DCNHost – DDoS Protected 200GB cPanel/WHM Master Reseller for $19/year & more in New York, USA!

Dean from DCNHost is back to share their new product offering with us. They are now offering launch specials on their new Master Reseller hosting services! Using the WHMReseller software, a Master Reseller account allows you to create both shared & reseller cPanel hosting accounts. For those who are seeking a VPS, they have also included some VPS specials below. We were told that all plans below include 10Gbps of DDoS protection by standard. If you decide to buy any of the plans below, we look forward to your feedback in the comments section below!

The below deals are part of a flash sale and are not listed anywhere else on their website. You must use the custom order links below in order to order. They accept Credit/Debit Cards, Alipay, PayPal, Bitcoin, Bitcoin Cash, Litecoin and Ethereum. You can find their ToS/Legal Docs here.

Here’s what they had to say:

“When it comes to hosting, there is no doubt that DCNHost is the perfect solution for you. We take pride in delivering what we promise to our beloved customers. 24/7 Customer service with industry top notch hosting engineers to help you anytime, anywhere. Our Mission is to focus more on customer challenges to provide them the best hosting solutions and services, and continuing to create maximum value for our customers. Our hosting platform is built on the latest technology and industry leading infrastructure providers that result in providing you with a smooth hosting experience – so you can rest easy at night knowing your applications are online!”

Here’s the offers:

Master Reseller 200GB

  • 200GB Storage
  • 3,000GB Bandwidth
  • Shared IP Address
  • Create Unlimited Shared Hosting Accounts
  • Create Unlimited Reseller Hosting Accounts
  • Unlimited Features (i.e. Email, FTP, etc)
  • cPanel/WHM Control Panel
  • WHMReseller Panel
  • CloudLinux Optimized Servers
  • One Click Install Scripts
  • Free Migrations
  • $ 19/yr
  • [ORDER]

Master Reseller 500GB

  • 500GB Storage
  • 10,000GB Bandwidth
  • Dedicated IP Address
  • Create Unlimited Shared Hosting Accounts
  • Create Unlimited Reseller Hosting Accounts
  • Unlimited Features (i.e. Email, FTP, etc)
  • cPanel/WHM Control Panel
  • WHMReseller Panel
  • CloudLinux Optimized Servers
  • One Click Install Scripts
  • Free Migrations
  • $ 35/yr
  • [ORDER]

VPS Special 1GB

  • 1 GB RAM
  • 1 CPU Core
  • 15GB SSD Storage
  • 1500GB Monthly Transfer
  • 1Gbps Port
  • OpenVZ/SolusVM
  • API Access
  • Full Root Access
  • $ 11.99/yr
  • [ORDER]

VPS Special 4GB

  • 4 GB RAM
  • 4 CPU Cores
  • 40GB SSD Storage
  • 5000GB Monthly Transfer
  • 1Gbps Port
  • OpenVZ/SolusVM
  • API Access
  • Full Root Access
  • $ 29/yr
  • [ORDER]

NETWORK INFO:

Buffalo, New York, USA (BUF1 Facility)
Test IPv4: 192.3.180.103
Test file: http://192.3.180.103/1000MB.test
Network Carriers: TeliaSonera, XO Communications, Hibernia Networks, Zayo

Host Node Specifications:

Master Reseller Hosting Servers:

– Intel Xeon E3-1240v3
– 32GB DDR3 RAM
– 4x 2TB Enterprise HDD’s
– Hardware RAID10 with LSI 9361-4i w/ CacheVault
– Redundant Power Supplies
– 1Gbps Uplink

OpenVZ VPS Nodes:

– Intel Xeon E3-1240v2 or greater
– 32GB DDR3 RAM or greater
– 4x 1TB Samsung 850 Pro SSD’s
– Hardware RAID10 with LSI 9361-4i
– Redundant Power Supplies
– 1Gbps Uplink

Please let us know if you have any questions/comments and enjoy!

NettaCompany – Dedicated Server – Fair Price – 16/64GB Ram – Free DDoS Guard – RDNS – WhoIS Permit!

[​IMG]

Customer Comments
: https://hostadvice.com/hosting-company/nettacompany-web-solutions-reviews/

NC-TR-Server-101 / Xenon E5 2620 – 2.50Ghz

  • 6 Core Processor
  • 16 GB of ECC RAM,
  • 1 TB of SAS disk
  • 1Gbit's Port
  • 200 Mbit's Hat
  • Unlimited Traffic
  • IP WhoIs & RDNS Recording
  • Free DDOS…

NettaCompany – Dedicated Server – Fair Price – 16/64GB Ram – Free DDoS Guard – RDNS – WhoIS Permit!

