iConnik – Faster loading and Secure
Page loading speed.
iConnik use a cache system to increase the loading speed of your site. The cache system generates what’s called a static html file and saves it on the server (your hosting provider). When someone views your site they reach the static html page which means that most of the data that is pulled from multiple files doesn’t have to be loaded each time, thus massively improving the loading speed.
The security system we employ on your website is comprehensive, constantly updated to incorporate the latest security features and to hunt for the newest security threats to your website. The features include:
- Real-time blocking of known attackers.
- Block entire malicious networks.
- Includes login security to lock out brute force hacks and prevents revealing information that will compromise security.
- Firewall to block common security threats like fake Googlebots, malicious scans from hackers and botnets.
- Monitor DNS security for unauthorized DNS changes.
- Monitors disk space which is related to security because many DDoS attacks attempt to consume all disk space to create denial of service.
- Fully IPv6 compatible
Security Terms Used
Brute force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct password. As the password’s length increases, the amount of time, on average, to find the correct password increases exponentially. This means short passwords can usually be discovered quite quickly, but longer passwords may take decades.
Malicious networks traffic is considered to be any of the following:
- Port Scanning: an attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port and exploiting a known vulnerability of that service.
- Malicious HTTP GET/POST requests: an attack against a web server to discover commonly used scripts or software, with the goal of exploiting a known vulnerability in that software.
- Brute force attacks (see above)
Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
A Domain Name System (DNS) translates more readily memorized domain names to the numerical IP addresses needed for the purpose of locating and identifying computer services and devices. By providing a worldwide, distributed directory service, the Domain Name System is an essential component of the functionality of the Internet.
A Distributed Denial-of-Service (DDoS) is where the attack source is more than one, often thousands of, unique IP addresses. It is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations