,6154,6158,6207,6211,6218,6222,6228,6235,6238,6242,6263,6270],[11,6089,6090,6091,6093],{},"If you run a web hosting company or plan to start one, you will sooner or later come across the term ",[85,6092,114],{},". But what exactly is WHMCS – and why do over 45,000 companies worldwide rely on this software?",[15,6095,6097],{"id":6096},"brief-explanation-of-whmcs","Brief Explanation of WHMCS",[11,6099,6100,6102,6103,6106,6107,6110],{},[85,6101,114],{}," stands for ",[94,6104,6105],{},"Web Host Manager Complete Solution"," – and it offers exactly that: a ",[85,6108,6109],{},"complete automation and billing platform"," specifically designed for web hosting providers, resellers, ISPs, web designers, and agencies. The software helps you efficiently manage your hosting business, saving time and automating processes, from customer onboarding and product delivery to billing and support.",[15,6112,5882],{"id":5881},[11,6114,6115],{},"With WHMCS, automate almost every aspect of your hosting business:",[154,6117,6118,6124,6130,6135,6141,6146],{},[157,6119,6120,6123],{},[85,6121,6122],{},"Product Deployment & Management"," (e.g., for cPanel, Plesk, DirectAdmin)",[157,6125,6126,6129],{},[85,6127,6128],{},"Domain Registrations & Transfers"," (e.g., via InternetX, IP-Projects, Lumaserv)",[157,6131,6132],{},[85,6133,6134],{},"SSL Certificate Management",[157,6136,6137,6140],{},[85,6138,6139],{},"Automated Billing & Payment Processing"," (including PayPal, Stripe, etc.)",[157,6142,6143],{},[85,6144,6145],{},"Integrated Support Ticket System",[157,6147,6148],{},[85,6149,6150],{},"Customer Self-Service Portal",[11,6152,6153],{},"WHMCS is modular, offers numerous extensions, and can be flexibly customized through open interfaces.",[371,6155,6157],{"id":6156},"main-advantages-at-a-glance","Main Advantages at a Glance",[154,6159,6160,6166,6172,6178,6184,6189,6195,6201],{},[157,6161,6162,6165],{},[85,6163,6164],{},"Quick Setup:"," Ready to use in under 30 minutes",[157,6167,6168,6171],{},[85,6169,6170],{},"Easy Initial Configuration"," thanks to a setup wizard",[157,6173,6174,6177],{},[85,6175,6176],{},"Central Management"," of your customers, products, and domains",[157,6179,6180,6183],{},[85,6181,6182],{},"Seamless Integration"," with over 30 hosting control panels & cloud platforms",[157,6185,6186],{},[85,6187,6188],{},"Automated Billing, including tax calculation and EU VAT identification",[157,6190,6191,6194],{},[85,6192,6193],{},"Secure Customer Portal"," for orders, payments, upgrades, and support",[157,6196,6197,6200],{},[85,6198,6199],{},"Developer-Friendly:"," Open for customizations and API integrations",[157,6202,6203,6206],{},[85,6204,6205],{},"Reliable 24\u002F7 Support"," from the manufacturer (available in English)",[15,6208,6210],{"id":6209},"who-is-whmcs-suitable-for","Who is WHMCS Suitable For?",[11,6212,6213,6214,6217],{},"Whether you run an established hosting company or offer hosting services to clients as a freelancer – ",[85,6215,6216],{},"WHMCS is ideal for anyone looking to sell and automate hosting services",". Agencies, web designers, or resellers also benefit from automation and professional management functions.",[15,6219,6221],{"id":6220},"who-created-whmcs","Who Created WHMCS?",[11,6223,6224,6227],{},[85,6225,6226],{},"WHMCS was founded in 2003 by Matt Pugh",", originally as a side project to simplify hosting provider tasks. What began as a simple billing and automation solution quickly evolved into one of the most popular platforms in the web hosting sector. With an expanding user base and increasing functionality, WHMCS established itself as a leading solution for hosting automation worldwide.",[11,6229,6230,6231,6234],{},"Over the years, the company became part of the larger software ecosystem of ",[85,6232,6233],{},"WebPros",", which also includes well-known brands like cPanel, Plesk, and SolusVM.",[11,6236,6237],{},"The acquisition by WebPros facilitated even deeper integration with leading hosting technologies and further expansion of the platform. Today, WHMCS benefits from a strong network within the hosting industry, continuous development, and close collaboration with the largest players in the hosting sector.",[15,6239,6241],{"id":6240},"deploying-whmcs-in-germany","Deploying WHMCS in Germany",[11,6243,6244,6245,6248,6249,6252,6253,1071,6256,6259,6260,108],{},"WHMCS was initially developed for the international market – particularly the US and English-speaking regions. Hence, certain ",[85,6246,6247],{},"legal and functional requirements"," need to be considered when deploying in ",[85,6250,6251],{},"Germany",". These include ",[85,6254,6255],{},"GoBD-compliant invoicing",[85,6257,6258],{},"correct VAT calculation according to German law",", and ",[85,6261,6262],{},"adjustments for data protection (GDPR)",[11,6264,6265,6266,6269],{},"As with many international software solutions, it is common for ",[85,6267,6268],{},"extensions and modules"," to be added to adapt the software to the requirements of the German market.",[11,6271,6272,6273],{},"We discuss typical challenges and practical solutions in our separate article: ",[690,6274,6277],{"href":6275,"rel":6276},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fblog\u002Fsoftware\u002Fwhmcs-in-deutschland-nutzen-herausforderungen-und-losungen",[694],"Using WHMCS in Germany: Challenges and Solutions",{"title":56,"searchDepth":57,"depth":57,"links":6279},[6280,6281,6284,6285,6286],{"id":6096,"depth":57,"text":6097},{"id":5881,"depth":57,"text":5882,"children":6282},[6283],{"id":6156,"depth":398,"text":6157},{"id":6209,"depth":57,"text":6210},{"id":6220,"depth":57,"text":6221},{"id":6240,"depth":57,"text":6241},"If you run a web hosting company or plan to start one, you will sooner or later come across the term WHMCS. But what exactly is WHMCS – and why do over 45,000 companies worldwide rely on this software?","\u002Fimg\u002Fblog\u002Fwas-ist-whmcs.webp","Boskampi","https:\u002F\u002Fpixabay.com\u002Fusers\u002FBoskampi-3788146\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-16-was-ist-whmcs",{"title":6085,"description":6287},{"loc":6292},"blog\u002Fen\u002F2025-04-16-was-ist-whmcs","qj0Zn5iLXnAna3eh4wprwXL6rg8jX-TMtvt6UB6KxTE",{"id":6298,"title":6299,"body":6300,"category":66,"date":6075,"description":56,"extension":65,"head":66,"image":6521,"imageCredit":6522,"imageCreditUrl":6523,"locale":68,"meta":6524,"navigation":70,"ogImage":66,"path":6525,"robots":66,"schemaOrg":66,"seo":6526,"sitemap":6527,"stem":6528,"__hash__":6529},"blog\u002Fblog\u002Fen\u002F2025-04-16-whmcs-rechnungen-monatsanfang.md","WHMCS Invoices at the Start of the Month – Our Solution",{"type":8,"value":6301,"toc":6507},[6302,6306,6313,6316,6326,6333,6340,6343,6346,6350,6357,6364,6368,6374,6382,6388,6395,6399,6405,6412,6419,6423,6432,6436,6440,6447,6451,6458,6462,6465,6469,6484,6486,6493,6504],[15,6303,6305],{"id":6304},"why-this-is-even-a-topic","Why This is Even a Topic",[11,6307,6308,6309,6312],{},"If you use WHMCS, you're likely familiar with the issue: ",[85,6310,6311],{},"Invoices are typically generated X days before they are due."," This results in customers receiving invoices scattered throughout the month, depending entirely on when they placed their order. For example, a customer making a purchase on February 15 will receive their next invoice on March 5, for a service starting on March 15.",[11,6314,6315],{},"This creates confusion, particularly in the B2B space, where invoices should be collected, recorded, and contracts made more predictable. Customers actually expect to receive their invoices on the due date.",[11,6317,6318,6321,6322,6325],{},[85,6319,6320],{},"Our Goal:","\nWe aim for our customers to ",[85,6323,6324],{},"receive a consolidated invoice on the 1st of each month"," for all services due throughout the month, even if a product is due on the 25th.",[11,6327,6328,6329,6332],{},"The best part: These invoices are directly sent to ",[85,6330,6331],{},"Lexoffice",", thanks to our custom WHMCS ↔ Lexoffice module. Everything remains GoBD-compliant, automated, and accountant-friendly.",[11,6334,6335,6336,6339],{},"There is a ",[85,6337,6338],{},"WHMCS Pro-Rata alternative",":\nThis forces all products to have a uniform billing date (e.g., the 1st of the month). Initially practical, yet has pitfalls:",[11,6341,6342],{},"Especially during the order process, things can quickly become confusing. For instance, if an order is placed on the 25th, WHMCS calculates the remaining days of the month plus the entire following month at once. The result? A higher price than advertised, which can lead to customers dropping off. This is particularly counterproductive for B2B customers expecting clear price transparency.",[11,6344,6345],{},"Even if the setting doesn't invoice for an additional month, paying for just five days seems odd, resulting in awkward fractional costs.",[15,6347,6349],{"id":6348},"technical-implementation-proper-use-of-whmcs-cron-jobs","Technical Implementation: Proper Use of WHMCS Cron Jobs",[11,6351,6352,6353,6356],{},"WHMCS offers the option to selectively ",[85,6354,6355],{},"activate or skip certain tasks"," during cron job execution. This flexibility is key to our concept.",[11,6358,6359,6360,6363],{},"Instead of running the standard cron job daily or every five minutes with ",[85,6361,6362],{},"all actions",", we split the tasks:",[371,6365,6367],{"id":6366},"daily-cron-every-5-minutes-without-invoices-suspensions","Daily Cron (every 5 minutes, without invoices & suspensions):",[805,6369,6372],{"className":6370,"code":6371,"language":810},[808],"* * * * * \n",[30,6373,6371],{"__ignoreMap":56},[154,6375,6376,6379],{},[157,6377,6378],{},"--CreateInvoices ➜ skips invoice creation",[157,6380,6381],{},"--AutoSuspensions ➜ skips automatic suspensions",[11,6383,6384,6385,108],{},"This way, the cron runs as usual handling modules, upgrades, domain renewals, etc. – ",[85,6386,6387],{},"excluding invoices and suspensions",[11,6389,6390],{},[690,6391,6394],{"href":6392,"rel":6393},"https:\u002F\u002Fdocs.whmcs.com\u002Fsystem\u002Fautomation\u002Fsystem-cron\u002F#tasks",[694],"➡ To the official WHMCS Cronjob parameter list",[371,6396,6398],{"id":6397},"monthly-cron-on-the-1st-at-1000-am","Monthly Cron (on the 1st at 10:00 AM):",[805,6400,6403],{"className":6401,"code":6402,"language":810},[808]," \n",[30,6404,6402],{"__ignoreMap":56},[11,6406,6407,6408,6411],{},"It's only ",[85,6409,6410],{},"on the 1st of the month"," that we create all due invoices and activate automatic suspension for overdue clients.",[11,6413,6414,6415,6418],{},"We specifically chose ",[85,6416,6417],{},"10:00 AM"," – this way, our support team is available if customers have any inquiries.",[15,6420,6422],{"id":6421},"adjusting-the-due-dates","Adjusting the Due Dates",[11,6424,6425,6426,6431],{},"With these settings, WHMCS would make the invoice immediately due. To prevent this, we developed a hook that overrides the invoice date for each created invoice.