10.10.2018

As the ICANN Organization prepares, for the first time ever, to change the cryptographic keys that help protect the Internet's Domain Name System (DNS), the organization has published a guide to let people know what to expect.

 

The changing of the keys, known as the "Root Key Signing Key (KSK) Rollover", is currently scheduled for 11 October 2018. The new ICANN guide is intended for those with all levels of technical expertise. It will help everyone prepare for the rollover by detailing what to expect. It is part of the ICANNOrganization's ongoing efforts to raise awareness of the rollover and will also afford details about the rollover process.

25.06.2018

Please be informed that our bank account in "Norvik banka AS" is no longer available from 26th June 2018. All further payments will not be accounted.

You can send money to one of existing accounts.

 

Please send request to support team to obtain a list of available options.

22.06.2018

we will conduct a scheduled maintenance 23th June 2018 from 23:00 CEST till 01:00 CEST on systems where your shared-hosting accounts and VPS-servers are located. The maintenance includes server software update. During update services will encounter temporary downtimes.

Thanks your your patience.

20.06.2018
[11:47 CEST]
We are encountering a power outage in Frankfurt data center (FRA-10). This power outage might result in unavailability of your services. 

Our data center engineers are on-site to investigate the cause of this issue. Please be assured that we will do our utmost best to keep the downtime as short as possible.

 

[12:00 CEST update]
Power is restored and our data center engineers are working hard on bringing up all servers again. If you still experience downtime please contact support.
22.05.2018

In late April, there were numerous facts of hacking servers in the data center. Attackers got root access to servers and used them for various purposes - miners, zombies for DDOS attacks, etc. Later it was figured the vulnerable is because of permanently available ip-kvm access. It was through vulnerabilities in ILO software that grants access to an operating systems at the end.

1 2 3