FAQs

If you dont require users to login to your WordPress site, consider blocking all other IP addresses from accessing your wp-login.php page.

In otherwords, consider only whitelisting your own IP address to be able to login to your site. This prevents bots and hackers bruteforcing your site. Even if you had a overly complex password (highly recommended), bruteforcing can cause spikes in your hosting resource utilisation. It can cause errors to appear on your site such as ‘Resource limit exceeded’.

To achieve this:

Create an .htaccess file (or edit if you have an existing .htaccess) and add the following (change 123.123.123.123 to your IP address):

# wp-login.php being brute-forced. Only allow specific IPs
<FilesMatch “^wp-login.php$”>
Order deny,allow
Deny from all
#Allow from x.x.x.x
Allow from 123.123.123.123
</FilesMatch>

Some other recommended WordPress security measures are to install WordPress security plugins such as:

BulletProof Security

Ultimate Security Checker

Wordfence Security

cPanel is installed on a custom port. SSL sites on custom ports usually have issues with custom ports. SSL sites default port is TCP 443 and since the port for your cPanel is on a custom port, your browser will display an error. This is expected behaviour. To work around this issue, you will need to add a Security exception in your browser.

Firefox users: https://support.mozilla.org/en-US/kb/add-security-exception

Internet Explorer users: http://stackoverflow.com/questions/681695

Google Chrome: http://superuser.com/questions/27268/how-do-i-disable-the-warning-chrome-gives-if-a-security-certificate-is-not-trust

Once you have booked your domain name (through us or yourself), you would need to change your domain name’s DNS records to point to our Name Server settings.

Our name servers are:

NameServer1: ns01.proteusnetworks.net
NameServer2: ns02.proteusnetworks.net

Once you update your domain name DNS records, please allow 24-48 hours for it to propagate through the Internet. For troubleshooting purposes, you can look up your domain names DNS records by visiting this site:

http://mxtoolbox.com – Select DNS check.

Contact us or email info@proteusnetworks.com.au for technical support.

No, for now we allow unlimited upload/download usage.

You have unlimited email addresses in your web hosting with Proteus Networks. Ensure that you have adequate space to support storing emails on our servers. We are flexible and you can add as much storage as you like.

You can technically host unlimited databases provided you pay for storage to support it. We are flexible and you can add as much storage as you like.

It really depends on the size of the files (images / videos) stored on the site, content, plug ins, backups taken, size of the database. Sometimes error files can also consume a lot of disk space. In our experience, a moderate WordPress site consumes about 100MB of disk space. As your sites grow and you add more content, you could easily see that 100MB site grow to 500MB. Keep in mind the email storage requirements too.

We offer unlimited add-on domain names, unlimited databases and unlimited email addresses but it depends on how many MB each site consumes.

In our experience, a moderate WordPress site consumes about 100MB of disk space. It really depends on the size of the files (images / videos) stored on the site, content, plug ins, backups taken, size of the database. Sometimes error files can also consume a lot of disk space.

So in short, you can host anywhere between 5-20 WordPress sites on a 1GB cPanel. Other CMS like Drupal can consume a lot more. If you need additional space, you can easily purchase more or contact us.

For your web hosting, Proteus Networks will pass on the 99.9% guarantee.

That means, we guarantee you:

  • Daily: 1m 26.4s
  • Weekly: 10m 4.8s
  • Monthly: 43m 49.7s
  • Yearly: 8h 45m 57.0s

http://uptime.is/99.9

We dont provide 24/7 technical support but our server admins and data centre technicians work around the clock. When we have a requirement to provide 24/7 technical support, we will consider our options and costs. As our business grows and product offerings get more diverse, one day we will be a 24/7 shop. Till then we aim to keep our overheads low. If you have an immediate need for 24/7 support, please contact us immediately.

The web hosting operating system is CloudLinux.

We only accept PayPal, direct bank deposits and cheque payments.

We currently do not offer Windows web hosting. All our web hosting is on Linux. Contact us if you require Windows web hosting and we will be happy to discuss.

Yes, we have PayPal as a payment option, allowing you to pay by credit card via PayPal. We dont process credit cards over the phone.

Refunds can only be made if you change your mind and cancel within 7 days of purchase of your web hosting service. If pay for a full year and cancel within 7 days, you will receive a full refund – no questions asked. If you decided to pay monthly, then you can cancel after the first 7 days, your service will be turned off after the month is over, you wont be billed any further.

