relevancenofollow
nofollow 时间:2021-05-23 阅读:(
)
AnatomyofCommentSpam2014,Imperva,Inc.
1.
ExecutiveSummarySpamisdefinedasirrelevantorunsolicitedmessagessentovertheInternet,typicallytolargenumbersofusers,forthepurposesofadvertising,phishing,spreadingmalware,etc.
Byspammingmultipletargetsoveralongperiodoftime,spammersareabletogainprofit,anddoharm.
Liketheflyersinourmailboxes,digitalspamstarteditspathtogloryviaemail.
However,withtheevolutionofwebtechnologiesandwebsiteinteraction,spammershavemovedtoreachingusersviatheweb,injectingspamcommentsintoforums,commentfields,guestbooks,andevenwebsiteslikeWikipedia,whichallowusergeneratedcontenttobepublished.
Andthus,commentspamwasborn.
Commentspammersaremostoftenmotivatedbysearchengineoptimization,sothattheycanuseapromotedsiteforadvertisementandmalwaredistribution.
Attackersarealsoknowntousecommentspamforthepurposeofclickfraud.
Thecommentspamissuehasbecomesoprevalentthatorganizationsarefightingback,byimplementingmitigationservices.
Interestingly,therehavebeenincidentsofspammersfightinganti-spammersinanattempttoshutdownthosemitigationservices,andmanyofthosecounterattackshavebeensuccessful.
Wedecidedtostudythecommentspamspacefrombothends.
Inourresearch,weexaminedtheattacker'spointofview,includingthecommentspamtechniquesandtools.
Inaddition,weexaminedthevictim'spointofviewtounderstandhoworganizationsdealwithcommentspamtoday.
1.
1KeyFindingsOverthecourseoftwoweeks,fromSeptember1toSeptember14in2013wemonitoredcomment-spammeractivityagainstmorethan60differentapplications.
Herearesomeofourkeyfindings:58percentofallcommentspammersareactiveforlongperiodsoftime.
17percentofallcommentspammersgeneratedthemajorityofcommentspam.
Inordertounderstandhowacommentspammerattacksawebapplication,welookedcloselyatasinglevictim.
Thisreportincludesthiscasestudyandwhatwehavelearned:80percentofcommentspamtrafficisgeneratedby28percentofattackers.
Overtime,commentspammersincreasedtheirvelocityagainsttheattackedwebsite.
1.
2MainConclusionsOurconclusionswerestraightforward:Identifyingtheattackerasacommentspammerearlyon,andblockingtherequests,preventsmostofthemaliciousactivityIPreputationwillhelpinsolvingthecommentspamproblem,byblockingcommentspammersearlyintheirattackcampaigns2TableofContents1.
ExecutiveSummary.
12.
Introduction.
33.
TheAttacker'sPointofView.
44.
CommentSpaminPractice.
45.
TheVictim'sPointofView106.
MitigationTechniques.
126.
1ContentInspection.
126.
2SourceReputation126.
3Anti-automation136.
4Demotivation.
136.
5ManualInspection.
137.
CaseStudies.
147.
1AnalyzingaSingleVictim.
147.
2AnalyzingaSingleAttacker.
157.
3AttackersAbuseGoogleAppEngineforCommentSpam.
198.
SummaryandConclusions.
2032.
IntroductionWikipedia'sdefinitionforcommentspam1:"Commentspamisatermusedtorefertoabroadcategoryofspambotpostingswhichabuseweb-basedformstopostunsolicitedadvertisementsascommentsonforums,blogs,wikisandonlineguestbooks.
"Anexampleforacommentspammedsite:Figure1–ASpammedSiteExampleAttackersusecommentspamforvariousreasons.
Themostsignificantoneis'SearchEngineOptimization'(SEO)–improvingasite'srankingwithinasearchengineresultset(withrespecttogivensearchterms).
Asiterankingwithinasearchengineresultsetisbasedonthenumberandqualityofwebsitesthatholdlinkstoit(AKA"backlinks").
