Enter your Email Address to get subscribed to our Blog.

Category

Tech Blogs

Category
Sort by

In a clear instance that highlights the importance of keeping software up-to-date, Google yesterday announced the uncovering of a bug in SSL version 3.0 (a standard of SSL that is 15 years old) that would render transactions originating from certain outdated browsers and/or Operating Systems vulnerable to attacks. POODLE is the name that Google has given to this bug and you can read more about Google’s assessment here. As soon as this flaw was announced, we at ResellerClub have…

You wake up one morning and get started on your daily chores of pouring over your e-mail only to discover that your inbox has been flooded with angry emails from irate customers, complaining about how your business has failed to deliver. It’s bad enough to wake up to something so troubling, but its even worse to not have a clue as to what went wrong! This is the recent story of a small business…

The phrase ‘Internet of Things’ (IoT) seems to have caught Tech World by storm!  It has been a topic of serious debate in technology circles and has steadily gathered steam in the past few months! So what is the (IoT) wave all about? Is it just another buzzword or will it really alter the course of the Internet as we know it? Let’s get some perspective… What is the Internet of Things? Imagine that you…

Does designing a website from scratch can seem like an intimidating task? Do you want to design a website and manage the content without coding or in-depth technical know-how? Enter CMS. CMS or Content management system is a software that allows publishing, editing and modifying content as well as maintenance from a central interface. CMSs are often used to run blogs, news portals, and e-commerce websites. Many corporate and marketing websites use CMSs as well.…

As I write this post, there is an on going and highly distributed, global attack on wordpress installations to crack open admin accounts and inject various malicious scripts. To give you a little history, we recently heard from a major law enforcement agency about a massive attack on US financial institutions originating from our servers. We did a detailed analysis of the attack pattern and found out that most of the attack was originating from…

On Friday 6th May, 5 am GMT our servers were hit with an extremely heavy DDoS attack. We were getting about 120,000 queries per second on each of our servers (about 40 times the usual peak load). Snapshot of the increased traffic we received An early investigation revealed that the attack originated from China and we immediately placed our IPs under TMS guard (it filters the incoming malicious traffic, and lets the genuine traffic through,…

A few days ago Microsoft released a Security Advisory (http://www.microsoft.com/technet/security/advisory/2416728.mspx) about a vulnerability which affects all versions of ASP.NET. This vulnerability known as Padding Oracle exploits the way an ASP.NET application handles encrypted data. ASP.NET encrypts data to prevent an application from tampering with it. Because of this vulnerability, an attacker can send data to a site and analyze the error response which provides a lot of information enabling the attacker to break the ASP.NET’s…

Starting today, we’re introducing a series of posts through which we intend to bring you the latest updates from our developers and tech experts. This corner will give you an insider’s view on the new features around the corner, useful tips and tricks and all the techie gossip at ResellerClub! For the first installment of the series, we’re tackling a very common aspect of most hosting queries – Extensions that are available on Servers. As many…

Plesk, the first in a string of launches, went live earlier today for all Windows Hosting Packages. This launch marks the beginning of a new phase at ResellerClub – with a series of products and Services being launched over the next 2 months. Plesk, as you may know, is one of the most popular Hosting Automation Control Panels around and is a standard for Windows Hosting Customers around the world. We feel that this, along…

Email authenticity is a major concern for a lot of customers and one of the best ways of addressing this is by adding SPF and DKIM Records. Both these techniques can be used to prevent email spoofing. So what are SPF and DKIM Records? SPF stands for Sender Policy Framework and is an open standard to prevent sender address forgery. The way it works is that it stops email forgers from forging the sender address…