Welcome Awab, our new Linux Systems Engineer
Dogsbody are happy to announce the addition of Awab, our new Linux Systems Engineer. Having successfully accomplished a degree on Biological Sciences (he is a Co-author of an abstract published to an issue of Allergy Journal, in relation to his 3rd year dissertation) he immediately started his career in technology. Keen to learn more about […]
Debian 9 “Stretch” goes End of Life (EOL) June 2022
On the 30 June 2022, Debian 9 “Stretch” goes End of Life (EOL). We recommend you upgrade to Debian 11 “Bullseye” (skipping Debian 10 if possible) which is supported until June 2026. After this date there will be no security updates released for Debian 9 and servers will not be patched for any new vulnerabilities […]
Staff pick our charity giving 2021
Every year, around Christmas time, Dogsbody Technology gives back. This year we let each member of staff pick a charity for Dogsbody to donate too. Each one has received a percentage of our profits. Here is what they selected… We hope you agree these are all wonderful charities to support. WISHING EVERYONE A HAPPY CHRISTMAS, […]
CVE-2021-44228 – Log4j2 vulnerability
This weekend, a very serious vulnerability in the popular Java-based logging package Log4j was disclosed. This vulnerability allows an attacker to execute code on a remote server; a so-called Remote Code Execution (RCE). Because of the widespread use of Java and Log4j, as well as the relative ease with which the vulnerability can be exploited, […]
Dogsbody Technology 2021 Christmas Holiday
2021 went in a blink of an eye and its that time again for Dogsbody Technology 2021 Christmas holiday. Our Christmas 2021 holiday covers: Fri 24 Dec 2021 – Office closed after 13:00 Mon 27 Dec 2021 – Public Holiday Tues 28 Dec 2021 – Public Holiday Wed 29 Dec 2021 – Office Closed Thur […]
How to set-up fail2ban for a WordPress site
What is Fail2ban Fail2ban is a tool which you can use to reduce the impact of attacks on your servers. Typically you configure it to monitor a log file for suspicious activity. Then once the activity crosses a threshold you can have it take an action, such as block the source IP address in your […]