<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - Dogsbody Technology</title>
	<atom:link href="https://www.dogsbody.com/blog/category/security/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Linux managed services &#38; consulting for ambitious web agencies and SaaS companies</description>
	<lastBuildDate>Tue, 24 Mar 2026 11:02:12 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Avoid Surprise AWS RDS Charges in 2026</title>
		<link>https://www.dogsbody.com/blog/avoid-surprise-aws-rds-charges-in-2026/?pk_campaign=feed&#038;pk_kwd=avoid-surprise-aws-rds-charges-in-2026</link>
					<comments>https://www.dogsbody.com/blog/avoid-surprise-aws-rds-charges-in-2026/?pk_campaign=feed&#038;pk_kwd=avoid-surprise-aws-rds-charges-in-2026#respond</comments>
		
		<dc:creator><![CDATA[Claire Christmas]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 11:02:12 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Amazon AWS]]></category>
		<category><![CDATA[AWS RDS MySQL]]></category>
		<category><![CDATA[RDS]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=169081</guid>

					<description><![CDATA[<p>From 31 Jul 2026 Amazon Web Services (AWS) will automatically start charging anyone using RDS MySQL 8.0 Community Edition for &#8220;Extended Support&#8221;. Your monthly database costs could increase significantly (in many cases close to double). TL;DR MySQL 8.0 goes End of Life (EOL) In April 2026 From 31 Jul 2026 AWS will start charging extra [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Favoid-surprise-aws-rds-charges-in-2026%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Davoid-surprise-aws-rds-charges-in-2026&amp;action_name=Avoid%20Surprise%20AWS%20RDS%20Charges%20in%202026&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/avoid-surprise-aws-rds-charges-in-2026/?pk_campaign=feed&#038;pk_kwd=avoid-surprise-aws-rds-charges-in-2026">Avoid Surprise AWS RDS Charges in 2026</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>From 31 Jul 2026 Amazon Web Services (AWS) will automatically start charging anyone using RDS MySQL 8.0 Community Edition for &#8220;Extended Support&#8221;. Your monthly database costs could increase significantly (in many cases close to double).</strong></p>
<h2>TL;DR</h2>
<ul>
<li>MySQL 8.0 goes End of Life (EOL) In April 2026</li>
<li>From 31 Jul 2026 AWS will start charging extra for &#8220;Extended Support&#8221;</li>
<li>There are options, you don&#8217;t have to upgrade to MYSQL 8.4</li>
</ul>
<h2>What Happens When AWS RDS MySQL 8.0 Reaches End of Life?</h2>
<ul>
<li>AWS automatically enrols your RDS MySQL 8.0 instance into Extended Support</li>
<li>Additional charges are added to your monthly AWS bill</li>
<li>Security updates continue for up to 3 more years</li>
<li>No automatic optimisation or performance improvements</li>
</ul>
<p>This is primarily a commercial decision by AWS, not a technical upgrade.</p>
<h2>Your Options</h2>
<h3>Option 1: Do Nothing and Pay for Extended Support</h3>
<p>This is the default outcome if no action is taken and there is nothing wrong with it. AWS will automatically upgrade your instance to Extended Support.</p>
<p><strong>Pros</strong></p>
<ul>
<li>No work required</li>
<li>Continued security patches</li>
<li>Supported until approximately July 2029</li>
</ul>
<p><strong>Cons</strong></p>
<ul>
<li>Higher monthly costs</li>
<li>No technical benefit</li>
<li>Unnecessary operational spend</li>
</ul>
<p>For cost-conscious businesses, this is rarely the best long-term choice.</p>
<h3>Option 2: Upgrade to MySQL Community 8.4</h3>
<p>Move to MySQL Community 8.4, which is supported until <strong>31 July 2029.</strong></p>
<p><strong>Pros</strong></p>
<ul>
<li>Avoid Extended Support charges</li>
<li>Remain on community MySQL</li>
</ul>
<p><strong>Cons</strong></p>
<ul>
<li>Requires application compatibility testing</li>
<li>Potential query or driver differences</li>
<li>Requires Developer time and regression testing</li>
</ul>
<h3>Option 3: Move to Aurora MySQL 8.0 (Best of both worlds)</h3>