This is what the backend server hardware specs look like:

Processors:

2 x Intel Xeon L5640 @ 2.27Ghz

RAM:

128GB DDR3 1600Mhz Registered ECC

Storage:

6 x 1TB SSD Drives in RAID10

Node Power:

Redundant Dual Power Supply

Virtualisation:

Xen

Orchestration:

OnApp V3

There are cheaper web hosting providers but they aren’t as reliable as the data centres our web hosting runs on. Our technology partner serves over 50,000 websites and has been hosting since 2003 in their Australian based data centre. We have access to AWESOME 24x7x365 technical support, experienced technical engineers running the show and pro-active security updates giving you complete peace of mind.

If you are after the details:

Transit Partners: Vocus (dual-Gigabit IPv6), Equinix (dual-Gigabit IPv6)
Peering Partners: Equinix
Datacenter: Private Cage at Equinix SY3, Sydney (Tier-4)
Datacenter Features: UPS System, Fire Suppression & Detection, SSAE16 & ISO Certified
Uptime Guarantee: 99.9%

Absolutely. We provide migrate your cPanel to your new hosting account with us (one per cPanel account). This will bring across all your websites, email address settings, databases. All we need is your existing host’s cPanel link, username and password. You will need to ensure that the disk space used on your old cPanel is smaller than your new Proteus Networks cPanel storage. For example, it is impossible for us to migrate your cPanel consuming 2GB from your old host into your new Proteus Networks 1GB cPanel plan.

We provide technical support concerned with your cPanel and platform (files and database). If you require cPanel to cPanel migration, that can be done without cost (once per account). If you require assistance with domain names, installations and error messages, please contact us via this form.

Once payment has been received in PayPal or our bank account and our records indicate that an order has been paid for, your hosting will be provisioned normally within 2 hours.

 

Costs are based per GB of disk space required.
The minimum we sell is 1GB storage. For pricing go to the shop: https://proteusnetworks.com.au/shop/
For example, if you want 1 GB of storage and want to pay monthly, then purchase 1 of these: https://proteusnetworks.com.au/shop/hosting/1-1gb-cpanel-ssd-vpc-hosting
If you want 3 GB of storage and want to pay monthly, then purchase 3 of these: https://proteusnetworks.com.au/shop/hosting/1-1gb-cpanel-ssd-vpc-hosting
If you want 5 GB of storage and want to pay annually, then purchase 5 of these: https://proteusnetworks.com.au/shop/hosting/ssd-cpanel-web-hosting-1gb-12months

With our simple pricing model, all you have to do is work out your disk space required.
Contact us if you need further assistance.

An effective penetration testing methodology is executed regularly. As the general wisdom goes, it’s better to be proactive and strengthen your web applications’ defenses now than to wait until you’ve already suffered an attack, losing valuable data in the process.

In planning your penetration testing methodology, consider your industry. Not everyone is going to have the same security needs, but it’s your company’s responsibility to make sure confidential information stays confidential.

Your organization should deploy its penetration testing methodology regularly, but especially when any of the following occurs:

  • Regulations specific to your industry mandate it. For the payments industry, for example, this can be a quarterly requirement. In other sectors, pentests might only be an annual requirement.
  • Any alterations to network infrastructure or web applications (internal or external). This could entail upgrades, modifications, security patches, new additions or total overhauls.
  • Policies change. This is especially common on the end user side of the equation. Policy changes affect the nature of the user’s interaction with the web application, which could create new challenges.
  • Your organization moves or adds a new location. This includes remote employees, who will be accessing web applications through their ISP rather than your organization’s secure network.

Finally, when designing your penetration testing methodology, err on the side of caution. If you think you may need a pentest, you probably do.

Think of a penetration testing methodology—or “pentesting” for short—as a controlled cyber attack during which your best defenses are put to the test and exploited to determine the extent of vulnerabilities in your web applications.

Essentially, designing and implementing a penetration testing methodology allows you to:

  • Hack your own system in a proactive, authorized environment, focusing on elements such as IT infrastructure, OS vulnerabilities, application issues and user and configuration errors;
  • Analyze and validate both system defenses and user adherence to system protocols; and
  • Assess potential attack vectors such as web applications, wireless networks and devices and servers.

Unfortunately, no data is safe 100 percent of the time. But an effective penetration testing methodology can do wonders for eliminating unnecessary vulnerabilities.

The stakes are high for data security. With an effective penetration testing methodology, you can:

  • Identify vulnerabilities that scanning software cannot;
  • Not only test those vulnerabilities, but also determine how prepared network defenders are to both detect and respond to attacks in a timely manner;
  • Determine the potential magnitude of a successful attack; and
  • Ensure all compliance protocols for data security are being met (a consideration especially important in the payments industry).

Another benefit of taking your penetration testing methodology seriously is its potential affect on internal culture. When organizational leadership demonstrates a clear commitment to data security, it reinforces its importance to employees, who will then be encouraged to follow user-end protocols to the best of their abilities.