Home » About » SecureMoz Website Anti-Malware Monitoring

Frequently Asked Questions




SecureMoz Server Monitor is a Service that checks whether your websites and servers are attack by malware & up and running.

It comes with a web based user interface where you can see your services and websites, and you can be alert for each monitor or service with a mobile number and email address.


  • Monitor services and websites (see below).
  • Email, SMS and Pushover notifications.
  • View history graphs of uptime and latency.
  • User authentication with 2 levels
  • Logs of connection errors, outgoing emails and text messages.
  • Easy & automatically check your servers.


There are two different ways to monitor a server:

  • Service

    A connection will be made to the entered ip or domain, on the given port.

    To check your IMAP service for example, we san port 143.

  • Website

    You can enter a link to a website, it will then  open the website and check the HTTP status code. If the site status code is in the down , it means an error occurred and the website is not accessible to the public. will return a “status offline”, and will start sending out notifications.


Each website has its own settings regarding notification.You can choose for email, text message (SMS) and Pushover.net notifications.

The following SMS gateways are currently available:

Please note: for these gateways you will need an account with sufficient credits.

Can I Use This on My Client’s Sites?

No, this is for personal use only for sites you own. If you would like to use this on client’s sites, they will require their own license.


Will SecureMoz slow down my site?

Absolutely not. You may experience a slight slow down while tests are being run but that takes less than a minute.


What changes will SecureMoz make to my site?

SecureMoz will not make any changes to your site.

Still Need Support? Please Click Here…


Malware Help Watch This Videos


Types OF Malware

Virus: A virus is a computer program that has been coded to replicate itself and infect a computer without the user’s knowledge. A virus spreads from computer to computer by infecting network files as well as CDs, USB drives, and other forms of removable media.

Trojan horse: Trojan horse or just Trojan is a program which looks legitimate but performs illegitimate actions such as granting full access to the intruder, installing a keylogger, disabling security software and as an invisible downloaded and spywares.

Adware: Adware (advertising supported software) is a software bundle which automatically downloads and displays advertisements to a computer in which it is installed. Adwares can be classified as privacy invading software. It is seen as a way to recover development costs by software developers.

Rootkit: A rootkit is a program which has been coded to take complete (or root) control of the system without the user’s knowledge. Rootkits take full control of the operating system and therefore cannot usually be removed by anti-virus software. Rootkits usually modify the boot sector of the operating system or disguise as drivers and load during boot up. As a result, it is usually hard to delete them.