What time is it? – About NTP
In this blog post we’ll talk about time, how it works, why it’s important to computers, and how NTP can be used to manage the time on computer systems. “You may delay, but time will not.” ― Benjamin Franklin Intro to NTP NTP (Network Time Protocol) allows computers on a network to synchronise their system […]
HTTPS Everywhere
“HTTPS Everywhere” is an increasingly popular trend among websites which gives added security, speed and SEO benefits. In August 2014, Google announced that it would be adjusting it’s search engine ranking algorithm to benefit HTTPS only sites, this was one of the key announcements that started the trend of sites going HTTPS everywhere. There’s also […]
The Dark Art of Email Deliverability
We often get questions over the technologies which help get your legitimate email delivered. There are three main ones: SPF – Used to lock down email sources to your servers DKIM – To authenticate your sent emails DMARC – For real world email reporting and DKIM enforcement Email is vital to any organisation. Ensuring your […]
BBC micro:bit Launched
Yesterday the new BBC micro:bit 2016 was launched. Over a million were given to Year 7 students in the UK for them to take home and keep – just in time for the Easter break! The tiny device can be plugged into a computer and programmed to do all sorts of cool stuff and is […]
Welcome Claire Christmas!
We are pleased to announce the expansion of our team in the form of Claire Christmas (yes that really is her real name!) Claire will be joining us as an Office Manager and brings with her years of administration and customer services skill as well as a real passion for cost savings and efficiency. Into […]
DROWN vulnerability
Dogsbody Technology maintenance customers are already protected against the newly disclosed DROWN attack, but as of the 1st March, 33% of all HTTPS sites are affected by this vulnerability. The DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) vulnerability affects HTTPS and other services that rely on SSL and TLS, these cryptographic protocols that make […]