-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 This page serves as informational purpose for any news related to Paranoid Secure Hosting. All updates on this page are signed with the Paranoid Secure Hosting OpenPGP key. The OpenPGP public key can be imported from: https://hosting.d9ping.nl/mail/7637487CEB21CFBF21AA448B4267880693D1329E.asc Fingerprint: 7637487CEB21CFBF21AA448B4267880693D1329E Algorithm: RSA 4096 bits Long Key-ID: 4267880693D1329E Valid till: 2024-01-01(YYYY-MM-DD) Previous valid till: 2023-01-01(YYYY-MM-DD) And previous valid till: 2021-01-01(YYYY-MM-DD) Any message before before 2018-01-01(YYYY-MM-DD) 12:00(UTC) are signed with our old OpenPGP key. Import from: https://hosting.d9ping.nl/mail/C7570F0C16D6ED56C4D5E9C240F7B86E9A1ECAD2_expired.asc Algorithm: RSA 3072 bits Fingerprint: C7570F0C16D6ED56C4D5E9C240F7B86E9A1ECAD2 Valid till: 2018-01-01(YYYY-MM-DD) 12:00(UTC). -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEdjdIfOshz78hqkSLQmeIBpPRMp4FAmQEp9EACgkQQmeIBpPR Mp5aSg//dwcRDR7i1BEFTDsdRiHmI4S9IlcvPIApj9HuXySYSR2mvy3S4gvWZ2cJ JVmENLP4RhtdPDXElCi226R35uP7/8Vanu8wutABXRnhpHJbK45SUthYQD7HpB+s xSdKnHy0Fe+IGP4Mry/K0VRYkEee/VBJr2vushdYqGxveelaPpGPkPOQLrJXvdpN Nve1Sor+Xdcac+2x1qPpz6pzMkraOC45aTuBFqQ49EUJ+cPtSxEsExzGCEgbQsGV X1qa188F/1UqggFtVDV5jg9JAyZvqooewEZNnrD3kgedizWcKwdXRMMIMdAynIzy RFjctwseDB7+4ZNk7FIBmVSuiTnHfVI29TKAn3HOhRNO7pg0zAF7UXlMfAdNQHeL 0IT840DauQCC2LSum0LITKqwoFjOriPwCaAsxweK1jBl/Knvlx9B/N4aEHZBZRjl SZX+Dq6b9n5czEHB2SYri6CtbY9J919vcq8dfZb6kgoUVQu72OwLcHin2IEqK02E tQH+Nv0ACSDOGJduWk760WgTNs7WqACWaCZ6IGkoIx/b7pzMVVV4dziKPPJLNHmE Un5WqRwmhGL16V/fXZnnQN3tgZPIx7XZn+4eOuhm7H9msGmoclbLpNDmI/MUc8B/ mo6YoaPoZK1Sq9JufBuFeleThsGbem4ZoTadU/a1mJ4Ly60MuOI= =D7te -----END PGP SIGNATURE-----
News
Recent news
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 There has been a DNS resolve issue for the paranoidsecurehosting.tk zone. The problem starting from 2015-02-02 13:28 (UTC) till 2015-02-02 13:33 (UTC). The problem is caused by a DDoS attacks against the DNS nameservers. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCgAGBQJVHSC4AAoJEED3uG6aHsrS2TgMAJEygWZqNRomfsplpqKZb7Xx y1K81I2h09eX7lwKpcOwinyCC0x6mHILwaQXG1h5S6aSJefYHe/sZNTQ6g2AJ3V3 5xfQ5ptLiBdJlPk5XY7vEWWDc1rIjgqKvjPU4PFiFbPgy4l+z3JrWfqPOjWqALgu eVGUdz1srMXyuBhrsdq/syvQ3+hPrA6WWaX9lFoLNhz8AIjdOunnkwNpk9UMNxki 1b4gv+iMIujodw/nYVDC7sHVgOfRowHVJAuYSsMtrm8e8VQilqX5EgYGMotQlOTP hVDpGrRNuVax0LsjYYt6Dyswn+GmMsZANySUjxG+NqZBTHXYNEu4quiwLiEcUHf4 9QFXu6ZWLIvQCuRxLo0cE/62Zl4e1+bM1jGlow9/+m20ZNFvaM/QXKYfBjDvWVFq 2zDUsssMZep2YxR2HgY19JYW3zgA2G4AYc4CCI+2qgR0elPsgehlTUEDcZ05ztCC IgaNpJcZdoYg3oiE7JuqfBDjWFsPZLy9q1yLnQK1Cw== =a/rA -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 There will be scheduled maintenance by the upstream provider from 2014-12-09 23:59 (UTC) till 2014-12-10 5:00 (UTC). During this time window connection distributions can occur or connection may be slower than usually. