Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


How to stop all negative reviews - Page 3
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

How to stop all negative reviews

13»

Comments

  • yoursunnyyoursunny Member, IPv6 Advocate

    🤘 self-incrimination

  • HosterlabsHosterlabs Member
    edited May 2021

    @yoursunny said:
    🤘 self-incrimination

    Jajajajaja. It was so obvious, there is no self-incrimination here.

    P.D. This will be updated to reflect feedback.

  • It is usually a sign of the company not doing good :) But honestly, this is not that unfair... considering some providers who flat out state "Any threat of legal action results in immediate account cancellation with no refunds."

  • @JoeMerit said:
    the best way to stop negative reviews is to engage with all negative reviewers and secretly give them more resources and/or remove limiting off their cores/storage etc in exchange for switching to a positive review.

    The provider seems to get quite a bit beaten up here, but I believe there are quite a lot, and I mean REALLY a lot of bad customers that abuse the server from day one. From the tone of their TOS they probably are tired of that type of client. Maybe, maybe not.

  • @yoursunny said:
    I had a similar scenario happen to me, in a different universe.

    I bought a restaurant gift card, but the restaurant closed all their locations within 100km from me.
    I had to complain to the attorney general office, who wrote a letter to the restaurant corporation.

    Eventually I got a refund via cheque, but it's their goodwill and not really a legal requirement.

    I wouldn't share that story if I were you. You come off as an unreasonable asshole. The rest of us would have sold or given away the gift card instead of tying up so many people's time. No one forced you to buy the gift card in the first place.

    No one's going to want to do business with you if you approach all things in life like this.

  • seriesnseriesn Member
    edited May 2021

    @tradeplanner said:
    "Any threat of legal action results in immediate account cancellation with no refunds."

    Actually that’s how it works in the non virtual world as well. As soon as one mentions legal, a business should no longer communicate without involving legal department. A business should also freeze and seize any transaction with that personal/company to protect and secure themselves from further liability/damages.

    Every communication from that point and onwards must be in the form of written correspondence.

    That’s business 101. Recommended by people with legal authorities and experience. Because everything you say or onward, can and will be used against you in court. (Both parties).

    Don’t make legal threats if you aren’t going to move forward with it.

    Thanked by 1dahartigan
  • yoursunnyyoursunny Member, IPv6 Advocate

    @TimboJones said:
    No one forced you to buy the gift card in the first place.

    Provider deadpools, everyone opens PayPal chargeback.
    Restaurant closes, I ask for gift card refund.
    Same thing.

    No one forced you to buy HostSolutions double credit in the first place, and yet many are complaining when they are in the process of deadpooling.

  • @yoursunny said:

    @TimboJones said:
    No one forced you to buy the gift card in the first place.

    Provider deadpools, everyone opens PayPal chargeback.
    Restaurant closes, I ask for gift card refund.
    Same thing.

    It's not, in at least 3 ways. You're just reinforcing what I said about coming off as an asshole.

    No one forced you to buy HostSolutions double credit in the first place, and yet many are complaining when they are in the process of deadpooling.

    As far as I'm concerned, anyone who still has their server shouldn't be able to initiate a chargeback. Anyone who doesn't should have a support ticket in for 7 days. After not getting support response and no working server, then file for chargeback.

    The people who file for chargebacks who still have working service should have their services cancelled, their funds kept and then be added to fraudrecords.

  • JasonhyperhostJasonhyperhost Member, Patron Provider

    you cant really stop bad reviews , the only time they will get removed is if the review contains offensive language . other than that you wont get them removed , keep your customers happy and your reviews will reflect this :smiley:

  • raindog308raindog308 Administrator, Veteran

    @Jasonhyperhost said: you cant really stop bad reviews , the only time they will get removed is if the review contains offensive language . other than that you wont get them removed , keep your customers happy and your reviews will reflect this

    Not entirely true...ask any provider here and they'll tell you how they get people trying to blackmail them.

    image

  • @seriesn said:

    @tradeplanner said:
    "Any threat of legal action results in immediate account cancellation with no refunds."