\nThis hook is available for purchase through our ",[690,6427,6430],{"href":6428,"rel":6429},"https:\u002F\u002Fportal.becker-software.de\u002Fstore\u002Fwhmcs-module-kaufen\u002Fwhmcs-falligkeitsdatum-berschreiben",[694],"WHMCS Store",". The hook is entirely open-source and isn't encrypted with Ioncube.",[15,6433,6435],{"id":6434},"additional-important-settings","Additional Important Settings",[371,6437,6439],{"id":6438},"invoicing-vs-due-dates","Invoicing vs. Due Dates",[11,6441,6442,6443,6446],{},"We set our payment lead ",[85,6444,6445],{},"to 28 days",". So the customer receives, for instance, an invoice on April 1 for a service due on April 25. This provides transparency and predictability – especially for contract clients.",[371,6448,6450],{"id":6449},"adjusting-automations","Adjusting Automations",[11,6452,6453,6454,6457],{},"For this to work, you must also adjust the ",[85,6455,6456],{},"grace periods and escalation levels in WHMCS",". Otherwise, you might encounter nasty surprises: invoice arrives on the 1st, but the system wants to suspend on the 10th, even though the client has 28 days.",[371,6459,6461],{"id":6460},"suspensions-better-manually","Suspensions? Better Manually.",[11,6463,6464],{},"We've found that automatic suspensions can be perilous – particularly for new WHMCS users without 100% clean payment allocations (e.g., transfers).",[11,6466,6467],{},[85,6468,2817],{},[154,6470,6471,6477],{},[157,6472,6473,6474],{},"Better ",[85,6475,6476],{},"review suspensions manually",[157,6478,6479,6480,6483],{},"Simply add ",[85,6481,6482],{},"the support address to CC"," in WHMCS email templates for reminders and invoices to maintain oversight.",[15,6485,673],{"id":672},[11,6487,6488,6489,6492],{},"If you, like us, prefer to send invoices ",[85,6490,6491],{},"structured and consolidated",", the start-of-month strategy is spot on. It requires some configuration and understanding of WHMCS’ cron logic, but the impact on your clients is noticeable.",[11,6494,6495,6496,6503],{},"And with our ",[690,6497,6500],{"href":6498,"rel":6499},"https:\u002F\u002Fwww.becker-software.de\u002Fde\u002Fwhmcs-modules\u002Flexware-office-whmcs-integration",[694],[85,6501,6502],{},"Lexware Office Module",", everything comes together nicely: clean PDFs, GoBD-compliant, E-Invoice ready, including dunning processes.",[11,6505,6506],{},"If you need support implementing this or wish to test our Lexoffice module – feel free to reach out. I’m confident: even your bookkeeping can be smoother.",{"title":56,"searchDepth":57,"depth":57,"links":6508},[6509,6510,6514,6515,6520],{"id":6304,"depth":57,"text":6305},{"id":6348,"depth":57,"text":6349,"children":6511},[6512,6513],{"id":6366,"depth":398,"text":6367},{"id":6397,"depth":398,"text":6398},{"id":6421,"depth":57,"text":6422},{"id":6434,"depth":57,"text":6435,"children":6516},[6517,6518,6519],{"id":6438,"depth":398,"text":6439},{"id":6449,"depth":398,"text":6450},{"id":6460,"depth":398,"text":6461},{"id":672,"depth":57,"text":673},"\u002Fimg\u002Fblog\u002Fwhmcs-rechnungen-monatsanfang.webp","tomeklaskowski1","https:\u002F\u002Fpixabay.com\u002Fusers\u002Ftomeklaskowski1-17196557\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-16-whmcs-rechnungen-monatsanfang",{"title":6299,"description":56},{"loc":6525},"blog\u002Fen\u002F2025-04-16-whmcs-rechnungen-monatsanfang","3iumC0grN6Iiz2G3Jup1M2DUJAAE8ZkIlgNTxKlav7I",{"id":6531,"title":6532,"body":6533,"category":66,"date":6689,"description":6537,"extension":65,"head":66,"image":6690,"imageCredit":733,"imageCreditUrl":734,"locale":68,"meta":6691,"navigation":70,"ogImage":66,"path":6692,"robots":66,"schemaOrg":66,"seo":6693,"sitemap":6694,"stem":6695,"__hash__":6696},"blog\u002Fblog\u002Fen\u002F2025-04-13-bewertungsportale-vergleich.md","Review Platforms Compared: Which Ones Truly Matter",{"type":8,"value":6534,"toc":6679},[6535,6538,6541,6545,6548,6551,6554,6558,6561,6564,6571,6574,6580,6586,6592,6596,6604,6610,6616,6622,6626,6634,6639,6644,6649,6653,6661,6666,6671,6676],[11,6536,6537],{},"When searching for a service provider online—be it for web hosting, software solutions, or just the best local baker—you'll almost always find yourself on a review platform. This reflects how crucial these platforms have become. Over recent years, we've clearly noticed: if you want to be visible online, you need reviews. Period.",[11,6539,6540],{},"We're not talking about fake, purchased reviews but genuine feedback. Honest voices from our clients and customers. These are the statements that matter and build trust.",[15,6542,6544],{"id":6543},"why-reviews-are-so-important","Why Reviews Are So Important",[11,6546,6547],{},"No matter how good your offer is—without building trust, you'll remain invisible. Reviews provide potential customers with what traditional advertising can't: authentic testimonials. It's a bit like a personal recommendation from someone you know, just in the digital realm.",[11,6549,6550],{},"It’s not just about positive reviews. Constructive criticism can also help improve processes and demonstrate that you’re learning and caring as a provider. We take every feedback seriously—and many of our small improvements are thanks to these voices.",[11,6552,6553],{},"This doesn’t only apply to us—many of our customers, like those in the hospitality industry, rely on it. Platforms such as Booking.com or Google Maps centralize competition. It's not just about competing on price anymore; it's mostly about visibility. Those who are listed at the top are seen—and those who are seen, win. The key to this is good, honest reviews.",[15,6555,6557],{"id":6556},"our-experiences","Our Experiences",[11,6559,6560],{},"Initially, we underestimated the power of review platforms. We thought: \"Those who know us, know how we work.\" But that’s no longer enough today. Especially in competitive fields like IT services or hosting, one must be visible and trustworthy. And this is only possible through platforms made visible by Google & Co.",[11,6562,6563],{},"We’ve had good experiences with the following platforms:",[371,6565,6567,6568],{"id":6566},"_1-google-business-profile","1. ",[85,6569,6570],{},"Google Business Profile",[11,6572,6573],{},"Google Business Profile allows businesses to become visible online and directly engage with their customers. With the integration of Google Maps, Google Search, and other Google services, it's a central place for local searches. Customers can leave reviews, add photos, view opening hours, and contact directly.",[11,6575,6576,6579],{},[85,6577,6578],{},"Pricing","\nGoogle Business Profile (formerly Google My Business) is free for businesses. There are no hidden costs for creating and maintaining the profile. Companies only pay for optional advertising (e.g., Google Ads).",[11,6581,6582,6585],{},[85,6583,6584],{},"Activation","\nTo create a Google Business Profile, a company must have a physical store or location accessible to customers, such as an office, a shop, or a branch. The business owner must have the right to manage the profile. Google also requires verification of the business address (often via a PIN sent by post).",[11,6587,6588,6591],{},[85,6589,6590],{},"Authenticity","\nThe authenticity of a business profile is ensured through address verification, often via a mailed PIN—though I received three letters because they were stuck together during printing. Google rarely deletes reviews, positive or negative. In my experience as a Local Guide, I once saw Google delete a review after a legal demand.",[371,6593,6595],{"id":6594},"_2-trustpilot","2. Trustpilot",[11,6597,6598,6603],{},[690,6599,6602],{"href":6600,"rel":6601},"https:\u002F\u002Fwww.trustpilot.com\u002F",[694],"Trustpilot"," is one of the best-known and widely used platforms for customer reviews. It allows companies to gather feedback from their customers, thus boosting credibility and transparency. As a review platform, Trustpilot offers both small businesses and large firms valuable opportunities to showcase their services and get direct customer feedback. The platform was founded in 2007 and has since earned considerable trust among consumers.",[11,6605,6606,6609],{},[85,6607,6608],{},"Pricing\u002FModel:"," Trustpilot has a free version that allows for collecting and managing reviews. However, this version doesn't allow integrating the reviews via widgets on your website—that feature is available only with a paid plan. Trustpilot's paid service starts at a monthly rate of 189€, offering additional features like widgets and advanced analytics. For businesses looking to collect reviews without using additional features like widgets, the free