Blog - FullHost ®

VENOM Security Vulnerability

Earlier today, CVE-2015-3456, a security vulnerability known commonly as VENOM was published earlier this morning. This vulnerability affects all of our clients on our KVM virtualization environment but does as well affect Xen virtual machines as well. There is no

Posted in FullHost News, Infrastructure, Security and Vulnerabilities

Five Reasons to Optimize Your Website for Mobile Phones

Before mobile browsing became what it is today, it was nothing more than a joke. At a time when Nokia and Symbian OS ruled the mobile market, the cell phones that were available had large keypads, clunky graphics, and tiny

Posted in Domain

Managed Cloud as a Service, The Key to an Agile IT Infrastructure  

The whole premise behind a managed private cloud is that it gives organizations the freedom to get the computing power and/or storage capacity that they need, on-demand.  When you think about a private cloud, you have to think about it

Posted in Helpful Hints and Tips

Why Merchants Should Become PCI Compliant

Whether you are a large corporation or a small Internet business, you need to receive payment from your clients for your product or service. If you accept credit cards as a method of payment, then it is crucial that you

Posted in Security and Vulnerabilities

Five Server Response Codes Important for SEO

Each web server responds to bots and users with a numerical code. Web users don’t see this numerical code, but search engine bots execute different processes relative to the response code. These response codes are generally unimportant for website visitors,

Posted in Helpful Hints and Tips