If you like DNray Forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...

 

Balancing privacy and security when using VDS

Started by praktik_man, Sep 13, 2022, 08:48 AM

Previous topic - Next topic

praktik_manTopic starter

Can you launch a DDoS attack on your own VDS hosting? The basic protection provided simply detects atypical activity, but more complex DDoS protection is an additional option for additional safeguarding. However, it's important to note that basic protection doesn't protect you, but instead safeguards other websites on the same hosting platform that could be affected by an attack on your site.



In terms of unauthorized access to your virtual machine, the hosting company won't be able to see anything beyond the guest OS, unless there's an authorized appeal to support with an explicit transfer of the right to look inside at the time of solving the problem. However, in cases of Microsoft audit, the company may need access to all machines where their products are located.
Encrypted VMs can provide an added layer of security, but there's no 100% guarantee that a skilled attacker wouldn't be able to obtain the encryption key.

Regarding mining protection and spam protection, the hosting provider does provide protection against heavy computing and mailing to the client base, respectively. However, they may not automatically detect and stop Chia or other cryptocurrencies tied to disks. The support team typically responds within 15 minutes, but sometimes an explanation of the activity's purpose or its technical implementation is necessary, which may conflict with desired privacy.

Atypical disk activity is often associated with incoming or outgoing DDoS attacks, which falls under basic protection, including mining for that type of cryptocurrency.

When renting a server with a large disk and immediately moving a large backup there, the security systems won't trigger immediately. The first 20 GB will pass normally, but if aggressive read/write (90/10) continues, then limitations will be imposed. However, you can continue if you inform support in advance or after applying protection. The main objective is to ensure that one client's resource usage doesn't affect others, but it's difficult to detect indirect signs.

While compressing patch cords manually may have been common practice in the past, it's no longer done.

When using an RCN-approved VPN, it's expected to maintain the same blacklist as providers without VPNs. However, connecting to another unknown RCN raises questions about the logic of the whole action.

In terms of watching аdult content at work via VDS without the admin noticing, it's possible, since the admin only sees traffic before the VDS web hosting. However, there's always the risk of a paranoid admin having tools to monitor corporate computers or take screenshots every few minutes. This is rare, but it can happen.
  •  

hieronymusf01

Clients have different preferences when it comes to data storage. One example is a miner who has exhausted all available energy in their home, office, and country and needs to move their equipment to a mining hotel in a data center with ample reserve electricity. In addition, some clients may require access to a repair area or round-the-clock access to their hardware, making a local data center essential. However, some companies choose foreign placement, as some countries offer lower risks for data storage.
  •  

Ghazala

Most servers use only 5-10% CPU or less, with RAM being the primary resource for a variety of loads. It's reasonable to expect tariff plans and service providers with at least a 1:10 processor oversubscription, or even higher. In fact, it's common for more expensive plans to offer no oversubscription. Renting a dedicated server is a special case where all resources are exclusively yours for a fee. Additionally, dynamic clouds that support automatic relocation of virtual machines may have even higher oversubscription ratios, such as 1:100.
  •  

selearnerlive

A colleague suggested that instead of seeing it as 2 cores, it should be viewed as 'up to 2 cores,' which would have been a more accurate description. Although the market is highly competitive, it's important to provide honest descriptions of services offered, since the market is also large enough to attract buyers for every type of service.

While $7 per year is a great deal, it's likely offered by OpenVZ. However, for a virtual machine at $7 per month (with only 1 core, 512 MB of RAM, and 10 GB of storage), it's a blatant scam that can't be justified. Such practices seem like unethical business tactics from the past decade, and it's crucial to keep prices reasonable and transparent to maintain customer trust.
  •  

amiaramiara

I will share my top hosting sites that I use to this day:

Bluehost – hosting #1 in the world
Hostgator – powerful hosting for any websites
Web.com – the best hosting for business websites
  •  

naughtymonkey

Balancing privacy and security when using a Virtual Private Server (VPS) involves several considerations. Here are some key points to consider:

1. Strong Security Measures: Ensure that your VPS provider has robust security measures in place, such as firewalls, intrusion detection systems, and regular security updates. This helps protect your data from unauthorized access or attacks.

2. Encryption: Implement end-to-end encryption for your communications and data. This ensures that even if someone gains access to your VPS, they cannot read or use your data without the encryption keys.

3. Access Controls: Control access to your VPS by using strong authentication methods, like multi-factor authentication (MFA), and restrict access to only trusted individuals. Regularly review and revoke access privileges to prevent unauthorized access.

4. Regular Backups: Backup your data regularly, either locally or on secure cloud storage. In case of any security breach or data loss, you can restore your information and minimize potential damage.

5. Privacy Policies: Understand and review the privacy policies of your VPS provider carefully. Ensure that they align with your data protection requirements and that they adhere to relevant regulations, such as GDPR or CCPA.

6. Data Minimization: Minimize the amount of personal or sensitive data you store on your VPS. Only keep what is necessary for your operations, reducing the risk in case of a data breach.

7. Secure Configuration: Adjust the configuration of your VPS to ensure it follows security best practices. Disable unnecessary services, close unused ports, and regularly update your software to patch known vulnerabilities.

8. Monitoring and Auditing: Use monitoring tools to track and analyze activities on your VPS. This helps identify any suspicious behavior or security breaches promptly. Consider implementing log analysis and intrusion detection systems.

9. Regular Updates: Stay up-to-date with the latest security patches and updates for your operating system, software, and applications running on your VPS. Regularly applying these updates reduces the likelihood of vulnerabilities being exploited.

10. Educate Users: Educate yourself and any users who have access to the VPS about security best practices and potential threats. This includes practices like using strong passwords, avoiding phishing attacks, and being cautious with suspicious links or email attachments.

By implementing these measures and regularly reviewing and updating your security practices, you can strike a balance between privacy and security when using a VPS.
  •  

Corwin

Launching a DDoS attack on your own VDS hosting is possible, but the basic protection will detect atypical activity and safeguard other websites on the same hosting platform. However, this protection doesn't shield your site from attacks. It's essential to opt for more complex DDoS protection for added security. I'd recommend encrypting VMs for an extra layer of security, but it's crucial to understand that no security measure is foolproof. The hosting provider's mining and spam protection are decent, but they might not detect Chia or other cryptocurrencies tied to disks.
  •  


If you like DNray forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...