SoftLayer Certified Partner

We receive a number of phone calls and emails for requests for quotes and for proposals as a SoftLayer Certified Partner.One may ask what does a SoftLayer Certified Partner do?While SoftLayer has a variety of Certified Partners, Dynamic Net, Inc. is a SoftLayer Certified Partner that specializes in server security and server administration.

Service Suspension

Imagine reading Service Suspension - Ongoing unanswered abuse complaints thinking to yourself, the person is in a jamb.... I hope they get someone who can really help them (maybe we could, not sure), then later on reading the person who initiated the post also runs a "All you can Eat" (i.e. unlimited support tickets, unlimited labor time) server administration business where they advertise a long list of what they can do for you for just $15.00 per month. I guess, they are so packed with work they could not solve their own problems.Imagine, for just $15.00 per month you "24/7/365 USA-Based Technical Support" plus "24/7/365 Server Monitoring (5 Minute Intervals)" of your servers plus "Guaranteed 15 Minute Response On Monitoring Alerts" and so much more... sounds like a great deal? Right?

WordPress Brute Force Attacks

If you asked me from September 2012 forward, the answer would change dramatically with WordPress Brute Force Attacks now exceeding 50% of all attacks being reported.If you review your or your hosting provider reviews your web site's access logs on a regular basis, you can tell if there are Brute Force attacks being attempted on your WordPress site by seeing multiple requests to access the file wp-login.php from the same IP address over and over again. Sometimes it might be a single request every x period of time; other times it might be scores of requests from the same IP address. By the way, are you or your provider regularly checking your web site access logs for abuse?How can you protect yourself against WordPress Brute Force attacks?

Extending Linux Socket Monitor

Linux Socket Monitor by R-fx Networks is a good, automated, tool to let you know if an application is creating TCP and UDP sockets.The caveat we’ve experienced over the years is that when you receive an LSM alert that might involve malicious malware or hacker activity on the server running LSM, you sometimes have milliseconds to log onto the server to hopefully catch the application opening sockets red handed. If you are delayed or the application just runs that fast, by the time you are on the server, the port closed and the application is now in hiding.I often agree necessity is the mother of invention, and I would like to share what we’ve done to extend the Linux Socket Monitor (LSM) to provide running process information, not just the netstat lines.