version is a great option. But for those wanting more interactivity and to incorporate reviews on their site, the paid options can be relatively expensive.",[11,6611,6612,6615],{},[85,6613,6614],{},"Requirements for Activation:"," Authenticity on Trustpilot is supported by gathering reviews from verified customers. Trustpilot has measures to combat fake reviews and regularly deletes suspicious ones. As a company, you can respond to reviews, which helps maintain a transparent and authentic relationship with your customers. Negative reviews aren't simply deleted, but there's an option to request a review based on suspected manipulation.",[11,6617,6618,6621],{},[85,6619,6620],{},"Authenticity:"," Trustpilot now uses artificial intelligence (AI) to verify the authenticity of reviews. Additionally, company operators can manually report reviews they deem false or inappropriate. An example from our own experience: a review mistakenly posted to the wrong company profile was removed after being reported and undergoing an 11-day review process by Trustpilot. Trustpilot examines every reported review and takes measures to ensure the quality and authenticity of the reviews.",[371,6623,6625],{"id":6624},"_3-provenexpert","3. ProvenExpert",[11,6627,6628,6633],{},[690,6629,6632],{"href":6630,"rel":6631},"https:\u002F\u002Fwww.provenexpert.com\u002Fen-us\u002F",[694],"ProvenExpert"," was founded in 2011 and remained active in our business until 2020. When we partially sold a division, we also let go of this review platform; however, during our use, we gained valuable insights. We operated under the Basic plan, with up to 50 reviews, and made intensive use of the platform's advantages. ProvenExpert helped us gather customer feedback and strengthen our online reputation.",[11,6635,6636,6638],{},[85,6637,6608],{}," ProvenExpert offers both free and paid plans. The free plan allows collecting reviews; however, these are automatically hidden after 24 months. More features require a paid subscription. Prices for paid plans vary based on needs, starting at about 29.90€ per month for the \"Basic\" plan, which allows up to 50 reviews.",[11,6640,6641,6643],{},[85,6642,6614],{}," To use ProvenExpert, businesses need to create a profile and provide their services and relevant business information. No special requirements are needed for activation, but companies need to ensure they can prove they’re receiving reviews from genuine customers. This is supported by a verification process and the possibility of incorporating widgets for collecting reviews.",[11,6645,6646,6648],{},[85,6647,6620],{}," ProvenExpert follows a model allowing businesses to hide or show individual reviews. Companies can use this to prevent displaying reviews that don't meet their expectations. However, it’s not always clear why a review isn’t shown, which can lead to uncertainties, especially with the free plan usage.",[371,6650,6652],{"id":6651},"_4-expeero","4. Expeero",[11,6654,6655,6660],{},[690,6656,6659],{"href":6657,"rel":6658},"https:\u002F\u002Fwww.expeero.com\u002Fen\u002F",[694],"Expeero"," is a relatively new review platform with an innovative concept: customers can leave reviews and simultaneously contribute to an environmentally conscious action. Expeero’s business model combines collecting reviews with the opportunity to plant trees. This integration of reviews and environmental awareness appeals to both businesses and customers who value sustainability. We used the platform during a test phase, finding both its functions and concept convincing. Our customers also highly appreciate this solution, and we will most likely start with the Starter plan for 2025.",[11,6662,6663,6665],{},[85,6664,6608],{}," Expeero offers a very fair entry price. The free plan already includes numerous features, including extensive widgets and marketing materials that companies can use to collect and showcase reviews. The paid plan starts at 15€ per month with a 12-month contract binding. This rate provides numerous additional functions, such as multiple survey types and the option to plant a tree for each review (even external ones). Thus, collecting reviews isn’t just a duty but also an eco-friendly gesture that can sustainably improve a company's image. The idea of planting a tree for each review encourages people to submit reviews—even if they're negative.",[11,6667,6668,6670],{},[85,6669,6614],{}," Getting started with Expeero is straightforward. Companies only need to create a profile and confirm their email. There's no address verification required, but Expeero manually marks business profiles as verified.",[11,6672,6673,6675],{},[85,6674,6620],{}," Expeero adopts a transparent and fair review aggregation approach. Customer reviews are displayed honestly and uncensored. Negative reviews aren’t hidden but receive the same visibility as positive ones. Expeero follows a transparent strategy where all reviews are visible, enhancing platform trust and building an authentic reputation. As business owners, we can dispute reviews with reasons like \"The customer is not known to us\" or \"The customer is lying or defaming our business.\" Reported reviews are immediately deactivated and reviewed by the Expeero team.",[11,6677,6678],{},"As a business owner, this feature is advantageous as unwanted or incorrect reviews can quickly be hidden. As a consumer, however, I’d prefer a more transparent solution where, for example, a disputed review on the profile is greyed out, indicating it has been challenged.",{"title":56,"searchDepth":57,"depth":57,"links":6680},[6681,6682],{"id":6543,"depth":57,"text":6544},{"id":6556,"depth":57,"text":6557,"children":6683},[6684,6686,6687,6688],{"id":6566,"depth":398,"text":6685},"1. Google Business Profile",{"id":6594,"depth":398,"text":6595},{"id":6624,"depth":398,"text":6625},{"id":6651,"depth":398,"text":6652},"2025-04-13","\u002Fimg\u002Fblog\u002Fbewertungsportale-vergleich.webp",{},"\u002Fblog\u002Fen\u002F2025-04-13-bewertungsportale-vergleich",{"title":6532,"description":6537},{"loc":6692},"blog\u002Fen\u002F2025-04-13-bewertungsportale-vergleich","1aMJ0cX_86A2sPFCX97zpoYhxg9C9Ay8MlJDPCCamlI",{"id":6698,"title":6699,"body":6700,"category":66,"date":6689,"description":6879,"extension":65,"head":66,"image":6880,"imageCredit":6881,"imageCreditUrl":6882,"locale":68,"meta":6883,"navigation":70,"ogImage":66,"path":6884,"robots":66,"schemaOrg":66,"seo":6885,"sitemap":6886,"stem":6887,"__hash__":6888},"blog\u002Fblog\u002Fen\u002F2025-04-13-digitale-dienste-gesetz.md","Understanding the Digital Services Act (DSA) – A Guide for Digital Service Providers",{"type":8,"value":6701,"toc":6867},[6702,6709,6715,6719,6724,6731,6736,6750,6755,6758,6769,6772,6776,6782,6790,6796,6801,6807,6815,6821,6832,6838,6846,6852,6860,6864],[11,6703,6704,6705,6708],{},"On May 14, 2024, a new law came into effect in Germany, particularly relevant for operators of websites, platforms, and digital services: the ",[85,6706,6707],{},"Digital Services Act (DSA)",". Sounds dry? Perhaps. But it's important – and impacts nearly everyone offering digital content. Therefore, it's reason enough to take a calm and clear look at the DSA.",[11,6710,6711,6712,6714],{},"The DSA is Germany's implementation of the European Union's ",[85,6713,6707],{},". The regulation aims to establish uniform rules for digital services across Europe – particularly with regard to transparency, liability, and consumer protection. The DSA itself has been applicable since early 2024, and the DSA now enables national implementation and elaboration.",[15,6716,6718],{"id":6717},"what-specifically-changes","What specifically changes?",[11,6720,6721],{},[85,6722,6723],{},"1. The Telemedia Act (TMG) is no more",[11,6725,6726,6727,6730],{},"Many website operators know the TMG primarily from the imprint: There was usually a reference to \"§ 5 TMG\". With the enactment of the DSA, ",[85,6728,6729],{},"§ 5 DSA"," now replaces this paragraph. This means: imprints, general terms and conditions, privacy policies, or other legal texts should be promptly adapted to reference the new law.",[11,6732,6733],{},[85,6734,6735],{},"2. From TTDSG to TDDDG",[11,6737,3168,6738,6741,6742,6745,6746,6749],{},[85,6739,6740],{},"TTDSG"," (Telecommunications and Telemedia Data Protection Act), which has included digital space data protection regulations since 2021, has also been replaced by a new law: the ",[85,6743,6744],{},"TDDDG"," – ",[85,6747,6748],{},"Telecommunications Digital Services Data Protection Act",". Here too: The name is new, many contents remain similar, but it's worth keeping an eye on the changes.",[11,6751,6752],{},[85,6753,6754],{},"3. More obligations for platform operators and intermediary services",[11,6756,6757],{},"The DSA affects not only traditional websites but also operators of platforms, marketplaces, or hosting services. They must, for example:",[154,6759,6760,6763,6766],{},[157,6761,6762],{},"Handle reported content more transparently,",[157,6764,6765],{},"Provide mechanisms to manage illegal content,",[157,6767,6768],{},"and publish regular reports on their moderation practices (especially for very large platforms).",[11,6770,6771],{},"Even smaller providers must contend with certain requirements – such as accessibility, complaints procedures, or collaboration with supervisory authorities.",[15,6773,6775],{"id":6774},"our-checklist-for-website-operators","Our Checklist for Website Operators",[371,6777,6779],{"id":6778},"_1-update-imprint-legal-notices",[85,6780,6781],{},"1. Update Imprint & Legal Notices",[154,6783,6784,6787],{},[157,6785,6786],{},"Replace § 5 TMG with § 5 DSA → Applies to imprint, legal notices, contract pages, etc.",[157,6788,6789],{},"Check further legal references (e.g., TTDSG → TDDDG)",[371,6791,6793],{"id":6792},"_2-adjust-privacy-policy",[85,6794,6795],{},"2. Adjust Privacy Policy",[154,6797,6798],{},[157,6799,6800],{},"Include information on notification procedures and contact options (for platforms)",[371,6802,6804],{"id":6803},"_3-contact-complaint-procedure",[85,6805,6806],{},"3. Contact & Complaint Procedure",[154,6808,6809,6812],{},[157,6810,6811],{},"Provide email addresses and electronic contact options for authorities and users",[157,6813,6814],{},"Offer clear regulations on complaint procedures for illegal content (e.g., via abuse form)",[371,6816,6818],{"id":6817},"_4-platform-operators-eg-reseller-interfaces-customer-portals",[85,6819,6820],{},"4. Platform Operators (e.g., Reseller Interfaces, Customer Portals)",[154,6822,6823,6826,6829],{},[157,6824,6825],{},"Integrate notification procedures for illegal content (e.g., \"Report Content\" button)",[157,6827,6828],{},"Visible reference to moderation and complaint mechanisms (e.g., in terms and conditions or customer info)",[157,6830,6831],{},"For hosting offers: Define internal processes for responding to reports",[371,6833,6835],{"id":6834},"_5-documenting-obligations",[85,6836,6837],{},"5. Documenting Obligations",[154,6839,6840,6843],{},[157,6841,6842],{},"Check if you qualify as a \"very large online platform\" (from 45 million EU users – usually not applicable)",[157,6844,6845],{},"If needed: Prepare moderation or activity reports (e.g., abuse reports)",[371,6847,6849],{"id":6848},"_6-review-terms-customer-communication",[85,6850,6851],{},"6. Review Terms & Customer Communication",[154,6853,6854,6857],{},[157,6855,6856],{},"Optionally adapt terms to point out the new legal situation",[157,6858,6859],{},"Inform customers transparently about changes (e.g., through news, blog, newsletter)",[371,6861,6863],{"id":6862},"disclaimer","Disclaimer",[11,6865,6866],{},"The contents of this post have been researched and compiled with the utmost care. However, Becker Software assumes no guarantee for the accuracy, completeness, or timeliness of the provided information. This article does not constitute tax or legal advice and cannot replace an individual consultation by a tax advisor, lawyer, or another qualified professional. Especially regarding changing legal frameworks – such as the e-invoicing obligation – we recommend seeking legal or tax advice if specific actions are required. Becker Software is not liable for any direct or indirect damages that result from the use of the content.",{"title":56,"searchDepth":57,"depth":57,"links":6868},[6869,6870],{"id":6717,"depth":57,"text":6718},{"id":6774,"depth":57,"text":6775,"children":6871},[6872,6873,6874,6875,6876,6877,6878],{"id":6778,"depth":398,"text":6781},{"id":6792,"depth":398,"text":6795},{"id":6803,"depth":398,"text":6806},{"id":6817,"depth":398,"text":6820},{"id":6834,"depth":398,"text":6837},{"id":6848,"depth":398,"text":6851},{"id":6862,"depth":398,"text":6863},"On May 14, 2024, a new law came into effect in Germany, particularly relevant for operators of websites, platforms, and digital services: the Digital Services Act (DSA). Sounds dry? Perhaps. But it's important – and impacts nearly everyone offering digital content. Therefore, it's reason enough to take a calm and clear look at the DSA.","\u002Fimg\u002Fblog\u002Fdigitale-dienste-gesetz.webp","qimono","https:\u002F\u002Fpixabay.com\u002Fusers\u002Fqimono-1962238\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-13-digitale-dienste-gesetz",{"title":6699,"description":6879},{"loc":6884},"blog\u002Fen\u002F2025-04-13-digitale-dienste-gesetz","CL5LjmdIwO-OU8BpqAIWuVqe7kpE6J5PaHYVd1lQ1lw",{"id":6890,"title":6891,"body":6892,"category":66,"date":6689,"description":7116,"extension":65,"head":66,"image":7117,"imageCredit":7118,"imageCreditUrl":7119,"locale":68,"meta":7120,"navigation":70,"ogImage":66,"path":7121,"robots":66,"schemaOrg":66,"seo":7122,"sitemap":7123,"stem":7124,"__hash__":7125},"blog\u002Fblog\u002Fen\u002F2025-04-13-e-rechnung-whmcs-hoster.md","The E-Invoice is Coming, (WHMCS) Hosts Beware!",{"type":8,"value":6893,"toc":7100},[6894,6901,6904,6908,6911,6920,6924,6927,6938,6941,6945,6950,6969,6974,6982,6987,6999,7004,7012,7019,7023,7026,7030,7042,7046,7049,7053,7056,7060,7063,7066,7080,7083,7085,7088,7090,7093,7097],[11,6895,6896,6897,6900],{},"Starting January 1, 2025, a significant change will take effect: ",[85,6898,6899],{},"All companies in Germany must be able to receive electronic invoices (E-Invoices)"," – regardless of whether they're sole proprietorships, partnerships, GmbHs, or AGs. Even small entrepreneurs are not exempt.",[11,6902,6903],{},"The digital transformation in accounting doesn't spare any industry. Against this backdrop, hosts, who often rely on systems like WHMCS, must adapt their processes. However, there are industry-specific nuances that provide some exceptions for hosting providers.",[15,6905,6907],{"id":6906},"electronic-invoice-whats-coming","Electronic Invoice: What's Coming?",[11,6909,6910],{},"From January 1, 2025, the obligation comes into force for all companies in business transactions to receive E-Invoices. This new system is intended to promote transparency, efficiency, and error reduction in accounting.",[11,6912,6913,6914,6919],{},"Regardless of the size of the company – even small entrepreneurs can no longer rely on paper. For hosts, this means: billing systems must be electronically compatible. A well-established example for the smooth reception and dispatch of E-Invoices is Lexware Office. More on this can be found at ",[690,6915,6918],{"href":6916,"rel":6917},"https:\u002F\u002Ftesten.lexware.de\u002Findex\u002F",[694],"Try Lexware Office",". (Advertisement)",[15,6921,6923],{"id":6922},"exceptions-for-hosts-what-specifically-applies","Exceptions for Hosts – What Specifically Applies?",[11,6925,6926],{},"Hosting providers are generally subject to the E-Invoice obligation. However, the legislature has created transitional arrangements that give smaller providers and companies with lower annual turnover time to implement the changes.",[11,6928,6929,6930,6933,6934,6937],{},"Starting January ",[85,6931,6932],{},"1, 2025",", all companies in Germany are required to be able to ",[85,6935,6936],{},"receive and process E-Invoices"," – without the invoice recipient's prior consent. This applies regardless of industry or company size, thus also affecting hosting providers.",[11,6939,6940],{},"The obligation to issue E-Invoices also applies from January 1, 2025. However, special regulations apply for the transitional period between 2025 and 2027, especially with regard to format and type of transmission.",[371,6942,6944],{"id":6943},"what-does-this-mean-specifically-for-hosts-regarding-invoice-dispatch","What Does This Mean Specifically for Hosts Regarding Invoice Dispatch?",[11,6946,6947],{},[85,6948,6949],{},"From 01.01.2025:",[154,6951,6952,6955],{},[157,6953,6954],{},"Mandatory receipt of E-Invoices (according to EN 16931) for all companies – including small entrepreneurs.",[157,6956,6957,6958],{},"Dispatch possible as:",[154,6959,6960,6963],{},[157,6961,6962],{},"Paper invoice",[157,6964,6965,6966],{},"PDF or other formats – but ",[85,6967,6968],{},"only with the recipient's consent",[11,6970,6971],{},[85,6972,6973],{},"From 2026:",[154,6975,6976,6979],{},[157,6977,6978],{},"No changes in dispatch possibility compared to 2025",[157,6980,6981],{},"Receiving obligation remains",[11,6983,6984],{},[85,6985,6986],{},"From 2027:",[154,6988,6989,6996],{},[157,6990,6991,6992,6995],{},"Only companies with a previous year's turnover of ",[85,6993,6994],{},"\u003C 800,000 €"," may continue to send invoices as PDF\u002Fpaper (with consent).",[157,6997,6998],{},"All others must already issue structured E-Invoices.",[11,7000,7001],{},[85,7002,7003],{},"From 2028:",[154,7005,7006,7009],{},[157,7007,7008],{},"All companies must use E-Invoices in the EN 16931 format.",[157,7010,7011],{},"PDF, paper, and other formats are no longer permissible – regardless of turnover.",[11,7013,7014,7015,7018],{},"These transitional arrangements mainly offer small hosts and freelancers the opportunity to gradually switch their systems to E-Invoices. However, all affected companies should ",[85,7016,7017],{},"start adapting early"," to be fully compliant by the deadline in 2028.",[371,7020,7022],{"id":7021},"important-for-small-entrepreneurs","Important for Small Entrepreneurs:",[11,7024,7025],{},"Small entrepreneurs who are exempt from sales tax must receive E-Invoices but can continue to use PDFs for dispatch, as their invoices are formally considered \"Other Invoices.