News All the latest from Indichosts.net

Apple Push Mail now available on our Linux servers

Apple Push Notifications for MailWe are pleased to announce the availability of Apple Push Notifications for Mail on all our Linux servers. To enable this on your Mac or iPhone you need to enable 'Push' instead of 'Fetch' as the method of getting emails on your device. This settings can be found ... Read More »

31st Dec 1969
Google PageSpeed enabled on select server

We at IndicHosts.net are pleased to announce the immediate availability of Google PageSpeed or mod_pagespeed for your website with our Linux hosting and Semi-dedicated packages. Google PageSpeed dramatically increases the Speed of your website by optimising content delivery without touc... Read More »

31st Dec 1969
HTTP/2 Protocol available

We at IndicHosts.net are pleased to announce the immediate availability of HTTP/2 http2 protocol for your website with our Linux hosting and Semi-dedicated packages.Major Improvements In HTTP/2Single Connection. Only one connection to the server is used to load a website, and that connection remains open as long as the website is open. This reduces the number of round trips needed to set up mu... Read More »

31st Dec 1969
Enable Two-factor Authentication

Recent security developments have made it necessary for us to introduce a 2nd level of security (Two-Factor Authentication) on Customer Portal. This will ensure that even if your Registered email address and CustomerPortal password are compromised, your account will remain secure. To enable time based two-factor authentication, please visit Customer Portal >> My Details >> Security Settings OR Visit URL:  Read More »

31st Dec 1969
Security Advisory: Important Linux Kernel Vulnerability - Fixed

A vulnerability has recently been disclosed in the Linux kernel which affects all supported Linux systems running any distribution.  This vulnerability is serious and may allow a remote exploit or local user to cause privilege escalation, resulting in root access to your server. A working example of the exploit has already been publicly disclosed, thus no advanced knowledge of the Linux kernel is required to gain root access once shell access has been obtained on the target system. Read More »

31st Dec 1969