Web directory, archive
Search web-archive-uk.com:

Find domain in archive system:
web-archive-uk.com » UK » S » SERVERSPACE.CO.UK

Total: 117

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • What threat does Shellshock pose to business users of hosting services?
    integral server types are all common applications for the Bash carrying operating system meaning that many business critical servers are at risk The issue is exacerbated by the fact that many Linux users think of the OS as unsusceptible to attack and thus neglect to perform basic security measures It s worth mentioning at this point that although Mac OS X machines do carry the vulnerable Bash component the threat to these machines is low due the way in which they use it Also Bash should not be confused with the Command Prompt synonymous with Windows operating systems though they look same they are not Windows machines are for once not affected Probable impact of being compromised The possible uses of the Shellshock vulnerability are wide ranging but the likely candidates are personal data theft use in DDoS attack botnets sending of SPAM email and attacking more machines via Shellshock The challenge is that you may not know your machine is compromised as Shellshock gives already sophisticated criminals full control of your machine allowing them to cover their tracks A more recent development has seen exploits like this one being used to create bitcoin mining rigs However since mining bitcoin is extremely resource intensive this is likely to be both limited to extremely powerful servers and easily spotted by system administrators when it occurs Should we scramble to patch Media advice would on the whole have us the hosting provider and you the user scrambling to patch every bit of vulnerable kit we can find as fast as possible In truth however this probably isn t the most sensible solution for three reasons The patches that have so far been released have been developed in haste Several prominent examples were quickly superseded or withdrawn while more effective solutions were developed

    Original URL path: https://www.serverspace.co.uk/blog/blog/threat-shellshock-pose-business-users-hosting-services (2016-04-24)
    Open archived version from archive

  • Boost database performance with software defined storage
    access etc SDS grants greater scalability flexibility and speed of configuration than SAN or NAS alternatives This separation also enables the use of lower cost commodity components Scalability flexibility and reliability While traditional SAN relies on a limited number of nodes normally between 4 and 8 SDS has no such limit and can easily scale to thousands of nodes This enables you to at last scale performance in a similar fashion to capacity a true breakthrough Virtualisation of the control layer to software introduces never before seen flexibility too making SDS solutions extremely well suited to cloud computing applications both public and private In a public cloud the multi tenant capabilities of the virtualised control allows the operator effective performance isolation and quick reallocation of unused capacity In a private cloud the same features allow multiple applications to use dynamically allocated portions of the total capacity with full workload isolation This results in efficiencies for the end user in either scenario SDS boosts reliability too by removing single points of failure and enabling the use of rolling updates that never need the whole system to be taken off line Massive database performance gains SDS is not a new concept with a number of costly proprietary systems as well as numerous approximations of true SDS having been available for some years More recently however open source solutions have been developed and subsequently productised being packaged with hardware and support at a price point that is far more realistic for many As a result database administrators in start ups SMEs and enterprises can all now access the benefits that SDS offers Several vendors of open source SDS software including our chosen provider Nexcenta are taking the performance benefits of virtualised control to even greater heights by integrating the ZFS file system complete

    Original URL path: https://www.serverspace.co.uk/blog/blog/boost-database-performance-software-defined-storage (2016-04-24)
    Open archived version from archive

  • Protect your business from ransomware
    familiar as an update for Adobe Reader Flash Player or the Java Runtime Environment Currently the US is seeing the highest number of malicious ads with the UK coming a close second In another incident stateside the entire police department of Durham New Hampshire lost control of its computers to a ransomware virus in early 2014 Needless to say they didn t pay the ransom and were eventually able to restore their systems thanks to robust backup arrangements Since the appearance of CryptoLocker other similar malware has emerged including CryptoLocker 2 0 CyrptoDefense CryptoWall and CryptoBit To aid dissemination criminals have even gone so far as to package ransomware in kit form selling it on underground forums to less technical fraudsters Ransomware is big business Given the nefarious nature of ransomware it s difficult to reliably assess the sums involved However in December 2013 ZDNet traced Bitcoin addresses posted by victims of CryptoLocker in an attempt to gauge ransom takings They came up with a figure of around US 27 million for the final three months of 2013 This is very similar to the results of research by Dell Secureworks who estimated that CryptoLocker raked in 30 million in the first 100 days of its existence Protecting your business from this growing threat Since most attacks start on a single client machine you would be wise to first secure your client estate and educate users to the threat A sensible first step is to implement many of the same precautions that are advised to home computer users such as Invest in reputable anti virus software and ensure it is always up to date Keep firewalls turned on at all times Ensure operating system automatic software updates are turned on Schedule a weekly or daily anti virus scan Don t open

