全球主机交流论坛

 找回密码
 注册

QQ登录

只需一步,快速开始

IP归属甄别会员请立即修改密码
查看: 2389|回复: 13
打印 上一主题 下一主题

chicagovps什么时候可以恢复啊

[复制链接]
跳转到指定楼层
1#
发表于 2013-6-18 23:23:09 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
RT
2#
发表于 2013-6-18 23:46:51 | 只看该作者
等查明问题,会发表公告/通知给大家个交代的!
3#
发表于 2013-6-19 00:45:27 | 只看该作者
已經退幾個月了...
實在是浪費錢.
4#
发表于 2013-6-19 00:46:12 | 只看该作者
没买
5#
发表于 2013-6-19 00:46:19 | 只看该作者
自己问官方去
6#
发表于 2013-6-19 00:48:36 | 只看该作者
估计没办法了吧
7#
发表于 2013-6-19 01:12:56 | 只看该作者
为什么我的VPS一直正常呢?
8#
发表于 2013-6-19 01:17:14 来自手机 | 只看该作者
等待。。来自: iPhone客户端
9#
发表于 2013-6-19 07:28:06 | 只看该作者
Hello Everyone,

Around 3am Eastern Standat Time (EST) today, there was a security breach, due to a vulnerability in SolusVM that allowed a command line to be run to dump the ChicagoVPS SolusVM client database and attempt to delete all data from our nodes. Our staff is working tirelessly to get everything back online, along working with SolusVM to address the root issue and no furthur impact is expected.
Now what does this mean for the customer? All passwords should be changed, this includes passwords for SolusVM control panel and your VPS. This data leak does not include billing information or credit card information. Thus far we are having great success in getting nodes back online with no data loss, however, there are a few that were not recoverable and will be restored using our offsite backups.
Once the situation is 100% complete and back to normal we will send another email out. We understand the sevarity and importance to get everything back online quickly. With that in mind, please try to refrain from opening a ticket or replying to an old one as it only slows us down even more. We are doing our best, and hope to have this fully resolved within 24 hours.
Thank you for your patience and understanding.
Regards
Your ChicagoVPS Team

貌似也没说什么时候,只是在最后 一句提到会尽快在24小时内恢复。
10#
发表于 2013-6-19 07:52:18 | 只看该作者
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|全球主机交流论坛

GMT+8, 2025-9-10 18:05 , Processed in 0.083074 second(s), 10 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表