Thursday 29 December 2016

Facebook Admits Handing Thousands Of Its Users Details Over To British Authorities

Facebook Admits Handing Thousands Of Its Users Details Over To British Authorities Social media giant Facebook has confessed to giving the personal details of thousands of its users to the British government this year. Facebook says that officials requested access to 7,199 profiles between January and June of 2016 – a 30 percent increase on…
Facebook Admits Handing Thousands Of Its Users Details Over To British Authorities

FREE 30 Day Trial Period No Credit Card Information Required


We at Evostrix Web Hosting offer FREE 30-Day Trial Period For All Web Shared Hosting Packages and our Semi-Dedicated Servers Hosting, during which you can evaluate our services at your....
FREE 30 Day Trial Period No Credit Card Information Required

Tuesday 27 December 2016

Where Can You Obtain Reliable Web Hosting Solutions?

Discovering a shared hosting vendor offering cut-price, top-quality hosting solutions is a dream everyone has. However, there still are a small number of web hosting companies, which measure up to this description – a description, which appears unrealistic to some extent. One hosting services provider that offers an ideal mixture of cheap prices and top-class quality of the hosting solutions on offer is us at ‘Evostrix Web Hosting’. We may be not very popular at the moment, as we create our cloud web hosting platform in-house. At the....

Continue Reading:
Where Can You Obtain Reliable Web Hosting Solutions?

Thursday 8 December 2016

Live Chat Support And An Info Brochure Added For 30-Day Trial Accounts – Update

A few months ago we introduced a 30-day Free Trial option to our platform, giving prospects the chance to evaluate our services at their leisure before committing to our web hosting services.
To better communicate the value of this option to customers, we’ve added a Live Chat module and an info brochure inside their Web Hosting Control Panel.

What are the new Free Trial updates about?

To reflect the new 30-day Free Trial option, we’ve implemented a major update to the themes, as well as to the order procedure itself.
Instead of completing the signup procedure on our store, the clients are sent to the Control Panel where they are presented with two options: to take advantage of the 30-day free trial period or to finish the registration process on the spot.
Prospects’ acquaintance with the Free Trial option represents a key step in the signup process, which is why we’ve expanded our free trial coverage campaign, adding a detailed brochure and a Live Chat service.
The info brochure – In the dialog box that will come up right after they have logged into the Control Panel for the first time, prospects can see an overview of the Free Trial option, which is now complemented by a PDF brochure.
The brochure elaborates on the main benefits of the Free Trial option and the features included with each Free Trial account.

The Live Chat service – If our customers have questions about the available information or just prefer to communicate instead of reading, they can get in touch with our Sales Department in real time even though their accounts are still in trial mode:

Visit Evostrix Web Hosting Today – Try Our Free 30 Days Trial



Tuesday 6 December 2016

A New ICANN Policy Is Now In Force

ICANN – the Internet Corporation for Assigned Names and Numbers, has enforced a new policy that affects all Whois updates regardless of whether a change of registrant or just a simple Whois modification is taking place. The policy is effective December 1, 2016.
The new policy has been imposed on all registrars and, as an ICANN-accredited registrar, we’ve taken all due steps to implement it throughout our system.
The implementation will affect all domain registrants who attempt to make modifications to the Whois contact information of their domain names  (.COM, .NET, .ORG, .BIZ or .INFO). This includes changes to the registrant’s name, organization or email address.

What is the new policy about?

ICANN’s new policy represents an essential revision of its Inter-Registrar Transfer Policy (IRTP), which covers the authorization procedures registrants need to pass through prior to initiating a transfer.
The new revision also covers the process of transferring domain ownership from one registrant to another, which now entails a series of confirmation and notification emails.
In addition to transfers, the new policy revision also affects simple Whois data updates, which may include changes to the registrant’s first name, last name, organization or email address.

How will the new policy affect registrants?

The new policy has introduced a few significant changes to the Whois management process, which can be summarized as follows:
  • registrants will no longer be able to make simple modifications to their Whois data with a click of the mouse;
  • any changes made to the first name, the last name, the organization or the email address, will now trigger an email confirmation procedure;
  • the procedure includes obtaining confirmation from both the current and the new registrant before the change is completed;
  • after the Whois update has been completed, the current and the new registrant will receive a confirmation email informing them that the change is reflected in the Whois database;
  • whenever a Whois modification has been implemented, the associated domain will enter into a 60-day transfer-lock period;
  • if a Whois change is made before initiating a domain transfer, the present registrant will be able to opt out of the 60-day lock, so that the domain can be transferred to the new registrant as soon as the Whois update confirmation procedure has been completed;

How does the new policy work?

The newly revised policy will come into effect every time a change is made to the Whois data, be it a registrant change or a simple Whois modification. Here are the steps involved in the Whois update procedure on our platform:
  1. The domain owner submits a Whois modification request;
  2. We send a Whois update confirmation request to the new registrant, asking them to approve or to decline the change of registrant;
  3. We send a Whois update confirmation request to the current registrant, asking them to approve or to decline the change of registrant; In the event of a transfer, we give the current registrant the option to opt out of the 60-day transfer lock that is imposed on a domain after a Whois update is confirmed. This way, they will be able to initiate the transfer as soon as the Whois update request is confirmed;
  4. Once the Whois change has been approved by the registrant(s), we will complete the update and send a final confirmation to both the current and the new registrant notifying them of the completed process. No further response is required from the registrant(s) at this point.
In case the current or the new registrant does not approve the change within 5 days of receiving the update confirmation request from us, the latter will be terminated and the current Whois information will not be modified.
NOTE: Even if the registrant just wants to make a correction to their name or organization, for example, the policy mandates that we send two separate emails in this case as well.
The afore-described Whois update confirmation procedure will not affect ID-protected domain names.
To make this possible, we have changed our Terms-of-Service agreement.
Of course, we will always opt out of the 60-day transfer lock on behalf of the given registrant, allowing transfers to take place.

