Pages:
Author

Topic: Is tradehill.com really hosted on a shared hosting account? (Read 3483 times)

member
Activity: 70
Merit: 10
Has anyone seen this floating around today, sure hope is false;

--tradehill bitcoin exchange user/hash passes out now

pastebin

That is some guy looking for an idiot to scam.
member
Activity: 94
Merit: 10
Has anyone seen this floating around today, sure hope is false;

--tradehill bitcoin exchange user/hash passes out now

pastebin
member
Activity: 70
Merit: 10
I'm pretty sure it's Hostgator or at least something similar. Their site can obviously handle no more traffic than Susie's Geocities page about beanie babies.
Don't even say that name. They are so bad just so bad.  Cry Cry Cry Cry

There are actually worst hosts like bluehost.  Chances are if they list UNLIMITED bandwidth, disk space, etc they are retardedly overcrowded and will disable your site once it gets hit by more then a small breeze.
legendary
Activity: 1596
Merit: 1012
Democracy is vulnerable to a 51% attack.
It is the same physical card in the same physical machine.  C++ is quite powerful.
Even a dedicated machine uses the same physical network interface on the same router. If sharing network hardware were a problem, every system on the Internet would have it. And yes, C++ is very powerful. So what?
legendary
Activity: 2114
Merit: 1040
A Great Time to Start Something!
Unless they prove them self or have someone as a security expert, it will be much safer for them to use shared hosting rather than a VPS/dedicated server.
Why is that?  How is shared hosting safer than VPS or a dedicated server?  I don't know much about these things but I have been told that if you have a shared hosting account your site is more or less only as secure as any other site sharing that server.

If the file permissions (and DB's) are set up accurately, then security can be as good as other options.
With shared hosting you can never have a busy site, that is a huge issue.
sr. member
Activity: 308
Merit: 250
That's odd.  I was under the impression that many exploits use this very method, as well as stack overflows.

Your problem is you're "under the impression" but you don't really understand the workings of things you're trying to argue about.

Quote
Anyhow, I am not going to debate this further.  Today's modern OSes might be as impossible to crack as the Nazi Enigma code...  Hmmm...

There are bugs in virtualization layers, but it's not simply a case of fire up C++ and write to some arbitrary location and boom you have baremetal access to the entire box.
newbie
Activity: 14
Merit: 0
I'm pretty sure it's Hostgator or at least something similar. Their site can obviously handle no more traffic than Susie's Geocities page about beanie babies.
Don't even say that name. They are so bad just so bad.  Cry Cry Cry Cry
member
Activity: 94
Merit: 10
inetnum: 46.21.104.0 - 46.21.105.255
netname: GLESYS-CUSTOMER-SERVERS
descr: Customer VPS services located in Falkenberg, Sweden

Domain Name: 46-21-104-237-static.serverhotell.net
Location: Falkenberg, Sweden Country Flag


full member
Activity: 209
Merit: 100
So you're telling me that I can't intentionally write beyond my own memory pointers in C++ on a VPM?  Nonsense.

You can't even do that on most modern OSs.  Write a program and try to write outside of the programs bounds and see what happens.

That's odd.  I was under the impression that many exploits use this very method, as well as stack overflows.

Anyhow, I am not going to debate this further.  Today's modern OSes might be as impossible to crack as the Nazi Enigma code...  Hmmm...

legendary
Activity: 1806
Merit: 1003
Dedicated server is old school, nowadays you want VPS or cluster, both allowing instant scaling, not the dedicated crap.
member
Activity: 70
Merit: 10
So you're telling me that I can't intentionally write beyond my own memory pointers in C++ on a VPM?  Nonsense.

You can't even do that on most modern OSs.  Write a program and try to write outside of the programs bounds and see what happens.
full member
Activity: 209
Merit: 100
Go ahead and write to the memory, you wont be able to address it so it is pointless.  Just because you can compile a program on a machine doesn't mean you can access a device without root access.

So you're telling me that I can't intentionally write beyond my own memory pointers in C++ on a VPM?  Nonsense.

The physical machine is shared.  It is only a PROGRAM on the OS that makes it appear to be separate machines to the various users.  The root user sees the whole REAL directory structure.  So the barrier between accounts is only as solid as the program controlling the access.  Show me an OS that is without bugs...

