Try Hacker Blocker free for 15 days
Download Hacker Blocker for Windows and see the difference instantly on busy public servers.
- Good for 1 Windows Server for 15 days
- Imports over 770 million IPs into Windows Firewall
- Gets hourly updates from our Master Blocklist
- When installed on every Endpoint, synchronizes all Windows Firewalls
- Fully Automated - install it and forget it
Need a more robust trial? Contact us.
Re-Discover Your Server's True Power
What Does Hacker Blocker Do?
Easy Deployment
Fully Automated
Windows Server or PC
Want to skip the trial and jump right in?
Government Pricing
Contractor Information
Contract #: | 47QTCA22D00BJ |
Contractor: | TRIG WEB DESIGN, LLC |
Address: | 33A REBECCA CIR HUDSON, NH 03051-3160 |
Phone: | 617-819-5877 |
E-Mail: | |
Web Address: | http://www.trigwebdesign.com |
SAM UEI: | KZVLG45QLW54 |
NAICS: | 511210 |
Socio-Economic : | Small business |
EPLS : | Contractor not found on the Excluded Parties List System |
Govt. Point of Contact: Jay Johnson |
Contract Clauses/Exceptions: View the specifics for this contract |
Source | |
Title | Multiple Award Schedule |
Contract Number | 47QTCA22D00BJ |
Contractor T&Cs /Pricelist | |
Current Option Period End Date | Aug 1, 2027 |
Ultimate Contract End Date | Aug 1, 2042 |
Category | 511210 |
View Catalog |
Frequently Asked
Questions
Have a question not addresses here? Contact our experts today at (800) 626-3520
Hacker Blocker for Windows Licensing
Windows PC - Single user license is for one Activation on a single device. You can move an Activation from one device to another 3 times, called 'Deactivations' per license. If you need more Deactivations, you can request them in your Customer License Portal or call support.
Windows Server edition - Licenses are assigned to a physical OSE of Windows Server for up to 25 users or virtual OSEs, with two activations assigned. For Enterprise and Datacenter editions with more than 25 OSEs, contact our Volume License department.
Volume Licenses can be ordered online or by calling our sales department at (617) 819-5877. We can also customize your license options for easy tracking and deactivations of licenses on individual machines.
Our Customer License Portal allows Customers to organize and control license options easily, and we can help customize your Portal for easy management.
email:
Linux / Unix / WHM
For Linux machines, we use Secure FTP (sFTP) connections to upload our Blocklist to your CSF path every 15 minutes, in whichever format needed i.e.: csf.deny. We offer paid subscriptions through our website here.
Hackers have a multi-pronged approach to attacking American businesses and agencies. Most attacks are random, usually on your website or in the form of spam / phishing and attacks looking for vulnerabilities. When one is found, it is exploited.
Website & Email attacks include:
- Thousands of WP-Admin logins per hour
- SQL Injections
- Form and Comment spam
- Direct File Inclusions (malware/viruses)
- Denial-of-Service Attacks
- Email Bombing
- Phishing
Meanwhile, your public-facing servers are dealing with the same 'noise' attacks, while dealing with Windows-specific attacks such as Exchange Server exploits from Ransomware-as-a-Service (RaaS), Eavesdropping, Network Denial-of-Service Attacks, Spoofing, RTP Relays, Spim Attacks, Viruses & Worms, and so on, and so on.
These attacks result in slow networks, websites and email delivery; affecting productivity, increasing IT costs, and in worse cases, ransomware nightmares.
Ransomware attacks vary in their techniques, from simple phishing and malware infections to sophisticated proxy-shell flaw exploits. Hacker Blocker adds blockades to Ransomware at multiple stages:
- We research and block IP addresses and CIDRs used by Ransomware actors, including known RaaS (Ransomware as a Service) organizations such as BlackByte, which attacked the San Francisco 49ers on Superbowl Sunday, 2/13/2022
- We block IPs used by email servers that spread malware and phishing emails, substantially reducing the amount of spam and phishing emails
- We block IPs used by malware programs to communicate with their servers, stopping their ability to do their dirty work
- We recommend adding roles such as Anti-Ransomware FSRM to your servers, and educating staff to avoid phishing schemes
Exchange Servers using Hacker Blocker see immediate decreases in spam and phishing emails, increasing overall performance.
Windows - When your subscription expires, Hacker Blocker removes the firewall Rules it installed in Windows. Once you renew, it will download and apply the latest Rules once more.
Linux / LAMP - if your subscription expires, the IPs and CIDRs Hacker Blocker added are removed and no further updates are applied.
We do not offer a free trial, but we can offer free Detection, Reporting and Blocking apps for your website with every Linux order.
Yes! you can add user licenses for Windows Server, additional PC licenses or upgrade your Linux version to Unlimited website coverage.
We can customize any plan to your needs. Just contact sales for a free consultation.
Yes, you can cancel Hacker Blocker at any time, simply cancel your subscription online, uninstall the Windows version, or contact us for Linux cancellations.
The Hacker Blocker Blocklist has been compiled since 2016, and includes IP addresses & CIDRs of reported cyber-attacks from around the world. Our process is both reactive and proactive, as we collect attack reports from our customers as they happen, and from outside agencies before they happen to our customers.
- As attacks happen to our clients, we collect the IP address and research its origin
- Using our Whois tools, we find the CIDR of the IP. This can range from one to a million IPs on a single CIDR
- The CIDR is added to our own live firewalls, if it matches our criteria
- Our updated Blocklist is generated from our live firewall lists every 15 minutes
We only block the CIDR if it matches certain criteria:
- Small Network with multiple attack reports
- Large network from countries unfriendly to the USA (i.e.: Russia)
- Not a University or Medical Institution
Hacker Blocker installs a Service on your Windows machine that communicates with our secure servers and aquires our latest Blocklist. It then parses this list into Rules in your Windows Firewall. Hacker Blocker then updates your Firewall Rules every hour, as we constantly add and remove entries.