Managed VPS plans image

Virtual Private Servers, or VPS for short, are the ideal solution for businesses who need full access and control over their servers. They’re a cost-effective answer to dedicated servers, yet still yield similar results in terms of control and bandwidth. VPS are great because they are completely customizable,… Read More

How Secure is SSH - Really? image

Every day, millions of network administrators rely on the SSH (Secure Shell) protocol. SSH enables them to log in to servers remotely, tunnel into networking equipment and transfer files between different machines. For most of its life, SSH has been regarded as “impenetrable” by many security… Read More

VENOM vulnerability image

There’s a new vulnerability creating a buzz in the IT industry – particularly with respect to virtual servers. It’s called the Virtualized Environment Neglected Operations Manipulation, but you probably know it as VENOM. This vulnerability is exposing sensitive data and compromising shared computing resources by exploiting the weaknesses in… Read More

OSSEC Protection image

 

OSSEC is a popular host-based intrusion detection system (HIDS). One of the factors driving OSSEC’s popularity is that it is an open-source project, meaning that it’s available at no cost. Able to run on Windows, Linux, MacOS, Solaris, HP-UX and AIX, OSSEC is a HIDS that nearly everyone… Read More

What is DDoS?

 

We’ve all been there – that moment when your server’s traffic figures begin to spike. The steady rise in volume for what can feel like days with no sign of slowing down. Phone calls start coming in – customers having problems with your website. The server’s load time… Read More