Hacker Newsnew | past | comments | ask | show | jobs | submit | j_lagof's commentslogin

Hint: Rackspace lost badly (21% of the sites they hosted got blacklisted in the last 90 days). Netsol won with only 1% of sites blacklisted...


The vast majority of websites that are inadvertently serving malware have been compromised through the website itself, which can happen totally independently of the web server software or the host.

About the best the host can do is have a reasonable IP blacklist, but even that doesn't stop nearly enough attackers. (My little mail server, hosting only around a dozen accounts, is currently averaging 14 new SSH bans per day for example.)

The only thing that a "secure" host guarantees is that a compromised website can not lead to a compromised server; attempting to measure that by checking the number of malware-hosting websites at a service provider is the wrong way to go about it.

All that said, if you want a "secure" host without spending a lot of money, your best compromise would be an OpenBSD VPS, and then either spend a lot of time learning how to set it up correctly (and maintain it), or have someone do it for you.

Having NetSol and GoDaddy on a list of potentially "secure" hosts is hilarious.

edit: I'd recommend checking the Sucuri Blog (http://blog.sucuri.net/) for an idea of who's been compromised and how they've responded. Sucuri's pretty good at keeping track of all this stuff.


I kinda agree with you, but when you see 21% at Rackspace, it shows that something odd is going on there (taking out hosting-specific attacks, the % should be the same everywhere).


Heh! I just added a link to your blog as a recommendation, before seeing your reply.

My guess is that more of the stuff at Rackspace is being admin'd by customers who don't know what they're doing, versus the managed shared hosting at other places.


Blacklisting alone don't tell if a hosting company is secure or not, but is a good indicator of how it is being perceived from the outside.


You mean yesterday?


Apple has been doing way worse things and nobody (of importance) seems to care.


It is funny that Windows is a proprietary platform and nobody (government) ever allowed them this kind of control/restriction.

Now Apple/Twitter/Facebook is going crazy and nobody does nothing...


The US vs. Microsoft case started in 1998 [1], but the investigation started all the way back in 1991. Given that the DOJ has just initiated an investigation into Apple over possible antitrust violations in online music sales [2], we can expect to maybe see a case in 2017 or so...

That said, there are many difference between the Windows platform and the iPhone. When the DOJ started investigating Microsoft in 1991 they did have a monopoly on PC operating systems, and (as the DOJ investigation found) was using this power to unfairly give Internet Explorer an edge.

The iPhone platform may command the lion's share of the attention in the smartphone market, it is nowhere near a monopoly [3, 4]. The same cannot be said about the iTunes Music Store [5]. It seems, however, that the investigation into Apple's practices are moving beyond music [6], so we'll see in 7 years time about "does nothing".

[1] http://en.wikipedia.org/wiki/United_States_v._Microsoft [2] http://topnews.us/content/221070-apple-under-doj-investigati... [3] http://mashable.com/2010/02/09/android-iphone-market-share/ [4] http://en.wikipedia.org/wiki/Smartphone [5] http://www.apple.com/pr/library/2008/04/03itunes.html [6] http://newsblog.thecmuwebsite.com/post/DOJs-Apple-investigat...

[Hope this wasn't too citation heavy, I tend to get a bit verbose when I am tired.]


OSSEC is a powerful open source HIDS. If you are not using it on your servers, you should be.


More like a lessons learned from the Apache defacement.


"Lessons learned from the Apache.org defacement of 2000" would have been a pretty good title. I still would have clicked, but my expectations would have been differently calibrated. As the title was written, I was expecting Apache.org to be, currently, defaced.


The "from 2000" is not really relevant -- all the same technologies are in use and are likely misconfigured in the same way. There are probably 100s of sites on the Internet that could be owned in the way the article describes.


It's relevant, as there is a very different level of interest in Apache.org being hacked 10 years ago, and today.


I agree! I jumped into the article when I saw apache.org defaced....


Very good article and awesome mention of OSSEC. Good to see it gaining some attention.


Very interesting research describing a simple way to detect which version a web app is running.

They just fingerprint a few css/js files, get their md5sums and create a list of them for each version...


Great initiative. Note that for 3l33t (severe) bugs found they will pay $1337 instead.


I agree, it is the same thing as buying a piece of land and waiting for the area to become more popular and sell later...

The issue comes from the fact that buying domains are very cheap and easy, but that's other problem.

*btw, I am not saying that I approve people with 1000s of domains just waiting for someone interested, but the business idea is the same.


Intentionally provocative question: So you think domain squatting is ethical if it's done occasionally and unsystematically, but not if it's done in an efficient and industrious manner?


If we use the real definition, it doesn't matter, if you break trademark law, you break trademark law.


Your definition doesn't match how I usually see the term used, so I don't understand how it's the real one. Sure, it's written into law that way, but legal jargon doesn't supersede actual widespread usage except in a legal context. When people say "domain squatting" or "cybersquatting," they mean speculatively buying and holding a domain with no intention of using it, hoping to sell it later when it becomes valuable to someone else. (And no, putting up a generic advertising search page does not qualify as "using" it for the purposes of this definition.)


Then what is 'using'? Please define it and think about the implications for domain name registrations at all levels.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: