Server Solutions
Dedicated Server Rental Meet your physical server needs with dedicated server rental Explore Now
Virtual Servers Scalable, high-availability server rental services with our high-performance cloud server solutions. Explore Now
İlkbyte Cloud Fully developed by Netinternet, flexible and scalable cloud servers with cloud technology Explore Now
GPU-Based AI Infrastructure High-performance GPU solutions created on a project basis for your AI and machine learning projects Explore Now
Server & Hardware Procurement Server and hardware procurement services with equipment suitable for your projects Explore Now
Customized Infrastructure Solutions Custom-designed infrastructure solutions and technical consulting services for your unique needs Explore Now
Hosting Services
Cabinet Rental Dedicated 15U, 24U and 48U smart cabinet systems allocated for you Explore Now
Server Colocation Individual server hosting service in shared cabinet systems Explore Now
Premium Connectivity Fast and reliable internet access with multi-carrier, multi-IXP and high-capacity Anti-DDoS protection Explore Now
Telecom Data Center Circuit Low-cost and high-performance internet access through a dedicated data center tariff Explore Now
Cross-Connect Direct connection between network carriers with low latency and high performance Explore Now
IP Address Pricing IP address and ASN rental services with RIPE LIR management services Explore Now
Managed Services
Managed Server Installation, configuration, regular maintenance, updates and 24/7 monitoring of your server operating system Explore Now
Managed Infrastructure End-to-end management of your entire IT infrastructure including data center, storage, virtualization and backup Explore Now
Managed Network Professional management and monitoring of network devices (router, switch, firewall) configuration, optimization and performance Explore Now
Managed Cloud (Public / Private) Professional management of your public and private cloud infrastructures to meet your cloud needs Explore Now
Managed Security 24/7 monitoring, analysis and response services against cyber security threats Explore Now
Managed Backup & Disaster Recovery Backup and disaster recovery plans, implementation, operation to ensure your data security and business continuity Explore Now
License Rental
cPanel Licenses cPanel software license rental solutions Explore Now
Plesk Licenses Plesk software license rental solutions Explore Now
DirectAdmin Licenses DirectAdmin software license rental solutions Explore Now
LiteSpeed Licenses LiteSpeed software license rental solutions Explore Now
CloudLinux Licenses CloudLinux software license rental solutions Explore Now
Cyber Security
HEIMWALL Fully developed by Netinternet, protect against cyber attacks with our Web Application Firewall solution Explore Now →
AntiDDoS High-capacity volumetric Anti-DDoS protection provided free by default on all our services Explore Now →
VPN Solutions Secure, encrypted tunnel connections for your remote offices and employees with our managed VPN solutions Explore Now →
Layer4 Stateless Firewall Layer4 stateless firewall solution for filtering and directing incoming traffic Explore Now →
SSL Certificates Secure connection solutions with free and paid SSL/TLS certificate options Explore Now →
Penetration Tests Penetration tests performed by third parties in cooperation with TSE-approved testing firms Explore Now →
Corporate Email
Corporate Email Solutions Fully domestic, KVKK compliant, 100% compatible with Outlook and all mail programs, professional, uninterrupted email service Explore Now →
Bulk Email Sending Manageable bulk email sending services with high delivery rates for your marketing campaigns Explore Now →
Email Archiving Secure archiving of all your email traffic to protect corporate memory and comply with legal requirements Explore Now →
Free Email Migration Service Wherever your email service is, we migrate you to Netinternet corporate email solution for free! Explore Now →
Traditional Web Hosting
cPanel Web Hosting Fast and reliable hosting packages with easy setup and management using cPanel, the world's most popular hosting management panel. Explore Now →
cPanel Reseller Hosting Fully customizable cPanel-based reseller hosting solution for starting your own hosting business Explore Now →
DirectAdmin Reseller Hosting Scalable and cost-effective reseller hosting powered by lightweight DirectAdmin control panel Explore Now →
Free Hosting Migration Service Professional migration services to move your existing systems to Netinternet data center infrastructure Explore Now →
Domain Names
Domain Registration Services Domain registration and easy management at the most affordable prices in all popular extensions (.com, .net, .org, etc.) Explore Now →
Domain Transfer Services Transfer your domains to Netinternet for professional domain management services Explore Now →
Domain Reseller Flexible and reliable reseller program and integration services for offering domain registration to your customers Explore Now →
Free Hosting with Domain Free hosting service for domains registered or transferred to Netinternet Explore Now →
Hosting & Cloud Service Providers High-density infrastructures, multi-tenant architectures and SLA-focused sustainable data center solutions for hosting and cloud providers Explore Now →
E-Commerce Companies High-performance, secure and uninterrupted e-commerce infrastructures resilient to sudden traffic surges during campaign periods Explore Now →
Software Developers Developer-friendly infrastructure solutions with CI/CD compatible, API-supported, automation-ready flexible resource management Explore Now →
SaaS Providers Scalable, high-availability and continuity-focused cloud infrastructures suitable for SaaS architectures serving many users. Explore Now →
AI & R&D GPU-based high-performance and scalable infrastructures for big data processing, model training and high computation tasks Explore Now →
Agencies & Marketing Multi-client management compatible, quick setup, high-performance and flexible web hosting infrastructures Explore Now →
Media & Broadcasting High bandwidth and low latency infrastructure solutions for live streaming, video and heavy content traffic Explore Now →
Banks & Fintech Regulation-compliant, Tier-3/Tier-4 standard, highly secure financial infrastructures ensuring uninterrupted service Explore Now →
Government & Education Long-term, sustainable and secure infrastructure solutions compliant with regulations and data security requirements Explore Now →
Manufacturing / Industry Low-latency and high-availability infrastructure solutions compatible with Industry 4.0, IoT and production automation systems Explore Now →
Healthcare Organizations Highly secure and uninterrupted health informatics infrastructures prioritizing patient data privacy and continuity Explore Now →
HEIMWALL – Web Application Firewall Protect your web applications against advanced attacks with our 100% domestic WAF platform HEIMWALL Explore Now →
Ilkbyte - Cloud Server Service Scalable and high-performance cloud servers deployable in seconds with our domestically developed orchestration infrastructure Explore Now →
Netrafix - Bandwidth Monitoring Manage 5651 compliant logging and bandwidth billing (Burst, Traffic Quota, 95th Percentile) in one platform with sFlow, NetFlow and IPFIX supported Netrafix Explore Now →
Secure Internet - For ISPs Keep your DNS traffic in your own network with 100% domestic DNS software developed for authorized ISPs Explore Now →
DirectIP - IP Management System 100% domestic IP management platform developed by Netinternet for centralized IP address, subnet, VLAN and DHCP management Explore Now →
RuleDNS - Rule-Based DNS Management Dynamically manage DNS responses with rule-based RuleDNS, easily integrate CDN and services with API support Explore Now →
Documents / Whitepapers Developer-focused technical documentation covering all API endpoints, usage scenarios and automation examples Explore Now →
API Documentation Developer-focused technical documentation covering API endpoints, usage scenarios and automation examples for platform integration Explore Now →
Peering Policies Reference policies transparently explaining our network architecture, traffic exchange principles and peering criteria Explore Now →
Frequently Asked Technical Questions Clear and actionable answers to the most frequently asked technical questions about infrastructure, security and operations Explore Now →
System Status Status page transparently sharing real-time status, planned maintenance and past outages of all platforms and services Explore Now →
Our Physical Data Center
Our Physical Data Center Our corporate data center facility designed with high security standards and redundant power and cooling infrastructure Explore Now →
Power, Cooling, Security Facility architecture designed for critical infrastructures with redundant power lines, climate systems and multi-layered physical security Explore Now →
Internet Access Points Low-latency and high-availability backbone connections through multiple operators and internet exchange points Explore Now →
Network Infrastructure
Network Infrastructure Uninterrupted connectivity infrastructure with multi-carrier connections, redundant backbone and high-capacity network architecture Explore Now →
Network Policies Sustainable network operation policies with transparently defined rules for traffic management, peering, security and capacity usage Explore Now →
Planning and Processes Scalable and controlled network management approach with pre-designed network capacity planning, growth scenarios and operational processes Explore Now →
Certificates and Documents
Our Certifications We provide auditable and sustainable infrastructure standards with our certifications for information security and service continuity Explore Now →
Security Policy We ensure protection of infrastructure and data with our security policies covering information security, access control and risk management Explore Now →
KVKK Compliance Data processing and storage structure compliant with KVKK and related regulations with defined technical and administrative measures for personal data protection. Explore Now →
Quality Policy Our quality management policies within the scope of ISO 9001 for continuous improvement of service quality. Explore Now →
Service Management Policy Our policies and standards governing IT service management processes within the scope of ISO/IEC 20000-1. Explore Now →
Business Continuity Policy Our ISO 22301 compliant policies and procedures ensuring business continuity against possible outage scenarios. Explore Now →
Incident Management Policy Our incident management processes and action plans for the detection, response and resolution of security incidents. Explore Now →
Supplier Security Policy Our policy governing information security requirements and risk assessment processes in supplier relationships. Explore Now →
Disclosure Text Text prepared within the scope of our disclosure obligation regarding the processing of your personal data under KVKK. Explore Now →
Cookie Policy Our policy regarding cookies and data collection practices used on our website. Explore Now →
Hosting Provider and Legal Obligation Policy Legal obligations we fulfill as a hosting provider under Law No. 5651. Explore Now →
Blog Posts Technical analyses, sector evaluations and current content about data center, network, cyber security and cloud technologies Explore Now →
Case Studies Reference case studies describing needs encountered, solutions applied and outcomes achieved in real projects Explore Now →
Events and Announcements Events we attend and organize, technical meetings, launches and current announcements about Netinternet Explore Now →
19 Years of Experience

Blog Posts

Discover the success stories of our customers' digital transformation journeys. Each project demonstrates the power of our reliable infrastructure.

Başarı Hikayeleri
Webmaster
1011 Hit
2 Comments

Litespeed Security Vulnerability

Due to a vulnerability that appeared in Litespeed 5.1.16 and older versions, an update needs to be made on servers using Litespeed. After the update, the Litespeed version should be 5.1.17 as of today. Litespeed announced that version 5.1.17 closes the mentioned security vulnerability.


You can perform the update in 2 ways.


Via SSH connection;



/usr/local/lsws/admin/misc/lsup.sh



You can perform your update using this command.


From the cPanel Plugins section;



Current Version: 5.1.XXX



You can complete your update with this button.

1011 Hit
0 Comments
View Details
Webmaster
1188 Hit
2 Comments

Let's Encrypt SSL Certificate

Let’s Encrypt is a certificate authority service that operates automatically and for free in cPanel and many well-known hosting control panels. The Let’s Encrypt organization is supported by the Internet Security Research Group, which works to make the internet more secure without profit motive.


It is supported by most commonly used browsers and certificates are also supported without issues on smart devices (iOS, Android). It provides free support for all your subdomains including the main domain. Popular certificate providers required the site or subdomain to run on a dedicated IP for certificate installation; with the development of web clients, it has become possible to use multiple SSL certificates on a single IP without needing to use or purchase a dedicated IP for Let’s Encrypt certificates.


Let’s Encrypt provides certificates in 3-month periods and renews your certificate without any action required at the end of the period. Therefore, each of your certificates will be renewed after 90 days.


Note: Let’s Encrypt is not suitable for e-commerce sites.

1188 Hit
0 Comments
View Details
Webmaster
10373 Hit
2 Comments

Server Management and Managed Server Services

Server management is the monitoring and control of server computers to which websites or all other applications connected to the internet or running locally are connected, in order to ensure they run properly and stably.


