• 09 Apr
    Byte encoding exploits in PHP files

    Byte encoding exploits in PHP files

    Despite better coding practices, testing and peer review of code, the number of exploit attempts and the technical complexity of attacks continues to increase against web sites. With the rise in exploit attempts comes a...
    Read Full Article
  • 24 Mar
    Directory Traversal Attacks - Beware DirBuster

    Directory Traversal Attacks – Beware DirBuster

    A What? A directory traversal attack is a type of brute force attack by which a hacker uses to get both an understanding of your web site structure and potential access to files which have...
    Read Full Article
  • 17 Mar
    FREAK - Yet another new exploit!

    FREAK – Yet another new exploit!

    Firstly, FREAK stands for "Factoring Attack on RSA-EXPORT Keys" and is officially designated as CVE-2015-0204. It is a weakness in some implementations of SSL/TLS that may allow an attacker (known as a man-in-the-middle attack) to decrypt secure communications...
    Read Full Article
  • 03 Mar
    Transferring Files - FTP

    Transferring Files – FTP, SFTP and FTPS

    Transferring Files - FTP, SFTP and FTPS There are numerous ways to transfer files these days, the oldest and still very widely used method is FTP. FTP stands for File Transfer Protocol and was defined...
    Read Full Article
  • 29 Jan
    Ghost - Glibc Vulnerability 2015

    Ghost – Glibc Vulnerability 2015

    Overview The start to 2015 from a security perspective has given us a very timely reminder about the need to stay vigilant with security updates. As is the case for any system, having a stringent...
    Read Full Article

We’ve got your back

With over ten years experience providing solutions for design agencies
in Australia, Conetix delivers premium service and performance.

Let’s talk about Agency Hosting plans

Let's Get Started

  • This field is for validation purposes and should be left unchanged.