Call us +1-231-421-7160

Cloud Hosting

A Little Background

Today we are going to focus on how a website works, share an overview of a hosting environment, and explore some other aspects of how a website functions.

Back in the old days, a website was a simple text document located in the server’s files. HTML let webmasters define the formatting on a website with the flexibility comparable to an advanced text editor, such as MS Word and allowed them to display images, and eventually other media.

Read more

affiliateblog1.jpg

Our Affiliate Program offers 30% recurring commissions on all hosting product purchases. So, every time your client makes their renewal payment (monthly or annually) for their website, you get a 30% commision! Here are some basic instructions on how to sign up:

Read more
Posted by

GDPRblog.jpg

The European Union has implemented a new law called the General Data Protection Regulation - GDPR for short - to help protect personal data of EU citizens. As a company that has many clients in the European Union, we have taken this very seriously and took steps to make sure that our service is GDPR compliant, which means many good things for our clients, not only from the EU but from all around the world.

Read more

meltdown-spectre.jpg

What's the big deal? 

Around the world 2018 started out with a bang… and the tech-world was no exception! Two major vulnerabilities (Spectre: CVE-2017-5754, CVE-2017-5753 and Meltdown: CVE-2017-5715) were disclosed. These vulnerabilities affect the underlying hardware found in most of the worlds devices. This includes most phones, tablets, computers and web servers.

Read more

In the last few days, we have seen questions regarding the recently released ImageTragick vunerabilites. We began working to patch and protect the CloudAccess.net platform shortly after the vunerability was announced. Here are a few commonly asked questions that we have seen.

What is ImageTragick / CVE-2016–3714?

ImageTragick is the internet nickname that was given to CVE-2016–3714 to help spread the word of this vulnerability to end users and the media. It features a website and a logo and is a pun based on "ImageMagick".

Read more