    Original URL path: https://www.serverspace.co.uk/blog/blog/protect-your-business-from-ransomware (2016-04-24)
    Open archived version from archive

  • Virtual Private Servers Vs. Dedicated Physical Servers
    to saturation of the node resources which might result in a temporarily diminished performance for all servers What about security Security is often a concern for a business moving to the cloud but it is often blown out of proportion Security wise VPS from reliable providers are a very safe choice The logical security capabilities of a VPS are no different from any other server and are entirely within your control Physical security is somewhat different being part of a shared infrastructure there is no separation of physical devices This could be perceived as a flaw but in reality it isn t All VPS benefit from the physical security measures of the data centres in which they are housed In the case of ServerSpace and most other Tier 3 data centre tenants this includes biometric site and server suite access locked server racks CCTV and 24x7 security attendance so there is really very little physical security risk And maintenance Maintenance of shared platforms like those that VPS run on is a shared issue Hosting providers take care of all maintenance related issues patching software and replacing failed components for example Fortunately VPS providers usually operate infrastructures that incorporate N 1 redundancy meaning maintenance can normally take place without you experiencing any down time at all Dedicated Physical Servers offer even more power and control A dedicated physical server is an individual server that is allocated to you in full You have full and total access to its resources including CPU RAM and storage and have complete control over its initial configuration so you can run any OS and application software you wish on it Performance of other machines can in no way affect the performance of your machine so if its performance is slow you know it s the result of your own workloads not others The benefit of this dedication of physical resources is perhaps best observed when an application performs an extremely high volume of read and or write actions to the hard disk in a large database configuration for example Under this scenario having 100 access to the bus can be extremely helpful in maintaining performance and understanding planning expansion requirements for the future Maintenance and security Being physical rather than virtual means that upgrades or downgrades are physical too This may mean that an upgrade requires you to wait for delivery of a server or parts and availability of an engineer in a managed scenario to install and configure them Logical and physical security of dedicated servers are much the same as VPS Since the physical server is dedicated to you nobody has reason for physical contact with it unless conducting your business And since we are still in the data centre environment malicious physical access is extremely unlikely Management of a dedicated server differs from that of a VPS For starters it s optional as to whether you perform basic management tasks or your provider does A managed server from your provider will no doubt

    Original URL path: https://www.serverspace.co.uk/blog/blog/virtual-private-servers-vs-dedicated-physical-servers (2016-04-24)
    Open archived version from archive

  • Using SNMP to control remote APC Switched Rack PDUs
    you set the community string the allowed IP addresses if required and the level of access Read Only or Read Write If you just wish to see the status of the ports you can do this under Read Only access but if you wish to be able to turn them on or off you will need to enable Read Write access Once the device has SNMP enabled you then need something that can talk to the device This can be your workstation with a simple SNMP tool installed There are many available free on the web and you can try several until you find one that suits your needs We will start off the basics using a Command Line version on our linux workstation You can then retrieve all the information that the target device is able to give you using the following command where the IP address is that of the target device snmpwalk v 1 c communitystring 192 168 0 1 We have hidden some of the command line fields but this is the kind of output you should see from an SNMPwalk An example of the output of an SNMP walk from the console Not exactly user friendly huh If you get to see an output similar to above then you are successfully reading from the device What s it all mean The long strings of numbers on the left hand side are known as Object Identifiers or OIDs Manufacturers identify each aspect of the device that can be interacted with and assign them an OID ordering them in a hierarchical tree manner These OIDs are then gathered into a Management Information Base or MIB pack and usually made available by the manufacturers Thanks guys So you need to identify and get hold of the relevant MIB pack for the PDU you are working with and then use a MIB browser to translate the OIDs into something that you and other mortals might have a chance of understanding iReasoning for example make a fantastic MIB browser a personal version of which is freely available It makes the tree structure that the OIDs are presented in much easier to understand With the information translated by the MIB Browser you can now see which functions or properties of the device you might like to interact with and what their values correspond to The example above shows the OID rPDUOutletControlOutletCommand which controls the status of a power outlet Eureka The value of an OID is usually an integer In this case changing it to the number 2 switches off the power to outlet 4 on the PDU in question You achieve this with the following command snmpset v 1 c public 192 168 0 2 1 3 6 1 4 1 318 1 1 12 3 3 1 1 4 i 2 Let s look at this command in a bit more detail Snmpset this command changes the value of an OID Other commands such as Snmpwalk and Snmpget allow

    Original URL path: https://www.serverspace.co.uk/blog/blog/using-snmp-control-remote-apc-pdus (2016-04-24)
    Open archived version from archive