To better understand server management, it is necessary to address the answer to the question of what a server is and the differences between a server and hosting.


What is a Server?


They are hardware and software computer systems that share the data and information stored on them with users on the internet or computer network they are connected to, or with different computer network systems. Servers are high-capacity computers with much more advanced hardware features compared to personal computers used daily.


What is Hosting?


The hosting service, whose Turkish equivalent is “barındırma” (hosting), is provided through the server computers we defined above. The hosting service, where you can store your personal or corporate data and make this data accessible on the internet, is provided through servers configured for this purpose.


Server Management and Managed Servers


Server management is technically a comprehensive operation. To perform server management, it is necessary to be able to connect to the server with full authority, and you need to have high technical knowledge both in terms of hardware and software. We can refer to all intervention operations carried out to stabilize the server and ensure that the systems on it work without problems in any kind of issue that may arise on the server as server management.


We can generally summarize the stages of server management under the following headings.



  • Monitoring the server,

  • Performing necessary checks and work for the server to operate healthily,

  • Regularly performing update and security settings for the operating system and software on the server,

  • Intervening in problems that may occur on the server,

  • In case of hardware problems, identifying and resolving the issue.


In dedicated server services provided by data centers, since full authority over the server is given to the customer, server management responsibility also belongs to the customer. All operations such as ensuring server security, installing required software, and making necessary interventions to the server in case of problems are under the responsibility of the server owner institution or person.


Physical server owners who do not want to perform server management related operations can request server management services from the company they rent the service from. However, data centers generally provide server management on a paid basis since custom solutions are produced for individuals or institutions for server management operations. You can receive server management support for a certain fee, or you can use the managed server service where all management belongs to the data center.


In the managed server service provided by our company, server management responsibility lies entirely with our support desk. This way, you save the time you would spend on server management. In our managed server service, no extra server management fee is charged. You can use our service with free server management and free cPanel license, and you can spend more time on your projects by leaving server management to our expert support team.

10373 Hit
0 Comments
View Details
Webmaster
1115 Hit
2 Comments

Security Advisory TR-17-069 VAULT 7 (USOM)

General Information


Since August 2016, a hacker group called “Shadow Brokers” has been publishing information, exploit codes, and malware belonging to a cyber espionage unit called “Equation Group”. In addition to the published data going back to January 2009, it contains detailed information about cyber security vulnerabilities targeting various operating systems and software published to date.

The published exploit codes also target network devices used in institutions. In addition, it has been observed that malware targeting end-user computers is among the published information. The ‘Wannacry’ malware, which recently affected corporate and individual systems worldwide, uses the aforementioned vulnerabilities and exploit codes that have been published. The hacker group announced that it will publish similar exploit codes and malware on a monthly basis.
Also, as of March 2017, data claimed to belong to foreign intelligence agencies, announced under the name ‘Vault 7’, has been leaked to the internet. This data includes software used to leave backdoors on IT system assets, primarily end-user systems. At the same time, malware that tends to spread through corporate networks using file servers is also included in ‘Vault 7’. It is likely that similar data will continue to be published in 2-3 week intervals.
In order for this leaked data not to affect corporate information security, it is necessary to create an inventory of information systems within the institution and to perform vulnerability detection and impact analysis on this inventory.


Affected Devices


Exploit codes and malware have been developed and spread on the internet that will affect the products listed below by type/brand/model. Therefore, it is important for institutions and organizations to detect these devices in their own information systems inventories (all internal and external networks) and take the necessary actions.


