[bitfolk] OpenSSL "heartbleed" vulnerability

Top Page
Author: Andy Smith
Date:  
To: announce
New-Topics: [bitfolk] Regarding possible exposure of your BitFolk account credentialsvia the "heartbleed" vulnerability
Subject: [bitfolk] OpenSSL "heartbleed" vulnerability

Reply to this message
gpg: Signature made Tue Apr 8 18:21:58 2014 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hello,

If you've been reading tech news in the last 24 hours then you're
probably aware of "heartbleed", but if not then you will want to
have a read of:

    http://heartbleed.com/


and take appropriate action.

If you trust this site you can use it to check if your HTTPS server
is vulnerable or not:

    http://filippo.io/Heartbleed/


Cheers,
Andy

--
http://bitfolk.com/ -- No-nonsense VPS hosting
_______________________________________________
announce mailing list
announce@???
https://lists.bitfolk.com/mailman/listinfo/announce