Skip to main content

Jail Host is now enabled by default for all new hosts

Introduced to our web hosting platform more than a year ago, the Jail Host functionality has brought a new dimension to the concept of site security.


By 'jailing' the 'germ' within the limits of a given host, Jail Host prevents it from spreading out to the rest of the account,offering extra protection against intruders who have managed to infiltrate
into the system

Now the Jail Host option is enabled by default for all newly created hosts to double protect them from intruders.


How does the Jail Host option work?

The main purpose of Jail Host is to
outsmart eventual intruders.

Even though security solutions are
getting more and more reliable, hackers seem to always be one step ahead of the game. The truth is that no universal painkiller for hack attacks has been invented yet.

This is where the extra Jail Host barrier can come in real handy.
If an intruder does manage to break into a website, if Jail Host is enabled, they will not be able to move to another host and spread their malicious activity.
Here is an illustration of how the Jail Host feature basically works:

As you can see in the figure above, the Jail Host-enabled domain is practically isolated from the other hosts in the /www directory within the same hosting account.

This prevents intruders from using the host as a doorway to the rest of the system in the event of an attack.
The tight encapsulation works at the Operating System level, which
guarantees its efficiency in all possible hacking scenarios.

By ensuring a segmental level of
protection, the Jail Host feature offers an innovative approach to keeping a hosting environment clean of smart intruders.
This way, even if one of your hosts
succumbs to an attack, you will have the rest of your content fully intact.

What will happen to already added hosts?

If you already manage domains with us,you can enable 'jail host' protection for them from the Hosted Domains section of the Web Hosting Control Panel.

In the Actions column of the table of
hosted domains, search for the Edit host option:

You will find the Jail host option at the bottom of the Edit host form:
Just tick the box and click on the Edit Host button to complete the action.

The Jail host functionality is supported on all web hosting services, which are compatible with the Hepsia Control Panel including cloud hosting packages,
Virtual Private Servers, semi-dedicated servers and dedicated servers.
http://www.josidelhosting.com
www.josiahdele.blogspot.com

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...