Thus,postingmanycommentscontaininglinkstoatargetsiteincreasesitsrankingwithinsearchengineresultsets(especiallywithrespecttokeywordssurroundingthelink).
Attackersthenusethepromotedsiteforadvertisement(usuallyofdubiousmerchandise)andmalwaredistribution.
AttackersarealsoknowntousecommentspamforthepurposeofClickFraud.
1http://en.
wikipedia.
org/wiki/Comment_spam43.
TheAttacker'sPointofViewThereareafewbasicstagesanattackerfollowswhenaspiringtoproducecommentspamtraffic.
Eachofthesestagescanbeperformedseparatelyandneedstobefine-tuned:TargetAcquisition(AKAURLharvesting):Thetaskoffindingqualityvulnerablewebsitestopostcommentsonisnamed"URLharvesting".
TheURL'squalityismeasuredbytherelevancetothepromotedsite;theURL'sownsearchengineranking;thedifficultyofpostingcomments(forexampleun-protectedpublicpostsorCaptchaprotectedposts)andthesite'spolicyregardingsearchengines(forexamplethefollow/nofollowvalueofthe"rel"attributeofhyperlinks).
Posting:PostthecommentsonthechosenURLs.
Verification:Verifythatthecommentswereindeedpublished.
4.
CommentSpaminPracticeTheattacker'ssuccessreliesonpublishingcommentspaminlargescales.
Largescalecommentspamisachievedbyautomatingtheaforementionedcommentingprocess.
Forthispurpose,automatictoolsweredevelopedwhichsupportthisprocessandoffercomplementaryservices.
Thetools'inputisasetofkeywordsrelevantforthepromotedsite.
Theautomatedtoolsmayencompassallofthefollowingsteps,oronlypartofthem:URLharvesting:Automatictoolsusepopularsearchenginestolocaterelevantwebsitesbasedoninputkeywords.
Uponsuccess,thetoolexploresthefoundwebsites,inordertolocatesuitableURLsforcommenting.
Blogsarethemostpopularwebsitesforcommentspamposting.
Infact,sometoolsarelimitedtoharvestingonlyblogs,andspecificallyWordPressblogs.
Figure2-AutomatedTool(G-LockBlogFinder)forHarvestingshowsanexampleofanautomatedtool(G-LockBlogFinder)whichspecificallyofferstoharvestblogs.
Theuserspecifiedaninputkeyword:"music",andthetoollocatedarelevantsetoftargets.
Figure2–AutomatedTool(G-LockBlogFinder)forHarvestingBlogs5Someattackersskiptheharvestingstage,bypurchasinglistsofhighqualityURLs–URLswithhighsearchenginerankingandwhichautomaticallyapprovecomments.
Thusmany'qualityURLs'listsareavailableforpurchaseonblackhatSEOforumsandspecificsites(Figure3showsanexample).
AtypicalpriceforaURLlistis$40forapproximately13,000URLs.
Figure3–URLListsforSaleCommentgeneration:Relevantverbalcommentsareattachedtothepromotedsitelinks.
ThisservestheSEOtechniqueandprovidesamoreauthenticcomment.
Theverbalcommentsareproducedaccordingtotheinputkeywords.
Figure4showsanexampleofacommentthatwasautomaticallygeneratedbythe'CommentBlaster'toolfortheinputkeyword'music'.
Figure4–AutomaticCommentExampleThecommentinFigure4iswrittenin"Spintax"format.
Onewaytomitigatecommentspamistoblockduplicatecomments.
Spintaxisanautomaticmethodthatwasdevelopedbyspammers,inordertoavoidthispitfall.
Theideaisforthespammertocreateagenericcommentusingaspeciallyformattedsyntax.
Thisgenericcommentcanbespunintomanydifferentcommentswithasimilarmeaning.
Figure5showsanexampleforthe"Spintaxphrase"andtheresultingcomments2.
