RSS Feed
News
Nov
20
New TLDs!
Posted by Daniel Billing on 20 November 2014 08:03 PM

We have added a whole bunch of (63 actually) new TLDs to our Client Area, and they are pretty cheap. Full list: http://rtrdt.ch/tlds


Read more »



Nov
16
New logo and web design
Posted by Daniel Billing on 16 November 2014 06:40 PM

Like most companies now we have changed our logo and it is flat. We have also updated the design on our website to match the flat desgin, while we where at it we fixed some bugs here and there in the client area. So that should work a lot smoother now. Thanks!


Read more »



Sep
27
Shellshock Bash Vulnerability
Posted by Daniel Billing on 27 September 2014 11:27 PM

On September 24, 2014, a GNU Bash vulnerability, referred to as Shellshock or the "Bash Bug", was disclosed. In short, the vulnerability allows remote attackers to execute arbitrary code given certain conditions, by passing strings of code following environment variable assignments. Because of Bash's ubiquitous status amongst Linux, BSD, and Mac OS X distributions, many computers are vulnerable to Shellshock; all unpatched Bash versions between 1.14 through 4.3 (i.e. all releases until now) are at risk.

None of our servers are affected by this bug/vulnerability because we have updated all the servers so they are now protected.


Read more »



Jul
23
Moving Hosts
Posted by Daniel Billing on 23 July 2014 06:08 PM

We are moving our servers to a new host and might cause some downtime over the next few days. Please follow our tweets for more info.


Read more »



Apr
11
Heartbleed
Posted by Daniel Billing on 11 April 2014 09:26 PM

 

On 7. April a new vulnerability was announced in OpenSSL 1.0.1 that allows an attacker to reveal up to 64kB of memory to a connected client or server (CVE-2014-0160). We fixed this vulnerability last week before it was made public. All our clients sites is not affected as they do not use SSL, but all our server have received this fix and are now protected.

We encourage everyone else running a server that uses OpenSSL to upgrade to version 1.0.1g to be protected from this vulnerability. For previous versions of OpenSSL, re-compiling with the OPENSSL_NO_HEARTBEATS flag enabled will protect against this vulnerability. OpenSSL 1.0.2 will be fixed in 1.0.2-beta2.


Read more »



Apr
4
Moving support to new server
Posted by Daniel Billing on 04 April 2014 10:21 PM

We are currently moving our support software to a new server. You wont be able to see it on the website but the support email and live support will still be available. Sorry for the inconvenience.


Read more »