Feel free to provide some context if possible.
Not much more to say, as it appears that Epik has shut down DNProtect. I am no longer associated with DNProtect or Epik.Feel free to provide some context if possible.
I consider Name.com to be one of the safer registrars. For example, you get an email the instant someone logs into your account.
I hope these very valuable names are returned to Gregg.
That "kind of" helps, but hackers getting into the account can get around it. Or, if they're fast enough, they usually will get into the account while you're sleeping and not checking email.For example, you get an email the instant someone logs into your account.
Yeah, kind of an amateur-ish move to move them to Namecheap. If they knew what they were doing, they would have moved them to a Chinese registrar, outside of the USA. If it's moved to a Chinese registrar, given the current environment, you're pretty much NOT going to get those domain names moved back to a US-based registrar unless you file a UDRP.Anyone with any ideas as to why they thought to move them to Namecheap and not somewhere else.
Very interesting! So basically there are times when the hackers DONT want to change your email password, they just monitor the hacked email messages and delete pertinent notification emails to cover their tracks...That "kind of" helps, but hackers getting into the account can get around it. Or, if they're fast enough, they usually will get into the account while you're sleeping and not checking email.
I can't tell you how many stolen domain names I've recovered that had this "feature" turned on.
If you're thinking that your registrar having this email notification feature gives you peace of mind and that it will stop someone from stealing your domain, you're sadly mistaken, unfortunately.
Many domains are stolen because someone hacked into the email account. And if they don't change the password on your email account, then they're going to just delete those notification emails. You'll never see them.
Yeah, kind of an amateur-ish move to move them to Namecheap.
So, there is another security tip btw. In todays environment, domainers should maintain unique e-mail boxes for each registrar, and these emails should not be used anywhere else. Neither in whois (private or public), nor for correspondence (except with the registrar in question). If the hacker does not know account contact email, he will have difficulties determining the email hosting company to attack...In this instance, the most likely route of attack appears to have been the hosting company for the account contact email address.
If the hacker does not know account contact email, he will have difficulties determining the email hosting company to attack...
HiIt's just one of many prizes obtained in the broader general compromise of the hosting comapny and then sold to someone looking for that sort of thing.
John, can you share the name of this hosting company? NP members may also have accounts with that company, so the information is important... to change passwords etc. at least...I believe a more likely scenario in this instance is a general compromise of the hosting company, and that access to the email address was a bonus that was sold off along with other bounty obtained in the compromise.
Tatiana, did I read this correctly - your name.com domains somehow ended up on NameCheap, which is in fact operated from Ukraine (and probably UA-owned) by the way, as the result of sanctions? I don't get it...name.com - Safe, yeah