2http://umstrategies.
com/what-is-spintax/6TheSpintaxphraseinFigure5hasafewpossiblevariations.
Foreachuniquecomment,thetoolselectsaspecificcombination.
Theresultisafull(hopefullysensible)comment.
Figure6showsanexampleofaSpintaxcreatedbyScrapeBox.
Thistoolenablestheusertoinputakeyword,orinput/edittheSpintaxitself.
Figure6–ScrapeBoxSpintaxExample7Posting:ToolsoffertoautomaticallypostcommentsonmanyURLsatonce.
Sometargetsrequiredifferentformstobefilledinordertosubmitcomments,suchas:userauthentication,Captchaformsoruserdetails.
Sophisticatedtoolsincorporateservicestohandlethesechallenges.
Figure7showshowtoconfiguretheScrapeBoxtooltohandleCaptchachallenges.
Figure7–ScrapeBoxCaptchaSolving8Verification:Toolsprovidefeedbacktotheuserspecifyingwhetherornotacommentwasposted.
Figure8showsanexampleoftheScrapeBoxtoolstatusreport.
Figure8–ScrapeBoxPostingStatusReport9Therearemanyautomatedtoolsthatholdallorpartofthefunctionalitiesdiscussedinthissection.
ThepopularimplementationsaretheScrapeBoxtool,whichoffersallthementionedfeaturesandisshowninFigure9.
TheGscrapertoolisanewalternativethatofferssimilarfeatureswithsimilarpricing.
Figure9–AScrapeBoxScreenshotWeexploredonesideofthecommentspamattack–theattackerpointofview.
Inthenextsection,weexaminetheotherside–thevictim'spointofview.
Thisprovidesusabetterunderstandingoftheessenceoftheattack,andtheoptionalmitigations.
105.
TheVictim'sPointofViewWeobservedalargeamountofdatainordertothoroughlyunderstandthequantitativeaspectsofcommentspamtraffic.
Thedatawascollectedthroughthereal-timemonitoringofattackdataagainstmorethan60webapplications.
Wefocusedonaperiodoftwoweeks,fromSeptember1toSeptember14in2013anduseddifferentfilterstoleaveonlytrafficthatisclearlycommentspam.
Wethenanalyzedthebehavioroftheseattacksovertime,andacrosstargets.
Wealsoperformedcalculationsofstatisticalpropertiesofthemalicioustraffic.
Wediscoveredthatmostofthecommentspamtrafficoriginatedfromattackerswhohavebeenactiveforlongperiods,andattackedmultipletargets.
Toillustratetheexactrelationshipbetweenthenumberofattackedtargetsperattacksource,andthedurationoftheattacker'sactivity,wedesignedan"Attack-SourceReputationQuadrant"graph(SeeFigure10.
ThisgraphwasfirstintroducedinaourpreviousHII3).
Figure10–AttackSourceReputationQuadrantforCommentSpamInan"Attack-SourceReputationQuadrant"graph,theY-axisrepresentsthenumberoftargetsthatwereattacked,andtheX-axisrepresentsthedurationofanattack.
Accordingly,eachdotinthegraphrepresentsanattacksourceandcorrespondstothesource'slongevityandthenumberoftargetsithasattackedduringthecourseofouranalysis.
ToexpresstheAttack-SourceReputationQuadrantasagraph,weaddedtwomoredivisions.
ThefirstisaverticallinealongtheY-axiswhichseparatesattacksourcesofthoseactiveonlyduringasingleday,fromthoseactiveformorethanasingleday.
Thesecondisahorizontallinewhichsimilarlyisolatesattacksourcesthatattackedonlyasingletargetfromthosethatattackedmultipletargets.
Therearefourdifferentquadrants:Theupperleftquadrant(inpurple)includesallattacksourcesthatwereactiveforonlyonedayandattackedmorethanonetarget.
Theupperrightquadrant(inblue)includesallattacksourcesthatwereactiveformorethanonedayandattackedmorethanonetarget.
