Welcome to UltratechHost Forum, Guest. Please take the time to register if you haven't, or click

Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Online Users
There are currently 5 online users.
» 0 Member(s) | 5 Guest(s)

Latest Threads
Redirect HTTP to HTTPS au...
Forum: Hosting Tutorials
Last Post: UltratechHost
10-29-2016, 07:48 PM
» Replies: 0
» Views: 2,435
Added Let’s Encrypt SSL f...
Forum: Announcements
Last Post: UltratechHost
10-29-2016, 07:42 PM
» Replies: 0
» Views: 2,035
Install CentOS Web Panel ...
Forum: Hosting Tutorials
Last Post: UltratechHost
05-23-2015, 09:09 PM
» Replies: 0
» Views: 9,134
Enable Remote Desktop on ...
Forum: Windows Tutorial
Last Post: UltratechHost
05-15-2015, 11:15 PM
» Replies: 0
» Views: 5,027
How to Install Linux KVM ...
Forum: Virtualization
Last Post: UltratechHost
05-15-2015, 09:47 PM
» Replies: 0
» Views: 2,122
UltratechHost.CoM - Germa...
Forum: Announcements
Last Post: UltratechHost
05-15-2015, 09:09 PM
» Replies: 0
» Views: 2,521
VENOM: QEMU vulnerability...
Forum: Announcements
Last Post: UltratechHost
05-14-2015, 12:39 AM
» Replies: 0
» Views: 2,279
Cloud VPS Hosting Service
Forum: Announcements
Last Post: UltratechHost
05-13-2015, 11:55 PM
» Replies: 0
» Views: 1,923
Protect Your Bandwidth Fr...
Forum: Hosting Tutorials
Last Post: UltratechHost
05-13-2015, 09:54 PM
» Replies: 0
» Views: 1,833
Install memcached And lib...
Forum: Hosting Tutorials
Last Post: UltratechHost
05-13-2015, 09:52 PM
» Replies: 0
» Views: 1,895

 
  Added Let’s Encrypt SSL for Shared/Reseller Hosting Customers
Posted by: UltratechHost - 10-29-2016, 07:42 PM - Forum: Announcements - No Replies

Dear Customer,

We are pleased to inform you that UltratechHost (Ultra Web Solutions®) has been added Let’s Encrypt SSL (Free SSL Certificate Option) for its Shared/Reseller Hosting Customers.

Now Customer can install Let’s Encrypt SSL Certificate within cPanel and they don't need to purchase SSL certificate from external vender.

Regards
Management Team
Ultra Web Solutions®

Print this item

  UltratechHost.CoM - Germany/Netherlands/USA Cloud Servers Hosting from 18Euro/Month
Posted by: UltratechHost - 05-15-2015, 09:09 PM - Forum: Announcements - No Replies

UltratechHost Cloud servers allow you to build architectures requiring a virtual network quickly and easily. Netherlands Cloud VPS

Delivered in your own network, they give you private and free communication between servers. Our Public Cloud is a flexible, scalable, and highly redundant virtualized hosting platform. Now you can focus on what you’re really good at. Our public cloud is ideal for a variety of workloads, including testing and development, email and web hosting.

Standard Included:
Choice Of Linux/Windows OS
1Gbps Virtual Network
1 IPv4 address
SLA: Best Effort
Full Root/Administrator Access

Packages:
Iron
1Core Virtual CPU
1GB Virtual RAM
40GB Disk Space
1Gbps (Virtual) Network
200GB Traffic
€ 18/Month
Order Now

Bronze
2Core Virtual CPU
2GB Virtual RAM
60GB Disk Space
1Gbps (Virtual) Network
200GB Traffic
€ 30/Month
Order Now

Silver
4Core Virtual CPU
4GB Virtual RAM
80GB Disk Space
1Gbps (Virtual) Network
200GB Traffic
€ 45/Month
Order Now

Gold
8Core Virtual CPU
8GB Virtual RAM
160GB Disk Space
1Gbps (Virtual) Network
200GB Traffic
€ 75/Month
Order Now

Print this item

  VENOM: QEMU vulnerability (CVE-2015-3456)
Posted by: UltratechHost - 05-14-2015, 12:39 AM - Forum: Announcements - No Replies

A very serious security problem has been found in the virtual floppy drive QEMU's code used by many computer virtualization platforms including Xen, KVM, VirtualBox, and the native QEMU client. It is called VENOM vulnerability. How can I fix VENOM vulnerability and protect my Linux server against the attack? How do I verify that my server has been fixed against the VENOM vulnerability?

This is tagged as high severity security bug and it was announced on 13th May 2015. The VENOM vulnerability has existed since 2004, when the virtual Floppy Disk Controller was first added to the QEMU codebase. Since the VENOM vulnerability exists in the hypervisor’s codebase, the vulnerability is agnostic of the host operating system (Linux, Windows, Mac OS, etc.).
  

What is the VENOM security bug (CVE-2015-3456)?


Quote:An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller (FDC) handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the hosting QEMU process.

This issue affects the versions of the kvm, xen, and QEMU packages while VMware, Hyper-V, and Bochs are unaffected. This issue affects all x86 and x86-64 based HVM Xen and QEMU/KVM guests, regardless of their machine type.

A list of affected Linux distros
  • RHEL (Red Hat Enterprise Linux) version 5.x, 6.x and 7.x
  • CentOS Linux version 5.x, 6.x and 7.x
  • OpenStack 5 for RHEL 6
  • OpenStack 4 for RHEL 6
  • OpenStack 5 for RHEL 7
  • OpenStack 6 for RHEL 7
  • Red Hat Enterprise Virtualization 3
  • Debian Linux code named stretch, sid, jessie, squeeze, and wheezy [and all other distro based on Debian]
  • SUSE Linux Enterprise Server 10 Service Pack 4 (SLES 10 SP3)
  • SUSE Linux Enterprise Server 10 Service Pack 4 (SLES 10 SP4)
  • SUSE Linux Enterprise Server 11 Service Pack 1 (SLES 11 SP1)
  • SUSE Linux Enterprise Server 11 Service Pack 2 (SLES 11 SP2)
  • SUSE Linux Enterprise Server 11 Service Pack 3 (SLES 11 SP3)
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Expanded Support 5, 6 and 7
Fix the VENOM vulnerability on a CentOS/RHEL/Fedora/Scientific Linux
Type the following yum command as the root user:


Code:
yum update

or

yum update qemu-kvm

Fix the VENOM vulnerability on a Debian/Ubuntu Linux


Code:
sudo apt-get clean
sudo apt-get update
sudo apt-get upgrade

Print this item


226Posts 225Threads 2Members
Latest member UltratechHost.sales