Security

Practical guide to protecting your business from ransomware based on real incidents. We cover multi-layer defense, backup configuration, server setups, and action plan during infection.

11.04.2025
1 042
Knowledge base / Site protection / Security
Site protection: what is it

Some details about the "Site Protection" service in THE.Hosting: why a user needs it and how requests are filtered.

23.01.2025
2 325
Knowledge base / Terminal / Security / Windows
How to Create an SSH Key on Windows

SSH keys are a powerful tool for securing remote connections. They are used for authentication and data encryption when working over SSH. Unlike traditional passwords, SSH keys provide a much higher level of protection, as their mechanism avoids transmitting confidential data over the network.

03.01.2025
1 501
Knowledge base / Security
How to Restore a WordPress Website After a Hack

A hacked website is always a source of stress, especially if the issue is discovered too late. The site can end up on search engine blacklists and be flagged as “unsafe,” which leads to a significant drop in traffic, sometimes to almost zero. Restoring the site to normal operation is a lengthy process, and search rankings may suffer greatly. Let’s look at a proven and effective way to restore a website after a hack.

02.01.2025
2 202
Knowledge base / Security
Overview of Services for Protection Against DDoS Attacks

DDoS attacks can paralyze company websites, leading to financial losses and reputational damage. Smart technologies help minimize the impact of such attacks. We've compiled a selection of the best solutions for countering DDoS attacks so you can choose the optimal tool for your business security.

11.11.2024
12 807
Knowledge base / Security
Backup: insurance for your digital world

The term "backup" means creating a duplicate copy of important files and folders. It is not just a simple copying process, but a strategically important process

08.06.2024
39 931
Knowledge base / Security
ARP scanning of the Linux local network

It is often necessary to know which devices are connected to the Linux local network. This is necessary if you want to connect to one of the PCs and have no clear idea if its address is the same, or if you just want to make sure that your network is secure or not and find all hidden devices.

13.07.2021
14 845
Knowledge base / Security
Searching for vulnerabilities on the website

Site testing allows you to find vulnerabilities and bugs that can be exploited by attackers. If you are a site administrator, we recommend adding penetration testing to your list of tools and regularly searching for vulnerabilities to ensure your sites are fully secure. The issues discovered will help you to fix weaknesses.