Thelowerleftcorner(inred)includesallattacksourcesthatwereactiveforonlyonedayandattackedonlyasingletarget.
Thelowerrightquadrant(ingreen)includesallattacksourcesthatwereactiveformorethanonedayandattackedonlyasingletarget.
3http://www.
imperva.
com/resources/hacker_intelligence.
asp11Toquantifythedata,we'veenhancedtheAttack-SourceReputationQuadrantwithtwopie-charts(color-codedtothequadrants,respectively):Thetoppiechartrepresentsthepercentageofattacksources,withineachquadrant.
Thebottompiechartrepresentsthepercentageoftraffic,withineachquadrant.
Figure10showsthatmostoftheattackers(72percent)areintheredzone,whichmeanstheywereactiveonlyforasingleday,andattackedonlyasingletarget.
Nonetheless,mostofthecommentspamtraffic(58percent)isinthebluezone,whichmeanstheywereactivemorethanoneday,andattackedmorethanonetarget.
Wefocusedontheupperrightquadrant(blue)andexploredthetraffic.
Wediscoveredthatarelativelysmallnumberofattackersareresponsibleforalargeamountofthecommentspamtraffic.
Figure11showsthecumulativepercentageofcommentspamtrafficfromtheattackersinthebluequadrant.
Theattackersaresortedbydominance:attacker#1producedthehighestnumberofattacksinthegivenperiod,etc.
Figure11–TheCumulativePercentageofCommentSpamTrafficThegraphshowsthat80percentofthecommentspamtrafficwasgeneratedby28percentoftheattackers.
126.
MitigationTechniquesWebsitescandefendthemselvesagainstcomment-spamattacksusinganumberofmitigationtechniques.
Following,aresomeofthepopularonesatusetoday.
6.
1ContentInspectionThecontentinspectiontechniqueisbasedoninspectingthecontentofthepostedcomments,accordingtoapredefinedsetofrules.
Rules,forexample,mightbe:toomanylinksinonecomment;logicalsentencesthatarerelatedtothesubjectathand;andnoduplicatecomments.
Insuchsystemsatradeoffexistsbetweenfalse-positiveandtrue-negativerates,dependingontherulesdefinitions.
Akismet4isacommentspamdetectionservicethatusesacombinationofmitigationmethods,amongthemthecontentbasedtechnique.
Whenusingit,eachcommentissenttotheAkismetservers.
Theserverscheckthereceiveddata,andreturnatrue/falseanswer.
Figure12–AkismetMotoContentbasedmitigationcanrelyonthereputationofthehyperlinkspostedwithinthecomments5.
Oncealinktoaspecificwebsiteappearsintoomanycommentsontheweb,orinrequeststhataresuspiciousenoughtobecreatedusingcommentspamtools,thepromotedwebsitemaygainabadreputation.
Thisreputationcanbeusedtoblockcommentscontainingthesehyperlinks.
"Penguin"6isarecentupdatetotheGooglesearchenginethatusesthiskindofinformation,andpenalizeswebsitesthatareknowntousecommentspamtools.
6.
2SourceReputationThismitigationtechniqueisbasedonidentifyingwhetheracommentisspamaccordingtothereputationoftheposter.
Sourcereputationisbasedonwhetherpreviouslyseentrafficfromthatsourcewasconsideredcommentspam.
Onlinerepositories,basedoncrowdsourcing,wereset-upforthesepurposes.
Therepositoriesareusedtobothreportspamandtocheckacommentsourcereputation.
Thetwomostpopularrepositoriesarewww.
projecthoneypots.
organdwww.
stopforumspam.
com.
Ourresearchfoundthemratherreliable.
4http://www.
akismet.
com5http://www.
securelist.
com/en/analysis/204792295/Redirects_in_Spam6http://en.
wikipedia.
org/wiki/Google_Penguin136.
3Anti-automationAnti-automationtechniquescanbeusefulforcommentspammitigation,asautomatictoolsarefrequentlyusedtoproducecommentspamtraffic.
