Tag: guides

No its not a bloody free load balancer and never will be.

Last week we exhibited at Cloud Expo Europe, promoting the release of the new cloud products:  ENTERPRISE AWS + ENTERPRISE AZURE . We love trade shows, it provides a platform to meet existing customers as well as potential new customers. Several people visiting our stand mentioned the recent announcement that  Kemp Technologies have released a free load balancer . Understandably they were interested to hear if we would be responding in kind, however in his usual politically correct mood our boss responded with: “ No, its not bloody free and never will be”, Malcolm Turnbull – CEO Loadbalancer.org As usual we had a good chat with the guys on the Kemp stand, nice people, with a good product – but apparently they said they don’t compete with us. We really enjoyed meeting some existing customers and potential new ones.

STunnel Cipher List and Qualys SSL Labs Testing

In the wake of all the recent vulnerabilities we have been working hard to make sure that we give the correct information to our customers. So we decided to setup our latest version of STunnel on our support server (https://support.loadbalancer.org) and test our Cipher Lists with the Qualys SSL Labs site (https://www.ssllabs.com/ssltest)

Another year, another IP Expo show

We’re dusting ourselves off after exhibiting at IPExpo 2014. A huge thank you to everyone who visited our stand during the two day event. There were some productive discussions, light-hearted fun, and we even talked about load balancing!!! We love the opportunity to get some face-to-face time and felt the show was so good we’ve already booked up for IPExpo 2015

Shell-shocked by shell shock? I give you “CMD Caret” ^&

There seems to have been so much hype over the recent bash bug, shell shock! And there were all the people  in the Microsoft world thinking YES we are so cool we are NOT affected by it! Yea right I knew it, there had to be something much the same as the bash bug available in CMD.exe It affects the Windows CMD.exe Shell and I will provide a working example of how it can be exploited. It does show the whole hype of the bash bug bearing in mind you need access to the machines shell in the first place

Shell-shocked by shell shock? Bash vulnerability explained.

Having recovered from the recent Heartbleed vulnerabilities we now have another headline grabbing vulnerability to keep us all busy. First let me say that our product should be perfectly safe and secure unless you’ve already shared your passwords or forgotten to run “lbsecure”