Web Security

Web Security is designed for the customers who want us to resolve any hackers attacks. We will remove the malicious code and prevent it's return.

Without Web Security, the site administrator must remove the malicious code by themselves. 

When a malware is found, the infected file will be automatically blocked. This may cause a partial or complete downtime of the website. The downtime then persists until the webmaster removes the malicious code from the source code.

 


 

Terms and conditions - Web Security

Web Security can be activated for both new and already running hosting packages.

Web application must be hosted on ACTIVE 24 servers. Web Security is not provided as a third party service and cannot be outsourced.

The service will only be activated for hosting that does not contain suspicious files and the domain, nor the hosting aliases, are not listed on the Google blacklist.

If we have already notified you of the presence of malware, or the website's security has already been broken, it is necessary for the site administrator to remove the malicious code or you may order the Web Security Express service.

Web Security is provided after we the payment for an invoice which is generated during the service activation request.  

Invoice is sent to the contact e-mail address or it can be found in the Customer Center section payments and invoicing  Payments and invoicing.

The service is intended for unlimited hosting packages and VMS subservers, it can be activated only on hosting with Linux operating system.



How to activate Web Security

You can activate the Web Security in the Customer Center. You can use the link to a quick installation, where you simply choose the hosting where you wish to activate it.

If you do not have hosting with us, you can order the most favorite hosting package Complete with Web Security.
 

NOTE: Web Security is activated after the payment. The service is designed for unlimited hosting packages and VMS subservers, it can be activated only on hosting with Linux operating system.


Detailed walk through:

  1. Use your login credentials to log into Customer center. Or you can ask for a new password
  2. After logging in, select the virtual server where you wish to activate Web Security  (Servers and hosting/Details/Server settings).
  3. In the server Detail, click the Activate Web Security button. Please accept the Terms and conditions.   
  4. Activation will be made after the payment. You can pay for it directly from the Customer Center in the Payments and invoicing section or by following the instructions sent to your contact email.
  5. You will receive a confirmation email once the service is established. The Web Security label appears next to the hosting name in the Server overview for every hosting using Web Security service.


Administration and History overview

Every first day of the month we will send you a Web Security report, in which you will receive brief overview about the security of the monitored hosting of the last month. 

Daily results can be found at any time in the Customer Center in the Web Security History overview. 

Detailed walk through:

  1. To view daily reports of the Web Security, log in to the Customer Center.
  2. Choose the hosting where the service is already up and running  (Servers and hosting/Details)
  3. In the Server settings section, you can find the Web Security, click on Detail.
  4. Here you can see the status for the current day. In the History,  you can view results for all the scans made for your hosting.


What is malware?

Websites are attacked through known security vulnerabilities, which are often revealed in old versions of content management systems such as WordPress and their non-updated plugins.

It means that someone use exploits to uploaded malicious code to your web files. This code then can be used to send out spam or modify Website's content. From words malicious software become word Malware.

Usually is malware add to an existing file. If the infected file is deleted, the website may be partially or completely damaged.

 



What Google blacklist do?

Google blacklist is a public domain list that refers to domains abused for malicious activities. The domain is listed if is it used for sending a spam or the website is abusing/publishing the visitor's private data, etc.

If a domain appears on a Google blacklist, the website with that domain will no longer appear in Google search results.

Blacklists are also checked by Internet browsers. If you try to visit a blacklisted site, you will receive a security warning and the webpage will not be displayed at all.

If the domain appears on a Google blacklist, we immediately request to be removed and we will try to fix the issue which caused the domain to be written to the blacklist.
 



Web Application Firewall

Web Application Firewall is enhanced with a list of suspicious IP addresses within Web Security.

Most of these IP addresses are used by automatic systems to break in website data through known security breach and upload malware to the web.

If a website visitors use a suspicious IP address, they are denied access to the website.

This approach protects the web content against robots trying to misuse known exploits of old versions of content management systems (WordPress, Joomla, Drupad, etc.) or scripting languages (PHP, ASP), etc.
 



Web Security Express

If you do not use Web Security to protect your website, and the site will be exploited, the site administrator must remove the malicious code.

If you don't know how to remove malware, you can use the one-time cleanup service Web Security Express.

Removing malware from an insecure page may require a complex process of identifying infected files, so we recommend contacting our customer support with an authorized request.

The Web Security Express service does not include daily malware scans, other features of the classic Web Security are not included.