Our credit card gateway 2checkout will no longer be able to process mastercards as of April 29-2021. If you would like pay via mastercard please use paypal as your checkout method instead.
Effective April 19 - 2021 new firewall rules have been rolled out across our entire network to help mitigate spam and database injection attacks.
Some users may be encountering 503 errors, we are working to resolve.
A failure in the RAID array on this VPS node has caused an outage.
We have a new server coming online April 2 - 2017 for the OS Clients area, this migration will not impact any users web sites or services. There will be a small window of approximately 1-2 hours where clients may not be able to login to pay their invoices.
Today, we were made aware of a critical security hole in the OpenSSL module. Effected servers have been recompiled and rebooted.
Some very disturbing facts have come to light about the operators of our Los Angeles Datacenter, these facts make us very uncomfortable and we are taking immediate action to distance ourselves from this company. We have only 1 server with this company, and have been with them for nearly 10 years with fairly good service. All of that has changed this week.
Los Angeles (host23.osempire.org) is experiencing connectivity issues this morning. We are working to resolve, we have confirmed the server is online and operational with all resources well within the limits, the issue appears to be with the datacenter infrastructure.
A CloudLinux kernel update will require a quick reboot on this server, estimated downtime 5-10 minutes. The server will be rebooted at 2PM MST Feb 13-2014
For the past couple of hours, the mail server on Luna Server (osdedicated/kootenaymedia) has been storing messages in queue rather than sending immediately. We are working to resolve and expect things should be back to normal within the hour.
A large inbound denial of service (DoS) was detected attacking the server your site is hosted on. The attack appears to have been targeting the IP address 126.96.36.199 and that IP has now been null routed on the Liquid Web network. This means that all traffic to that IP address, including legitimate traffic, will be dropped.
As of now, all OS servers are running more restrictive mod security rules than ever before. This is a response to a recent increase in hack attempts.
Effective August 15 - 2010 Os Web Hosting will be altering our shared hosting packages. The starter plans will be replaced with a single $12.95 per month plan that will be based in the cloud hosting environment.
At 2:00 am Eastern Time we will be performing a hardware maintenance upgrade to the cloud environment, the result will be 5-15 minutes of downtime while the server is rebooted to a new master host.
As you might be aware, starting at 12:00 noon (Pacific Time) Jan 28 - 2010 the Jupiter server will be upgraded to our new "Cloud Hosting" service.
UPDATE - Topsite hosting termination http://www.osempire.com/community/showthread.php?t=12118 After a lengthy outage the topsite server is back online, I suggest everyone begin migrating their topsite to another web host immediately. ================================= The primary IP of the topsite server is under DOS attack. We do not have knowledge at this time if the attack is malicious or just a really busy site mass loading a button.php. We are in communication with the security team at the datacenter who has been working for the past hour to get us a prompt to work with. I'll post back here with updates as soon as they are available.
Over the last few months, we have seen a number of websites exploited by hackers / spammers. In all cases, the cause has been outdated scripts on client websites.
UPDATE: August 6 - The topsite server has once again suffered an attack. Same as last time, malicious script has been added to the end of several files. Namely index and wrapper, but other skin files may also be affected. Please check your sites and remove any injected code. It has come to our attention that several files on the topsite server have been appended with malicious code. It is VERY important that you take a moment and review your index.php and index.html files immediately.