Onesimpleoptionisaddingacheckboxtoindicatewhetherauserwishestopostacomment.
RegularlychangingtheHTTPfieldnameforthischeckboxisusefulagainstthemoresophisticatedtools.
AmorecomplexoptionisusingtheCaptcha7mechanism.
Whenusingit,eachcommentpostrequiresenteringanobfuscatedtextdisplayedonthepage.
Figure13–CaptchaChallengeforPostingaComment6.
4DemotivationThedemotivationtechniquestrivestomakecommentspamuseless.
Thiscanbeachievedbythefollow/nofollowvaluethatcanbeassignedtothe"rel"attributeofanHTMLanchor()elementwhichdefinesahyperlink8.
Itspecifieswhetheralinkshouldbefollowedbythesearchengine'sindexingalgorithm.
Settingthe"nofollow"valueforpostedcommentsdecreasesthecommentspammotivation.
ThisisdemonstratedinFigure14.
Frameworkscanusethisvaluetodemotivatecommentspammers.
Forexample,WordPress1.
5andaboveautomaticallyassignsthenofollowvaluetoalluser-submittedlinks9.
AnotherexamplefordemotivationisthePenguin10updatetoGooglesearchenginealgorithmthatfocusesondecreasingthesearchenginerankingofwebsitesthatareconsideredtousecommentspamtechniques.
6.
5ManualInspectionManualinspectionisveryeffectiveforidentifyingcommentsasspam.
Itsprimarydrawbackisitslossofscalability–asspamincreases,manualinspectionofitbecomesimpractical.
Thistechniqueiseffectiveagainstmanualcommentspam,duetotherelativelysmallamountofspamthatcanbemanuallyposted(andinspected).
7ttp://en.
wikipedia.
org/wiki/CAPTCHA8http://en.
wikipedia.
org/wiki/Nofollow9http://codex.
wordpress.
org/Nofollow10http://en.
wikipedia.
org/wiki/Google_Penguin147.
Casestudies7.
1AnalyzingaSingleVictimInordertobetterunderstandthecommentspamattackpattern,wetookacloserlookatthespamtrafficdirectedatasinglevictim.
Wechoseonewebsitethatwasreceivingagreatamountofcommentspamtraffic.
Itconsistsofasinglehost,withmanyURLs.
Thevictimisanon-profitorganizationthatsuppliesinformationandsupportsacommunityofusers.
Wegathereddataoveraperiodofonemonth,thatproduced384eventsfromSeptember1sttoSeptember30th2013.
Wediscoveredahighdiversityinthevolumeofcommentspamtrafficfordifferentpages.
OurtheoryassociatespopularphraseswithintheURLaddressandpagecontent,totheattackrate.
Wedocumentedattackson119URLs.
Figure15showsthenumberofeventsforeachURLindescendingorder,i.
e.
URLonereceivedthehighestnumberofevents,andsoon.
Figure15–URLPopularityGraphThegraphshowsthattargetonehadsignificantlysufferedmorecommentspamcomparedtotheothertargetsonthatsamehost.
Ithadapproximately10timesmoreeventscomparedtothenextURLinorder.
Apotentialexplanationcanbethattargetonecontainsthepopularphrase'weightgain'initsURLaddresswhichdrawscommentspamattackers.
Thisphraseappearsfrequentlywithinthepagesuchas"causesofweightgain"and"Howcanthisweightgainbeprevented".
15Wediscoveredthatasmallnumberofsourcesproducedmostofthetraffic.
Figure16showsthecumulativepercentageofcommentspamtrafficgeneratedbysourceIPs,tothetarget,athand.
Figure16–TheCumulativePercentageofCommentSpamTraffictoaSingleTargetWecanseeinFigure16,52percentofsourceIPsproduceapproximately80percentofthetraffic.
7.
