For the most part, people from all over the world want to have a top-notch website. In order to get your website done, there is no need to spend a good deal of time on building your website. Actually, there is a wide range of online-projects that you can launch these days. You may dream of getting a stylish blog, user-friendly eCommerce online-project or eye-catching business website. In all of these cases, a ready-made website template can turn out to be your perfect assistant.
As you can understand, an impressive website means a lot in the 21st century. Read More
To follow up with our latest article, besides CBT Locker Ransomware affecting WordPress websites, this past month many internet users experienced another well known ransomware program called WannaCry. This malicious program would encrypt files by adding .WCRY to the end of the files. Those affected were threatened to pay a ransom of $300 in bitcoins. If those infected did not comply the amount would double eventually leading up to the deletion of the infected files.
As of May 12th, Europe experienced the worst of WannaCry. The United Kingdom was a huge target suffering major losses in their healthcare industry. Read More
Plesk has recently added a few Plesk Toolkits that might have a massive influence on your customer experience. Here is a breakdown on what’s new.
Lets get started!
This toolkit is one of the most outstanding features of them all. First and foremost, it utilizes the world’s most popular CMS, WordPress. Plesk describes it as, “the most complete, secure and versatile toolkit for WordPress.” The most notable CMS feature is its user-friendliness and simplicity; the Plesk WordPress toolkit takes that even further. Read More
Two Factor Authentication is a super effective and easy to setup security measure. This cPanel feature provides an additional layer of security by requiring a code authentication upon a successful login attempt. So, after logging into WHM with the correct username and password, you would be prompted to input a code generated by an authentication application like Google Authenticator. In this blog post, we will help you activate Two-Factor Authentication and explain the benefits of using it.
The initial process begins in your Web Host Manager (WHM). Read More
Without a GUI, servers must be configured and operated through SSH, which requires extensive knowledge of command line syntax. Control panels provide a centralized and intuitive way to manage your servers.
InterServer’s customized control panel is designed for maximum usability and cost savings. While competitors often charge additional fees for control panel access, Bread Basket allows users to easily deploy hundreds of cloud applications at no extra cost. Read More
You may have become familiar with our InterShield blog posts. It has become a special security series of ours which serves of high importance to us and Web Hosting our customers. Due to its ongoing success and popularity, we have decided to describe the step by step process of which InterShield follows.
A request to access a website comes in, someone has entered http://domain.com into a browser.
Using litespeed web-server and the RBL rule, Interserver InterShield queries our own internal RBL blacklist. This blacklist contains known bad ips; ips that have been blocked for bad activity, hacking, uploading malware and a number of other activities. Read More
InterServer’s InterShield system is able to stop many attacks and updates daily based on new data including new possible malware, known exploits and other Common Vulnerabilities. However, sometimes even with all these a new type of malware comes up.
In a recent case a site was redirecting to a pharmacy website but only when coming from a google search engine result. The site initially passed all scans of known vulnerabilities, the url did not exist in the code or database and it was reproducible. In this cases advanced debugging is needed. Read More
The month of February brought yet another scare to the hosting world. A WordPress vulnerability was exposed which allowed hackers to initiate what is known as a denial of service (DoS) attack on ones website. Ultimately, under a DoS attack, your website becomes unreachable by anyone including you. The technical understanding of performing the DoS attack is rather simple.The flaw begins under the well-known “/wp-admin” directory. Every WordPress site is assigned this path as an administrative source. It was discovered that while loading this path there exists a script which fetches a number of JS/CSS files. Read More
You may have heard of terms like Meltdown and Spectre in recent tech news. Both exhibit a hardware vulnerability exposed by a small team in Austria. Through software, both are able to access private data on a server, but how is this possible? The vulnerability begins at the most inner core of a computer, the Central Processing Unit (CPU). By observing micro processes and transactions, these programs were able to access other parts of the computer that may not be relevant to the actual programs running. Read More