All VPS nodes and Web Hosting will be reboot at 03 February 2018 00:00AM Hong Kong time in order to patch for the Meltdown and Spectre CPU Vulnerabilities.

You’ve probably already read about one of the most widespread security issues in modern computing history — colloquially known as “Meltdown” (CVE-2017-5754) and “Spectre” (CVE-2017-5753 and CVE-2017-5715) — affecting practically every computer built in the last 20 years, running any operating system.

So should you be worried?

So far it doesn’t look like the Spectre or Meltdown flaws have been used in an attack, and device manufacturers are working with Intel, ARM and AMD to fix these flaws.

Intel has claimed that the exploits can't corrupt, modify or delete data. While it’s good to see companies set aside their differences to find a fix for these flaws, it has emerged that one flaw, Spectre, may need a processor redesign to fix.

However, this does mean that future processors should be free from the Spectre and Meltdown security flaws. So, don’t be too alarmed, but keep an eye on any updates your device offers, and follow our advice on how to protect against the Meltdown and Spectre CPU security flaws.

Before making any changes:

Make sure that you have full backups of your data
If you or your customers are using any Antivirus software, you/they should first check compatibility with the software vendor

How can you/your customers patch these Vulnerabilities?

We shall be patching our Shared Hosting (Both Linux and Windows), Cloud Hosting and Email infrastructure very soon. However, if you have VPS/Dedicated Server/Cloud Server package(s) with us, please perform the following steps depending on the Operating System installed on your order. In case of Managed Servers, please reach out to us in case you face any issues while following the provided steps.

For Debian/Ubuntu:

1. Update and upgrade your packages using apt-get:

#apt-get update && sudo apt-get dist-upgrade

2. You'll need to reboot your server to apply the changes:


For CentOS/Fedora, use either of the two methods mentioned below:

1. You can initiate a full yum update using the below command:

#yum update

2. Just update the kernel packages:

#yum update "kernel*"

3. You'll need to reboot your server to apply the changes:


For Windows:

  1. Apply the latest Windows update available

  2. Enable mitigations in your registry

  3. Apply a microcode firmware update for your CPU

  4. Please Note: Applying the patches may have a negative impact on overall performance.

Steps 1 and 2 are documented on Microsoft's website.

Due to the way this vulnerability was made public, not all patches and updates may not be currently available.




Tuesday, January 23, 2018

« Back