Illegal, Obscene and Harmful Content

Internap’s Acceptable Use Policy (“AUP”) prohibits Customers (and any third party who uses the services through or on behalf of a Customer) from publishing, transmitting, distributing or storing content, material, information or data that is illegal, obscene and harmful, among other things. Prohibited content includes: · Illegal activities. Any activity that violates a law, rule […]

Read more →

Copyright and Trademark Guide

Issue Description Copyright infringement is the unauthorized use or distribution of works that infringe upon the copyright holder’s exclusive rights. Using Internap resources to use or distribute copyrighted works is prohibited by our Acceptable Use Policy. Recommended Resolution All access to the allegedly infringing material should be removed and the material may not be made available again unless a […]

Read more →

Guide to CryptoPHP Infections

Description of Issue CryptoPHP is a threat that uses backdoored CMS (such as Joomla, WordPress, Drupal etc.) themes and plug-ins to compromise webservers on a large scale. By publishing pirated themes and plug-ins free for anyone to use instead of having to pay for them, the CryptoPHP actor is social engineering site administrators into installing […]

Read more →

Malicious URL Troubleshooting and Guidelines

Issue Description Usually the hosting of malicious content is not intentional and is instead the result of a vulnerability of a service (such as a website, a user account etc.) or the operating system.  Malicious content must not only be removed but the method used by third parties (such as exploiting an unpatched software, weak permissions, […]

Read more →

OpenSSL vulnerability – The Heartbleed Bug

Description: The Heartbleed Bug is a very serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the internet for applications such as web, email, instant messaging (IM) and some […]

Read more →

Guide to Chargen Amplification Issues

What is Character Generator Protocol? The Character Generator Protocol (CHARGEN) is a service of the Internet Protocol Suite defined in RFC 864. It is intended for testing, debugging, and measurement purposes. A host may connect to a server that supports the Character Generator Protocol on either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) […]

Read more →

Detecting Malicious Processes in Linux

Warnings: Be sure you are satisfied with your backups before you make any changes to your server. Modifying any part of a server with administrative access may cause services to fail or the system itself to become unbootable.  Only experienced and authorized administrators should perform any steps outlined in this guide. It is very possible […]

Read more →