Illegal websites should not initiate any form of manual service requests to our staff. It is strictly prohibited to use honmau Media's technical support services and products to engage in any illegal activities. If discovered, no technical support will be provided.×
Current location:home
The following are the results of the system search: with keywordssecurityarticle

Alibaba Cloud was blastedsecurityVulnerability, all machine rights, all user information may have been disclosed

Just as Alibaba Cloud was promoting its data security in a high-profile manner, a major security incident occurred! On September 1, multiple cloud hosting forums and discussion groups exploded. The reason was that Alibaba Cloud, the largest cloud hosting service provider in China, had another major security incident, and system commands and executable files were deleted from a wide range of users

detailed+
2017-12-09

Notice on the real-name certification requirements for honmau Media's business

According to the provisions of the Cybersecurity Law, in order to implement the real-name certification requirements of the Ministry of Industry and Information Technology in 2017, circumvent illegal and illegal information, and ensure that business user information is true and effective. honmau Media received a notice from its superiors that in order to respond positively, all the company's businesses must undergo "real-name certification", virtual hosting, fast cloud VP

detailed+
2017-11-21

honmau Media officially launches HTTPS on its entire sitesecurityencryption technology

honmau Media recently officially launched HTTPS links across its entire site. The global trusted website-EV International certification uses a 40-bit to 256-bit adaptive symmetric encryption algorithm and a 2048-bit RSA public key (asymmetric encryption algorithm). When visiting honmau Media's official website, the browser address bar will display green

detailed+
2016-12-14

How to uninstall cloud locks on linux servers

Cloud Lock is a security management software released by security vendor Jiaotu Technology. Currently, after upgrading our company's linux wdcp system to the latest version, we will be prompted to install this software. Note: If you are not familiar with linux systems and do not understand cloud locks, please do not enable it. 1. wdcp can log in directly in wdc

detailed+
2016-10-15

wdCP v3 cannot access the site phpmyadmin solution

The v3 version of phpmyadmin connection and access has made major adjustments. It no longer uses direct background access methods, but uses the front-end WEB address to access the default access address such as http://ip/pma_xxx For security reasons, xxx is randomly generated.

detailed+
2016-07-08

What kind of virtual host to choose for novices?security

Choose what kind of virtual host is safe. 1. Server operating system: UNIXLINUX's security performance is much higher than that of the WINDOWS family, but UNIXLINUX can only install platform software such as PHPJSP, and the operating interface is not as friendly as WINDOWS;

detailed+
2015-03-05

Emergency: GHOST CVE-2015-0235 vulnerability and emergency repair methods

Regarding this vulnerability, security researchers have recently exposed a serious security vulnerability called Ghost (GHOST), which can allow attackers to remotely obtain the highest control privileges of the operating system, affecting a large number of Linux operating systems and their distributions on the market. The CVE number for this vulnerability is CVE-2

detailed+
2015-02-01
Message Board
* Contact customer service for urgent issues
submitted
submission
Working days: 8:30 - 22:00 Online QQ

customer service

Company Introduction
top