On 25.09.2014 a severe internet security alert was issued for many Linux/Mac systems. stSoftware immediately patched all our cloud hosted servers in response to this alert.
We advise individuals or organisations with Unix-based systems they will need to patch all internet facing Linux/Mac servers immediately.
See Severe Bash vulnerability affects Unix-based systems including Linux and Mac OSX for more information on how to manage this internet security issue.
We recommend internet users subscribe
The Heartbleed Bug is a recently discovered vulnerability in the OpenSSL cryptographic software library used by many of the world’s web servers to secure information using TLS. If the web site is vulnerable then a hacker could expose 64k of the server's memory without any trace in the server's logs. The server's memory exposed could include the server's private encryption key or other information such as usernames and passwords.
By clicking on the "Welcome user name" you will be shown your user set up, with the list of current sessions.
If you see an IP address that is unfamiliar to you, we suggest you change your password immediately to secure your account against unauthorized access. Your current IP address is displayed below the table. In most cases, we guess the location by matching your IP address to a broad geographical location. The location and IP mappings might not always be accurate, especially in cases
Normal users are restricted to view only their own session details. Administrators may see the session details for all users.
Active sessions can be forcibly logged out from the session details screen. The list of active sessions for a user can be viewed from the "My Setup" screen.
Industry standard best practice for passwords for both the web server and Linux machines. Site designers do not have direct access to the underlying Linux server, the raw database or files. All changes are done within sandbox of the system.
The file /etc/hosts.deny on Unix/Linux can block login attempts based on counties. The below is a simple host.deny file to block all countries but your own ( in my case Australia), sure this is not the whole answer to securing a system but it sure cuts down the number of hack attempts.
sudo vi /etc/hosts.allow
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
# We will block *all
The system administrator can configure the system password management and storage options to find the correct balance between convenience, performance and security. The password and login options can be configured at the global level and at a per user level.