\" These remain permissible until 2027, provided the recipient consents.",[371,7027,7029],{"id":7028},"exceptional-cases","Exceptional Cases:",[154,7031,7032,7039],{},[157,7033,7034,7035,7038],{},"Invoices under ",[85,7036,7037],{},"250 € gross"," can be permanently issued in other forms (paper, PDF, etc.).",[157,7040,7041],{},"The paper invoice is still formally permitted but plays virtually no role in the hosting industry.",[15,7043,7045],{"id":7044},"implementing-the-e-invoice-obligation-in-whmcs","Implementing the E-Invoice Obligation in WHMCS",[11,7047,7048],{},"WHMCS does not offer native support for implementing the E-Invoice obligation, so additional modules are necessary to meet legal requirements. Below are two implementation paths.",[371,7050,7052],{"id":7051},"lexware-office-whmcs-integration-becker-software","Lexware Office WHMCS Integration (Becker Software)",[11,7054,7055],{},"The module from Becker Software provides a seamless connection between WHMCS and Lexware Office. Invoices created in WHMCS are automatically transferred to Lexware Office, where they are generated as E-Invoices in ZUGFeRD or XRechnung format in compliance with legal requirements. These invoices are then dispatched directly from WHMCS using the original PDFs from Lexware Office. Since Lexware Office meets the legal E-Invoice requirements, all legal obligations are automatically covered.",[371,7057,7059],{"id":7058},"e-invoice-whmcs-module-from-plambee","E-Invoice WHMCS Module from Plambee",[11,7061,7062],{},"The E-Invoice module from Plambee for WHMCS enables the creation and dispatch of electronic invoices directly from WHMCS. The ZUGFeRD format is used, a hybrid data format combining a human-readable PDF file with machine-readable XML data. This facilitates electronic invoice data exchange and complies with legal E-Invoice requirements.",[11,7064,7065],{},"A special feature of the module is the caching function: invoices are stored on the webspace, allowing customers to download the original invoice at a later date, even if layout or product name changes have occurred in the meantime.",[11,7067,7068,7073,7074,7079],{},[690,7069,7072],{"href":7070,"rel":7071},"https:\u002F\u002Fwww.plambee.de\u002Fpanel\u002Fcart.php?a=add&pid=495&aff=111",[694],"Rental Version (annually) - 79.95 €"," - ",[690,7075,7078],{"href":7076,"rel":7077},"https:\u002F\u002Fwww.plambee.de\u002Fpanel\u002Fcart.php?a=add&pid=496&aff=111",[694],"Rental Version (monthly) - 8.99 €","\n(Affiliate Links)",[11,7081,7082],{},"Have we missed something? Feel free to contact us via email: info [a-t] becker-software [dot] de.",[15,7084,673],{"id":672},[11,7086,7087],{},"Anyone issuing invoices through WHMCS or other systems must be fully transitioned to structured E-Invoices (according to EN 16931) by 2028 at the latest – regardless of turnover. The obligation to receive begins as early as 2025.",[371,7089,6863],{"id":6862},[11,7091,7092],{},"The content of this post has been researched and compiled with the utmost care. Nevertheless, Becker Software assumes no guarantee for the accuracy, completeness, or timeliness of the provided information. This article does not constitute tax or legal advice and cannot replace individual consultation with a tax advisor, lawyer, or other qualified professional. Particularly regarding changing legal frameworks – such as E-Invoice requirements – we recommend seeking legal or tax advice in case of specific need for action. Becker Software does not accept liability for direct or indirect damages arising from the use of the content.",[371,7094,7096],{"id":7095},"transparency-notice-affiliate-links","Transparency Notice \u002F Affiliate Links",[11,7098,7099],{},"Some links in this post are so-called affiliate links. If you purchase a product or service through one of these links, we receive a small commission. The price for you does not change. The recommendation is made solely if we are convinced of the product's quality and benefits. Revenue from these links helps us operate this blog and regularly publish new content.",{"title":56,"searchDepth":57,"depth":57,"links":7101},[7102,7103,7108,7112],{"id":6906,"depth":57,"text":6907},{"id":6922,"depth":57,"text":6923,"children":7104},[7105,7106,7107],{"id":6943,"depth":398,"text":6944},{"id":7021,"depth":398,"text":7022},{"id":7028,"depth":398,"text":7029},{"id":7044,"depth":57,"text":7045,"children":7109},[7110,7111],{"id":7051,"depth":398,"text":7052},{"id":7058,"depth":398,"text":7059},{"id":672,"depth":57,"text":673,"children":7113},[7114,7115],{"id":6862,"depth":398,"text":6863},{"id":7095,"depth":398,"text":7096},"Starting January 1, 2025, a significant change will take effect: All companies in Germany must be able to receive electronic invoices (E-Invoices) – regardless of whether they're sole proprietorships, partnerships, GmbHs, or AGs. Even small entrepreneurs are not exempt.","\u002Fimg\u002Fblog\u002Fe-rechnung-whmcs-hoster.webp","Maximilianovich","https:\u002F\u002Fpixabay.com\u002Fusers\u002FMaximilianovich-16478317\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-13-e-rechnung-whmcs-hoster",{"title":6891,"description":7116},{"loc":7121},"blog\u002Fen\u002F2025-04-13-e-rechnung-whmcs-hoster","lN18eL5aZYRB_KhsPxB3FWubTcB7WSlSj6ve6MNRn_I",{"id":7127,"title":7128,"body":7129,"category":66,"date":6689,"description":7137,"extension":65,"head":66,"image":7211,"imageCredit":7212,"imageCreditUrl":7213,"locale":68,"meta":7214,"navigation":70,"ogImage":66,"path":7215,"robots":66,"schemaOrg":66,"seo":7216,"sitemap":7217,"stem":7218,"__hash__":7219},"blog\u002Fblog\u002Fen\u002F2025-04-13-website-ohne-cookies.md","Cookie Banner? No Thanks! Why We Have Completely Ditched Cookies on Our Website",{"type":8,"value":7130,"toc":7201},[7131,7135,7138,7144,7147,7153,7156,7162,7165,7171,7174,7177,7183,7186,7189,7195,7198],[7132,7133,7128],"h1",{"id":7134},"cookie-banner-no-thanks-why-we-have-completely-ditched-cookies-on-our-website",[11,7136,7137],{},"Nowadays, it's almost impossible to browse a website without encountering cookie banners. The moment you open a new page, another consent window pops up – sometimes subtly, sometimes not. Usually, these are not even about ensuring the functionality of the site; they are for tracking, marketing, and transmitting data to third countries. It's as if the web has become nothing more than a data collection machine. For us, the decision was clear: we didn't want that.",[15,7139,7141],{"id":7140},"no-cookies-yes-its-possible",[85,7142,7143],{},"No Cookies? Yes, It's Possible!",[11,7145,7146],{},"Many are surprised when we say: Our website doesn't use cookies. \"How is that possible? Doesn't every site use cookies?\" No – not every site! While cookies do have a sensible technical origin – storing information in the user's browser, such as keeping a session open or securing a login – the reality in 2025 is different: tracking cookies, analytics, ad networks, chat widgets, external scripts... the madness never ends.",[15,7148,7150],{"id":7149},"our-decision-only-use-cookies-when-absolutely-necessary",[85,7151,7152],{},"Our Decision: Only Use Cookies When Absolutely Necessary",[11,7154,7155],{},"That's why we designed our website from the ground up to work entirely without cookies. The only exceptions are our customer portal and contact forms – there, we use session cookies that automatically delete when the browser closes. They ensure, for instance, that users receive appropriate confirmation after submitting a form – technically necessary, GDPR-compliant, and temporary.",[15,7157,7159],{"id":7158},"and-what-about-statistics-and-analysis",[85,7160,7161],{},"And What About Statistics and Analysis?",[11,7163,7164],{},"Marketing experts might ask: \"But how do you analyze your website's visits? What about Google Analytics, conversion tracking, BI systems?\" Our answer: What truly matters? We want to know how often an article is read, what devices visitors use, which pages are particularly well-received – but we don't need to send data to the USA or create comprehensive user profiles to find that out.",[371,7166,7168],{"id":7167},"our-solution-matomo-with-server-log-tracking",[85,7169,7170],{},"Our Solution: Matomo with Server Log Tracking",[11,7172,7173],{},"We analyze our access data with Matomo – completely independently, on our own server. The foundation: server logs, anonymized and evaluated in a privacy-friendly manner. No cookies, no personalized IDs, no fingerprinting. We only store the User Agent, the first 16 bits of the IP address, and the page path. Known bots and crawlers are automatically filtered out.",[11,7175,7176],{},"This way, we gain valuable insights into user behavior without compromising our visitors' privacy.",[15,7178,7180],{"id":7179},"less-is-sometimes-more",[85,7181,7182],{},"Less is Sometimes More",[11,7184,7185],{},"Of course: You can do much more with tracking tools. But often, we see that companies collect masses of data they never analyze or use. And let's be honest: Much can be measured server-side or with simple means – without complex scripts or foreign cloud services.",[11,7187,7188],{},"Another advantage: speed. External trackers, chat widgets, and scripts can drastically worsen loading times – especially on mobile devices or in weak networks. We've experienced it: On the ICE, a well-known hosting site preferred to load its chat rather than its actual homepage.",[371,7190,7192],{"id":7191},"our-site-fast-simple-cookie-free",[85,7193,7194],{},"Our Site? Fast. Simple. Cookie-Free.",[11,7196,7197],{},"Our website is consistently optimized for performance and privacy. No trackers, no external scripts, no banner confusion. Instead: complete server caching via NGINX on an ultra-fast RAM disk – for maximum speed and minimum latency. Whether bot, mobile device, or desktop – our site loads in milliseconds.",[11,7199,7200],{},"And yes, we use modern technology: Vue.js in the frontend, combined with our backend – even for small features like displaying our consumed coffees on the homepage. Technically modern, but in terms of privacy, quite traditional: as much as necessary, as little as possible.",{"title":56,"searchDepth":57,"depth":57,"links":7202},[7203,7204,7205,7208],{"id":7140,"depth":57,"text":7143},{"id":7149,"depth":57,"text":7152},{"id":7158,"depth":57,"text":7161,"children":7206},[7207],{"id":7167,"depth":398,"text":7170},{"id":7179,"depth":57,"text":7182,"children":7209},[7210],{"id":7191,"depth":398,"text":7194},"\u002Fimg\u002Fblog\u002Fwebsite-ohne-cookies.webp","TheDigitalArtist","https:\u002F\u002Fpixabay.com\u002Fusers\u002FTheDigitalArtist-202249\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-13-website-ohne-cookies",{"title":7128,"description":7137},{"loc":7215},"blog\u002Fen\u002F2025-04-13-website-ohne-cookies","NJkAFGA-pYCw9634adIo8xqGH8QfgEPoqn2W5fOgWn4",{"id":7221,"title":7222,"body":7223,"category":66,"date":7413,"description":7414,"extension":65,"head":66,"image":7415,"imageCredit":7416,"imageCreditUrl":7417,"locale":68,"meta":7418,"navigation":70,"ogImage":66,"path":7419,"robots":66,"schemaOrg":66,"seo":7420,"sitemap":7421,"stem":7422,"__hash__":7423},"blog\u002Fblog\u002Fen\u002F2025-04-10-kuendigungsbutton-hosting.md","Cancellation