Evostrix Web Hosting

Monday 5 December 2016

9 Proven Tricks To Protect Your WordPress Site From Attacks

WordPress is one of the most popular CMS solutions available today. As such, it is being used by a very large number of websites on our network.
However, its popularity among users also means that it’s extremely popular amongst hackers as well.
Here are 9 proven tricks to protect your WordPress site from attacks:

1. Choose a strong password

This is valid not only for WordPress, but for any online service where you have to log in. Choose a long password that has both lowercase and uppercase letters, numbers and, if allowed, special symbols. WordPress has a built-in password strength meter when setting up a new password and here is a guide on how to create strong passwords.

2. Create custom login URLs

During every WordPress installation, the same default login URLs are created. This makes it easier for attackers to locate them and launch a brute-force attack to gain access. You can thwart them by using custom login URLs. You can use the ready-made Custom Login URL  plugin for exemple.

3. Change the ‘admin’ username

During the installation, WordPress sets up an ‘admin’ username by default. If someone wants to access your WordPress site and your username is still the default one, the attacker’s job is already half done.
To fix that, once you have installed WordPress, create a new user with admin privileges. Then, log out of your current session and log in with the new username and password you have set up. Then, delete the default user. If you have created any posts, make the new user their owner.

4. Limit the login attempts

A brute-force attack involves a script attempting to log into your account by using numerous username/password combinations. A very simple way to stop such attacks is to limit the number of login attempts. You can use the WP Limit Login Attempts plugin for exemple or any other.
If your site is hosted with us, you are already protected by the mod_security Apache module we have. It blocks users who make more than 10 login attempts within 1 minute and is enabled by default.

5. Limit the access to the admin area by IP address

If you are the only person who needs to log into your admin area and if you have a static IP address, you can deny access to everyone except yourself to the wp-admin folder using an .htaccess file.
Create a file called ‘.htaccess’ using a plain text editor or simply edit the existing one (if any) and add:
# Block access to wp-admin.
order deny,allow
allow from x.x.x.x
deny from all
Here, ‘x.x.x.x’ is your IP address. You can add multiple IP addresses by adding the line ‘allow from x.x.x.x’ in accordance with the number of IPs you wish to whitelist.

6. Limit the access to the admin area by IP address

You can also limit the access to the wp-login.php file via an .htaccess file.
Create a file called ‘.htaccess’ or simply edit the existing one (if any) in the /wp-admin folder and add:
<Files wp-login.php>
Order allow,deny
Allow from x.x.x.x
Deny from all
</Files>
Here, ‘x.x.x.x’ is your IP address. You can add multiple IP addresses by adding the line ‘allow from x.x.x.x’ in accordance with the number of IPs you wish to whitelist.

7. Hide the admin area from bots

Add the following lines in the robots.txt file or create a file named ‘robots.txt’ with the following content:
User-agent: *
Disallow: /wp-admin
Disallow: /wp-login.php
Disallow: /administrator
This will essentially block search engines from indexing these URLs, as brute-force attackers generate lists of such URLs (intitle: Log In and inurl: wp-login) namely with the help of the major search engines.
This is a long-term prevention method, as it will take a few months for the search engines to update this information, but it should make brute-force attempts disappear for good.

8. Protect yourself from spam comments

On a different note, if you are receiving a large number of spam comments on your WordPress site, you can disable the comment option by doing the following:
Go to yoursite.com/wp-admin/options-discussion.php and uncheck ‘Allow people to post comments on new articles’.
You WILL need to go to all the existing posts and to turn off the comments there as well.
If you still want people to be able to comment, you might consider making them register first. In that case, check the box ‘Users must be registered and logged in to comment instead’.

9. Keep WordPress and your plugins up to date

This may sound trivial, but there are a lot of users who simply forget to update. Each new update brings security improvements and is considerably more secure than the previous one. And WordPress is under very active development, so security patches are released frequently. You can use the WP Updates Notifier plugin to notify you when there are available updates for your themes, plugins and the WordPress core.

Evostrix Web Hosting
Evostrix Web hosting Blog News

Sunday 4 December 2016

The Dirty COW Linux Exploit Patched Successfully

It has been some time since the nightmarish Poxy and Poodle vulnerabilities scared Internet users out of their wits, and now the web faces a new security exploit – a Linux kernel flaw bearing the ‘user-friendly’ name “Dirty COW”.
Dirty COW represents a privilege-escalation vulnerability that hackers can exploit and do harm to web servers using any Internet-connected device.
We’ve managed to address the issue on time and apply the necessary patches to our Linux-based system.

What is the Dirty COW security bug about?

In fact, the Dirty COW vulnerability is not new, at least not to Linux’s founder Linus Torvalds who admits to having uncovered it 11 years ago.
A bug fix patch was released in due time, but 3 years later it was undone by another security fix, leaving the Linux kernel vulnerable to network attacks for a period of 9 years. It was not until a couple of days ago that the ‘dirty’ Linux kernel threat re-surfaced online again.
According to Red Hat, the Dirty COW security flaw has left the Linux kernel vulnerable to unprivileged users who want to gain root access in order to increase their privileges and compromise the given server’s security.
This allows local users to gain write access to read-only memory mappings and hijack an Internet-connected device within practically a few seconds.
It is namely the broken copy-on-write (COW) mechanism in the Linux kernel that the flaw has been named after.

Evostrix Web Hosting

Evostrix Web Hosting Blog News