Piergiorgio Venuti

Black Friday e Cyber Monday 2017

Black Friday e Cyber Monday 2017

black friday

 

Come ogni anno, in occasione del Black Friday e Cyber Monday, la Secure Online Desktop è lieta di offrire ai suoi clienti sconti incredibili su tutti i prodotti Cloud.

Ottieni il tuo servizio Cloud a metà prezzo per un anno! Con lunghi cicli di fatturazione come quello semestrale o annuale sarà possibile sfruttare questa incredibile offerta più a lungo

Hai un intero fine settimana per decidere, utilizza la demo gratuita del servizio che si desidera acquistare, sottoponici tutte le tue domande oppure spiegaci il tuo progetto e sfrutta questa offerta per realizzare il tuo servizio Cloud ad un prezzo formidabile.

 

Black Friday e Cyber Monday VPS €2,36
VPS Windows e Linux.
Sconto del 50%

In occasione del Black Friday, che quest’anno sarà il 24 Novembre fino al Cyber Monday (27 novembre), la Secure Online Desktop offre uno sconto dell’50% sui prodotti Cloud.

 

Istruzioni

1) Visitare il nostro portale e-commerce al seguente indirizzo:

https://cloud.secure-od.com

 

2) Selezionare un servizio (vedi lista dei servizi disponibili per l’offerta qui di seguito) dal pannello Ordini

 

3) Inserire il seguente codice promozionale:

Z54F0VUWEPE87L

 

nella sezione “Utilizza un codice promozionale”.

 

4) Portare a termine il wizard fino alla conclusione dell’ordine.

 

Servizi disponibili

 

N.B. Il codice promozionale è valido sul primo ciclo di fatturazione per tutti i nuovi ordini e può essere utilizzato solo dal 24 al 27 Novembre 2017. Al termine della promozione verrà visualizzato il messaggio: Il codice promozionale inserito non è valido

 

Esempio1:

Prodotto: IaaS Public Cloud – VPS size M

Costo senza sconto: €4,72 al mese

Costo con sconto: €2,36 il primo mese

 

Esempio2:

Prodotto: Webhosting – Starter

Costo senza sconto: €28,37 all’anno

Costo con sconto: €14,18 il primo anno

 

Esempio3:

Prodotto: Cloud Conference

Costo senza sconto: €37,30 all’anno

Costo con sconto: €23,65 il primo anno

 

 

Per maggiori informazioni o per richiedere supporto tecnico inviare una e-mail a [email protected] oppure visitare la pagina di support al seguente indirizzo: http://secure-od.com/it/supporto

 

N.B. Tutti i prezzi sopra citati si intendono IVA esclusa.

 

Condividi


RSS

Piu’ articoli…

Categorie …

Tags

RSS CSIRT

RSS Dark Reading

RSS Full Disclosure

  • Defense in depth -- the Microsoft way (part 84): (no) fun with %COMSPEC% Marzo 24, 2023
    Posted by Stefan Kanthak on Mar 24Hi @ll, the documentation of the builtin START command of Windows NT's command processor CMD.EXE states: | When you run a command that contains the string "CMD" as the first | token without an extension or path qualifier, "CMD" is replaced | with the value of the COMSPEC variable. […]
  • Invitation to the World Cryptologic Competition 2023 Marzo 22, 2023
    Posted by Competition Administrator on Mar 21The WCC 2023 is a fully-online and open competition using GitHub. The language of the competition is English. The WCC 2023 has a total duration of 295 days, from Sunday January 1st 2023 to Monday October 23rd 2023. Teams and Judges must complete registration before Wednesday June 1st. The […]
  • Insecure python cgi documentation and tutorials are vulnerable to XSS. Marzo 22, 2023
    Posted by Georgi Guninski on Mar 21Is there low hanging fruit for the following observation? The documentation of the python cgi module is vulnerable to XSS (cross site scripting) https://docs.python.org/3/library/cgi.html ``` form = cgi.FieldStorage() print("name:", form["name"].value) print("addr:", form["addr"].value) ``` First result on google for "tutorial python cgi" is...
  • Re: Microsoft PlayReady security research Marzo 22, 2023
    Posted by Adam Gowdiak on Mar 21Hello, I feel obliged to provide additional comments to this paragraph as I start to believe that CANAL+ might not deserve sole blame here... While Microsoft claims there is absolutely no bug at its end, I personally start to perceive the company as the one that should be also […]
  • Re: Defense in depth -- the Microsoft way (part 83): instead to fix even their most stupid mistaskes, they spill barrels of snakeoil to cover them (or just leave them as-is) Marzo 22, 2023
    Posted by Arik Seils on Mar 21Hi there, One can use the Metasploit Framework Module post/windows/local/bypassua _fodhelper to achieve this. Greetings from Germany, A.Seils 17.03.2023 06:26:56 Stefan Kanthak :
  • Re: Microsoft PlayReady security research Marzo 21, 2023
    Posted by Security Explorations on Mar 21Hello, I feel obliged to provide additional comments to this paragraph as I start to believe that CANAL+ might not deserve sole blame here... While Microsoft claims there is absolutely no bug at its end, I personally start to perceive the company as the one that should be also […]
  • Defense in depth -- the Microsoft way (part 83): instead to fix even their most stupid mistaskes, they spill barrels of snakeoil to cover them (or just leave them as-is) Marzo 17, 2023
    Posted by Stefan Kanthak on Mar 16Hi @ll, with Windows 2000, Microsoft virtualised the [HKEY_CLASSES_ROOT] registry branch: what was just an alias for [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] before became the overlay of [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] and [HKEY_CURRENT_USER\Software\Classes] with the latter having precedence: Note: while [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] is writable only by...
  • [CFP] Security BSides Ljubljana 0x7E7 | June 16, 2023 Marzo 17, 2023
    Posted by Andraz Sraka on Mar 16MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMN..-..--+MMNy:...-.-/yNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MM:..---.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM Mm../dds.-oy.-.dMh--mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM MMMs//yMNo+hMh---m:-:hy+sMN..+Mo..os+.-:Ny--ossssdN-.:yyo+mM...
  • Full Disclosure - Fastly Marzo 12, 2023
    Posted by Andrey Stoykov on Mar 11Correspondence from Fastly declined to comment regarding new discovered vulnerabilities within their website. Poor practices regarding password changes. 1. Reset user password 2. Access link sent 3. Temporary password sent plaintext // HTTP POST request POST /user/mwebsec%40gmail.com/password/request_reset HTTP/2 Host: api.fastly.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 […]
  • Full Disclosure - Shopify Application Marzo 12, 2023
    Posted by Andrey Stoykov on Mar 11Correspondence from Shopify declined to comment regarding new discovered vulnerabilities within their website. Although 'frontend' vulnerabilities are considered out of scope, person/tester foundhimself a beefy bugbounty from the same page that has been listed below, including similar functionality that has not been tested yet. Two emails and several reports, […]

Customers

Newsletter