Active Monitoring
Active Monitoring Active Monitoring is the way to check the site performance by simulation of visiting by real users.

Active Monitoring is the way to check the site performance by simulation of visiting by real users. It is done by external service, usually with distribyted networks. The checking servers create the requests like the real clients, who are trying to download a web page. Doing it on regular schedule, allows to check if the page is available from the web. If not - there is a possibility to catch and report the error. The difference between the bot and a real person is visible only for bulky pages with lots of content - in order to save the traffic, monitoring systems usually download only a part of such pages, which is enough to make sure the site is Ok.

Active monitoring is an independent eye on your site. The checking is not connected to your company and web hosting, and so provides the clear third-party view of the situation. HostTracker service uses active monitoring to supervise web sites.

  • CM.Glossary.WebsiteMonitoring
  • CM.Glossary.Downtime
  • CM.Glossary.DistributedMonitoring
  • CM.Glossary.PassiveMonitoring
more glossary
"

The global monitoring system is quite useful -
as most of my outages are really regional outages out of my control. It helps to know this.

"
- Rick
Shellshock vulnerability online check
Considering the recently discovered Shellshock vulnerability, HostTracker has created a tool for testing it.
Check your server for vulnerability

How does it work?

It is developed for a Linux server with a web server installed on it. The algorithm is very simple. We consequently generate 4 http requests:

  • 1. Ordinary request
  • 2. The request tries, using vulneratility, post a "harmful" cookie which causes 2-seconds delay in respond to our special http request.
  • 3. The request tries, using vulneratility, post a "harmful" cookie which causes 4-seconds delay in respond to our special http request.
  • 4. Same as #3

Results of the test

How to understand the result?

We compare response time for all 4 requests. Three situation are possible:

  • 1. Vulnerability found. We may affirm that if the difference in responses is about 2 seconds for requests without cookie and with 2-second-delay cookie, as well as for requests with 2 and 4-second delay cookie. It means that our request was able to use the vulnerability and set these cookies.
  • 2. Vulnerability not found. All the requests have about the same response time. The cookies, likely, were not installed because there is no vulnerability.
  • 3. Uncertain situation. If the response time differs widely, without coincidence with preset by cookies delay, we can not say for sure. It could be if the server is under high load. To check this, we use two requests with same cookies (#3 and #4). If the response time for two same checks varies, we make a conclusion that the response time is not affected by cookies. At least, not only by them. So in this case our method can not detect vulnerability

Safety of checks

Our test can not damage your server. The risk consists of appearance of one extra-cookie, which is used only for our requests and can not affect normal work-flow of your site.

more blog
 
Partners
Sign In
Sign Up
Prices & packages
Our monitoring network
Home > Partners

Our partners

Partner Description
Honest and unbiased web hosting reviews for shared hosting providers. They rank web hosting providers based on uptime %, page load times, support quality and cost
Review Squirrel - web hosting reviews
Real web hosting reviews from real people - Find out what people are saying about web hosting companies on social media to help you choose web hosting.


Our company is always open to cooperation! If you want to be our partner, please contact us

If you wish to become our hosting partner, please visit this page: Become hosting partner

Share:
Send to Twitter Send to Facebook Send to LinkedIn Share on Google+
Blogs:
HostTracker blog HostTracker page on Facebook