  • 512K day - how one small file broke the internet
    table According to the CIDR report a web service that tracks changes in the routing table it exceeded 512K in size for the first time ever this week The table crossed the threshold briefly for the first time on Friday 08 August 2014 It quickly dropped back down only to rise over it again and stay there on Tuesday 12 August 2014 This major internet event coincided with global internet service disruption and is we are convinced the underlying reason for it How can something so small break the internet Like any large distributed system the internet is vulnerable to technical limitations and assumptions that hark back to its creation At the time of the BGP internet s creation 512K was a large number in terms of memory and probably considered ample if not overkill for the global routing table which while performing a very complex function needed only to contain very little simple data This assumption became embodied as hardware limitations in devices which were only allocated 512K memory or thereabouts for the table When the table exceeded that size this week some of the Default Free Zone DFZ routers will have no longer been able to store all of the routes in the table meaning they were no longer able to advise different AS where to send some of their data Due to the central role of the DFZ routers and the interconnected nature of the internet the effects of the resulting packet loss were felt the world over How was it fixed While most carriers are yet to come forward and announce that it was the 512K threshold that caused the issues of 12 August we are confident that it was at the heart of them We expect that the affected networks responded by swapping out old

    Original URL path: https://www.serverspace.co.uk/blog/blog/512k-day (2016-04-24)
    Open archived version from archive

  • ServerSpace Hybrid Cloud Hosting and Virtualisation Blog | Cloud Hosting
    to the system to cope with that changing demand all without human intervention This is theoretically ideal for applications with variable spiky or unpredictable demand Read More Cloud Hosting Elastic Cloud Public vs Private vs Hybrid cloud what s what 16 Feb 15 Posted February 16 2015 by Clive Larkin Cloud computing is an increasingly integral component of doing business especially for those offering SaaS or selling online Despite this growth the industry still hasn t arrived a consistent set of definitions for the three main flavours of cloud computing resulting in confusion for those migrating to the cloud for the first time Read More Cloud Hosting Ask smarter questions to make better decisions about your cloud provider 10 Feb 15 Posted February 10 2015 by Tim Pat Dufficy We re the first to admit that it must be hard for any tech business from a start up to an enterprise to choose between suppliers of cloud services Objective quantitative supplier evaluation can help Cloud hosting suppliers We all look pretty similar don t we Offering similar if not the same solutions and making the same promises about uptime service support and security So what can you do to tell between us identify our differences and ultimately select the right one for you Read More Cloud Hosting What is Hybrid Cloud and how can it support SaaS delivery 26 Nov 14 Posted November 26 2014 by Tim Pat Dufficy For developers of SaaS apps migrating to the cloud can be harder than for most Often this is down to sensitive data preventing a wholesale move to Public or even Private cloud models This is where a Hybrid Cloud solution can come to the rescue In this post we explain what the Hybrid Cloud computing model is the benefits it can

    Original URL path: https://www.serverspace.co.uk/blog/topic/cloud-hosting/page/2 (2016-04-24)
    Open archived version from archive

  • ServerSpace Hybrid Cloud Hosting and Virtualisation Blog
    got to look at the way mobile phones are sold to see that in action on a daily basis It s also present where cloud hosting is concerned No one would argue that price isn t important it is rightly a vital commercial consideration of any purchase But when price is the focal point of the conversation it can be all too easy to lose sight of the combination of factors that go into determining that price Particularly when it comes to technology that because of its utility like nature is almost taken for granted Read More Cloud Hosting Why we offer DDoS protection as standard 16 Apr 15 Posted April 16 2015 by Tim Pat Dufficy As you are no doubt aware the frequency of DDoS attacks has been increasing at an alarming rate in recent years DDoS attacks are now the most common sources of data centre outages rising from 2 in 2010 to 18 in 2013 Perhaps more worrying than the increasing frequency is the increasing intensity of attacks Attackers have been successful at innovating finding new and ever more disruptive ways to attack their victims systems Read More Cloud Hosting Cloud Elasticity vs Scalability Which is Best for You 16 Mar 15 Posted March 16 2015 by Tim Pat Dufficy Everywhere you look these days cloud vendors are promoting elasticity but what is it and can you benefit from it Elasticity is the latest innovation in cloud computing and helped along by the marketing of several giant Public Cloud vendors it s whipping up quite a storm In an elastic cloud the application is able to monitor changes in the demand for resources like bandwidth connections compute RAM and storage in real time It can then autonomously add or remove resources to the system to cope

    Original URL path: https://www.serverspace.co.uk/blog/page/5 (2016-04-24)
    Open archived version from archive

web-archive-uk.com, 2016-10-25