24x7x365 (5 minute interval) Server Monitoring with Reboot. If your server is down, we will follow your instructions to reboot it by either contacting data center or accessing reboot port. Our response time on reboots is Guaranteed within 15 minutes! Monitoring Stats - Access your monitoring stats online, in addition to our weekly uptime reports e-mailed to you! Within 6 Hour Response Time Guarantee for Support Tickets Statistically, most tickets are responded to in less than 1 hour Unlimited Admin Work Time!! We do not limit the amount of work we do for you, and we do not have any additional fees! Backend Server Software Upgrades Kernel, Apache, PHP, Mysql, Perl, Exim, FTP, WHM/CPanel, etc.... WHM/CPanel Technical Issues System updates, debugging errors, patching bugs, system compatibility checks, etc.... 3rd Party Software Installation Fantastico, RVSkin, CpanelPro, CpanelXp, ClamAV, Mailscanner, URCHIN, ZendOptimizer, Ioncube, GD, Curl, Freetype, Eaccelerator, Ruby on Rails, ImageMagick, Perl modules, etc.... Initial Server Setup If you have a new server, we'll setup and configure the server completely from scratch to get the server ready for your use! Server Backup Restoration If your server requires a restore, we'll restore all of your backups returning your server back to normal. Disaster Recovery & Hack Recovery If your server is crashed or hacked, we will determine the cause and rebuild your system from backups. Server Migration If you are moving accounts from one server to another, we will migrate them for you from the old server to the new server. You must have root access and CPanel running on both the old server as well as the new server. System Security, Optimization and Hardening (performed upon your request as often as you would like) CHKRootKit - a simple program that detects hacker software and notifies you if any has been detected via email RootKit Hunter - scanning tool to ensure your system does not have any backdoors or exploits Securing and Upgrading of SSH Server - increases security during ssh connections APF Firewall - the most commonly used policy based iptables firewall system (CSF Firewall can be installed upon request instead of APF) Anti-DoS configuration for APF Firewall - helps mitigate denial of service type attacks Brute Force Detection - notifies you of numerous login authentication failures and automatically blocks the attackers ip in the firewall Log Analysis Software Installation - Emails are dispatched daily, the amount of detail in the emails can be changed on request System Integrity Monitor - 24x7 Internal Monitor that checks all services and restarts them if they are down SPRI - changes the priority of different processes in accordance to level of importance, hence increasing server performance Secure and Optimize Apache (HTTP) - tweaks apache to perform better, and prevent unnecessary information from being easily seen MySQL optimization - increases performance of MySQL host.conf hardenening - prevent dns lookup poisoning & spoofing protection nsswitch.conf modification - secure and optimize DNS lookups sysctl.conf hardening - helps prevent TCP/IP stack from syn-flood attacks and other network abuses FTP Hardening - upgrade and secure your ftp software Removal of unused software - prevents exploits and wasted resources Removal of old logs - regain wasted space by deleting old archived logs Shell Fork Bomb/Memory Hog Protection - prevents a user logged into a shell from consuming all the resources on the server Root Logger - logs and emails you everytime someone accesses root with the timestamp and their ip address MyTOP - tool for monitoring MySQL threads and processes MultiTail - view multiple log files simultaneously TMP Directory hardening ( /tmp, /var/tmp, /dev/shm) - helps prevents execution of malicious scripts Password Scanner - scans for easy to guess and common passwords Filemanager - allows you to edit system files through WHM in case SSH is inaccessible Firewall Admin - allows you to edit firewall allow & deny list and config through WHM Mod_Security - protects against common url based hack injections (installed upon specific request only) Mod_Evasive - defends http based attacks (installed upon specific request only) PHP Tightening - tweaks php to run in a safer and restricted evironment (installed upon specific request only) ....plus more! PM Me for how to sign up - Paypal accepted