Web host security

Posted on 2006-05-12
Last Modified: 2010-04-20
If I use a commercial hosting solution to host my site what's to prevent the sysadmin or someone working for the hosting co from taking my code and data and putting it on a different machine, changing the look and name of the site and then using the new site for their own gain?
Question by:gharnett
    LVL 18

    Expert Comment

    by:Sam Panwar

    In sharing environment this difficult to this because a host company have all rights as administrator so they can do it . But in dedicated server this is possible.

    Other some security tips which is prevent to client side copy of your website



    LVL 51

    Accepted Solution

    > .. what's to prevent the sysadmin ..
    don't put that code on this host
    nothing else can be done

    Expert Comment

    I agree with ahoffman, if this is a concern you need a dedicated machine, not a leased dedicated machine, that is co-located in a datacenter or you own facility.  This would be the only way to ensure that you have complete control over the system and no one else - given that it has been properly secured.  Even leased dedicated servers typically have a login account for datacenter staff to use to do OS upgrades and maintenance.

    My $0.02
    LVL 4

    Expert Comment

    the only way this is 100% possible is by you haveing your own server at your work place in a nuclear proof room 1km underground with armed guards. this should prevent anyone stealing your code.

    On a more aerious note....

    anyone who has access to the server could steal your information for example anyone at the hosting company can physically go to your server and take your data.

    every website on the interent runs a risk of there code being stolen?

    If the server is at your workplace you can control who goes near it and access's it!

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Have you ever sent email via ColdFusion and thought of tracking this mail to capture the exact date and time when the message was opened ?  If yes, then this article is for you ! First we need a table user_email with columns user_id , email , sub…
    One of the typical problems I have experienced is when you have to move a web server from one hosting site to another. You normally prepare all on the new host, transfer the site, change DNS and cross your fingers hoping all will be ok on new server…
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now