I ran a webhosting company for a number of years, using Ensim at the time.  Another problem that is inherent to shared machines is the tendency of the OS to remain outdated well beyond what you'd settle for if you were the only person on the machine.  In other words, providers don't generally do a great job of keeping the OS as up to date as they should.  The techs in those centers have an install disk that simply doesn't get updated as fast as updates are available.
member
Activity: 70
Merit: 10
If you successfully compiled or uploaded a packet sniffer on virtual machine #1, it will sniff packets for every other virtual machine on that box.

Each virtual machine is bound to their own IP address so you can't listen to other machines on the same box.  You however could listen to any broadcasts on the local network, or anything else a bare metal server could do.

It is the same physical card in the same physical machine.  C++ is quite powerful.


Except you don't have access to the device.  In a VM you have a virtualized device you interact with and the host OS forward packets from the hardware.

Saying a language is powerful is pointless.  Most are touring complete so you can accomplish the same task in any of them.

I don't need access to the device.  I need access to the memory.  Or are you going to tell me that they have separate memory sticks too?  Tongue


Go ahead and write to the memory, you wont be able to address it so it is pointless.  Just because you can compile a program on a machine doesn't mean you can access a device without root access.
full member
Activity: 185
Merit: 100
Their site can obviously handle no more traffic than Susie's Geocities page about beanie babies.
Um, Geocities was once the biggest hosting provider on this planet. They had plenty of resources.

Also, no shared hosting services offers bitcoind, which is quite essential for operating a BTC exchange. I deem this rumor silly.
full member
Activity: 209
Merit: 100
If you successfully compiled or uploaded a packet sniffer on virtual machine #1, it will sniff packets for every other virtual machine on that box.

Each virtual machine is bound to their own IP address so you can't listen to other machines on the same box.  You however could listen to any broadcasts on the local network, or anything else a bare metal server could do.

It is the same physical card in the same physical machine.  C++ is quite powerful.


Except you don't have access to the device.  In a VM you have a virtualized device you interact with and the host OS forward packets from the hardware.

Saying a language is powerful is pointless.  Most are touring complete so you can accomplish the same task in any of them.

I don't need access to the device.  I need access to the memory.  Or are you going to tell me that they have separate memory sticks too?  Tongue

No OS is 100% secure.  And once you start sharing the machine with other people, your level of control and security lowers.  That's just a fact.

Have you had access to the root account on a VPM?  The view is quite a bit different.

newbie
Activity: 47
Merit: 0
Unless they prove them self or have someone as a security expert, it will be much safer for them to use shared hosting rather than a VPS/dedicated server.

This is kind of like saying, "If they're losing, they've lost."  Grin
member
Activity: 70
Merit: 10
Do they mine with their hosting server?

Definitely, because every web server has five 6990s ready to start mining!
member
Activity: 70
Merit: 10
If you successfully compiled or uploaded a packet sniffer on virtual machine #1, it will sniff packets for every other virtual machine on that box.

Each virtual machine is bound to their own IP address so you can't listen to other machines on the same box.  You however could listen to any broadcasts on the local network, or anything else a bare metal server could do.

It is the same physical card in the same physical machine.  C++ is quite powerful.


Except you don't have access to the device.  In a VM you have a virtualized device you interact with and the host OS forward packets from the hardware.

Saying a language is powerful is pointless.  Most are touring complete so you can accomplish the same task in any of them.
full member
Activity: 209
Merit: 100
You also place an inordinate amount of trust on the jail system of the OS -- making sure that the various virtual machines can't see each other across the harddrive(s) they share.

They don't share any hard drives.  In fact each virtual machine has their own install of an OS and they can't mount other volumes from the host machine.

And lastly, you'd be sharing SQL database access with everyone else on the virtual machine.  That could open up vulnerabilities if permissions are not exactly right.

No.  Each machine runs their own services.  Each VM will have a web server, sql, etc or whatever else the operator wants.

I don't think you are correct.  They only appear to be separate services.  And the hard drives are typically jailed in such a way as to APPEAR to be multiple instances of the os.  Appearance is NOT reality.
member
Activity: 103
Merit: 10
Do they mine with their hosting server?
Pages:
Jump to: