This article answers commonly asked questions about Pair Networks security.
What steps do you take to secure your network and servers?
Our FreeBSD Unix and Ubuntu Linux servers are extensively hardened and tested against security exploits. All unnecessary services are disabled, all security patches are up-to-date, and servers are audited regularly for attempted break-ins. Our systems administrators actively maintain awareness of new security developments, and as Open Source systems, FreeBSD and Ubuntu are easy to update with new protections.
Our network is overbuilt with spare capacity and redundancy. Our custom network monitoring systems ensure that attacks and other anomalies are identified and responded to promptly.
Our network is overbuilt with spare capacity and redundancy. Our custom network monitoring systems ensure that attacks and other anomalies are identified and responded to promptly.
How can I access my account securely?
If you are logging in by FTP, or accessing a mailbox by POP3 or IMAP, your password is traveling across the internet in "plaintext," which means that it can be intercepted at your Internet Service Provider (ISP), or intervening networks, and subsequently used by a third party to access your account.
To log into your account securely, please use SSH (Secure Shell), SFTP, POPS, or IMAPS. These access methods use public-key encryption to ensure that your connection cannot be intercepted or replayed. Details are available in our Support Resources.
Access through My Pair Account Control Center is always secure.
To log into your account securely, please use SSH (Secure Shell), SFTP, POPS, or IMAPS. These access methods use public-key encryption to ensure that your connection cannot be intercepted or replayed. Details are available in our Support Resources.
Access through My Pair Account Control Center is always secure.
How can I choose an effective password?
Every password should be chosen with the following guidelines in mind. Do not ever assume that no one would want to break into your account. Compromised accounts are very effective camouflage for system crackers, vandals, Spammers, etc. We provide tips on choosing an effective password in our Changing Your Password article.