1. Network Devices



  • Juniper Netscreen (NS5XT, NS50, NS200, NS500, ISG 1000, SSG140, SSG5, SSG20, SSG 320M, SSG 350M, SSG 520, SSG 550, SSG 520M, SSG 550M)

  • Cisco PIX (500 Series) Cisco ASA (5505, 5510, 5520, 5540, 5550 series)

  • Cisco Switch/Router (711, 712, 721, 722, 723, 724, 802, 803, 804, 805, 821, 822, 823, 824, 825, 831, 832, 841, 842, 843, 844)

  • Fortinet FortiGate (60, 60M, 80C, 200A, 300A, 400A, 500A, 620B, 800, 3600)

  • WatchGuard, Huawei

  • Solaris 6 – 11


2. Operating System



  • Windows XP

  • Windows Server 2003

  • Windows Vista

  • Windows 7

  • Windows Server 2008

  • Windows 8

  • Windows 8.1

  • Windows Server 2012

  • Windows 10

  • Windows Server 2016


3. File Server



  • Windows File Server


Solution


Institutions and organizations that have the products listed above in their inventories are required to apply the following controls:




  • Access controls



    • Access to management ports of network devices should be restricted on the internal network (access should be allowed only from certain interfaces and IPs) and access from the Internet should be blocked.

    • Access restrictions should be imposed on Windows devices from the Internet, and access to services such as SMB and RDP should be blocked if not necessary.

    • Access from the server network open to the Internet to the internal network should be restricted and domain structures should be kept separate.




  • Software with Update Support



    • It is observed that security patches are being published for products and services affected by published vulnerabilities or exploit codes. Although in exceptional cases, security patches are not published for old version software or operating systems without support. Institutions must use supported software and operating systems in their IT system assets, especially those accessible to the internet or to everyone or other systems on the network.




  • Password management



    • Use of simple and default passwords on servers, end-user devices and network equipment should be avoided.




  • Patch management



    • Security patches on network devices should be tracked and up-to-date firmware versions should be used.

    • Patch management platforms for Windows environments should be reviewed and security patches, especially those for remote code execution vulnerabilities (e.g. MS17-010), should be applied as soon as possible.



  • Antivirus usage

    • Attention should be paid to the use of up-to-date antivirus/antimalware on end-user devices and servers.




Note: Cyber incident detection in the product families mentioned above; the control of possible compromise situations on network devices, servers and end-user computers can be ensured as follows;




  1. The following controls are recommended for detecting possible intrusion situations on network devices:



    • Network device configuration files should be examined and compared with backup files to detect possible anomalies.

    • Log records (self log) on network devices should be examined; possible anomalies in admin/system/root activities should be detected.

    • Processes on network devices and firewalls should be examined.




  2. Doublepulsar; this malware published to open an authorized backdoor on the system in Windows operating system exploit codes can be controlled over the network. A scan can be performed using the “nmap” tool on the SMB and RDP ports of the compromised machine:


    https://nmap.org/nsedoc/scripts/smb-double-pulsar-backdoor.html




  3. The Pandemic malware has been developed to spread to other devices on the internal network using file servers. This malware creates the following registry variable on Windows File Server; this record should be searched on the relevant servers.


    HKLMSYSTEMCurrentControlSetServicesNull -> Null value in the Instances sub-key.



1115 Hit
0 Comments
View Details
Webmaster
1253 Hit
2 Comments

WordPress 4.7.5 Security Update

The 4.7.5 version released by WordPress as a security update is now available for download. Please complete your update immediately for the security of your system.


The security vulnerabilities identified by the WordPress security team in version 4.7.4 are as follows:



  • Cross Site Request Forgery (CSRF) vulnerability in the file system credentials dialog box.

  • Cross-site scripting (XSS) vulnerability when attempting to upload very large files.

  • A cross-site scripting (XSS) vulnerability related to the Customizer.


Source: [https://wordpress.org/news/2017/05/wordpress-4-7-5/]

1253 Hit
0 Comments
View Details
Webmaster
1074 Hit
2 Comments

Critical Security Vulnerability in Joomla! Version 3.7.1

Dear Customers,


A critical security vulnerability was announced in Joomla version 3.7.1, one of the frequently used CMS software. (Announcement published on Joomla.org)
The announcement also included information that the update related to the security vulnerability would be released at 17:00 Turkey time.


