- August 30th, 2016 184
This article assumes you’ve already purchased a dedicated IP address for your account, each site you’d like to secure with a Let’s Encrypt certificate will need its own dedicated IP address. Follow the guide – https://www.aspnix.com/kb/how-to-purchase-a-dedicated-ip-address-addon/ to purchase a dedicated IP.
- Login to the Windows control panel at https://panel.aspnix.com/
- Click the “Web Sites” icon
- Click the website you’d like to install the Let’s Encrypt certificate on
- If you do not see the “SSL” tab, please follow the step below or continue to step #6
- Click the “Switch to dedicated IP” option
- Click the “SSL” tab
- Click the “Install free certificate from Let’s Encrypt” button
- Select the required options on this form and click the “Create and install Let’s Encrypt certificate” button
Congrats! Your Let’s Encrypt certificate should now be generated and installed on your website.
- August 30th, 2016 184
Purchasing a dedicated IP address for your account is simple to do. Follow the steps below to purchase 1 (or more) for your account.
- Login to the billing system at https://billing.aspnix.com/clientarea.php
- Click “My Services”
- Click the “Manage” button next to the hosting service you’d like to purchase the IP for
- Click the “View Available Addons” button
From here you will be able to purchase a single dedicated IP address addon. To purchase more than 1, repeat these steps for each IP address required. You may also contact our sales / billing team to have them assign multipleto your account.
- February 17th, 2016 386
Using our only IP address information utility is easy! We provide an XML and JSON output so that almost any application or language can take advantage of the output from our system. You can use any of the hostnames below…
- https://myipv4.aspnix.com/ (IPv4 Support)
IPv6 support will be coming soon.
Add the ?xml or ?json parameter to the request and you will receive the information encoded in the output format you’ve requested. You can also specify an IP address you’d like to lookup as well by adding the ip=xxxx parameter to the request as well. If you do not specify the ip= parameter, our system will assume the IP address doing the request. For example, here is a full request of the ASPnix NS1 IP address… https://myipv4.aspnix.com/?json&ip=18.104.22.168
This service is free to anyone so long as there is no abuse from your website or application.
- March 16th, 2015 1112
Many customers have asked about how their credit card details are handled and stored, with all the recent exploits and security breaches in 2014 / 2015 we feel we should let our customers in on our operations and security.
When a customer makes a payment using their credit card, we do store the provided credit card details in our database systems. This information is stored to automate invoice payments, domain renewals and other billing related services to make it easier for our customers.
The following information is stored when a customer pays with their credit card…
- The full credit card number
- The last 4 numbers of the card
- The expiration date / issue date
The CVV or security code is never stored on our systems. All of the above information is stored in a 128-bit AES encrypted data blob and seeded with a passphrase that is 32-random-characters in length. The passphrase is only known / accessible by 2 employees within our company. Even if the encrypted data blob is retrieved, it cannot be decrypted without the passphrase.
The database systems that store all user information, services details, invoices etc. that our billing system operates out of are not publicly accessible, do not run locally alongside the web server and are secured with very strong randomly generated passwords. Access to the database systems is secured through VPN access only.
Our billing software is updated immediately when a new release is available to maintain high levels of security. We also have in-house developed scripts and software that monitor requests and traffic for intrusion attempts, SQL exploits / injections, fake / fraudulent signups and more. We also exceed PCI requirements which are designed to ensure that your credit card information is secure. You can view our PCI compliance here – https://email@example.com&k=61900d43ac5ac4fe3b38.
While no system is 100% secure, we do our best to make sure that our system is as secure as possible. We monitor for new threats, new exploits, and fraudulent activity to make sure we stay on top of our security.
If you have any questions, concerns or comments, please do not hesitate to contact us!
- August 2nd, 2014 1137
Customized backup solutions are available for our VPS clients and allows you to setup and execute backups more than once per day, which is our default setup. Clients also have the option to setup different versions to keep, by default only the last 3 backups are kept.
While the default backup setup will work for most customers, some may have higher requirements to backup sensitive data or data that changes more often at a more frequent rate, such as twice a day. You may select the following options for backup intervals…
- Standard – Nightly (Free / Included)
- Twice per day (every 12 hours)
- 4 times per day (every 6 hours)
- Hourly (once per hour)
You may also select the following backup versions to keep…
- 3 days (Free / Included)
- 1 Week (7 days)
- 2 Weeks (14 days)
Backup versions are kept for x number of days rolling, as 1 backup completes, the very last backup at the end of the version cycle is automatically removed.
- August 1st, 2014 1232
Sensor pricing is based on how many sensors you need and what type of sensor(s) is required. Sensors start at $1 per month and go as high as $5 per month. And can be triggered as low as every 15 seconds to as high as every 24 hours, depending on the sensors resource impact.
