Category: Security


Office install – Network & PCs

Michael Usher Mortgage Services asked us to setup another new office install for them due to further expansion. The office had been used by multiple Companies previously so we had to embark on a major cable tidy up including the removal of two old phone… Continue reading

Online security checker

We found a really useful tool that checks the security of your system. It’s an online tool that doesn’t need any installation. Run the tool and the system will tell you what vulnerabilities your system is open to. It’s then just a matter of closing… Continue reading

Display email delivery count for domains

We recently cleaned a WordPress site from malware for a Client after their server ended up on a blacklist due to the amount of spam it was sending out. This effects email delivery to end users as mail is usually rejected. Here’s a really useful… Continue reading

Talk Talk update

Talk Talk update for our Customers. This is the third serious attack against the broadband, TV and phone provider in 2015. It seems that however they tighten their defences the hackers keep finding ways in. The investigation is still ongoing, but unfortunately there is a chance… Continue reading

WordPress Malware removal

We’ve recently detected and removed a trojan from a Client’s website after being contacted early one morning. WordPress malware removal – The infection was a simple piece of malware that replaced the .htaccess file when ever it was changed. The interesting thing was that the… Continue reading

Some of the DNS attacks in force today

DNS attacks – A simple way to gauge the extent of the danger posed by DNS vulnerability is to look at the sheer number of attack types currently being launched. This is not all of them and new ones are emerging. Direct DNS amplication attacks… Continue reading

Ghost vunerability – Ubuntu and CentOS

Ghost vunerability

A new vulnerability, GHOST: glibc vulnerability (CVE-2015-0235), has been discovered that affects certain Linux systems. This exploit affects the gethostbyname functions in the GNU C Library (glibc), which is a key component of all Linux systems. Because many software programs rely on these functions, Linux… Continue reading

Using IKEView to review IKE & IPSEC logs.

IKE View

This is predominately aimed at Checkpoint users. Download a copy of IKE View here – this is a stand alone program so it doesn’t need installing. Open your ike.elg log file and analyse accordingly…  

IKE Debuging

Nokia IP Platform

This guide assumes you have Chekcpoint running on an IPSO nokia platform and are familiar with debugging the platforms. Logon to the firewall (using your PuTTY client & SSH v2) as admin and enter expert mode. Run the following commands: cd /$FWDIR/log vpn debug ikeon The… Continue reading

WordPress hacked site cleanup service

WordPress site cleanup service

WordPress hacked? When a WordPress site get’s hacked finding the malware can be tricky, however once you understand the principles behind SQL Injections, brute force attacks and suspicious file types, tracking down the infection isn’t too difficult. If the infection has spread to your server… Continue reading