Chris,

Thanks for actively posting a positive comment. :)  I agree that a
host being pro-active and up-front is a good thing.

Natalie,

Looking up reports about the host is something I do in cases like
yours where there's a small number of pages, all apparently HTML-only,
with no evidence of underlying PHP, database query activity, or web
applications like WordPress. That is, the most common avenues of
infection are absent.

Finding a lot of discussion about a particular host getting hacked
(especially the "mass attacks" rather than individual sites) is
unusual, but it's just one piece of evidence indicating that more
investigation is worthwhile. That investigation would include
searching forums for recent (not old) posts that might indicate you
are only one of many people experiencing problems *currently*. It
could also include locating the domain names of other sites on your
server (your "neighbors") and discovering whether any of them are
simultaneously experiencing the same problems you are (badware flag,
for example).

In other words, finding those reports online doesn't really justify
jumping to the conclusion:
> I will ask ipower web to come
> clean with me about the issues that they must have had

Has this been an ongoing recurrent problem since last May?  If so,
there are other ways a site can get compromised besides the most
common ways listed above (PHP code, etc.).

Do a thorough antivirus and antispyware scan on your computer to make
sure nothing is grabbing your login IDs and passwords as you log in to
your site.

If you use a wireless internet connection, make sure it's encrypted so
no one can eavesdrop.

Use strong random passwords so no one can guess them.

However, your site isn't flagged today, so apparently something has
changed at least for now, but if this problem has been coming and
going for months, that's a real concern.

In your control panel, turn on "log archiviing" so that your access
logs (both regular and FTP) are preserved and not discarded each day.
If there is another incident in the future, that will be your best
source of clues.

On Nov 22, 4:33 am, Chris Wright <[EMAIL PROTECTED]> wrote:
> NatalieLynn wrote:
> > Thank you Steve!!! I should of searched for ipowerweb and the
> > issue.... I was just so confused.... I will ask ipower web to come
> > clean with me about the issues that they must have had... I will also
> > talk with the shop and see if they want me to look into another
> > hosting company... Is there any recommendations?
>
> I'd personally stay with Ipower as they are one of the most pro-active
> web hosts when it comes to dealing with Malware.
> In the very early days of StopBadware they did get hit pretty hard with
> many 1000's of sites (servers) compromised, but they installed a mass of
> security to help prevent any future problems.
> Unfortunately, as is the same for ANY web host, they cannot control each
> and every users passwords and user names, and if a user installs their
> own blogging platform, they cannot control the level of security (as is
> the same for any application really).
> They do have some great scanning in place that reduces the amount of
> hacks, but keeping up to date with the latest and greatest is a massive
> effort..
> The point being, at least they try...
>
> They are also very upfront when you present them with the fact that your
> site has been hacked and will often work to try and put "things" into
> place to prevent it from happening again in the future thereby protect
> other users as well.
>
> They do have a number of tutorials available on their help site that
> provides instructions on how to reduce the chances of your site being
> 'hacked' but I don't have the link at present.
> If you do a search on their help pages for "malware" it should show up.
>
> I've dealt with a large number of web hosts over the years and iPower
> were by far the most upfront of the lot...
> Because iPower have a massive user base, there is always going to be a
> high proportion of negative comments, since in reality, people don't
> tend to actively post positive comments, i.e., they only complain when
> something goes wrong.
> As with any web host they have had their ups and downs, but I've had
> less headaches with them than any others... My biggest headache with
> them was support during the massive crossover to the new hosting
> platforms, but that seems to have settled down in recent months now that
> the process is all complete.
>
> But this is just my own personal experience which so far has been very
> positive with respect to Malware...
> I'd say "better the devil you know, than the one you don't"... IMHO of
> course...
>
> Regards
>
> Chris
--~--~---------~--~----~------------~-------~--~----~
You received this message through the Google Groups "stopbadware" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[EMAIL PROTECTED]
For more options, visit this group at
http://groups.google.com/group/stopbadware?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to