Start at $1 per month and can be triggered as low as 15-second intervals. These types of sensors include…
- Most SNMP based sensors (non-secure, v1)
- DNS monitoring
- Port scanning / monitoring
- Port range scanning / monitoring
Start at $2 per month and can be triggered as low as 1-minute intervals. These types of sensors include…
- HTTP request / web server monitoring
- DHCP server
- SMTP server
- POP3 server
- IMAP server
- SNTP server
- FTP server
Start at $3 per month and can be triggered as low as 5-minute intervals. These types of sensors include…
- Hyper-V host monitoring
- MySQL and SQL Server database monitoring
- Most WMI based sensors
Start at $5 per month and can be triggered as low as 24-hour intervals. These types of sensors include…
- WMI Event Log monitoring
- Windows Updates status
- Windows Updates last updates
- HTTP full webpage download
PRTG supports a very large amount of sensors and we cannot list them all, if you’d like to see all sensors that PRTG supports, please review – http://www.paessler.com/manuals/prtg/available_sensor_types. If you’d like more information about the cost of a specific sensor type, please contact our sales department.
- August 1st, 2014 1152
PRTG Network Monitor (PRTG, successor of Paessler Router Traffic Grapher) is a network monitoring software from Paessler AG. PRTG runs on Windows and monitors network availability and network usage using SNMP, Packet Sniffing, WMI, IP SLAs and Netflow and various other protocols.
We can easily monitor server uptime, CPU usage, RAM usage, hard disk space usage, network I/O, ping, HTTP, SMTP, POP and many, many, more services! You can easily login to our PRTG web interface, view server status through the iOS or Android app as well as the Windows Enterprise Console application.
Be notified when a sensor goes down, set rules for sensor limits to be notified of high resource usage, low RAM or hard disk space and more. We can monitor an unlimited amount of sensors for all of your VPS or dedicated servers. Pricing varies depending on what types of services and sensors you require. Please contact our sales department for more information.
For pricing information, please review our PRTG pricing guide article.
- March 19th, 2014 1321
Please do not take offense or feel upset in any way. Today’s world is full of Credit Card fraud, to protect us, our customers and Credit Card owners we may ask for verification documents for various reasons. Such as…
- Your order has a high probability of fraud or is flagged as “high-risk”
- The distance between your billing address and ordering location is very large or the locations do not match
- We feel that the account details are false or inaccurate (such as your name, address, phone number)
- Very large or expensive orders
If you’ve ever been asked for your ID when making a purchase at a store using your credit card, this is no different. We simply want to be sure that all your account details are correct, that the credit card is authorized for use by you and sometimes our anti-fraud system does make mistakes. Once the requested documents have been provided to us, we will activate and approve your order ASAP.
If you have any questions or concerns, please contact our billing department.
- March 11th, 2014 4647
Yes! Our SmarterMail services fully support SSL / TLS based delivery from start to finish. Our primary SmarterMail server, our delivery (outbound) gateways, our backup MX gateways, our website mail delivery gateways all fully support encrypted / secured email delivery.
With that said however, there are exceptions and limitations. For example – a recipient’s mail server may not support secured connections for incoming mail and as a result our SmarterMail systems cannot establish a secured delivery. When our SmarterMail systems cannot establish an encryption session they will fall-back to standard delivery methods. Our SmarterMail systems will always attempt to establish an encrypted session to the receiving mail server first.
Our SmarterMail services also fully supports encrypted incoming email deliveries from 3rd party mail servers. Just as our SmarterMail servers attempt to establish secure connections to recipient servers, other mail servers also attempt to establish secured connections to us as well.
This is quickly becoming standardized and widely adopted, large service providers like Google, Microsoft, Yahoo, AOL and many others already support encrypted email delivery and many many smaller companies do as well!
You can quickly test a recipient’s mail server to see if they support encrypted mail delivery at http://checktls.com/perl/TestReceiver.pl
- November 7th, 2013 1549
While IMAP IDLE provides real-time notifications to your client, it differs from ActiveSync in many ways. IMAP IDLE is an extension of the IMAP protocol (as described here) and IMAP being a message protocol, it handles only email. ActiveSync (as described here) handles email, calendar, contacts, notes and tasks, and syncs them across all of your clients (that support ActiveSync, including devices).
ActiveSync for example, if you added a new contact on your phone, your desktop client would instantly also have the contact available. The same goes the other way too, if you create a new calendar event on your desktop client, your phone would instantly have the event as well.
IMAP IDLE can also only generally receive notifications for the folder you currently have selected / viewing. ActiveSync does not have this limitation and receives real-time notifications for all folders.