Managing Security Groups in AgileCLOUD Using Horizon

Introduction Security groups in OpenStack act like traditional access control lists, working at the networking (virtual switch) level, rather than the instance level, allowing or disallowing traffic to flow between any two point based on a set of criteria, executed in the form of IP filter rules. Security groups are created per project and contain […]

Read more →

Illegal, Obscene and Harmful Content

Internap’s Acceptable Use Policy (“AUP”) prohibits Customers (and any third party who uses the services through or on behalf of a Customer) from publishing, transmitting, distributing or storing content, material, information or data that is illegal, obscene and harmful, among other things. Prohibited content includes: · Illegal activities. Any activity that violates a law, rule […]

Read more →

Copyright and Trademark Guide

Issue Description Copyright infringement is the unauthorized use or distribution of works that infringe upon the copyright holder’s exclusive rights. Using Internap resources to use or distribute copyrighted works is prohibited by our Acceptable Use Policy. Recommended Resolution All access to the allegedly infringing material should be removed and the material may not be made available again unless a […]

Read more →

Guide to CryptoPHP Infections

Description of Issue CryptoPHP is a threat that uses backdoored CMS (such as Joomla, WordPress, Drupal etc.) themes and plug-ins to compromise webservers on a large scale. By publishing pirated themes and plug-ins free for anyone to use instead of having to pay for them, the CryptoPHP actor is social engineering site administrators into installing […]

Read more →

Malicious URL Troubleshooting and Guidelines

Issue Description Usually the hosting of malicious content is not intentional and is instead the result of a vulnerability of a service (such as a website, a user account etc.) or the operating system.  Malicious content must not only be removed but the method used by third parties (such as exploiting an unpatched software, weak permissions, […]

Read more →

OpenSSL vulnerability – The Heartbleed Bug

Description: The Heartbleed Bug is a very serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the internet for applications such as web, email, instant messaging (IM) and some […]

Read more →

Guide to Chargen Amplification Issues

What is Character Generator Protocol? The Character Generator Protocol (CHARGEN) is a service of the Internet Protocol Suite defined in RFC 864. It is intended for testing, debugging, and measurement purposes. A host may connect to a server that supports the Character Generator Protocol on either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) […]

Read more →