    Actually that’s how it works in the non virtual world as well. As soon as one mentions legal, a business should no longer communicate without involving legal department. A business should also freeze and seize any transaction with that personal/company to protect and secure themselves from further liability/damages.

    Every communication from that point and onwards must be in the form of written correspondence.

    That’s business 101. Recommended by people with legal authorities and experience. Because everything you say or onward, can and will be used against you in court. (Both parties).

    Don’t make legal threats if you aren’t going to move forward with it.

    ^^ this x10000

  • yoursunnyyoursunny Member, IPv6 Advocate
    edited June 2021

    The unnamed provider just sent email below.
    I haven't written any negative review so far, and my personal information is still exposed because of "hackers" and WordPress?


    Notice of Data Breach

    Push-up Specialist
    123 Elf Street
    Amundsen-Scott South Pole Station 96598
    Antarctica

    We are writing to you because of an incident involving access to information associated with online purchases made on our website www.example.net. Although we are unaware of any actual misuse of your information, we are providing notice to you and other potentially affected customers about the incident, and about tools you can use to protect yourself against possible identity theft or fraud.

    What Happened?

    We were discovered on June 22, 2021 that our website www.example.net experienced an intrusion the day June 21,2021. The intruder or intruders placed malware on the our servers, and by doing so gained access to our customers’ data. To date, the investigation indicates that the intrusion began around the 21st of June ca. 9 AM.

    At first we noticed our website example.net/panel/ was offline and not working. Further investigation seemed to reveal a problem with the databases, we thought they were corrupted. After further investigation we found messages from "hackers" threatening to make the information on the databases public/selling them and they asked us for money in exchange of them returning us the information, because it was deleted. We do have backups that we do on a daily basis and as such we decided not to pay any ransom. We have disaster plans and prevention on all servers and platforms. We have had false alarms of hackings in the past, hence all our systems are extremely secured but unfortunately there is nothing that can not be hacked. The hack came through our Wordpress main site example.net/ where hackers possibly injected viruses through a vulnerability within one or more plugins we have. These vulnerabilities have been fully isolated and fixed. For now security is really tight but we will add further security in the upcoming days as well as changing how our systems are designed internally.

    What information was included?

    • Name, Last Name, E-mail, Address and personally identifiable information.
    • Passwords were most likely not stolen, nevertheless, please change your passwords for your VPS/Hosting accounts and your control panel account.

    No credit card information was stolen, no intrusion in any other systems took place. Please make sure to change your password in all of our services.

    Is the breach fixed?

    Yes we have tracked the malware and it has completely been removed from our sites.

    What did you do to increase your security?

    We have added further firewalls, active monitoring and we are working as of now with law enforcement to track the perpetrators of the crime. We have notified the FBI and we expect to do forensics on our servers, for which we have backed up all logs and accesses.

    What kind of security do you have/ how do we know our information was protected?

    Your information was protected to the best of our abilities as we have experience aiding and making sure other peoples' servers are secure. We have seen/traced/removed similar hackings from customers. Most of our servers are unreachable outside our working spaces and require special authentications. This breach was just exploiting a plugin we had on our Wordpress site. We will revise all our security policies and keep you updated.

    We are really sorry about the situation and we will keep you posted at status.example.net

    Best Regards,
    Unnamed Provider Team

  • brueggusbrueggus Member, IPv6 Advocate

    @yoursunny said: our systems are extremely secured but unfortunately there is nothing that can not be hacked. The hack came through our Wordpress main site

    Yeah...
    yeah.

  • Secured and WordPress. Two words that don't exist together.

  • skorupionskorupion Member, Host Rep

    @yoursunny said:
    The unnamed provider just sent email below.
    I haven't written any negative review so far, and my personal information is still exposed because of "hackers" and WordPress?


