Security

Reporting security vulnerabilities

Our company ACTIVE24 is constantly evaluating the risk of potential attacks on our services and takes them into account for both development and maintenance of the services as well as immediate response. We are focusing a large amount of our tech team capacity to secure our services. We are aware that the security of our services is not a static endeavor, but an ongoing process of re-evaluation, development and improvement, where the quick response to discovered weaknesses is the key. For that...

Web Security

Web Security is designed for the customers who want us to resolve any hackers attacks. We will remove the malicious code and prevent it's return. Without Web Security, the site administrator must remove the malicious code by themselves. When a malware is found, the infected file will be automatically blocked. This may cause a partial or complete downtime of the website. The downtime then persists until the webmaster removes the malicious code from the source code. - Terms and conditio...

Tips for your user password

In this article, you can find advice about how to work comfortably and safe with your passwords. Forget about the principles ordering you how many symbols your password should have and how often you should change your password. Those principles are outdated and contra productive. - Use a password manager (#manager) - Use a unique password for service (#unique) - Do not devise your passwords, generate them (#generate) - If you are sharing your password with anyone, verify their i...

SSL/TLS certificates and HTTPS

Normal communication on internet is not cryphered, the connection between computers can be easily listened to. By using SSL/TLS certificates the communication between computer of user and server, where websites are stored, is cryphered and can't be listened to or be modified on the way. Visitors of websites have certainty, that data send to server (names, passwords, credit card numbers etc.) are send only to website operator and no third part can access them during the communication. At the sa...

Email services protected by DANE protocol

Email services at ACTIVE 24 are protected by the DANE protocol. What does it mean? Both incoming and outgoing emails are encrypted during SMTP communication between mail servers whenever the counterparty supports it and automatically validates the validity of the certificate. If the certificate was not valid (for example, it was faked by a potential attacker), the email will not be delivered and the attacker will not get it. This effectively prevents not only the passive interception of postal ...

CAA record - certification authority autorization

CAA record type (Certification Authority Authorization) defines politics of SSL/TLS certificate creation on selected domain. The goal is to stop fake certificates creations and raise trustworthy of https connection with server. You simply specify which certification authority can issue the certificate, or who should be notified if someone attempts to issue the certificate unjustifiably. One CAA record define one certification authority. On one domain, there can be more records, which complemen...