Why We Value Your Privacy

OneHost Cloud has based our business around customer and data privacy and protection. In this day and age privacy is extremely important and considering we are sharing most of our daily activities with Google due to our handy smart phones we do not think this invasion should also expand to customers of OneHost Cloud. While […]

Read More >

Why OneHost Cloud Values Privacy & Security

What do we mean when we say OneHost Cloud Values Privacy & Security ? When customers ask is my data safe and private most cloud hosting providers will almost always say an unequivocal yes without giving it a second thought however the reality is a little different. All one needs to do is peruse some of […]

Read More >

Bulletproof Hosting

OneHost Cloud is a world class provider of private, reliable and secure cloud hosting. We are the number one provider of Pentesting Cloud Virtual Private Servers for security professionals and budding pentesters. Recently we have built our latest addition to our range of hosting products – we have added a second cpanel cluster to compliment […]

Read More >

Tor Hidden Services & Hosting Improvements

Finally we have made some significant changes to our Tor Hidden Service Hosting. Initially we allowed customers to access our Tor Control Panel via the clearnet however this was not an ideal solution for the privacy conscience Tor user. We have now moved our Tor services and all our customers to a new and improved […]

Read More >

Metasploit and Meterpreter with NAT

[vc_row][vc_column][vc_column_text]Using Metasploit and Meterpreter with NAT requires a SRVHOST and SRVPORT. These 2 variables will be used by Metasploit to determine where the webserver needs to bind to and listen on.  The plan is to trick the target to connect to this webserver, using the public IP of our firewall/router, which will then forward the […]

Read More >

Introduction Into CyberSecurity Training by Bruce Williams

Hi, I have been often asked about cybersecurity training. Where do you start? Websites like these are a good https://resources.infosecinstitute.com/top-5-free-learning-resources-for-cyber-security-beginners/ https://www.hackercurriculum.org To train people in cybersecurity there are various approaches. The method which I teach is based on a risk/return which tries to defend a small to medium business against web attack. One size will […]

Read More >

Tune Your MySQL or MariaDB Databases

Everyone knows the importance of having an optimal database as these are the cornerstone of any application including PHP websites. Tuning your MySQL or MariaDB Databases are not for the fainthearted however with this simple script anyone can tune their databases with minimal effort and risk. Please note however that before changing any database settings […]

Read More >

Using OpenVPN Inside Virtual Machine with Public IP

My team has been working on a solution that most customers have. Why can’t they use a VPN inside their VPS while still being able to connect to their VPS using their public IP address that we have assigned them ? Using OpenVPN inside a Virtual Machine has been something that I have been meaning […]

Read More >

WannaCry Ransomware 2.0

Wannacry Ransomware 2.0 So far, over 237,000 computers across 99 countries around the world have been infected, and the infection is still rising even hours after the kill switch was triggered by the 22-years-old British security researcher behind the twitter handle ‘MalwareTech.’ For those unaware, WannaCry is an insanely fast-spreading ransomware malware that leverages a […]

Read More >

Duplicate SSH Keys When Cloning Virtual Machines

There seems to be a big security issue when cloud providers ( and customers ) clone virtual machines and provide this master VM for provisioning VPS Machines for customers. When Digital Ocean was informed by its customers  ( see comments ) that this was an issue it took them over 4 months to notify other […]

Read More >