Cloudflare SSL ? How to work

The main difference between a free and paid CloudFlare Universal SSL account is that the free version will only work on modern browsers: it will not support Internet Explorer on Windows XP or Android pre-Ice Cream Sandwich. Site owners can, however, add a banner to their sites warning users that they are using an outdated browser.

 “CloudFlare’s paid plans have always and will always support both modern and legacy browsers,” the company said.

Sites that do not have SSL will default to CloudFlare’s Flexible SSL mode, “which means traffic from browsers to CloudFlare will be encrypted, but traffic from CloudFlare to a site’s origin server will not.” As a result, CloudFlare recommends a certificate on Web servers “so we can encrypt traffic to the origin.”

CloudFlare will publish a blog post later today with instructions on how to set that up. “Once you’ve installed a certificate on your Web server, you can enable the Full or Strict SSL modes which encrypt origin traffic and provide a higher level of security,” the company said.


Existing customers should be provisioned for Universal SSL within 24 hours, though anyone who signed up via a CloudFlare partner will have to wait a bit longer due a technical limitation. New customers will have to wait 24 hours for the free version; paying customers get it automatically.

“Having cutting-edge encryption may not seem important to a small blog, but it is critical to advancing the encrypted-by-default future of the Internet,” CloudFlare concluded. “Every byte, however seemingly mundane, that flows encrypted across the Internet makes it more difficult for those who wish to intercept, throttle, or censor the Web. In other words, ensuring your personal blog is available over HTTPS makes it more likely that a human rights organization or social media service or independent journalist will be accessible around the world.”

Kemaskini Antaramuka Panel Pelanggan

iViperhost komited dalam menyediakan perkhidmatan terbaik kepada pengguna dan kali ini kami membawakan antaramuka panel pelanggan yang baru. Kami memilih untuk menaiktaraf antaramuka panel pelanggan supaya pelanggan lebih selesa untuk menggunakan perkhidmatan yang disediakan serta mempertingkat kecekapan.

Berita baik bagi mereka yang sering menggunakan tablet ataupun telefon pintar untuk berkerja – antaramuka ini akan berubah mengikut kesesuaian saiz skrin.

Antaramuka Baru Panel Pelanggan
Antaramuka Baru Panel Pelanggan

Jika anda mempunyai masalah dengan antaramuka baru ini, sila Open Ticket dan kami akan selesaikan masalah anda dengan segera.

Terima Kasih kerana terus menyokong iViperhost – kami sentiasa mencari jalan untuk memberikan pelanggan kami lebih dari penyedia yang lain.

Kaspersky: DDoS attacks 57% more powerful in H2 2011, Russia tops list

Kaspersky Labs has compiled data collected by its botnet monitoring and DDoS protection services and written a detailed analysis on their findings. The verdict? The second half of 2011 was a bumpy six months with distributed denial of service attacks increasing in magnitude, length and frequency.

The security firm pointed out that the bandwidth of DDoS attacks rose on average by 57 percent to 110Mbps in the second half of 2011. Kaspersky suspects this number will drop in 2012 however, as anti-DDoS measures are becoming more focused on stopping such brute force attacks.

H2 2011 in figures

In the second half of 2011, the maximum attack power repelled by Kaspersky DDoS Prevention went up 20% compared to the first half of the year, and amounted to 600 Mbit/sec, or 1,100,000 packets/sec (UDP flood with short packets of 64 bytes).
The average attack prevented by Kaspersky DDoS Prevention in the second half of 2011 was 110 Mbit/sec – an increase of 57%.
The longest DDoS attack in the second half of the year lasted for 80 days, 19 hours, 13 minutes and 5 seconds, and targeted a travel website.
The average duration of a DDoS attack was 9 hours, 29 minutes.
The largest number of DDoS attacks in the second half of 2011 – 384 in number – targeted a cybercriminal portal.
DDoS attacks were launched from computers located in 201 countries around the world.


Additionally, 16 percent of DDoS attacks originated from Russia and 12 percent from its relatively tiny neighbor Ukraine. That means 28% of all DDoS attacks originate from these two countries alone, making Eastern Europe a huge component in such attacks.

More interestingly though, attacks originating from Russia and Ukraine overwhelmingly targeted networks within their own respective borders. This is thought to be the result of anti-DDoS measures taken by Ukraine and Russia which prevent outbound DDoS attacks to other countries. What researchers see now are new botnets within these countries targeting their country’s own network resources and accounts for the sharp rise of DDoS attacks from the first half of 2011.

The most frequent victims of DDoS attacks may surprise you. Government networks were only targeted 2 percent of the time while e-commerce and trading sites topped the list at 45 percent, collectively. Government targets are on the rise though and are expected to increase in correlation to political dissidence.

Gaming servers, gaming websites and financial websites were next on the list at 15 percent each. Minecraft and Lineage 2 servers were pointed out specifically as being largely targeted by DDoS attacks.

Not surprisingly, about 80 percent of all attacks in H2 2011 were based on HTTP flooding. As anti-DDoS measures become more sophisticated though, so to have the methods used to perform such attacks. Kaserpsky points out that hackers and researchers have found ways to use Google+, THC-SSL-DOS, Apache web server and other methods which can circumvent traditional DDoS-blocking technologies.

Low-Orbit Ion Cannon, an open source network stress testing tool, was made famous by Anonymous after they routinely subverted the utility for performing DDoS attacks. After law enforcement traced LOIC-based attacks back to several members, Anonymous claims to have developed a new tool named RefRef which will supposedly better conceal the origins of their DDoS attacks.

Registering meteorite impact site

GEORGE TOWN, Malaysia: The registration will make Bukit Bunuh one of the world’s reference sites in the study of meteorite impact.

“It will place Malaysia on the World Meteorite Impact Area Map,” said  Centre for Global Archaeological  Research director Prof Mokhtar Saidin.

Speaking after attending the International Conference on the Archaeology of the Meteorite Impact at Bukit Bunuh here yesterday, Mokhtar said it was the  only  meteorite impact site with suevite evidence in Asia.

Suevite is a rock consisting partly of melted material, typically forming rock fragments containing glasses and crystals or lithic fragments (stone tools), formed during an impact.

He said Bukit Bunuh was one of 28  impact sites in the world which exposed suevite evidence out of 896  meteorite impact sites, as well as being the sole impact site from the early Quarternary period (two million years ago).

Mokhtar hoped to submit the application on the matter this year, together with the summary on the conference to the Planetary and Space Science Centre (PASSC), University of Brunswick in Canada.

“We will be collecting the papers and comments from this conference for the application.”

On a related matter, Mokhtar said only four out of 30 open sites, and four  out of 72 caves within the Lenggong Valley had been excavated.

“Bukit Bunuh is one of the four open sites. It is still  being excavated,” said Mokhtar, adding that the excavation, which began in 2001, had yielded 110 chopper tools and 53 hand axes, among others.

Universiti Sains Malaysia vice-chancellor Prof Datuk Omar Osman, who opened the conference, said research had shown that Bukit Bunuh’s importance was not restricted to archaeology, but also geology.

Credit : NST

#proud malaysia