CAN I REGISTER A COM.AU DOMAIN NAME IF IT IS AVAILABLE?

In order to register .com.au domain names, you’ll need a check on your eligibility. To be eligible, registrants need to fulfill one of the following criteria, being either:   

  • A company registered in Australia; or
  • operating under a registered business name in any Australian State or Territory; or
  • an Australian partnership or sole trader; or
  • an overseas company licensed to trade in Australia; or
  • an owner of an Australian Registered Trade Mark; or
  • an applicant for an Australian Registered Trade Mark ; or
  • an association incorporated in any Australian State or Territory; or
  • an Australian commercial statutory body. 

As well as registering .com.au, the above also applies to acquire. net.au names. Eligibility for other .au website addresses can be viewed in our domain name registration guide.

A valid application with accurate details must be submitted and approved before .com.au domain name is considered to be fully licensed, but this is a very rapid process if you use our service.

This submission procedure fully occurs online as part of your name registration process and we will only contact you if further details are required. 

Your online registration application will be assessed to determine both that the information provided is valid and that it meets the allocation criteria. While this process may seem onerous, it serves to protect the integrity of the .com.au space and is one of the reasons why. com.au domain names remain one of the most trusted extensions; both locally and overseas. The eligibility criteria and process help to protect registrants as well.

If you’re unsure of your eligibility to register .com.au domains, please feel free to contact our office for clarification or check if you’re eligible.

We also recommend you refer to our domain name registration tips guide before you register .com.au website addresses for further information and handy advice about domain name selection and choosing the right address for your purposes.

Cpanel Server Exploit Scanner

Features

Active scanning can be performed on all text files:
  • Actively scans all modified files within user accounts using the cxs Watch daemon regardless of how they were uploaded
  • PHP upload scripts (via a ModSecurity hook)
  • Perl upload scripts (via a ModSecurity hook)
  • CGI upload scripts (via a ModSecurity hook)
  • Any other web script type that utilises the HTML form ENCTYPE multipart/form-data (via a ModSecurity hook)
  • Pure-ftpd uploads

The active scanning of files can help prevent exploitation of an account by malware by deleting or moving suspicious files to quarantine before they become active. It can also prevent the uploading of PHP and perl shell scripts, commonly used to launch more malicious attacks and for sending spam.

cxs also allows you to perform on-demand scanning of files, directories and user accounts for suspected exploits, viruses and suspicious resources (files, directories, symlinks, sockets). You can run scans of existing user data to see if exploits have been uploaded in the past or via methods not covered by the active scanning. It has been tuned for performance and scalability.

Exploit detection includes:
  • Over 4000 known current exploit script fingerprint matches (in addition to standard ClamAV detection)
  • Known viruses via ClamAV
  • Regular expression pattern matching to help identify known/unknown exploits
  • Filename matching
  • Suspicious file names
  • Suspicious file types
  • Binary exeuctables
  • Some illegal web software installations
  • Custom user-specified regular expression patterns
  • Comprehensive constant scanning of all user data using the Watch daemon – scans all user files as soon as they are modified
  • Daily check for new Exploit Fingerprints
  • Check for the old version of popular web scripts (e.g. WordPress, Joomla, osCommerce)
  • Bayes probability scanning – scans scripts and passes the contents through an algorithm which produces a probability as to whether it is an exploit
  • Monitor files and directories for changes and send an email report of activity
  • IP Reputation System. The system provides a variety of IP blocklists gathered from information that is submitted by participating servers. This dual aspect provides the information to help protect the server using the reputation from active attacks
  • Major update to Script Version Scanning. cxs now scans for more than 200 individual applications, more than 200 WordPress plugins, and more than 200 Joomla Extensions. Over 700 in total!
  • New in v8: cxs Setup Wizard to the UI for easy first-time configuration
  • New in v8: cxs Command Wizard to help create effective scan commands
  • New in v8: new quarantine interface via an SQLite database
  • New in v8: statistics to provide information at a glance as to what cxs has been doing
  • New in v8: command Wizards to help configure cxs Watch, Modsecurity and FTP
  • New in v8: cxs Daily/Weekly Scan Wizard, to create and modify cron jobs in /etc/cron.d/cxs-cron
  • … and lots more!
Web-based User Interface:

Included with the cxs Command Line Interface (CLI) is a web-based User Interface (UI) to help:

  • Run scans
  • Schedule and Edit scans via CRON
  • Compose CLI scan commands
  • View, Delete and Restore files from Quarantine
  • View documentation
  • Set and Edit default values for scans
  • Edit commonly used cxs files

Our Germany DataCenter Facility

Out service provider operates two own data centers for dedicated servers and colocation services. The ultra-modern “green data center“ in Munich was constructed and builtin 2009 and has enough room for 4,000 servers. The second data center in Nuremberg has been launched in 2014, and it offers space for another 10,000 dedicated servers. On both locations the office rooms are in the same building, only one level above the data floor.

