RSS Feed
Knowledgebase : Domains4Less Website Security > SiteLock Threats and Recovery Process
A virus on your website is serious. If hackers have compromised your site, they may be using it to distribute virus-infected software to your visitors. You may never know that you are actually infecting the computers of your website visitors and customers...
The SiteLock Deep 360-Degree Site Scan is extremely comprehensive. It will look for a vast and constantly updated list of website security issues, including: * Reputation monitoring (malware, email, SSL verification) * Network security vulnerabiliti...
Our SiteLock 911 product offers an emergency fix when your website has been hacked. For a one-time fee SiteLock 911 will immediately scan your website files for malicious code, automatically remove that code from your files and then upload replacement cle...
After running your Deep 360-Degree Daily Malware Scan, any website malware that is found is automatically removed from your system. This quick removal keeps your website safe and secure, and prevents it from being blacklisted or incurring any downtime.
All network servers have ports (kind of like channels on a television) that can be open or closed. Some ports, like the one you need to access the Internet, need to be open. Others, such as those for email or your secure databases, should be closed. If po...
A Website Application Firewall (WAF) creates a custom set of rules that limits access to website applications to specific, trusted sources. Attacks that are prevented include cross-site scripting (XSS), SQL injection and more.
Your online reputation is vital to your business' success. There are three key components of SiteLock's reputation monitoring scans: * Monitor malware blacklists: SiteLock carefully monitors proprietary lists of sites reported as having malware to ens...
As applications age, hackers tend to find ways to attack them and access your website files. It is important you update your applications regularly to ensure the latest safety measures are in place. A SiteLock Deep 360-Degree Site Scan will verify the v...
Hackers use an SQL injection attack to attempt to access your website databases. They may be after customer data, user IDs, passwords, credit card numbers, or other sensitive information. SQL (Structured Query Language) is specifically understood by dat...
Having a log of file changes gives you full access to what's happening inside your website. Any suspicious behaviour can be seen and you'll be able to take action before it's too late.
The 360-Degree Vulnerability Scan includes a deep network scan, website application scan, and checks for weaknesses in the SQL injection and cross-site scripting areas. You are also notified of any vulnerabilities so that action can be taken before any we...
Hackers use cross-site scripting, also known as XSS, to gain control of the content of your web pages. They do this by entering a piece of malicious code into your site, usually through an existing input field, such as a search box, or name/address box. I...