Buttons for Hosting Providers – Requirements, Penalties, and Our Implementation",{"type":8,"value":7224,"toc":7410},[7225,7233,7238,7240,7243,7248,7250,7257,7289,7292,7297,7299,7302,7316,7319,7324,7326,7329,7374,7381,7386,7388,7391,7402,7405,7407],[11,7226,7227,7228,653],{},"As a hosting provider, you find yourself in constant competition—beyond just technology and service, but also in fulfilling legal requirements. Since July 2022, companies must offer their clients a clearly structured and easily accessible cancellation button, allowing long-term contracts—from web hosting to domain services and additional offerings—to be terminated online effortlessly. In this article, I will explain who is affected by this regulation, what penalties are at stake, and how we at Becker Software implemented our solution. (see also ",[690,7229,7232],{"href":7230,"rel":7231},"https:\u002F\u002Fwww.becker-software.de\u002Fen\u002Fcancel-contract",[694],"Our Cancellation Form",[596,7234,7235],{},[157,7236,7237],{},"Who is Affected?",[4960,7239],{},[11,7241,7242],{},"Fundamentally, the legal stipulations apply to all providers that conclude contracts over the internet or make them available online—this includes hosting services. Particularly relevant are contracts that renew automatically or become due regularly. For hosting providers offering digital products and services like managed hosting, web space, or domain management, a clearly structured cancellation process tops the to-do list.",[596,7244,7245],{"start":57},[157,7246,7247],{},"Legal Foundations and Requirements",[4960,7249],{},[11,7251,7252,7253,7256],{},"The legal basis for implementing a cancellation button can be found in ",[85,7254,7255],{},"BGB §312k",". It essentially states that contracts made online must enable the consumer to:",[154,7258,7259,7265,7271,7277,7283],{},[157,7260,7261,7264],{},[85,7262,7263],{},"a)"," Specify the type of cancellation (regular or extraordinary, including a reason for cancellation in extraordinary cases), and allow entry of respective information,",[157,7266,7267,7270],{},[85,7268,7269],{},"b)"," Ensure their clear identifiability,",[157,7272,7273,7276],{},[85,7274,7275],{},"c)"," Explicitly identify the contract concerned,",[157,7278,7279,7282],{},[85,7280,7281],{},"d)"," Provide a field for indicating the desired ending date, and",[157,7284,7285,7288],{},[85,7286,7287],{},"e)"," Contain a clearly labeled confirmation button—ideally with \"cancel now\" or an equivalent phrase.",[11,7290,7291],{},"Providers of online contracts, like hosting companies, must ensure that the cancellation button is accessible from every subpage of the website and that the entire cancellation process is transparent.",[596,7293,7294],{"start":398},[157,7295,7296],{},"Potential Penalties for Non-Compliance",[4960,7298],{},[11,7300,7301],{},"If the cancellation button is not correctly implemented, legal consequences can accumulate:",[154,7303,7304,7310],{},[157,7305,7306,7309],{},[85,7307,7308],{},"Warnings and Cease-and-Desist Declarations:"," Consumer protection organizations regularly check if providers meet the requirements. If deficiencies are found—such as a missing, hidden, or inadequately labeled cancellation button—warnings often follow.",[157,7311,7312,7315],{},[85,7313,7314],{},"Fines and Image Loss:"," Besides potential financial penalties, reputational damage may occur if customers feel they can't easily exit a contract.",[11,7317,7318],{},"The Brandenburg Consumer Protection Association documented that during an inspection, hundreds of companies were warned for not complying with legal requirements. For hosting providers, this means that a faulty cancellation process can lead to not only legal and financial consequences but also a loss of trust among customers.",[596,7320,7321],{"start":5092},[157,7322,7323],{},"Our Implementation – Best Practices at Becker Software",[4960,7325],{},[11,7327,7328],{},"At Becker Software, we have thoroughly revamped the cancellation process within our system. Our goal was not only to comply with legal requirements but also to offer our customers an intuitive, user-friendly solution. Our core implementation includes the following steps:",[596,7330,7331,7337,7368],{},[157,7332,7333,7336],{},[85,7334,7335],{},"Centrally Placed Cancellation Button:","\nA prominently displayed button is integrated on every page of our customer portal—allowing the customer to initiate the cancellation process at any time without hassle.",[157,7338,7339,7342],{},[85,7340,7341],{},"Multi-Step Cancellation Process:",[154,7343,7344,7350,7356,7362],{},[157,7345,7346,7349],{},[85,7347,7348],{},"Selection of Cancellation Type:"," The customer decides whether to cancel regularly or extraordinarily. For extraordinary cancellation, they are asked to provide a reason.",[157,7351,7352,7355],{},[85,7353,7354],{},"Clear Identification:"," Using login data or personal identification entries ensures the correct contract is being canceled.",[157,7357,7358,7361],{},[85,7359,7360],{},"Clear Contract Designation and Date Selection:"," All relevant contract data is displayed, and a field for setting the desired termination date is provided.",[157,7363,7364,7367],{},[85,7365,7366],{},"Clear Confirmation Button:"," Finally, the customer reaches a confirmation page where the \"cancel now\" button is unmistakably visible.",[157,7369,7370,7373],{},[85,7371,7372],{},"Documentation of Cancellation:","\nAfter completing the cancellation, the customer immediately receives an electronic confirmation, available as a printable version via a \"Print Button.\" This provides the customer with a verification of the cancellation process at any time—a key point in legally secure documentation.",[11,7375,7376,7377,7380],{},"Our solution aligns with our developed cancellation form (see ",[690,7378,7232],{"href":7230,"rel":7379},[694],"), covering all legal requirements and ensuring an optimal user experience. This holistic approach minimizes the risk of warnings and fosters customer trust.",[596,7382,7383],{"start":5187},[157,7384,7385],{},"Conclusion and Recommendations",[4960,7387],{},[11,7389,7390],{},"Introducing a legally compliant cancellation button is not merely a formality but a crucial step in ensuring transparency and consumer protection. For hosting providers, the key points are:",[154,7392,7393,7396,7399],{},[157,7394,7395],{},"Review your current cancellation processes for completeness and conformity with legal requirements.",[157,7397,7398],{},"Seek a user-friendly, centrally accessible solution that clearly documents the entire cancellation process.",[157,7400,7401],{},"Leverage best practice examples—like our implementation at Becker Software—to stand out from competitors while minimizing legal risks.",[11,7403,7404],{},"A future-proof cancellation process not only serves as an important element of consumer protection but also reinforces your customers' long-term trust in your company.",[371,7406,6863],{"id":6862},[11,7408,7409],{},"The content of this article has been researched and compiled with the utmost care. Nevertheless, Becker Software assumes no liability for the accuracy, completeness, or timeliness of the information provided. This article does not constitute tax or legal advice and cannot replace individual consultation with a tax advisor, lawyer, or another qualified professional. In particular, regarding changing legal conditions—such as e-invoicing requirements—we recommend seeking legal or tax advice when specific action is required. Becker Software is not liable for direct or indirect damages arising from the use of the content.",{"title":56,"searchDepth":57,"depth":57,"links":7411},[7412],{"id":6862,"depth":398,"text":6863},"2025-04-10","As a hosting provider, you find yourself in constant competition—beyond just technology and service, but also in fulfilling legal requirements. Since July 2022, companies must offer their clients a clearly structured and easily accessible cancellation button, allowing long-term contracts—from web hosting to domain services and additional offerings—to be terminated online effortlessly. In this article, I will explain who is affected by this regulation, what penalties are at stake, and how we at Becker Software implemented our solution. (see also Our Cancellation Form).","\u002Fimg\u002Fblog\u002Fkuendigungsbutton-hosting.webp","fancycrave1","https:\u002F\u002Fpixabay.com\u002Fusers\u002Ffancycrave1-1115284\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-10-kuendigungsbutton-hosting",{"title":7222,"description":7414},{"loc":7419},"blog\u002Fen\u002F2025-04-10-kuendigungsbutton-hosting","sJm1rzLh3YsNv2Uo3DCzV0zRZqhtnYQIrO3ECWGO64M",{"id":7425,"title":7426,"body":7427,"category":2448,"date":7562,"description":7563,"extension":65,"head":66,"image":7564,"imageCredit":7565,"imageCreditUrl":7566,"locale":68,"meta":7567,"navigation":70,"ogImage":66,"path":7568,"robots":66,"schemaOrg":66,"seo":7569,"sitemap":7570,"stem":7571,"__hash__":7572},"blog\u002Fblog\u002Fen\u002F2025-04-04-proxmox-backup.md","Between Veeam and More – Proxmox Backup",{"type":8,"value":7428,"toc":7556},[7429,7440,7462,7469,7491,7495,7498,7501,7504,7507,7510,7513,7517,7520,7529,7540,7543,7547,7553],[11,7430,7431,7432,7435,7436,7439],{},"As an IT service provider, I face the daily challenge of finding the right software for various application scenarios. While in many enterprise environments, solutions like ",[85,7433,7434],{},"Veeam"," have their merits and are well-tailored for specific use cases, I have always favored ",[85,7437,7438],{},"open-source software",". This not only offers