We're testing four PCI scanning vendors to find the best fit for user-friendliness, cost, and reliability. Here's how ControlScan, ScanAlert, Comodo HackerGuardian, and SecurityMetrics compare in their sign-up processes and initial impressions.
Before choosing software, research its security history using tools like Secunia. Check how quickly vendors fix issues and watch for recurring problems. Unresolved critical vulnerabilities are red flags worth investigating further.
Testing PCI compliance for Plesk control panel using multiple vendors to find the most reliable, cost-effective solution. Goal: identify best scanning tools and establish procedures for out-of-the-box PCI-compliant servers.
Technical Services Archive
April 29, 2008
3 min read
Major companies passed PCI compliance yet suffered massive data breaches. PCI certification is just a starting point—small businesses must encrypt data end-to-end, limit access, and maintain secure systems to truly protect customer information.
Technical Services Archive
April 28, 2008
2 min read
rackAID partners with SoftLayer to offer managed dedicated servers, combining reliable hardware with expert support. Features include 24-hour deployment, KVM remote access, VPN security, and no hardware markup—just transparent management fees.
Technical Services Archive
March 28, 2008
4 min read
Experiencing hundreds of bounce messages for emails you never sent? You're likely a backscatter victim—where spammers forge your address as the reply-to field. Here's how to identify and minimize the problem.
Technical Services Archive
February 18, 2008
1 min read
Missing Plesk domains? They're still there! The search box above the domain listing saves the last query, showing only filtered results. Simply click "Show All" to the right of the search box to restore your complete domain list.
Technical Services Archive
January 25, 2008
1 min read
rackAID wins Web Host Magazine's 2007 Editor's Choice Award for Excellent Linux Server Support. We're expanding in 2008 with new staff, products, and services to deliver faster response times and cutting-edge solutions to our clients.
Technical Services Archive
November 30, 2007
2 min read
Hackers are using cron jobs to automatically relaunch malicious processes like IRC bots on compromised servers. Even after killing these processes, they respawn within minutes. Solution: Add the apache user to /etc/cron.deny to prevent this persistence technique.
Technical Services Archive
October 15, 2007
2 min read
When a server crashed due to bad RAM with no replacement available, memory mirroring came to the rescue. By enabling RAID-like protection for memory, the system ran stable with half capacity until proper repairs could be made.