Welcome Gary Rixon!

We are pleased to announce the expansion of our team in the form of Gary Rixon. Gary will be joining us as a Linux Systems Apprentice and brings with him a real passion for servers and hardware. A bit of a nerd with a love of the outdoors, Gary can typically be found tinkering with […]

CVE-2014-3566 – POODLE

What is POODLE The POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability allows an attacker to obtain data transferred with the SSL 3.0 protocol.  An attacker acting as a man in the middle can downgrade a TLS connection to SSL 3.0 and then use a padding-oracle attack to access sensitive information such as cookies.  Since […]

CVE-2014-6271 – Shellshock

Shellshock is a bug in the bash shell.  The main issue comes from the fact that commands can be executed if they are crafted into environment variables.  This means anyone who can send a user agent to Apache can run commands as the user running Apache. Am I affected? You can test if your server […]

Welcome Rob Hooper!

Hello! I’m Rob; Gamer, Tea drinker, and lover of all things hackable. I have customised every computer I have ever owned within a inch of its life. I am joining the Dogsbody team as a Linux Systems Apprentice. Excited to learn more about Linux, the cool new technologies out there as well as giving back to […]

Congratulations Alex Last

We are very pleased to congratulate Alex Last on completing his Linux Systems Apprenticeship. Alex now holds… City & Guilds Certificate in IT Systems and Principles City & Guilds Level 3 Diploma in IT Professional Competence We are even more pleased that Alex has chosen to continue his career with Dogsbody Technology as a permanent […]

CVE-2014-0160 – Heartbleed

A vulnerability has been discovered that allows anyone over the internet to read data straight off of your server. “Catastrophic” is the right word. On the scale of 1 to 10, this is an 11. – Bruce Schneier Labelled “Heartbleed” this vulnerability leaves your servers memory vulnerable and accessible to be read by anyone. A […]