Posted on October 18, 2016 by Nikolay Arefiev
When you use the Internet for your business, you are confronted with a task of protecting your Internet resource. Some small Internet-based companies believe that if they don’t store the customer payment information at their web resource, no hacker attack can significantly harm their business. However, nowadays there are exist attacks that indirectly influence all participating parties, even though your resource may not have been the target of the attack.
Posted on August 14, 2016 by Nikolay Arefiev
The task of website analysis for promotion in different search engines is usually solved by the means of various online services and software products. It is better to use a mashup approach, when you get all results of the web server log analysis on the same platform, thus eliminating the need to buy a set of various software products or pay for multiple online services.
Posted on May 28, 2016 by Yury Sergeev
If you have a web app running on a web server, you know that it is so helpful to analyse the access and error logs to get information about how it is functioning. Systems administrators use different tools to analyse HTTP statistics, but not all of them provide enough information. For instance, Google Analytics can't provide client IP addresses which might be really useful to have then you want to investigate what was going on. By looking into a website access log it is possible to extract client IP addresses and analyse their reputation. Therefore, it is essential to use special instruments for log analysis. As an illustration, RST Cloud shows which malicious sources that had repeatedly attacked other websites contacted your web server.
Recent Posts8 reasons why your site can be hacked