Sorry, you do not have permission to carry out this action.
Loadbalancer.org - Powered by Kayako Help Desk Software

news
Loadbalancer.org VA Product Releases v8.2.2-v8.2.4
Posted by Dave Saunders on 10 May 2017 08:40 AM

nwreadmore

Loadbalancer.org Update Versions 8.2/8.2.1 Available.
Posted by Andrei Grigoraş on 14 July 2016 06:41 AM
Update from v8.2 to v8.2.1
Changes in this release:
    • HAProxy
      • HAProxy updated to 1.7
    • Waf
      • Anomaly scores now default to 5
    • STunnel
      • STunnel Updated to 5.33. Improved memory handling.
    • Other
      • API

nwreadmore

Would you like $1,000 for helping someone?
Posted by Loadbalancer.org Support on 24 June 2016 03:52 PM

We'd like to give something back to you, when you tell people why you trust us.

Its simple really, if you know someone who could benefit from a load balancer, then why not give us a personal introduction?

We already get a lot of great referrals from existing customers and we wanted a simple way to give you something back.

Already Interested?

Then ask about our referral deal now:


nwreadmore

SSLv2 DROWN Attack Vulnerability.
Posted by Aaron West on 08 March 2016 06:38 AM

DROWN is the latest security vulnerability discovered in OpenSSL, thankfully thus far our appliance has shown itself not to be vulnerable. 

It primarily affects SSLv2 which we've disabled for some time by default(since v6.20), however, it's reported that the vulnerability can still be exploited even if SSLv2 has been disabled by forcing the use of EXPORT


nwreadmore

CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow
Posted by Aaron West on 17 February 2016 06:05 AM

Google's security team announced the discovery of a new vulnerability yesterday :

https://googleonlinesecurity.blogspot.co.uk/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html

So is your Loadbalancer.org appliance affected?

The short answer is


nwreadmore

CVE-2016-0728 Kernel Vulnerability
Posted by Dave Saunders on 21 January 2016 10:14 AM

A 0-day vulnerability which affects versions 3.8 and higher of the Linux Kernel has been published on 19 January 2016. The vulnerability is related to the keyring facility of Linux but also has the potential to be exploited on Android based devices too. The vulnerability was first reported by Israel based startup Perception Point and the good news is they have also provided details on exploiting the situation to test if your local system could be affected with steps to mitigate the


nwreadmore