    Notice of Data Breach

    Push-up Specialist
    123 Elf Street
    Amundsen-Scott South Pole Station 96598
    Antarctica

    We are writing to you because of an incident involving access to information associated with online purchases made on our website www.example.net. Although we are unaware of any actual misuse of your information, we are providing notice to you and other potentially affected customers about the incident, and about tools you can use to protect yourself against possible identity theft or fraud.

    What Happened?

    We were discovered on June 22, 2021 that our website www.example.net experienced an intrusion the day June 21,2021. The intruder or intruders placed malware on the our servers, and by doing so gained access to our customers’ data. To date, the investigation indicates that the intrusion began around the 21st of June ca. 9 AM.

    At first we noticed our website example.net/panel/ was offline and not working. Further investigation seemed to reveal a problem with the databases, we thought they were corrupted. After further investigation we found messages from "hackers" threatening to make the information on the databases public/selling them and they asked us for money in exchange of them returning us the information, because it was deleted. We do have backups that we do on a daily basis and as such we decided not to pay any ransom. We have disaster plans and prevention on all servers and platforms. We have had false alarms of hackings in the past, hence all our systems are extremely secured but unfortunately there is nothing that can not be hacked. The hack came through our Wordpress main site example.net/ where hackers possibly injected viruses through a vulnerability within one or more plugins we have. These vulnerabilities have been fully isolated and fixed. For now security is really tight but we will add further security in the upcoming days as well as changing how our systems are designed internally.

    What information was included?

    • Name, Last Name, E-mail, Address and personally identifiable information.
    • Passwords were most likely not stolen, nevertheless, please change your passwords for your VPS/Hosting accounts and your control panel account.

    No credit card information was stolen, no intrusion in any other systems took place. Please make sure to change your password in all of our services.

    Is the breach fixed?

    Yes we have tracked the malware and it has completely been removed from our sites.

    What did you do to increase your security?

    We have added further firewalls, active monitoring and we are working as of now with law enforcement to track the perpetrators of the crime. We have notified the FBI and we expect to do forensics on our servers, for which we have backed up all logs and accesses.

    What kind of security do you have/ how do we know our information was protected?

    Your information was protected to the best of our abilities as we have experience aiding and making sure other peoples' servers are secure. We have seen/traced/removed similar hackings from customers. Most of our servers are unreachable outside our working spaces and require special authentications. This breach was just exploiting a plugin we had on our Wordpress site. We will revise all our security policies and keep you updated.

    We are really sorry about the situation and we will keep you posted at status.example.net

    Best Regards,
    Unnamed Provider Team

    THAT'S FU***** HOSTERLABS ISN'T IT

  • HosterlabsHosterlabs Member
    edited June 2021

    @MatthewM said:
    Secured and WordPress. Two words that don't exist together.

    Sadly no. We were in the process of changing to a gatsby site but this was sadly first.

    We apologize for the situation that happened and we are committed to making it up to you.

    Absolutely all good practices were taken, everything was updated, everything is very well secured. That’s why only the client area was affected no server or further services were affected by this. We really use a lot of safety but we were unfortunately not prepared for xml injections on one of our plug-ins. And I personally apologize for this.

    No passwords, credit cards, credentials were stolen. We use well updated and supported plug-ins and we have found all causes and fixed them. We will be performing a lot of security updates and upgrades in the following days.

    Again, my apologies for the situation.

    We made sure to inform you as soon as possible, gather all evidence and inform the fbi as well as using our backups.

  • FalzoFalzo Member

    @Hosterlabs which plugin?

  • DPDP Administrator, The Domain Guy

    @Falzo said:
    @Hosterlabs which plugin?

    Yeah, share as much details as you can as it can be beneficial for the community.

    Thanked by 1Falzo
  • @yoursunny said:
    The unnamed provider just sent email below.
    I haven't written any negative review so far, and my personal information is still exposed because of "hackers" and WordPress?