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCgAGBQJVHSAMAAoJEED3uG6aHsrSp/EL/AocYFL8cLiD1jw+EVX3jKn4 3mjQG5vNL+eCq5TVs/UrWeJ/nEVL2py6dE/C6N1BvImOj+so9BdfvFA1uoyIbofE 6/GFSl9/80O9oVygVJOlcjzf+1EY2jAb2QVIrdqn/KJ5276vgLY+GZSAS+QUkTt0 ngnAE+qdPtY2zo0OuliYG1S6Sl+sSGikbHC1wLJMl5w9MqRJ4IrVe2XrJS6sqPm5 c79N1CuMOHjxwTYdcMRI69Bxdn7hReF+04pgnLl31Bmjr/X+9x/4uj0/2DDY2Q2D z//6sl50AZw5CuYCgFJdTt3QZAfhpfx3rObN7n8Sndx7t3CZ3eIpj0bsZ9B3csij JoaPANIbTgYPdukE3EoKI1VVSMvodq1DCJ7Nu4KhT7VqpB0YAO94HS7pcef6T7o3 9nzKJ2k28onPzctVDX3XbKyznxzDdyxUEAWOP6T1ktSDxV3yM3mym6+KFXKbq7b9 aJ65E2ZHuStlTvTcGb7J+XLwcl3M4DS1i4//WYm09Q== =YDnz -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Paranoid Secure Hosting has fixed security issue CVE-2014-8350 that is caused by the use of Smarty template engine. This security issue could be abused for PHP commandline execution from an internal threat. We have patched the issue and exploiting CVE-2014-8350 should now not work. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 iQGcBAEBCgAGBQJUZ4p3AAoJEED3uG6aHsrS0PYMAJIzsoI3KLyb0DEwuNMafOfR Q61fabhM/zw2UQUF4Lw1KSMwzgfT9FTVdZ23uCOtrlm6XFw5b2ACy5cSF4skKdQj jmMtiJA/nrW7L4xIdqrY6k5T3jToCUbu4Vjglu8D4wIr8wAbhg0OVup6V4Lokkes ek0iS8s70ug0I97esgiHCQnhfIsUn5NdRFJA1cILvMGLD/45gbO5Mj2nfARrlZOX T1bIPztredA2OlVFIesfl87KczoKirj1gihSslB/XPPs8cC7W4DCSkF/JU8F7K8j mnKX7n/Z0FC6HQE2ekR5C+HwC9YtcrBBGzcIAXmNKyRjOkW99tMwa+zpLSfILco6 xGFyfd13raR5+YeFulptrVvP5BYW7HaQ/ONnUjHhbdre9QdOy+n2rYSLcwaNPkor EYiHgS/0ZSmMopasGRyju2vtV28xnWXrdJWFrdQZtgeezIIhLcTPRuTGKE496aYD 58WGMuvYz2OuaR2qjmAyiyltfOGLyOjW+w3Y5vPUDQ== =uI4O -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Paranoid Secure Hosting is aware of a critical new issue with SSL 3.0.(CVE-2014-3566) Paranoid Secure Hosting want to clarify that Paranoid Secure Hosting does not and have not supported SSL 3.0. This is because we need use TLS instead of SSL for supporting multiple secure sites on the same public ip and SSL 3.0 cannot do that. We recommend all web users to enable TLS 1.1 and TLS 1.2 and make sure you always try to use the latest TLS version 1.2 due to other major issues with TLS version 1.0. Paranoid Secure Hosting does still supports TLS 1.0 but this is only because so many web users still do not have TLS 1.1 or 1.2 enabled in their webbrowsers. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 iQGcBAEBCgAGBQJUPkgyAAoJEED3uG6aHsrSh7EL/jbM4ENa0uYZfThitty5q63l Xvum/YLFDeXamOtq9QMHJPqjxZsWywrPlzyb4rNjGwvUxfrWDvXLRuA0y8t3QlLg Kz7drApgBQ5U+9Hlq42ObqGlEDgyivEMMO2vlVZMyoM+fQjo3v8i9M5hudGldjzj 42kZohcIxNWzT1CUabwfeDLFMXKkDiG5YmIaVvr7lkZduUunKct8eIGVcjDUjtkW iIkmI2EwMvUMBENMDcI51ZgupJawHVDtDOOrpaa1Echd0tnJ28f+BQvIHdmzWvjA RFEWF8NBI28HiztAjCC5Rz+DHUQAEdbJ41FZqa75S9xWQ19lVd77IoOTYoF3hezd +5jTqvdei72OaqyYDZ6Y92YqMjuEsk/xwzO0yb5TndVGO/BrwsFifGkkZ5jg0GKQ DaU1D+mB1cKXSxdFtGVfPk0vnLHRl31RLIjIoi9hOP+Xn/KrUyjl9Y3VX7bLaAke ZOPJiWMQFx40mlpdmOflgn6vLA24kqDgjTghcTvyHg== =Qcfa -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 There will be scheduled maintenance by the upstream provider from 2014-09-24 23:00 (UTC) till 2014-09-25 5:00 (UTC). During this time window connection distributions can occur or the connection is slower than usually. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCgAGBQJVHSLEAAoJEED3uG6aHsrSeXYL/2rIHsVTPBQm6TOUWDMYSvkA pvIVJcLWj0kBUZkGSemMsO+OGLKJDz/LYO9L/XCRyEbjEDynWPc2C7jJpwzIU5+/ 3OWvfLmrgy9+Z5lv1/kQ3gigpcG02VHJWU0Qvkhbz58HDcr6tVhBmCD80vgPQ1Iq FJYS0sChs9qd/n871W/1a+C3JtKpSvvjWkWDQhlt8GUI0RrtTUqg3Uta9CHxEK0/ rtFyMk5HIUjeHgktPssj4F+5W5tWKrjqwVCaAfHq4NVdlwvt9U/DztcEVFOCecM0 1cqJuIHT/t7OOzKnJVaZAdMTbQQECCwCjLQAFAtzFAVUJZJgeDVrAYqlvhNBG1QO ClTvDB7DsaxHnD6WRho8R4eJsoDpPFAxhK8nPLN6io9r8zmM0ToqottC8vtvs2cJ LGxSo6UR7u5+L/T9JfGM2nl9bEvrY0gzUz15+l8qujHWxKtU5F2myPfdYMEtoPzk wWlZmsO8ZWBWmvh5umydxsVwO2PF7FOYGC9wI35mgA== =RC3j -----END PGP SIGNATURE-----