RSS Feed
News
Aug
4
Scheduled maintenance of Vole server in Frankfurt, DE
Posted by Renato P. on 04 August 2017 01:53 PM
This is a notification that scheduled maintenance will be performed on Shared and Reseller hosting server vole.host1plus.com in Frankfurt.

Location: Frankfurt, DE

Period: 2017-08-05 08:00 UTC

Services affected: Shared and Reseller Hosting services

During the maintenance server network settings will be tested and server rebooted.

Please accept our sincere apologies for any inconveniences this may cause.

Thank you for your patience!
Read more »



Aug
3
EBANX payments settlement will not be made on August 9, 2017
Posted by Vytautas K. on 03 August 2017 11:11 AM

Please be informed that one of our payment gateways, EBANX, will have the following interruption:

  • August 9th EBANX will not make settlement payments or Boleto Confirmations. 

Sorry for any inconvenience this may cause.


Read more »



Aug
1
Routers upgrade in Chicago Data Center
Posted by Jonas B. on 01 August 2017 11:48 AM

This is a notification that we will tomorrow perform routers upgrade in Chicago DC, USA.

Location: Chicago, USA

Date: 2017-08-02, 10:00 UTC

Please be informed that small network issues may or may not occur.

We apologize for inconveniences which we able to possibly cause.


Read more »



Jul
15
Issues in Chicago, USA
Posted by Jonas B. on 15 July 2017 05:34 AM

Please be kindly informed that we are experiencing technical issues in Chicago data center.

Location: Chicago, USA

Services affected: VPS Hosting and Cloud Servers

Our technicians are investigating what could cause the issue and will take necessary actions as soon as possible. 

Update: 2017-07-14 20:47 UTC - System administrators identified the problem. Affected services will be started one by one. 

Update: 2017-07-14 22:42 UTC - All affected Cloud Servers back online. Some of VPS Hosting nodes are up but we still need more time.

Update: 2017-07-15 00:24 UTC - VPS Hosting nodes ovz-1, ovz-2 and ovz-7 up and running again.

Update: 2017-07-15 00:33 UTC - VPS Hosting nodes ovz-3 and ovz-10 also up and running again.

Update: 2017-07-15 01:00 UTC All problems solved. Thank you for your patience.

We apologize for inconveniences this is causing.


Read more »



Jul
1

Please be kindly informed that we are experiencing technical issues in Los Angeles data center.

Location: Los Angeles, USA

Services affected: VPS, Shared and Reseller hostings

Our technicians are investigating what could cause the issue and will take necessary actions as soon as possible. 

Update: 2017-07-01 12:58 UTC - System administrators identified that problem is related with network issues. We are looking for solution.

Update: 2017-07-01 13:35 UTC All problems solved. Thank you for your patience.

We apologize for inconveniences this is causing.

--------------------------------------------

Informamos que estamos enfrentando problemas técnicos no data center de Los Angeles.

Localização: Los Angeles, Estados Unidos

Serviços afetados: VPS, hospedagem compartilhada e revenda de hospedagem

Nossos técnicos estão investigando a causa do problema e tomarão as ações necessárias o mais rápido possível.

Atualização: 2017-07-01 12:58 UTC - Nossos administradores identificaram que o problema está relacionado com a rede. Estamos trabalhando em busca de uma solução.

Atualização: 2017-07-01 13:35 UTC - Todos os problemas foram resolvidos. Obrigado por sua paciência.

Pedimos desculpas pelo inconveniente causado.


Read more »



Jun
28

Please find some information about the variant of Ransomware, Petya (2017) GoldenEye, this threat are spreading on the internet in many countries over the world. This Ransonware are exploiting SMB v1 vulnerability and propagate itself using user passwords logged on the Operational System which has privilege for execute the vírus remotely via WMIC or PsEXEC.


Impact:
Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows 10 Version 1607 and Windows Server 2016, and it is important to Windows Vista, Windows 7, Windows 8.1, Windows RT 8.1, Windows 10, and Windows 10 Version 1511.

For  MS17-010 download on Windows Server 2003 (KB4012598), access the link http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598

How to correct or reduce the infection risk (recommendations)
•             It is necessary to apply the patch MS17-010 available on the Microsoft Web Site (https://technet.microsoft.com/en-us/library/security/ms17-010) and restart the server.
•             Make sure that all of security updates are applied.
•             Deactivate SMB (v1) on vulnerable machines – using GPO or following Microsoft instructions. (https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and-windows)
•             Avoid use admin users on workstations.
•             Do not open or execute any suspicious content received bye mail or unknown sources.
•             Communicate internal users about the risks presented.


Read more »