As you already know, CooliceHost.com hosts mWPCloud.com, an year old project, which we have launched in the upper class hosting services. While I was checking my email, I've found an email from the Security Audit of the mWPCloud scanner -
Beyond Security - right now mWPCloud is located at the CooliceHost.com ssd server in Netherland. In other words, scanning the infrastructure of CooliceHost.com with the mWPCloud.com site. The same configuration with some changes we use on our
hybrid VPS plans. Today someone has locked himself, so I decided to host him.
Here are the results:
1. First, I will tell you that there is no such thing as 100% security. It could be a bug somewhere into the scripts, or just an attack that we can not answer at the time, but only for now.
2. The result is one error in low, but it is not actually error, just
following the RFC standard. Everything else is blocked successfully.
1. TCP Timestamps Retrieval (Low)
Port: general/tcp
Summary: The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can be sometimes be computed.
We will keep giving the best of us in order to achieve such a results!
And please, do not be sad at us, if the system logs you. One fake positive result could have 100 real treads.
Want to repeat it again - There is no such thing as 100% security.