News
First of all DNS-records should be checked. Usually for correct work example.org [http://domain.name.com] has original IP-address and www.example.org [http://www.domain.name.com] has CDN IP-address and CNAME www.example.org.cybersecurecdn.com [http://www.example.org.cybersecurecdn.com] . Checking mechanism is described below: In order to activate alias, a DNS CNAME record for www.example.org [http://www.example.org] needs to be created to point www.example.org.cybersecurecdn.com [http://www.ex...
All checks are the same as in the previous question and customer should provide redirect from  example.org [http://domain.name.com] to www.example.org [http://www.domain.name.com]
Settings , described below should be done. SSL SETTINGS. If customer uses https he need to point his SSL-certificate configuration. The next steps should be performed: CERTIFICATE The certificate customer received after registering an SSL certificate with a trusted certificate authority (it means certificate content). SSL CHAIN CERTIFICATE They are OPTIONAL and contain all of the certificates required to verify the subject identified by the end certificate. CERTIFICATE KEY Also kn...
To check correct site work usual browser is used. First of all redirect from http://example.org [http://domain.name] to http://example.org [http://www.domain.name] should work and customer should obtain site content without any errors. To check WAF protection the next request should be used: http://www.example.org/?a=b%20AND%201=1 [http://www.domain.name/?a=b%20AND%201=1] It's a standard SQL injection request and it's blocked by WAF by default. An answer on this request is Error 403 (Forbidd...
To enable malware scan you need  to: 1) download the cwatch malware monitoring file from customer portal https://login.cwatch.comodo.com/ 2.) Upload the downloaded file to the root of your site http://example.org/ [http://example.org/example.org_1500902659128.php] 3.) Switch On for automatic malware removal on customer portal https://login.cwatch.comodo.com/ 4.) Put it in the location of the file on customer portal https://login.cwatch.comodo.com/ An example: http://example.org/exampl...
This check is explained on example of domain example.org. To check file location is used. Request: curl -v http://example.org/example.org_1500902659128.php [http://example.org/example.org_1500902659128.php] Correct answer: * Hostname was NOT found in DNS cache *   Trying 74.208.236.246... * Connected to example.org [http://example.org] (74.208.236.246) port 80 (#0) > GET /example.org_1500902659128.php HTTP/1.1 > User-Agent: curl/7.38.0 > Host: example.org [http://example.org] > Accept...
In malware scanner ver. 1.1 debug mode is provided. To turn it on customer should download new php-file from customer portal, upload it to web-server root directory and save new path for this file. Then file cwwdebug.data should be created in web-server root directory. This file should contain 1 key string (keyword) with digits and letters without spaces. For example, THIS_IS_KEY. To get result customer should send a request: https://example.org/phpdagent011.php?debug=this_is_key where php...
Error 531 PROBLEM DESCRIPTION Customer gets error 531 trying to visit his site. [http://www.websoctest.com/]ACTIONS TAKEN TO FIGURE OUT # dig A example.org example.org. 300 IN A 104.37.183.1 The problem is concluded in the fact that as Remote IP-address BelugaCDN IP-address (104.37.183.1) is used as A record for customer domain. Remote IP-address (also called origin) is address, where customer site is located. It shouldn't match CDN IP-address (Beluga's or another CDN). Customer mu...
TEST