Alessandro Stesi

Black Friday and Cyber Monday 2018

Black Friday and Cyber Monday 2018

black friday

Like every year, in celebration of Black Friday and Cyber Monday, Secure Online Desktop is pleased to offer its amazing discounts on all products Cloud.

Get your Cloud service at half the price for a year! With long billing cycles like that will be semi-annual or annual exploit this incredible offer for longer

You have a whole weekend to decide, using the free demo of the service you wish to purchase, let us all your questions or explain us your project and takes advantage of this offer to realize your Cloud service at a tremendous value.

 

 

Black Friday and Cyber Monday VPS $2.49
VPS Windows and Linux.
50% discount

On the occasion of Black Friday, which this year will be on November 24 and until Cyber Monday (November 26), the Secure Online Desktop provides a discount of 50% on Cloud products listed below.

 

Instructions

1) Go to:

https://cloud.secure-od.com

 

2) Choose one service (see available service below) from Order panel

 

3) Insert follow promotional code:

ZDQU3T9I

 

in “Use promotional code” section.

 

4) Complete wizard.

 

Available services

 

Note. The coupon code is valid on the first billing cycle for all new orders and can only be used on November 26 2018. At the end of the promotion you will receive the message: The promotional code you used is not valid

 

Example1:

Product: IaaS Public Cloud – VPS size M

Price wihout discount: $4.99 monthly

Price with discount: $2.49 first month

 

Example2:

Product: Webhosting – Starter

Price wihout discount: $29.99 annually

Price with discount: $14.99 first year

 

Example3:

Product: Cloud Conference

Price wihout discount: $50.00 annually

Price with discount: $25.00 first year

 

For more information write an e-mail to [email protected] or go to : http://secure-od.com/support

 

Note. All prices mentioned above do not include VAT

 

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading:

RSS Full Disclosure

  • Backdoor.Win32.DarkKomet.irv / Insecure Permissions February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/a229acff4e0605ad24eaf3d9c44fdb1b.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.DarkKomet.irv Vulnerability: Insecure Permissions Description: DarkKomet.irv creates an insecure dir named "Windupdt" under c:\ drive, granting change (C) permissions to authenticated user group. Standard users can rename...
  • Trojan.Win32.Pluder.o / Insecure Permissions February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ee22eea131c0e00162e4ba370f396a00.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Pluder.o Vulnerability: Insecure Permissions Description: Creates an insecure dir named "z_Drivers" under c:\ drive, granting change (C) permissions to authenticated user group. Pluder.o also creates several registry key...
  • Trojan.Win32.Pincav.cmfl / Insecure Permissions February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/9d296ebd6b4f79457fcc61e38dcce61e.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Pincav.cmfl Vulnerability: Insecure Permissions Description: The trojan creates an insecure dir named "Windupdt" under c:\ drive, granting change (C) permissions to authenticated users group. Standard users can rename the...
  • Trojan-Proxy.Win32.Daemonize.i / Remote Denial of Service February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/61bec9f22a5955e076e0d5ddf6232f3f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Proxy.Win32.Daemonize.i Vulnerability: Remote Denial of Service Description: Daemonize.i listens on TCP port 5823, sending some junk packets to the trojan results in invalid pointer read leading to an access violation and […]
  • Backdoor.Win32.Ketch.h / Remote Stack Buffer Overflow (SEH) February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/63c55ad21e0771c7f9ca71ec3bfcea0f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Ketch.h Vulnerability: Remote Stack Buffer Overflow (SEH) Description: Ketch makes HTTP request to port 80 for a file named script.dat, after process the server response of 1,612 bytes or more it […]
  • Backdoor.Win32.Inject.tyq / Insecure Permissions February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/833868d3092bea833839a6b8ec196046.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Inject.tyq Vulnerability: Insecure Permissions Description: The backdoor creates an dir named "hotfix" under c:\ drive granting change (C) permissions to the authenticated user group. Type: PE32 MD5:...
  • IBM(R) Db2(R) Windows client DLL Hijacking Vulnerability(0day) February 23, 2021
    Posted by houjingyi on Feb 23A few months ago I disclosed Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability I found : https://seclists.org/fulldisclosure/2020/Oct/16 In that post I mentioned "I will add more details 90 days after my report or a security bulletin available". Here it comes. NOTICE : This vulnerability seems did not get […]
  • CIRA Canadian Shield iOS Application - MITM SSL Certificate Vulnerability (CVE-2021-27189) February 23, 2021
    Posted by David Coomber on Feb 23CIRA Canadian Shield iOS Application - MITM SSL Certificate Vulnerability (CVE-2021-27189)
  • [KIS-2021-02] docsify <= 4.11.6 DOM-based Cross-Site Scripting Vulnerability February 20, 2021
    Posted by research on Feb 19-------------------------------------------------------------- docsify
  • Backdoor.Win32.Bionet.10 / Anonymous Logon February 19, 2021
    Posted by malvuln on Feb 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/be559307f5cd055f123a637b1135c8d3.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Bionet.10 Vulnerability: Anonymous Logon Description: The backdoor listens on TCP port 12348 and allows anonymous logon credentials to be used to access an infected host. Type: PE32 MD5: be559307f5cd055f123a637b1135c8d3 Vuln ID:...

Customers

Newsletter