    Notice of Data Breach

    Push-up Specialist
    123 Elf Street
    Amundsen-Scott South Pole Station 96598
    Antarctica

    We are writing to you because of an incident involving access to information associated with online purchases made on our website www.example.net. Although we are unaware of any actual misuse of your information, we are providing notice to you and other potentially affected customers about the incident, and about tools you can use to protect yourself against possible identity theft or fraud.

    What Happened?

    We were discovered on June 22, 2021 that our website www.example.net experienced an intrusion the day June 21,2021. The intruder or intruders placed malware on the our servers, and by doing so gained access to our customers’ data. To date, the investigation indicates that the intrusion began around the 21st of June ca. 9 AM.

    At first we noticed our website example.net/panel/ was offline and not working. Further investigation seemed to reveal a problem with the databases, we thought they were corrupted. After further investigation we found messages from "hackers" threatening to make the information on the databases public/selling them and they asked us for money in exchange of them returning us the information, because it was deleted. We do have backups that we do on a daily basis and as such we decided not to pay any ransom. We have disaster plans and prevention on all servers and platforms. We have had false alarms of hackings in the past, hence all our systems are extremely secured but unfortunately there is nothing that can not be hacked. The hack came through our Wordpress main site example.net/ where hackers possibly injected viruses through a vulnerability within one or more plugins we have. These vulnerabilities have been fully isolated and fixed. For now security is really tight but we will add further security in the upcoming days as well as changing how our systems are designed internally.

    What information was included?

    • Name, Last Name, E-mail, Address and personally identifiable information.
    • Passwords were most likely not stolen, nevertheless, please change your passwords for your VPS/Hosting accounts and your control panel account.

    No credit card information was stolen, no intrusion in any other systems took place. Please make sure to change your password in all of our services.

    Is the breach fixed?

    Yes we have tracked the malware and it has completely been removed from our sites.

    What did you do to increase your security?

    We have added further firewalls, active monitoring and we are working as of now with law enforcement to track the perpetrators of the crime. We have notified the FBI and we expect to do forensics on our servers, for which we have backed up all logs and accesses.

    What kind of security do you have/ how do we know our information was protected?

    Your information was protected to the best of our abilities as we have experience aiding and making sure other peoples' servers are secure. We have seen/traced/removed similar hackings from customers. Most of our servers are unreachable outside our working spaces and require special authentications. This breach was just exploiting a plugin we had on our Wordpress site. We will revise all our security policies and keep you updated.

    We are really sorry about the situation and we will keep you posted at status.example.net

    Best Regards,
    Unnamed Provider Team

    What do you care? They might just visit your site and increase your visitors.

  • HosterlabsHosterlabs Member
    edited June 2021

    @thedp said:

    @Falzo said:
    @Hosterlabs which plugin?

    Yeah, share as much details as you can as it can be beneficial for the community.

    We had the plugin "quiz maker" installed, we believe the breach came from the specific plugin but for now we deactivated and uninstalled all non-essentials. The investigation is still ongoing, we decided to go ahead and send the e-mail before we had all the answers.

  • @Hosterlabs said:

    @thedp said:

    @Falzo said:
    @Hosterlabs which plugin?

    Yeah, share as much details as you can as it can be beneficial for the community.

    We had the plugin "quiz maker" installed, we believe the breach came from the specific plugin but for now we deactivated and uninstalled all non-essentials. The investigation is still ongoing, we decided to go ahead and send the e-mail before we had all the answers.

    Jesus dude, a quiz maker plugin? Looking back what (if anything) might you have done differently?

  • Aquatis_JosephAquatis_Joseph Member, Patron Provider

    Well that sucks. Cant believe some hosts are doing this crap.

  • you suck, my review..lol

  • ArkasArkas Moderator

    And now I need to go back and read all the TOS of all my hosting accounts. This forum is bad for my blood pressure lol

    Thanked by 1yoursunny
  • @Arkas said:
    And now I need to go back and read all the TOS of all my hosting accounts. This forum is bad for my blood pressure lol

    Why? No sane judge is going to put up with these nonsense.

