We often take it for granted that we are being protected by our web hosts' security mechanisms. This article points out the number of threats that are being fought by your web hosting provider on a daily basis, to secure your website and emails.
All of us want a safe web hosting experience, especially if our business and confidential information is being regularly transacted. We often take it for granted that we are being protected by our web hosts' security mechanisms. But have you ever stopped and wondered what all threats are you insulated from? This article points out the number of threats that are being fought by your web hosting provider on a daily basis, to secure your website and emails.
Viruses and Malware
While this may seem quite common, you may surprised at how neglected this area of security is. When your local computer is at risk, you jump to take action, but when the threat is not very proximate, procrastinating the scan is more popular. Web hosts need to regularly scan mail, especially with attachments, to prevent the spread of viruses and malware over the internet. Your control panel should be having a virus and malware scanner which the admin can use to scan the hosting account. Port Scans
Attacks on various network ports to see if any service can be easily accessed is common for a web host. Seeing the logs of some servers will surprise you, with ports scans being done every few seconds to check if the server is improperly configured or there is a vulnerability which can be exploited. We hosts use firewalls to determine and block suspicious activity to keep the server and network safe.
Brute Force
Brute Force attacks are also very common, especially no mail servers. The attacker tries various username and password combinations to try and get hold of an email account. Once the email account is compromised, the attacker can send out spam and mass mail without disclosing his own identity. Email servers are bombarded every few seconds with brute force attacks on random accounts or even non-existent accounts. While the success rate maybe very low, even one successful email account being exploited can result in the sending out of thousands of mails.
DoS Attacks and Flooding
Denial of Service Attacks and Flooding is usually targeted towards a popular website or high-traffic portal. In these types of attacks, the attacker attempts to flood the website with dummy requests so that the site becomes overloaded or inaccessible. These attacks are mainly to harass the users and visitors of a website or just as a show of strength by the attackers. Web hosts use Firewalls, DNS Services and even special Network Hardware to thwart these attempts. DoS attacks can also come from multiple sources and IP Addresses and flood the victim server called a Distributed Denial of Service Attack or DDoS. Similar mechanisms are used to counter these attacks too.
Runaway Scripts and Bad coding
Some website owners like to experiment and try their hand at coding. This experimentation can be quite detrimental to other users on a live server. To prevent other users from being deprived of the shared server resources, webhosts often rate limit accounts which show such misbehaviour. This helps to balance the load on a server and prevents a single account from consuming all the resources like RAM and CPU. Another threat that web hosts need to deal with is SQL Injection. Often bad coding on a website leads to the entire database and website being split open by attackers. Usually these websites do not have any really confidential information (or else they would have been coded better) to be stolen from the database, but no web host likes to have a compromised account on his network. Web Application Firewalls are used to prevent such type of attacks before they happen. Even if your website is badly coded, low level attacks are automatically prevented at the server level.
Will Free Web Hosting Ever Become A Reality?
There may not be such a thing as free lunch, but there maybe a lot of people touting free web hosting services these days. This means that your website files will reside on a server for which there are no charges. But doesn't that sound too suspicious? It may sound odd, but there is definitely a catch to it. This article explores the possibility of having free web hosting services use alternate forms of revenue generation.Want To Host A Blog? What Does Blog Hosting Need To Have?
Starting a blog is pretty simple, but the challenge is in keeping it rolling and keeping the updates coming. This means that you need to dedicate some time, effort and energy apart from the initial money that you need to put in. This article deals with what are the basic essentials you need to start a blog for personal or business use.How Can You Encrypt Your Emails? Anti-Spying For Beginners
Your emails contain very important records of your life and may also contain traces or indications of various events. Even though you may have "nothing to hide", there is no reason why you should want a total stranger to have any information about you. Even if you are not the target of a terrorist group, you may become easy prey for a script kiddie who just wants to be a nuisance.