Why were hyperlink auditing pings used for DDoS attacks and not any other requests?

A few days ago this new story has been published:

Researchers have found that the HTML feature called hyperlink auditing, or pings, is being used to perform DDoS attacks against various sites. This feature is normally used by sites to track link clicks, but is now found to be abused by attackers to send a massive amount of web requests to sites in order to take them offline.
[…]
In new research by Imperva, researchers have found that HTML pings are being utilized by attackers to perform distributed denial of services attacks on various sites.

The article goes on describing the attack that basically executed some JS to add a link with ping attribute and automatically ”click every second”. It goes on in the same usual way describing that attackers are supposed to have “used social engineering and malvertising to direct users to pages hosting these scripts”.

Strangely it does not mention the victims, but just says these were “gaming companies”.


The question now is, especially considering they have used JS anyway, why did not they just use any other form of requests?

I admin, usual AJAX requests may have been problematic, as the attacked websites likely do not have CORS headers set, so they would have been blocked by the browser as they violate the same origin policy, but usually CORS does not apply to <img tags e.g.… So they could just have used that.

Why did they choose the ping attributes for that, and are they thus more dangerous than other (common) methods for DDoSing?

nginx no longer able to proxy a website that’s behind Cloudflare DDOS protection

I have a server set up with nginx that’s intended to transparently reverse-proxy a specific website that is not owned by me. Recently that website started using Cloudflare DDOS protection and I’m no longer able to access it using nginx.

From what I can tell, what’s supposed to happen is that I’ll access a page and receive a 503 from Cloudflare with its “DDOS protection” page. That page will then redirect to another URL containing encoded data, my browser receives a 302 response, and that will redirect to the page I’m trying to access.

What’s apparently going wrong though when this is proxied through my nginx server is that after the 302 direction, the page I’m trying to access will produce another 503. It will then get into an endless cycle of redirection. Apparently something that Cloudflare is trying to set up is not working, causing my browser to never get past its protection.

I’m still new to nginx and so far I haven’t figured out how to fix this.

Here is the nginx server configuration with any identifying information redacted:

server {     listen XYZ;      location / {         proxy_set_header Referer "https://target.website";         proxy_pass https://target.website/;         proxy_redirect https://target.website https://$  host:$  server_port;         proxy_set_header Accept-Encoding "";         sub_filter_once off;         sub_filter 'https://$  proxy_host' 'https://$  host:$  server_port';     } } 

Is there something I can change so that it will pass Cloudflare’s check?

Digitalbs | cPanel | £4.49 p/m | 100GB Disk| FREE Domain | SoftaCulous | DDOS Protection

We at Digital Business Solutions do not believe in overselling. We believe in quality & support.

Today we are introducing our new line of high performance shared hosting packages, with a powerful, all in one, control panel available for you to fully manage your website & databases from the client area.

Say goodbye to wait times:

As soon as your order is placed, your order will automatically be sent to be INSTANTLY provisioned.

Here is our Entry Level Hosting package, located in…

Digitalbs | cPanel | £4.49 p/m | 100GB Disk| FREE Domain | SoftaCulous | DDOS Protection

Cloud based solution to prevent DDoS attack on multiplayer game server?

I built an architecture below:

img

How does it work (and if it’s possible)

Assuming your game server currently runs on Node 1 and then Node 1 gets a successful DDoS attack. Your cloud system has automatically recognized big illegal traffic coming to your node, and automatically stops your server on node 1 and runs the same game instance on node 2 by moving the RAM from Node 1 to Node 2.

The problem is the game client, it knows just one IP it has to connect to, but what if you added a system to your client to detect disconnection and automatically try to move to the next node?.

Since all nodes connected to one database on a different server, that database server IP is anonymous and is only known for the nodes, so nobody really knows it’s IP to DDoS it.

Could that kind of an idea work in real life? or maybe corrected because I am really clueless about networking administrating.

When you move from Node 1 to Node 2, your system will remember all of the illegal traffic IPs and block them, it will know which of the traffic is illegal by analysing, so Node 2 will not receive connections from them anymore while Node 1 is null routing