The Joomla security team announced that the patch to be released contains many security fixes and that this update MUST be applied. It was also stated that information about the vulnerabilities would be provided after the security patch is released.


Do not forget to update for your security. We present this for your information and wish you good work.

1074 Hit
0 Comments
View Details
Webmaster
1452 Hit
2 Comments

CentOS Web Panel (CWP) Basic Settings

NS Settings


Name Server (NS) addresses are the name servers that will be used to query your domain name. In order for your website to work, NS redirection must be made from the domain registrar company to the NS addresses configured on the server. The process of creating these NS addresses on the server can be done in CWP panel via;
DNS Functions >> Edit Nameservers IPs.



Shared IP Setup


This section must not be skipped for your website to be active. The accounts you open will be created on the shared IP address set here. It is also used to select which IP address will be used if you have more than one IP address.
From CWP Settings >> Edit Settings, Shared IP and Root Email must be filled in.


Package Creation Process


In this section, the package to be determined for the account to be created is created. Usage limitations for the account related to the package are established.
Accessible from Packages >> Add a Package.


User Account Creation


In CWP panel, user accounts are created for sub-accounts other than the root account we use.
It enables the creation and restriction of sub-users similar to the cPanel section in WHM/cPanel.
Accessible from User Accounts >> New Account.

1452 Hit
0 Comments
View Details
Webmaster
1014 Hit
2 Comments

Let's Encrypt SSL Plugin

Overview


The Let’s Encrypt™ plugin offers the ability to automatically provision cPanel accounts with Let’s Encrypt SSL certificates for sites that do not have valid CA-signed SSL certificates.


NOTE: This plugin only integrates with the AutoSSL feature that generates SSL certificates for cPanel accounts. It does not generate hostname certificates for your system’s services.


Installation
To install the plugin, follow the steps below:


Log in to the command line via SSH as the ROOT user.


Run the following command



/scripts/install_lets_encrypt_autossl_provider


1014 Hit
0 Comments
View Details
Webmaster
1235 Hit
2 Comments

CentOS Web Panel (CWP) User Account

CWP Panel Addons Section



The CWP plugins menu comes with eXtplorer file manager by default.
You can add the eXtplorer file manager by providing a password.
It is an advanced file manager with Turkish language support.



Crontab



This is the section for creating cron jobs (scheduled tasks). There are options for creating simple and advanced crons. Additionally, a sample cron configuration is shown on the right side.



Change Password



This is the section for changing the account password.



Process List



Active running processes are listed in this section.



Edit php.ini



You can edit the php.ini for your account from this section.
You can edit existing PHP settings and new commands you need can also be added with the add option.



File Managements


File System Lock



File system lock locks all files and folders against all changes, also blocks all updates, file changes and even backup restore operations cannot be performed.
If you are the only person updating your website, this tool will help you fully protect your website.
You will need to remove this lock again when you need to edit your website.



Antivirus Scan



You can perform Malware and Virus scanning on your account with this tool.



FTP File Manager



WebFTP file manager allows you to access FTP through the browser and control your files.



FTP Accounts



FTP account creation and management operations are provided.



Backups



Backup creation tool. Creates a full backup of the account.



Softaculous



One-click script installation tool that allows you to easily install ready-made scripts for your service.





Domains


Add Domains



Addon domain addition section.



List Domains



Lists addon domains and their paths.



Add SubDomain



Subdomain addition section.



List SubDomain



Lists subdomains and their paths.





SQL Services


phpMyAdmin



Web MySQL database manager for the account.



MySQL Manager



MySQL databases, users and their access permissions can be created.



Show MySQL Processes



Shows real-time MySQL processes.





Email


Add Email Account



Email account creation and email forwarding operations are provided.



Add SubDomain Email



Email addresses can be created for subdomains.



List Email Accounts



List of email accounts.



List Email Forwarders



List of email forwarders.



Add AutoResponder



Automatic replies can be created for email addresses.


1235 Hit
0 Comments
View Details