2AnalyzingaSingleAttackerInordertothoroughlyunderstandthecommentspamtrafficwefocusedonahighlyactiveattacker,andexaminedbothitstrafficquantitativeandqualitativeaspects.
Wediscoveredthattheattackerwasactiveforalongperiod.
Weidentified61HTTPrequestsascommentspamduringaperiodoftwoweeks.
Figure17showsthenumberofrequeststheattackersenteachday,duringthosetwoweeks.
Figure17–RequestsperDayforaSingleAttackerTheattackerwasactivefortendaysandthenumberofrequestsperdayhadincreasedduringtheperiod.
Identifyingthisattackerasacommentspammerearly,andblockingitsrequests,wouldhavepreventedmostofitstraffic.
16Theattackerhadafewtargets,andmostofthemsufferedarelativehighamountofcommentspamattacks.
Theinvestigateddataincluded61eventstargetingfivedifferentwebsites.
Figure18showsthepercentageofthetrafficreceivedbyeachtarget.
Figure18–PercentageofTrafficperTargetAsshowninFigure18,mostofthetargetsreceivedroughly,anevenportionofthetraffic(exceptfromtargetfive).
Inaddition,oncetheattackerattackedacertaintarget,itwaslikelytoattackitagain,inthefollowingdays.
Forexample,theattacksontargettwohavespannedovereightdays,ofthetwoweekperiod.
Theautomatedtoolusesinputparameterswithnoreassurancetheyarebeingpubliclyavailableonthesite.
Figure19showsascreenshotofatargetedpage.
Theattacker'stargetwasthe"comments"field,howeverthecommentsareforanorderbeingmade,andwillnotbepublishedonthesite.
Webelievethishappensduetolackofverificationbytheautomatedtools–theyharvesttargetswitha"comment"parameter,anddonotverifythatthevalueisactuallybeingpublishedonthesite.
17Figure19–ACommentSpamTargetWeanalyzedthecontentofcommentsandlearnedthehyperlinksinasinglerequestarefordifferentsitesandconsecutiverequestshavesimilarhyperlinks.
Therequestsproducedbythetoolwillholdcommentscontainingdifferentwebsitestopromote.
Thosecommentswillberestructuredinconsecutiverequests,inordertoavoiddefensemechanisms.
Inthecaseathand,theattackersent48requestscontainingsevendifferentURLs.
Thecommentshaveabasicreoccurringstructure:18Error!
Referencesourcenotfound.
showstwocomments,forexample,thatholdeightURLs,withfiveuniquevalues.
Figure20–ExamplesofCommentsWhenfeedingthemtoabrowser,wesawthatsixofthemleadtothesamewebsiteofapharmaceuticalcompany(markedinyellow).
TheothertwoURLs(markedinblue)belongtoanotherwebsite.
UsingtheseURLsasjumpingboards,preventsthepromotedwebsitesfromgainingabadreputationfromusingcommentspamtools,andavoidshavingidenticalcomments(seeSection6:MitigationTechniques).
197.
3AttackersAbuseGoogleAppEngineforCommentSpamThe"GoogleAppEngine"11isaserviceprovidedbyGoogle,whichallowsuserstorunwebapplicationsonGoogle'sinfrastructure.
Oneespeciallyeasy-to-createapplicationisawebproxy,whichcanbeusedtogeneratecommentspamtraffic.
Figure2112showsaseriesofsimplestepsforcreatingaproxyusingtheGoogleAppEngine.
Figure21–StepstoTurnGoogleAppEngineintoaProxy11https://developers.
google.
com/appengine/docs/whatisgoogleappengine12http://www.
labnol.
org/internet/setup-proxy-server/12890/HackerIntelligenceInitiativeOverviewTheImpervaHackerIntelligenceInitiativegoesinsidethecyber-undergroundandprovidesanalysisofthetrendinghackingtechniquesandinterestingattackcampaignsfromthepastmonth.