the flexibility I appreciate as a developer but also provides greater control over the solutions in use.",[11,7441,7442,7443,7446,7447,7450,7451,7454,7455,119,7458,7461],{},"Recently, I came across the ",[85,7444,7445],{},"Proxmox Backup Server (PBS)",", a particularly promising open-source solution in the area of data backup. The PBS is specifically tailored to the ",[85,7448,7449],{},"Proxmox VE (Virtual Environment)",", an open-source hypervisor that has proven to be powerful and resource-efficient. But what truly sets the Proxmox Backup Server apart is not only its integration with Proxmox VE but also its ",[85,7452,7453],{},"innovative chunking method",", which ensures particularly efficient ",[85,7456,7457],{},"deduplication",[85,7459,7460],{},"compression"," of data.",[11,7463,7464,7465,7468],{},"Compared to traditional backup solutions, the PBS offers some unique features and a user-friendly, web-based interface that simplifies the process of creating and managing backups. However, what fascinates me the most is the ",[85,7466,7467],{},"flexibility"," of the system, which can be used for backing up virtual machines, Docker environments, and individual databases.",[11,7470,7471,7472,7475,7476,7479,7480,7483,7484,7487,7488,108],{},"In this article, I want to share my experiences with the Proxmox Backup Server and explain why I consider it one of the ",[85,7473,7474],{},"most promising open-source backup solutions",". Especially regarding ",[85,7477,7478],{},"Docker environments"," and the backup of applications like ",[85,7481,7482],{},"Mailcow"," at hosting providers such as ",[85,7485,7486],{},"Netcup",", PBS has proven to be particularly ",[85,7489,7490],{},"efficient and reliable",[15,7492,7494],{"id":7493},"chunking","Chunking",[11,7496,7497],{},"The Proxmox Backup Server uses the chunking method to break down large files into small, efficient pieces, much like a puzzle. These pieces are then deduplicated and compressed to optimize the backup process. The PBS creates a guide to piece these puzzle pieces back together later.",[11,7499,7500],{},"Chunking is a method that splits large files into small, equally sized pieces (chunks), which can then be deduplicated and compressed. The Proxmox Backup Server uses a variable chunk size, automatically adjusted to the size of the data to achieve optimal deduplication. This means that PBS only saves the changes between the chunks, thereby reducing data volume and shortening backup time.",[11,7502,7503],{},"When restoring data, the chunks are reassembled to restore the original file. Since each chunk is provided with a unique hash value, PBS can also ensure data integrity during the backup and restoration process.",[11,7505,7506],{},"In addition to this chunking method, the Proxmox Backup Server also offers support for encryption and compression of backup data to maximize the security and efficiency of the backup process.",[11,7508,7509],{},"For block-based backups, the Proxmox Backup Server uses a fixed chunk size of 4 MiB. This type of backup is usually used for virtual machines and is based on the block level, meaning changes to the entire virtual hard disk are detected and secured.",[11,7511,7512],{},"For file-based backups, however, the Proxmox Backup Server uses a variable chunk size of 64 KiB to 4 MiB to achieve optimal deduplication of data. File-based backups are based on the file level and allow the backup of specific files or directories instead of the entire hard disk.",[15,7514,7516],{"id":7515},"file-based-backups","File-Based Backups",[11,7518,7519],{},"Currently, I use two methods for backups, and I was surprised at how well these backups work in Docker environments. Likewise, in cases where I want to back up the content of a VM, such as our Mailcow at Netcup.",[11,7521,7522,7523,7528],{},"The host backups from PBS run through the CLI tool ",[690,7524,7527],{"href":7525,"rel":7526},"https:\u002F\u002Fpbs.proxmox.com\u002Fdocs\u002Fbackup-client.html",[694],"proxmox-backup-client",", which is available from Proxmox. I create a bash script that is triggered by a cron job.",[596,7530,7531,7534,7537],{},[157,7532,7533],{},"It pulls data from the source (e.g., from a MySQL server via mysqldump)",[157,7535,7536],{},"I place this data in a directory like backup",[157,7538,7539],{},"I run the proxmox-backup-client and specify the directory with the data as the source.",[11,7541,7542],{},"In reality, this would look as follows.",[371,7544,7546],{"id":7545},"backupsh","Backup.sh",[805,7548,7551],{"className":7549,"code":7550,"language":810},[808],"\u003Cspan class=\"hljs-number\">1.\u003C\u002Fspan> \u003Cspan class=\"hljs-comment\"># !\u002Fbin\u002Fbash\u003C\u002Fspan>\n\u003Cspan class=\"hljs-number\">2.\u003C\u002Fspan> set -e\n\u003Cspan class=\"hljs-number\">3.\u003C\u002Fspan> trap \u003Cspan class=\"hljs-string\">'curl -fs \"https:\u002F\u002Fstatus.myuptimekuma.de\u002Fapi\u002Fpush\u002FAvf1241sdas?status=down&msg=FAILED\"'\u003C\u002Fspan> ERR\n\u003Cspan class=\"hljs-comment\"># Run Mysql dump to backup into the backup folder\u003C\u002Fspan>\n\u003Cspan class=\"hljs-number\">4.\u003C\u002Fspan> \u002Froot\u002Fbackup-database.sh\n\u003Cspan class=\"hljs-comment\"># Set env vars\u003C\u002Fspan>\n\u003Cspan class=\"hljs-number\">5.\u003C\u002Fspan> export PBS_REPOSITORY=mailcow@pbs@pbs.meinpbs.de:datastore\n\u003Cspan class=\"hljs-number\">6.\u003C\u002Fspan> export PBS_PASSWORD=\u003Cspan class=\"hljs-string\">\"xxxx\"\u003C\u002Fspan>\n\u003Cspan class=\"hljs-number\">7.\u003C\u002Fspan> export PBS_ENCRYPTION_PASSWORD=\u003Cspan class=\"hljs-string\">\"xxxx\"\u003C\u002Fspan>\n\u003Cspan class=\"hljs-comment\"># Run the Proxmox Backup client\u003C\u002Fspan>\n\u003Cspan class=\"hljs-number\">8.\u003C\u002Fspan> proxmox-backup-client backup database.pxar:\u002Froot\u002Fdatabase-backups docker-volumes.pxar:\u002F\u003Cspan class=\"hljs-keyword\">var\u003C\u002Fspan>\u002Flib\u002Fdocker\u002Fvolumes mailcow-config.pxar:\u002Froot\u002Fmailcow-dockerized --ns mailcow  --skip-lost-\u003Cspan class=\"hljs-keyword\">and\u003C\u002Fspan>-found\n\u003Cspan class=\"hljs-comment\"># Report to the monitoring solution (in my case uptime kuma, remove if not needed)\u003C\u002Fspan>\n\u003Cspan class=\"hljs-number\">10.\u003C\u002Fspan> curl \u003Cspan class=\"hljs-string\">\"https:\u002F\u002Fstatus.meinuptimekuma.de\u002Fapi\u002Fpush\u002FAvf1241sdas?status=up&msg=OK\"\u003C\u002Fspan>\n",[30,7552,7550],{"__ignoreMap":56},[11,7554,7555],{},"First off, this article is not sponsored in any way. Becker Software has no affiliation with Proxmox.",{"title":56,"searchDepth":57,"depth":57,"links":7557},[7558,7559],{"id":7493,"depth":57,"text":7494},{"id":7515,"depth":57,"text":7516,"children":7560},[7561],{"id":7545,"depth":398,"text":7546},"2025-04-04","As an IT service provider, I face the daily challenge of finding the right software for various application scenarios. While in many enterprise environments, solutions like Veeam have their merits and are well-tailored for specific use cases, I have always favored open-source software. This not only offers the flexibility I appreciate as a developer but also provides greater control over the solutions in use.","\u002Fimg\u002Fblog\u002Fproxmox-backup.webp","wige","https:\u002F\u002Fpixabay.com\u002Fusers\u002Fwige-1579892\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-04-proxmox-backup",{"title":7426,"description":7563},{"loc":7568},"blog\u002Fen\u002F2025-04-04-proxmox-backup","sNHhvYaH7Sk-YdUMXfFqd8y9GQYxQ45vwSgmmDBKVxE",{"id":7574,"title":7575,"body":7576,"category":2448,"date":7562,"description":56,"extension":65,"head":66,"image":7580,"imageCredit":7581,"imageCreditUrl":7582,"locale":68,"meta":7583,"navigation":70,"ogImage":66,"path":7584,"robots":66,"schemaOrg":66,"seo":7585,"sitemap":7586,"stem":7587,"__hash__":7588},"blog\u002Fblog\u002Fen\u002F2025-04-04-whmcs-alternativen-deutschland.md","WHMCS-Alternatives on the German market (2025)",{"type":8,"value":7577,"toc":7578},[],{"title":56,"searchDepth":57,"depth":57,"links":7579},[],"\u002Fimg\u002Fblog\u002Fwhmcs-alternativen-deutschland.webp","jamesmarkosborne","https:\u002F\u002Fpixabay.com\u002Fusers\u002Fjamesmarkosborne-1640589\u002F",{},"\u002Fblog\u002Fen\u002F2025-04-04-whmcs-alternativen-deutschland",{"title":7575,"description":56},{"loc":7584},"blog\u002Fen\u002F2025-04-04-whmcs-alternativen-deutschland","dLoYJiZbroR3inKUNylYlptoUqLhjNHARUgmcQid0cQ",{"id":7590,"title":7591,"body":7592,"category":2448,"date":7562,"description":7596,"extension":65,"head":66,"image":7825,"imageCredit":733,"imageCreditUrl":734,"locale":68,"meta":7826,"navigation":70,"ogImage":66,"path":7827,"robots":66,"schemaOrg":66,"seo":7828,"sitemap":7829,"stem":7830,"__hash__":7831},"blog\u002Fblog\u002Fen\u002F2025-04-04-whmcs-deutschland-herausforderungen.md","Utilizing WHMCS in Germany: Overcoming Barriers and Finding Solutions",{"type":8,"value":7593,"toc":7811},[7594,7597,7601,7604,7622,7626,7629,7641,7653,7657,7660,7673,7677,7691,7694,7698,7701,7712,7716,7719,7729,7733,7736,7744,7748,7751,7759,7763,7766,7776,7780,7783,7788,7792,7795,7803,7805,7808],[11,7595,7596],{},"WHMCS is a widely-used software for managing web hosting and other online services. Although it is utilized globally, there are some challenges in Germany that make it difficult to use WHMCS with the standard tools. In this article, we will discuss these challenges and introduce solutions that allow German users to use WHMCS effectively.",[15,7598,7600],{"id":7599},"challenge-1-inadequate-pdf-invoice-template","Challenge 1: Inadequate PDF Invoice Template",[11,7602,7603],{},"The standard PDF invoice template in WHMCS does not contain all the necessary information such as tax numbers and bank details. This can lead to legal issues since