Christmas 2016

19. December 2016 News 0
Thank you for your continued support and for the confidence that you have placed in us. The Holiday Season is here and we have a gift for you!. Drop us an email at info@hostingahead.com to place new orders and grab your gift before it’s too late! Offer valid till end of this December

G-suite for India

28. November 2016 Default, News 0
There is no question on Google’s reliability.  Earlier google was providing email and another services such as calendar drive, GTalk, Google docs under the label “Google Apps. Now google has used another term called G-Suite and this covers all of these awesome services. Business Email Every company need business email though there are still companies ...

CloudLinux 7.3 update for older kernels

22. November 2016 News, Security 0
Official announcement from CloudLinux  Are you running an older kernel? This might cause server crashes during CloudLinux 7.3 update. Here is how to upgrade safely. During the recent update to CloudLinux OS version 7.3, some servers have crashed due to a race condition between kmem uncharge and charge reparenting. The issue is not present on ...

UNDERSTANDING RANSOMWARE ATTACKS AND HOW TO PREVENT THEM

We all started to hear about ransomware attacks when they first became popular in 2005. However, the first instance of a ransomware attack goes back to as far as 1989. Although this malicious practice started taking place in Russia, it has been international for quite a long time now, much to the dismay of everyday ...

Block Ransomware

What is Ransomware ? Let me give you quick answer on what is Ransomware.  You open some email attachment, or install some program from a infected website which eventually encrypt all your important files. For example  some ransomware may encrypt your word file, excel file, photo etc. Now if you try to open these files, ...

Fix ImageMagick vulnerability

ImageMagick, an open-source image processing software suite, has released versions 7.0.1-1 and 6.9.3-10 to address a vulnerability in previous software versions. Exploitation of this vulnerability may allow an attacker to take control of an affected system. Evidence : http://arstechnica.com/security/2016/05/exploits-gone-wild-hackers-target-critical-image-processing-bug/ https://www.us-cert.gov/ncas/current-activity/2016/05/04/ImageMagick-Vulnerability You can fix it by edit policy.xml file. Add following lines to policy.xml file <policy ...