  • starbetrayerstarbetrayer Member
    edited July 2021

    @yoursunny said:
    A provider, who shall not be named, has included this section in their ToS:

    We have a zero tolerance policy for posting negative feedback on any public locations about our company and/or our employees before submitting a ticket to our "Suggestions & Complaints" Department to discuss your issue, this will result in immediate account termination without any refund.

    Although it is your right to post feedback without discussing your issue with us first, it is undoubtedly unfair and unprofessional not to, which is not the type of client that we want to deal with. We have the utmost respect for all of our clients, and are more than fair with all of our clients. We will do anything and everything possible to keep all of our clients satisfied. But in the unlikely event you are not satisfied, all that we ask is to discuss your issue with our Complaints Department first. For example, if you are the type of person to run to the forums at the first chance you get to complain, please DO NOT SIGNUP with example.com Inc in the first place.

    Furthermore, all of our policies that pertain to keeping information given to us confidential including but not limited to our privacy policy, confidentiality agreement, non-disclose agreement are nullified once you discuss your experience publicly. For example, if you make a negative post in public, then you are waiving your protection of privacy at example.com

    This is a brilliant way to stop negative reviews.
    If anyone creates a drama thread with negative reviews, their account password, credit card number, API keys, MySQL password, WordPress admin password, etc, could be publicized.

    Note:

    • I will not name the provider.
    • This post is neutral.
    • If someone else names the provider or writes negative feedback in the comments, punish them.

    Woah, f... them for this outrageous part in their TOS

  • yoursunnyyoursunny Member, IPv6 Advocate
    edited August 2021

    It's time to end this toxic relationship, I guess.
    I'll get my vps3 hostname back in time for Black Friday.

    Dear push-up specialist (yoursunny summer host Inc),

    Re: IPv6 Power (vps3.host)

    We are no longer supporting this service anymore on the location (Germany or IPv6 Only ) you chose it. We inform you it will be automatically terminated at the end of its billing cycle or at most the 13 of August 2021

    For a refund kindly write an e-mail to [email protected] or reply to this e-mail if you ordered annual services so we create a pro-rated discount. Alternatively you might open a PushUpPal refund request which we will accept. Kindly put your transaction ID and date of service creation as well as cost on the reply.

    You might use this template:
    Creation Date:
    End Date:
    Payment Method:
    Transaction ID:

    You can also open a ticket for faster processing. Please note a refund might take up to 7-14 business days to reflect.

    We thank you for your business.

    Best Regards,
    Unnamed Provider Team.

    Anonymized and corrected typo.

    For the record, this provider promised multiple times in past two months to delete the "public feedback" section in their ToS, but still hasn't done so to this date.

  • skorupionskorupion Member, Host Rep

    @yoursunny said:
    It's time to end this toxic relationship, I guess.
    I'll get my vps3 hostname back in time for Black Friday.

    Dear push-up specialist (yoursunny summer host Inc),

    Re: IPv6 Power (vps3.host)

    We are no longer supporting this service anymore on the location (Germany or IPv6 Only ) you chose it. We inform you it will be automatically terminated at the end of its billing cycle or at most the 13 of August 2021

    For a refund kindly write an e-mail to [email protected] or reply to this e-mail if you ordered annual services so we create a pro-rated discount. Alternatively you might open a PushUpPal refund request which we will accept. Kindly put your transaction ID and date of service creation as well as cost on the reply.

    You might use this template:
    Creation Date:
    End Date:
    Payment Method:
    Transaction ID:

    You can also open a ticket for faster processing. Please note a refund might take up to 7-14 business days to reflect.

    We thank you for your business.

    Best Regards,
    Unnamed Provider Team.

    Anonymized and corrected typo.

    For the record, this provider promised multiple times in past two months to delete the "public feedback" section in their ToS, but still hasn't done so to this date.

    that's an email from hosterlabs for those wondering

Sign In or Register to comment.