Start a conversation

Web / Security & Abuse

  • What happens to someone abusing system resources?

    The offending site will be suspended and the owner will be given an opportunity to fix the problem or move to a Dedicated server. It is possible that sometimes we suspend a problem directory, but not ...

  • SQL injection and insertion Threats.

    SQL injection is an attack where malicious code is passed to an SQL Server for execution. The attack can result in unauthorized access to confidential data, or destruction of critical data. Before you...

  • What security measures are used to protect my server?

    We are protected from hackers and DDoS attack (UDP flood). We have an extensive custom firewall rule and large mod_security rulesets protecting our servers. If we do experience heavy flooding, we have...

  • Where can I find your Terms of Service?

    Please go to  https://www.eicra.com/terms If you have questions or need clarification on the rules, feel welcome to call us or join our live chat....

  • How can I prevent hacking?

    1. The most important thing to do is keep your passwords a secret. If you must give a password to someone, be sure to change it when they are done using the access. Don't write your passwords down or ...

  • We Offer Custom Design Services

    We offer custom design services and custom design packages. For more information please, visit http://www.eicra.com/website-package-price.php for more details....