Reliable data protection.

Started by Alekset, Jul 04, 2022, 07:00 AM

Previous topic - Next topic

AleksetTopic starter

Shared hosting is what you need to protect your data. Modifications and rates are different. Blog 5 GB NVMe Disk 2 Isolated FTP Sites, Databases and Domains. I'm leaning more towards Noble
30 GB
NVMe drive
ten
isolated sites
FTP, DB and Domains
465 ₽ per month
  •  

Doncaster

I can fully agree with you. I also use shared hosting. Thus, the data will be 100% protected. If the site is isolated, then there is no way to hаck it.
  •  

admissioninfo123

Any information security begins with physical protection. Hosting servers are located in secure data centers. Only employees have physical access to them. In addition, data centers are protected from power outages and equipment failures, have special ventilation and fire extinguishing systems. All important nodes are reserved: if one fails, it will be replaced by a backup.

Isolation of web hosting services
A single server can host many web  hosting services that have been ordered by different clients. But each of them has access only to their own files. The basis for that is the rights distribution mechanism provided by the Linux operating system.

Every file and directory in Linux can be configured to read and write. Access is separately configured for:
file owner;
user groups that the owner belongs to;
everyone else.

An SSL certificate (Secure Sockets Layer) is required for the HTTPS protocol to work. Thanks to the certificate, the data exchange between the client and the server is encrypted. SSL also confirms the authenticity of the web site to which the user connects. And today it is a mandatory element of every modern resource.

For any site hosted by REG.EN you can order and install an SSL certificate of the certification center you like, including a free one from Let's Encrypt, or get a certificate from GlobalSign for free for 1 year along with the domain.

In the web site code, as in any program code, there may be vulnerabilities through which it can be infected with malware. It is important to notice the infection in time and take action. To do this, you need an antivirus.

The user's files are scanned daily, and if malware is found, the user will receive a notification about it with recommendations for further actions.
In addition to checking and notifying, the antivirus can "treat" infected files — remove malicious code from them and restore damaged areas. Despite the capabilities of the antivirus, there are situations when files cannot be cured. In that case, you need to restore the web site from a backup.
  •