31
May
Banner Grabbing
Introduction Banner Grabbing is collection of the information related to your website such as webserver information, header information and open ports. Banner grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. An intruder can use banner grabbing in order to find... Read More
31
May
Content Change Monitoring Scan.
Introduction Content Change Monitoring (CCM) is a webpage service which monitors the changes made in web pages of the website. ESDS VTMScan instantly sends alerts if there is any change takes place in the content of the concerned web page. It helps in dealing with hacking and zero-day attacks quickly and efficiently. It is important... Read More
31
May
GHDB – Google Hacking Database
Introduction The Google Hacking Database (GHDB) is a categorized index of Internet search engine queries designed to uncover interesting, and usually sensitive, information made publicly available on the Internet. In most cases, this information was never meant to be made public but due to any number of factors this information was linked in a web... Read More
31
May
Malware Scan
Introduction Malware is short for ‘malicious software’ that performs unwanted action on websites and webservers and steals sensitive data such as credit card numbers or other personal information (identity theft). Malware can actually affect your livelihood if you use your website for business. Think about it, if you visit a site once and you see... Read More
31
May
Domain Reputation
Introduction Domain reputation is reputation of domain in World Wide Web. If the domain is suspected of containing malicious code, harmful programs, or is a suspected phishing site then it gets blacklisted. If the domain is blacklisted then Google will keep that domain away from people and the will affect the SEO of that domain.... Read More
31
May
Content Management System Scan
Introduction CMS is a Content Management System that is used to develop websites/blogs. Some of the most popular CMSs are WordPress, Joomla, and Drupal. Multiple themes and plugins are used in CMS to develop a website and many times these themes and plugins are vulnerable. If you’re using the vulnerable plugins and themes then your... Read More
30
May
Proactive Approach: The key to drive success
Proactive & Reactive Approach For many businesses, the default approach to customer service is to respond to clients/events after a problem arises. This reactive method might satisfy the customer and solve the problem temporarily, but it won’t surprise or delight them. Instead, imagine if you could solve problems even before customers have to call you.... Read More
23
May
Guaranteed Seamless Migration from any cloud to ESDS
Seamless Migration from any cloud to ESDS Seamless Migration is the process of moving user’s server data and configuration from virtual machines to virtual machines and servers to servers across Data centers by Cloud service providers. Enterprises can accelerate their cloud migration journey with eNlight Cloud as it not only integrates with legacy systems and... Read More
16
May
The Shift in Cloud Scalability
eNlight Cloud’s Vertical Autoscaling is bringing about a Great Shift in cloud scalability! If you google search the term ‘cloud’ you shall get fewer number of links to natural clouds in your search results. Technology evolves from the necessity of finding better solutions to problems, and the shift from traditional IT to Cloud has... Read More
10
May
Project Green Connect- An environment friendly initiative by ESDS
Introduction Earlier when a user used to co-locate a server in a data center, they used to face many concerns regarding uptime, power, network, cooling and support. Now-a-days the user is also focused on the data center environment while hosting a server. As per a study carried out recently, the power consumed by data centers... Read More