Windows security precautions - Possible Outages
Posted by Josh Henry on 15 May 2017 02:55 PM
Due to the recent discovery of the CryptoLock "WannaCrypt" or "WannaCry" and it's world wide effect, All of 4Web's Windows based servers will be undergoing security audits and updates to verify that they will not be affected by this Malware.
We will be conducting tests and updates in the evenings after 9pm going until 1am.
We apologize for any down time that will occur during this.
Read more »
Domain Renewal Scam Alert
Posted by Josh Henry on 16 January 2017 11:48 AM
4Web has been contacted by our clients indicating they have received letters in the mail telling them to renew their domain with a company called iDNS or Domain Registry of Canada.
This is a Scam.
These letters look like legit messages from a legit company trying to get you to transfer your domain away from your current registrar.
Discard these letters if you ever receive them.
If you have any questions about this please contact email@example.com to have them answered
Read more »
Posted by Josh Henry on 23 August 2016 02:04 PM
Shows that the WordPress developers always look into the bugs and hacks that they detect.
Read more »
4WEB News - December 2015
Posted by Ayman Hassan on 03 December 2015 04:42 PM
Dear 4WEB Customers,
We have a few important announcements that may affect your services with us.
1. Shaw Fibre Upgrade
We will be lighting up 2 x 1,000Mbit Shaw Fibre feeds on December 14th between 12:00pm to 1:00pm and all traffic will flow through our secondary provider, Bell. Once done please ask us about our new unlimited 10Mbit, 100Mbit and 1,000Mbit Fibre Internet packages.
2. New Cloud Backup Services
Our old cloud backup services will expire in December 2015 and replaced with our new Acronis based systems. All old backups will be maintained for the set retention period. Our new cloud backup service now supports; Windows Workstation, Windows Server, Windows Exchange Server, Windows SQL Server, Linux, Mac OS, Hyper-V and VMware. System state, bare metal, local backup, network backup or cloud backup options are available with our new software as well. If you are interested in an Edmonton based cloud backup solution starting at less than $10/month please contact firstname.lastname@example.org for a free trial.
3. New Links on www.4web.ca
OWA1/OWA2: Webmail links for customers with Exchange Email Hosting services. OWA1 is for our older exchange cluster and OWA2 is for our newest cluster. This may change in the future to a single link as we migrate customers.
Spam Filter: Link for clients with Spam/Virus/Archiving/BackupMX or any Hosted Email Services at 4WEB. Logging on as a user you can update your spam filter settings and admins can whitelist email accounts and much more.
Webmail: This Webmail link can be used by all pop/imap email clients on our new hosting cluster.
Hosting Panel: Most of our dns/email/web hosting clients have now been moved to this new hosting cluster. This new link gives users the ability to update anything related to their hosted domain such as; dns, email, websites and more.
Help Desk: If you have not yet logged onto your help desk please do so. You will find all your correspondences with 4WEB Sales, Support and Billing as well as several knowledge base articles and how to guides that can help you setup your 4WEB services.
Just email email@example.com if you are not sure which link is for you or how to get the best use of these links. Help us help you!
4. 4WEB Holiday Hours
Our office will be closed from December 25th - January 1st. We will not be booking any new service requests or updates to existing services during this time. Please feel free to contact us on/before December 24th or on/after January 4th.
Wishing you and yours a Merry Christmas and a Happy and Prosperous 2016!
Your 4WEB Team
Read more »
Experts warn of risks - Bash Bug (ShellShock)
Posted by Josh Henry on 29 September 2014 03:45 PM
Internet security experts are warning that a new programming flaw known as the "Bash Bug" may pose a serious threat to millions of computers and other devices such as home Internet routers. Even the systems used to run factory floors and power plants could be affected.
So, is it time to panic? Here are some common questions and answers about the latest security scare.
Question: What is the Bash Bug, and why is it a big deal?
Answer: The bug, also known as "Shellshock," is in a commonly used piece of system software called Bash. Bash has been around since 1989 and is used on a variety of Unix-based systems, including Linux and Mac OS X.
Devices that use Unix in some form include many servers, routers, Android phones, Mac computers, medical devices and even the computers that create bitcoins. Systems running power plants and municipal water systems could also be affected by the bug, though security experts already recommend that these systems remain disconnected from the Internet to avoid opening them to such risks.
Bash is a command shell — "the thing you use to tell your computer what you want it to do," explains Christopher Budd, global threat communications manager at security firm Trend Micro. Thus, exploiting a security hole in Bash means telling your computer, or other systems, what to do.
Q: Why are people saying it's worse than "Heartbleed," the flaw that exploited security technology used by hundreds of thousands of websites?
A: While Heartbleed exposed passwords and other sensitive data to hackers, Bash Bug lets outsiders take control of the affected device to install programs or run commands.
On the other hand, Bash Bug might be harder to exploit. Heartbleed affected any system running OpenSSL, a common Web encryption technology. With Bash Bug, your system actually has to be using Bash, Budd said. There are multiple types of command shells, so even if Bash is installed, the system could actually be using a different one.
Q: It's been a quarter century since Bash came out, so why is the bug a threat now?
A: That's because someone — Stephane Chazelas of Akamai Technologies Inc. to be specific — just found it.
Heartbleed was around for more than two years before it was discovered.
Q: Should you be worried?
A: For now, the Bash Bug appears to be more of a potential nuisance than a major threat.
It's a more vexing problem for Mac owners. The Bash Bug makes it easy for hackers to take control of a Mac running on a public Wi-Fi network, such as one in a coffee shop or airport, said Chris Wysopal, chief technology officer of computer security firm Veracode.
At home, a hacker who takes control of an Internet router could consume so much bandwidth for online mischief that the owner gets hit with a huge bill from service providers that impose monthly data caps, said Dave Lewis, Akamai Technologies' global security advocate.
Another possible security problem: A hacker who seizes control of a vulnerable Web server might collect online passwords stored in databases, said Joe Siegrist, CEO of LastPass, a service that stores and protects passwords. The threat doesn't appear to be as high as with Heartbleed, however.
The Bash Bug could cause massive damage if it's used to create an Internet "worm" — lines of malicious computer coding that wiggle from one vulnerable server to the next. A worm that reaches pandemic proportions could bog down the Internet and even render some services inaccessible. At this point, a worm feeding on the Bash Bug looms as a theoretical threat.
Q: What can you do about it?
A: Everyday users can't do much right now, except to wait for manufacturers to release fixes for their products. Budd recommends applying the patches for routers, Macs and other devices as they come out.
Even if a fix is developed, getting it could be another matter. Budd expects that to be an issue with Android phones, because their manufacturers and carriers are often slow to push out the system updates that Google provides.
Of course, it always helps to run up-to-date security software on your devices.
Q: Should these recurring security breakdowns cause people to reassess society's ever-increasing dependence on the Internet?
A: Probably, given that the revelations about Bash Bug and Heartbleed surfaced within six months of each other. What's especially troubling about Bash Bug is that it's been hiding in plain sight for the past two decades, even as millions of more machines came online to widen the threat.
Furthermore, these risks are likely to escalate as people store more documents, photos, videos and even medical records over the Internet. At the same time, technology is expected to make it possible to plug just about everything imaginable into the Internet, be it coffee machines or automobiles.
We'll just have to live with technological risks. As Lewis noted, "We are already too far down the road to take a step back."
Read more »