Both data centers are state of the art, especially when it comes to operational safety and energy efficiency. DC invests large amounts in the maintenance and optimization of the entire data center infrastructure every year. This allows us to offer customers a stable and – thanks to low operational costs – economical hosting platform.

Both data centers are located in different cities being several hundred kilometers apart from each other, and both are powered by different electricity suppliers (SWM and N-Ergie). Thus, your servers can be distributed to different locations without additional costs for you. Due to this geographical redundancy your services will stay online even if it comes to the highly unlikely case that one data center will be damaged by fire, water, or any other imaginable disaster.

In 2017 the data center in Nuremberg has been awarded by an expert jury of independent data center experts from Germany with the German Data Center Award 2017, the Deutsche Rechenzentrumspreis. In 2018 the Data center in Munich has also been awarded with the German Data Center Award, the Deutsche Rechenzentrumspreis. So both data centers are award-winning.

Facts about the  data centers: The following technology is used in Munich and / or Nuremberg


Location: Munich – Germany
Nuremberg – Germany

Data center area: 300 m² (Munich)
1750 m² (Nuremberg)

Air conditioning: Multiple chillers (n+1)
Groundwater cooling system
Several climate cabinets (n+1)
100 % redundant
Free cooling
Energy-efficient
Remote-controlled
Expandable

Internet access: Carrier-neutral
Numerous different fiber carriers using at least two different fiber directions into the building

The data centers are currently connected to the Internet with 130 Gbit/s:

  • CenturyLink: 40 Gbit/s
  • Telia Carrier: 30 Gbit/s
  • DE-CIX: 20 Gbit/s
  • AMS-IX: 20 Gbit/s
  • Versatel: 10 Gbit/s
  • M-NET: 10 Gbit/s

Energy supply: Inhouse transformer-station
Multiple UPS with batteries (n+1)
Emergency backup generator with powerful diesel generator

Security: Access only via ID card
Alarm system
Security service on duty
More than 50 observation cameras and video recording
Several live-webcams
Smoke detector / automatic fire alarm
Smoke exhaust installation
Water detector

Environment: Hundreds of power outlets per room, mounted directly into the double floor

Every single power outlet electrically interlocked at 16 A

Cable bushings mounted into the double floor next to the power outlets

Completely locked double floor
AC ventilation grills, individually adjustable, mounted into the double floor

Cool water canalization only beneath the double floor

Gullies for the case of a pipe leakage

19”-Racks individually lockable

Cages, entire colocation rooms for single customers and individual modifications/equipment available

Satellite feed (Astra 19.2°E and Eutelsat Hot Bird 13.0°E)

Service: Personnel on site 365 days a year, also on holidays and weekends. Priority and emergeny support available

This message seems dangerous

recent phishing attach

many of our clients are complaining regarding emails as bellow we suggest remedies bellow

  1. there is nothing serious about this mail as its spam mail sender has assumed your password
  2. even email seams from your email address do not mean email actually sent from your email address with a password.

but you should take the following corrective steps

  1. keep antivirus updated in your pc and mobile
  2. avoid using the email from public wifi
  3. install only trusted application in your pc and mobile
  4. keep strong password
  5. change password of your email id often
  6. don’t share password without secured communication

Sample Mail Copy

Hello!

My nickname in darknet is xxxxx.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.

the error you will see above mail

Many people marked similar messages as phishing scams, so this might contain unsafe content. Avoid clicking links, downloading attachments, or replying with personal information.

 

Setting Expiry for static content for browser using htaccess

open .htaccess and apply this code

this Setting “expires” tells browsers downloading these files that they don’t need to request it again for this specific length of time. In other words, use the cache instead if you have it. This can reduce stress on the server for you, and speed up page load time for visitors.

 

# BEGIN EXPIRES

<IfModule mod_expires.c>

ExpiresActive On

ExpiresDefault “access plus 10 days”

ExpiresByType text/css “access plus 1 week”

ExpiresByType text/plain “access plus 1 month”

ExpiresByType image/gif “access plus 1 month”

ExpiresByType image/png “access plus 1 month”

ExpiresByType image/jpeg “access plus 1 month”

ExpiresByType application/x-javascript “access plus 1 month”

ExpiresByType application/javascript “access plus 1 week”

ExpiresByType application/x-icon “access plus 1 year”

</IfModule>

# END EXPIRES