My AccountViewCheckoutItems 0   Delivery £0.00
HomeAbout UsHelp & FAQContact Us
Basket Total £0.00
Cookson Hardware
Call us for Architectural Ironmongery Supplies!  

Architectural Ironmongery
Fixings & Tools

Hang It | Close It | Lock It

Keyswift - Express Keys to Code. Key cutting service - cabinet keys, mortice keys & Yale type keys.

Reisser Cutter Screws and Crate Mate Promotion.

Gatemaster Metal Gate Locks.

Bahco Hardpoint Saws.

Securefast Easy Change Code Locks.

Reisser Crate Mate Storage System.

Vision Door Handles by Perry.

Sagepay


GAI Guildmark

 
Important Service Notification
Dear,

Thawte is aware of the vulnerability, dubbed “Heartbleed”, which is a security concern for users of OpenSSL, a widely-used opensource cryptographic software library. It can allow attackers to read the memory of the systems using vulnerable versions of OpenSSL library (1.0.1 through 1.0.1f). This may disclose the secret keys of vulnerable servers, which allows attackers to decrypt and eavesdrop on SSL encrypted communications and impersonate service providers. In addition, other data in memory may be disclosed, which conceivably could include usernames and passwords of users or other data stored in server memory.

To be clear, this is a vulnerability of the OpenSSL library, and not a flaw with SSL/TLS nor certificates issued by Thawte. At no time were Thawte’s SSL or Code-Signing roots and intermediates at risk, nor was there ever an issue with Thawte certificates.
 

Steps to Success:

  1. Identify if your web servers are vulnerable (running OpenSSL versions 1.0.1 through 1.0.1f with heartbeat extension enabled). Use our SSL Toolbox to detect this. If you’re running a version of OpenSSL prior to 1.0.1, no further action is required.
  2. If your server is impacted, update to the latest patched version of OpenSSL (1.0.1g), or recompile OpenSSL without the heartbeat extension.
  3. Generate a new Certificate Signing Request (CSR).
  4. Reissue any SSL certificates for affected web servers using the new CSR (do this after moving to a patched version of OpenSSL).
  5. Install the new SSL certificate and test your installation.
  6. After the new certificate is successfully installed, revoke any certificates that were replaced.
  7. Website administrators should also consider resetting end-user passwords that may have been visible in a compromised server memory.
  8. Always refer back to the Knowledge Base for more information.
If you have additional questions, please contact your SSL Reseller for further support and more information.

Best Regards,
 
© 2024 Cookson Hardware
Powered By TABS For Tools
First for Architectural Ironmonger Fixings and Tools Twitter Facebook
LinkedIn You Tube
Pinterest Wordpress Clog
We Accept Paypal, Mastercard, Visa, Electron and Visa Debit.

Cookson Hardware, Stockport, Greater Manchester
UK Online Architectural Ironmongers


Tuesday 23rd April 2024