Update (Oct. 2016): Stop the Hacker is no longer available or offered in the DreamHost panel. Only users who previously purchased this product are able to view and use this product. We now offer Malware Remover, a paid service that will ensure your website is free of malicious code. For information on how to enable Malware Remover, please visit our Knowledge Base here.
DreamHost has NOW added StopTheHacker to its Trusted Partner program as an additional way for customers to get the best possible protection for their Websites hosted with us. StopTheHacker is billed as “everything you need to protect your website and online reputation,” and we tend to agree.
That’s why we’re doing two important things for you:
- Providing Reputation & Blacklist Monitoring absolutely FREE!
- Giving you, for a limited time, an introductory offer to buy one year of the Professional version and get an additional year FREE! That’s two years for the price of one!
Now that’s a can’t-go-wrong kind of offer, and one that helps ensure things don’t go wrong with your online life.
This all sounds great, but what is StopTheHacker, and why will I want it?
StopTheHacker has a broad suite of website healthcare services that safeguard your websites, helping prevent, detect and recover from a hacker attack. Services include:
- Detection of malware that Antiviruses miss
- Automatic Cleanup
- Blacklist & Reputation Monitoring
- Uncovering security vulnerabilities
- Installation-free startup
- Protection of your business and revenue stream
The software catches malware using Machine Learning (ML) and Artificial Intelligence (AI) techniques. The technology is supported by the National Science Foundation (über nerds!) and has won multiple awards since 2009. StopTheHacker protects website owners, ranging from large multi-nationals to web hosting companies and small business owners. No matter how big – or small – you are, you’ll benefit from StopTheHacker’s smart services.
Why does your site get blacklisted?
More than 6,600 new websites are added to the Google malware blacklist every day. Blacklisting occurs as a result of getting hacked, and web-malware code getting injected into the website, without the permission from the website owner. Most of these hacked –and subsequently blacklisted– websites are legitimate businesses, online portals, academic sites, entertainment outlets and more. In order to protect web surfers, security companies, search engines, browser manufacturers prevent users from visiting these compromised sites.
How do websites get hacked?
Websites get hacked and compromised in a number of ways, including:
- Poor choice of passwords (Brute Force attacks) – Lots of website owners use simple passwords. Consider the fact that in a large-scale password analysis study in 2011, 123456 was found to be one of the most common passwords used. Users should also try to set up non-trivial user names, such as av21bx instead of Alex.
- Insecure FTP connections, password sniffing – A plethora of infections are injected into websites after the password and username used to connect to a site using FTP are sniffed by a silent trojan/rootkit that’s been embedded on a website administrator’s computer. Once passwords and username are obtained, they’re passed on automatically to an IRC chat room where a master controller accesses the website and starts to infect it with web-malware.
- Web-Application vulnerabilities – A lot of websites use web 2.0 functionality, primarily to iterate with users. The functionality can be in the form of letting users blog, post comments, sign up for newsletters, fill out a support form, start a live chat session and more. These are all avenues for a malicious hacker to inject malicious code into a website.
- Server level vulnerabilities – A large number of webservers run vulnerable software such as easily hack-able FTP servers etc. Many times, even though website and server administrators know about vulnerabilities in the server software, they forget to patch these security holes and then get hacked. These issues are primarily related to server set up and configuration. Improper permission settings also allows malicious hackers to gain access to files they shouldn’t access.
- Third party add-ons – A growing trend is the use of third party add-ons into websites to provide more interesting functionality on a site, such as dynamic IP geo-location, image resizing and others. These third party pieces of code may harbor vulnerabilities that the original website owner may not be aware of.
How can DreamHost help?
Well, we’ve got over 15 years of experience battling web security assaults, so who better to know a good product?, And that’s why we make StopTheHacker easy to get! You can browse options HERE , or go right to your DreamHost control panel HERE and sign up. It’s that simple to take advantage of great offers on this smart software!