We all understand the critical importance of maintaining an online presence. The image above displays a live uptime report relating to sites hosted by Digital Tsunami. On private clouds and dedicated web servers in the USA, China, Hong Kong and Australia, Digital Tsunami has been hosting websites since, well .. last century! Over the last quarter, uptime has been 99.988% …Read More…
Search Results: hosting
In the space of a month, yet another security vulnerability has been identified and announced. Known as the ‘SSLv3 protocol vulnerability and POODLE Attack’, (aka “POODLEbleed”, referencing the the recent Heartbleed vulnerability), the SSL Man In The Middle (MITM) Information Disclosure Vulnerability (CVE-2014-3566) affects version 3.0 of SSL, which was introduced in 1996, and has since been …Read More…
Shellshock is a serious security vulnerability in Bourne-Again SHell (BASH) on Linux. Known as the “Bash Bug” or “ShellShock”, the GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271) could allow an attacker to gain control over a targeted computer if exploited successfully. First disclosed on 24 September 2014, the vulnerability potentially affects most versions of Linux …Read More…
Detecting attempted access via repeated password attempts is easy. So should be the next step. Collating the IP addresses of offenders from each of our hosted sites, Digital Tsunami adds these to the firewall blacklist of our private clouds, to prevent future access by that IP to ANY of our hosted sites. While we recognise that hackers and …Read More…
The screenshot above displays a segment of a dynamic statistics report relating to a client hosted one of Digital Tsunami’s private clouds. It shows that there has been NO downtime for over 37 days, and 99.703% uptime over the last year. Over the last quarter, uptime has been 99.988% This is the uptime monitoring which we run for all our hosted client …Read More…
On Monday 7 April 2014, a widespread issue in a central component of Internet security was disclosed. Registered in the Common Vulnerabilities and Exposures system as CVE-2014-0160, the vulnerable code, called ‘Heartbleed’, had been adopted for widespread use upon the release of OpenSSL version 1.0.1 on March 14, 2012. The vulnerability, could allow attackers to …Read More…
As we approach the end of an exceptionally productive year at Digital Tsunami, we are just completing the migration of our web hosting to a private node in an Australian, Tier III, carrier-grade data centre. Our node has 64GB RAM, which is distributed between multiple ‘private clouds’; exclusive ‘private clouds’ for some of our publicly listed …Read More…
For 17 years, Digital Tsunami has hosted the websites (and email) of clients on five continents, in data centres across the globe. With the duplication of international backbones, the geographic location of a data centre is not as critical as it once was. For instance, in 1999, to maximise performance for the domestic and international markets of Heineken China, we had to …Read More…
Even the most secure enterprise or data centre can be hacked or infected by a polymorphic malware attack, persistent and determined ‘black hat’ programmer or malicious staff member. So, file backup is of critical importance in all environments. There could also be a recurrence of past worldwide infections, as polymorphic malware is now far more covert, …Read More…
Over a 2 year period at the turn of the century (1999-2001), when the World Wide Web was still in its infancy, some of the most contagious malware was released. January 1999: The Happy99 worm invisibly attached itself to emails, wished the user a Happy New Year and displayed fireworks to hide changes being made. …Read More…