Unmask Parasites - Check your web pages for hidden links, iframes, malicious scripts, unauthorized redirects and other signs of security problems.
Loading site search ...

WordPress Experts Aim to Provide Secure WordPress Hosting

14 Dec 10   Filed in Hosting+Security with 1 Comment

This is the second interview in the “Hosting+Security” series.

WordPress – is the most frequently used tag on this blog. There are two major reasons for this:

  1. I use WordPress myself and closely track development in this area.
  2. WordPress is the most popular free open-source blogging engine (according to its developers it is currently used by 25+ million sites), which makes it equally popular for hackers as a target of their attacks.

Thousands (if not millions) of WordPress bloggers have already experienced various security related problems: malicious scripts and spammy links injected into their web pages, rogue users, corrupted databases — they know how much time and efforts it may take to recover their sites, and how it can be frustrating to find their blogs hacked again just a few weeks later.

In this interview, I will talk with Jason Cohen about WordPress security and his new WPEngine hosting company that aims to protect your WP blogs better than any traditional shared hosting provider.
Continue »»

Can Security Be Bread and Butter of a Hosting Provider?

29 Nov 10   Filed in Hosting+Security with 3 Comments

My first interview in the “Hosting+Security” category will be with Jim Walker of TVCNet.

I know Jim for quite some time. I met him in various forums where webmasters discuss security problems. A couple of months ago he started to advertise his malware removal service on my Unmask Parasites site. Before placing the ads, I did some background check and was impressed with their focus on security features and their looong list of signed testimonials.

To find out more about how a relatively small hosting provider can ensure security of their clients’ websites, I asked Jim to answer my questions and tell my blog readers about his company’s security practices.
Continue »»