specific information is legally required on invoices in Germany.",[11,7605,7606,7609,7610,7615,7616,7621],{},[85,7607,7608],{},"Solution:"," There are two main solutions to this problem. The first is the ",[690,7611,7614],{"href":7612,"rel":7613},"https:\u002F\u002Fwww.plambee.de\u002Fwhmcs-erweiterungen\u002Fwhmcs-pdf-rechnungsvorlage\u002F",[694],"WHMCS PDF invoice template"," from Plambee, available for €24.95, which expands the PDF invoice template to include all necessary information. The second solution is the ",[690,7617,7620],{"href":7618,"rel":7619},"https:\u002F\u002Fwww.becker-software.de\u002Fwhmcs-module\u002Flexoffice\u002F",[694],"lexoffice module"," from Becker Software, which completely replaces the WHMCS billing system with the market-tested lexoffice software. This module is more expensive at €8.50 per month but offers a more comprehensive solution.",[15,7623,7625],{"id":7624},"challenge-2-insufficient-export-options-for-accountants","Challenge 2: Insufficient Export Options for Accountants",[11,7627,7628],{},"WHMCS does not provide sufficient export options for accountants in the DATEV format. This can complicate communication and collaboration with accountants and lead to errors in bookkeeping.",[11,7630,7631,7634,7635,7640],{},[85,7632,7633],{},"Solution 1:"," Using connected accounting systems like lexoffice or sevDesk can help. We offer suitable ",[690,7636,7639],{"href":7637,"rel":7638},"https:\u002F\u002Fwww.becker-software.de\u002Fwhmcs-module\u002F",[694],"WHMCS modules"," for both software solutions.",[11,7642,7643,7646,7647,7652],{},[85,7644,7645],{},"Solution 2:"," The ",[690,7648,7651],{"href":7649,"rel":7650},"https:\u002F\u002Ftecsee.de\u002Fshop\u002Fplugin-tecsee-whmcs-2-datev\u002F",[694],"Plugin Tecsee WHMCS 2 DATEV"," offers a solution for this problem. However, this solution is more geared towards medium-sized and large companies with a price of €1,188.81 (as of 07\u002F05\u002F2024).",[15,7654,7656],{"id":7655},"challenge-3-no-support-for-standard-chart-of-accounts-skr03skr04-from-datev","Challenge 3: No Support for Standard Chart of Accounts SKR03\u002FSKR04 from DATEV",[11,7658,7659],{},"WHMCS is not an accounting program but does offer transactions and booking options.",[11,7661,7662,7664,7665,119,7669,108],{},[85,7663,7608],{}," There are two ways to solve this problem. The first option is to export documents and transactions and have them booked by the accountant. The second option is to independently link WHMCS to an accounting program like sevDesk or lexoffice. This might require more effort, but it offers the advantage of providing a transparent view of ongoing finances and better planning capabilities. Becker Software offers modules for ",[690,7666,7668],{"href":7618,"rel":7667},[694],"lexoffice",[690,7670,118],{"href":7671,"rel":7672},"https:\u002F\u002Fwww.becker-software.de\u002Fwhmcs-module\u002Fsevdesk\u002F",[694],[15,7674,7676],{"id":7675},"challenge-4-no-double-entry-bookkeeping-support","Challenge 4: No Double-entry Bookkeeping Support",[11,7678,7679,7680,7684,7685,7690],{},"In Germany, [double-entry bookkeeping](",[690,7681,7682],{"href":7682,"rel":7683},"https:\u002F\u002Fwww.ionos.de\u002Fstartupguide\u002Funternehmensfuehrung\u002Fdoppelte-buchfuehrung-einfach-und-kompakt-erklaert\u002F#:~:text=Die%20Bilanzrechnung%20(auch%20%E2%80%9EBilanzierung%E2%80%9C,am%20Ende%20eines%20Gesch%C3%A4ftsjahres%20erstellen",[694],".) is legally required for ",[690,7686,7689],{"href":7687,"rel":7688},"https:\u002F\u002Fsevdesk.de\u002Flexikon\u002Fbilanzierungspflicht\u002F",[694],"companies required to balance",". Without this capability, managing and monitoring company finances could be difficult.",[11,7692,7693],{},"Unfortunately, users have no choice but to rely on external accounting software like sevDesk or lexoffice. The ability to perform double-entry bookkeeping in WHMCS does not exist.",[15,7695,7697],{"id":7696},"challenge-5-no-legally-compliant-order-form","Challenge 5: No Legally Compliant Order Form",[11,7699,7700],{},"The standard order forms in WHMCS do not contain all the required legal information, such as the withdrawal declaration and privacy policy. This can lead to legal issues since certain information is legally required on order forms in Germany.",[11,7702,7703,7705,7706,7711],{},[85,7704,7608],{}," One option is to manually implement checkboxes. Another solution is offered by the checkout form from ",[690,7707,7710],{"href":7708,"rel":7709},"https:\u002F\u002Fmarketplace.whmcs.com\u002Fproduct\u002F1410-whmcs-kassenformular-fur-deutschland-und-osterreich-das-kassenformular-hilft-dabei-die-rechtssicherheit-mit-whmcs-gewahrleisten-zu-konnen",[694],"Hosting Station 55",", available for €14.95 per month or €199 per year.",[15,7713,7715],{"id":7714},"challenge-6-only-english-email-templates","Challenge 6: Only English Email Templates",[11,7717,7718],{},"WHMCS email templates are only available in English by default and need to be translated at length. This can cause communication problems with customers who do not speak English or only speak little English.",[11,7720,7721,1028,7723,7728],{},[85,7722,7608],{},[690,7724,7727],{"href":7725,"rel":7726},"https:\u002F\u002Fwww.plambee.de\u002Fwhmcs-module\u002F",[694],"Plambee"," offers a German translation of the email templates. Installation is possible using copy-and-paste or as an automated script. The latter requires some technical know-how. The texts are available for €9.99 in Plambee's online store.",[15,7730,7732],{"id":7731},"challenge-7-whmcs-admin-area-only-in-english","Challenge 7: WHMCS Admin Area Only in English",[11,7734,7735],{},"The WHMCS admin area is only available in English by default, which can be problematic for employees who know little English. This can affect employee efficiency and productivity.",[11,7737,7738,1028,7740,7743],{},[85,7739,7608],{},[690,7741,7727],{"href":7725,"rel":7742},[694]," offers a German translation of the WHMCS admin area.",[15,7745,7747],{"id":7746},"challenge-8-little-integration-of-german-payment-providers","Challenge 8: Little Integration of German Payment Providers",[11,7749,7750],{},"WHMCS does not offer standard integration with German payment providers like SOFORT or Giropay. This can affect customer satisfaction and loyalty, as customers may not be able to use their preferred payment methods.",[11,7752,7753,1028,7755,7758],{},[85,7754,7608],{},[690,7756,7727],{"href":7725,"rel":7757},[694]," offers various payment providers such as SOFORT, Giropay, or Paysafecard as purchasable modules.",[15,7760,7762],{"id":7761},"challenge-9-gobd-violation-with-late-fees-setting","Challenge 9: GoBD Violation with Late Fees Setting",[11,7764,7765],{},"WHMCS adds late fees to existing invoices, which is a violation of the GoBD. This can lead to legal issues and fines.",[11,7767,7768,7770,7771,108],{},[85,7769,7608],{}," A free code snippet by Dennis (Plambee.de), published on the WHMCS forum, resolves this issue by creating an extra invoice for late fees. The in-house WHMCS system must remain deactivated as otherwise, the fee calculation is doubled. The code snippet can be found ",[690,7772,7775],{"href":7773,"rel":7774},"https:\u002F\u002Fwww.whmcs-deutschland.eu\u002Findex.php?thread\u002F506-hook-rechnung-f%C3%BCr-mahngeb%C3%BChr\u002F",[694],"here",[15,7777,7779],{"id":7778},"challenge-10-credit-system","Challenge 10: Credit System",[11,7781,7782],{},"The WHMCS credit system can be confusing for customers in Germany and complicates accounting. This can lead to errors in bookkeeping and affect customer satisfaction.",[11,7784,7785,7787],{},[85,7786,7608],{}," It is recommended to disable this feature.",[15,7789,7791],{"id":7790},"challenge-11-no-av-contract-integration","Challenge 11: No AV Contract Integration",[11,7793,7794],{},"Without AV contract integration, data protection issues can arise for providers. This can lead to legal issues and fines as data protection is strictly regulated in Germany.",[11,7796,7797,1028,7799,7802],{},[85,7798,7608],{},[690,7800,7727],{"href":7725,"rel":7801},[694]," offers an AV module that allows customers to independently create and download the contract through the customer center. The AV contract itself is not included and must be inserted manually. The module can be purchased for €59.95 or rented for €6.99 per month.",[15,7804,3592],{"id":3589},[11,7806,7807],{},"In summary, using WHMCS in Germany presents some challenges. Fortunately, for most of these challenges, there are solutions that allow WHMCS to be used effectively and legally in Germany. It is important to be aware of these challenges and solutions to ensure that your company can take full advantage of WHMCS while complying with German laws and regulations.",[11,7809,7810],{},"We hope this article helps you use WHMCS better in Germany. If you have any further questions or need support in implementing these solutions, please do not hesitate to contact us.",{"title":56,"searchDepth":57,"depth":57,"links":7812},[7813,7814,7815,7816,7817,7818,7819,7820,7821,7822,7823,7824],{"id":7599,"depth":57,"text":7600},{"id":7624,"depth":57,"text":7625},{"id":7655,"depth":57,"text":7656},{"id":7675,"depth":57,"text":7676},{"id":7696,"depth":57,"text":7697},{"id":7714,"depth":57,"text":7715},{"id":7731,"depth":57,"text":7732},{"id":7746,"depth":57,"text":7747},{"id":7761,"depth":57,"text":7762},{"id":7778,"depth":57,"text":7779},{"id":7790,"depth":57,"text":7791},{"id":3589,"depth":57,"text":3592},"\u002Fimg\u002Fblog\u002Fwhmcs-deutschland-herausforderungen.webp",{},"\u002Fblog\u002Fen\u002F2025-04-04-whmcs-deutschland-herausforderungen",{"title":7591,"description":7596},{"loc":7827},"blog\u002Fen\u002F2025-04-04-whmcs-deutschland-herausforderungen","xkhxX_pMy4BJXot3BS_OQysaJPdpb_LlXlDYMuwfBOI",1774864246046]