ApartofImperva'sApplicationDefenseCenterresearcharm,theHackerIntelligenceInitiative(HII),isfocusedontrackingthelatesttrendsinattacks,Webapplicationsecurityandcyber-crimebusinessmodelswiththegoalofimprovingsecuritycontrolsandriskmanagementprocesses.
Inourresearch,wemonitoredalistofIPaddressesknowntogeneratecommentspam.
ThemostdominantIPinthegroupwasanaddressregisteredtoGoogleAppEngine.
ThistechniqueisusedbyspammerstobypassreputationcontrolsbasedonIPaddresses,sincemostoftenaddressesofGoogleAppEngine(andthoseofothercloudservices)areexplicitlywhitelisted.
Infact,inourowndataset,weareabletoidentifylegitimatetrafficfromthesameIPaddresswhichbelongstoadifferentapplication(forexamplethe"feedly"application13).
AmorecarefulinspectionoftherequeststructurerevealedthatanapplicationID(appID)isspecifiedintheHTTPuser-agentfield–probablyinsertedbyAppEngineinfrastructure.
8.
SummaryandconclusionsStudyingthecommentspamspacefrombothends,andtakingintoaccountallexistingmitigationtechniques,wehavecometothefollowingconclusions:Identifyingtheattackerasacommentspammerearlyonandblockingitsrequestspreventsmostofthemaliciousactivity.
IPreputationwillhelpinsolvingthecommentspamproblem,byblockingcommentspammersearlyonintheirattackcampaignsAsofApril2014,ImpervaoffersaCommentSpamIPreputationfeedthroughitsThreatRadarservices,tohelpcustomersmitigatethecommentspamproblem.
13http://cloud.
feedly.
com/#welcome
青果网络QG.NET定位为高效多云管理服务商,已拥有工信部颁发的全网云计算/CDN/IDC/ISP/IP-VPN等多项资质,是CNNIC/APNIC联盟的成员之一,2019年荣获国家高薪技术企业、福建省省级高新技术企业双项荣誉。那么青果网络作为国内主流的IDC厂商之一,那么其旗下美国洛杉矶CN2 GIA线路云服务器到底怎么样?官方网站:https://www.qg.net/CPU内存系统盘流量宽带...
ihostart怎么样?ihostart是一家国外新商家,主要提供cPanel主机、KVM VPS、大硬盘存储VPS和独立服务器,数据中心位于罗马尼亚,官方明确说明无视DMCA,对版权内容较为宽松。有需要的可以关注一下。目前,iHostART给出了罗马尼亚vps的优惠信息,罗马尼亚VPS无视DMCA、抗投诉vps/2核4G内存/40GB SSD/100M端口月流量2TB,€20/年。点击直达:ih...
数脉科技怎么样?数脉科技品牌创办于2019,由一家从2012年开始从事idc行业的商家创办,目前主营产品是香港服务器,线路有阿里云线路和自营CN2线路,均为中国大陆直连带宽,适合建站及运行各种负载较高的项目,同时支持人民币、台币、美元等结算,提供支付宝、微信、PayPal付款方式。本次数脉科技给发来了新的7月促销活动,CN2+BGP线路的香港服务器,带宽10m起,配置E3-16G-30M-3IP,...
nofollow为你推荐
combininggoogleloadediosboxiphone三星苹果5127.0.0.1为什么输入127.0.0.1无法打开页面ipad上网为什么我的ipad 显示无法连接到网络xp关闭445端口Windows XP系统 关闭445端口后无法上网,求解?重庆电信宽带管家重庆电信宽带多少钱一个月360chrome360Chrome 世界之窗极速浏览器 ChromePluswin7关闭135端口win7下怎么关135和8909端口
如何注册域名 东莞服务器租用 国外免费域名网站 淘宝抢红包攻略 GGC 香港加速器 z.com 线路工具 牛人与腾讯客服对话 绍兴高防 秒杀预告 如何注册阿里云邮箱 香港亚马逊 日本代理ip 双十二促销 winserver2008 alertpay 服务器操作系统 ddos攻击软件 电脑主机 更多