<p>For most organisations, the most cost-effective and lowest-risk option is to migrate to <strong>Amazon Aurora MySQL 8.0. </strong></p>
<p>Aurora is AWS’s MySQL-compatible database engine. It is fully compatible with MySQL 8.0, and for most applications behaves identically.</p>
<p><strong>Aurora MySQL 8.0 is supported until 30 April 2028, without Extended Support charges.</strong></p>
<p>Why this is attractive:</p>
<ul>
<li>100% MySQL 8.0 compatible</li>
<li>Avoids 2026 Extended Support price increases</li>
<li>Often improved performance and storage resilience</li>
<li>Potential for zero-downtime migration (dependant on data etc)</li>
</ul>
<h2>Why SMEs Should Plan Now</h2>
<ul>
<li>Avoid sudden AWS bill increases in 2026</li>
<li>Schedule migration during low-risk periods</li>
<li>Controlled testing window</li>
<li>Maintain predictable cloud operating costs</li>
<li>Avoid rushed engineering decisions</li>
</ul>
<p>Leaving this until mid-2026 could result in rushed decisions, increased costs, or unnecessary operational risk.</p>
<h2>Summary: Best Path for AWS RDS MySQL Users</h2>
<table>
<thead>
<tr>
<th>Option</th>
<th>Cost Impact</th>
<th>Risk</th>
<th>Recommendation</th>
</tr>
</thead>
<tbody>
<tr>
<td>Do nothing</td>
<td>Higher</td>
<td>None</td>
<td>Expensive long term</td>
</tr>
<tr>
<td>Upgrade to 8.4</td>
<td>Neutral</td>
<td>Moderate testing required</td>
<td>Viable</td>
</tr>
<tr>
<td>Move to Aurora 8.0</td>
<td>Neutral</td>
<td>Very low</td>
<td><strong>Recommended</strong></td>
</tr>
</tbody>
</table>
<h2>Need Help With an AWS RDS to Aurora Migration?</h2>
<p>We are a UK-based Linux and AWS consultancy specialising in:</p>
<ul>
<li>AWS RDS optimisation</li>
<li>Aurora MySQL migrations</li>
<li>Zero-downtime database cutovers</li>
<li>Cost reduction and cloud optimisation for SMEs</li>
</ul>
<p>If you would like a review of your current AWS RDS MySQL estate and projected 2026 cost exposure, <a href="https://www.dogsbody.com/contact/">contact us.</a></p>
<h2>Frequently Asked Questions</h2>
<p><strong>Will AWS automatically upgrade my RDS MySQL 8.0 instance?<br />
</strong>Yes. After 31 July 2026, AWS will automatically enrol your instance into Extended Support unless you migrate or upgrade beforehand.</p>
<p><strong>Is Aurora MySQL fully compatible with MySQL 8.0?</strong><br />
Yes. Aurora MySQL 8.0 is designed to be fully compatible with MySQL 8.0 Community Edition.</p>
<p><strong>Can the migration be done with zero downtime?</strong><br />
In most cases, yes. Using replication and controlled cutover techniques, downtime can be reduced to seconds or avoided entirely.</p>
<p><strong>How long does an RDS to Aurora migration take?</strong><br />
Typically a few days including testing, depending on database size and complexity.</p>
<img decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Favoid-surprise-aws-rds-charges-in-2026%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Davoid-surprise-aws-rds-charges-in-2026&amp;action_name=Avoid%20Surprise%20AWS%20RDS%20Charges%20in%202026&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/avoid-surprise-aws-rds-charges-in-2026/?pk_campaign=feed&#038;pk_kwd=avoid-surprise-aws-rds-charges-in-2026">Avoid Surprise AWS RDS Charges in 2026</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/avoid-surprise-aws-rds-charges-in-2026/?pk_campaign=feed&#038;pk_kwd=avoid-surprise-aws-rds-charges-in-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PHP 8.1 will go end of life &#8211; 31 Dec 2025</title>
		<link>https://www.dogsbody.com/blog/php-8-1-will-go-end-of-life-31-dec-2025/?pk_campaign=feed&#038;pk_kwd=php-8-1-will-go-end-of-life-31-dec-2025</link>
					<comments>https://www.dogsbody.com/blog/php-8-1-will-go-end-of-life-31-dec-2025/?pk_campaign=feed&#038;pk_kwd=php-8-1-will-go-end-of-life-31-dec-2025#respond</comments>
		
		<dc:creator><![CDATA[Claire Christmas]]></dc:creator>
		<pubDate>Fri, 08 Aug 2025 10:34:41 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[EOL]]></category>
		<category><![CDATA[PHP]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=159103</guid>

					<description><![CDATA[<p>PHP 8.1 End of Life – Act Now PHP 8.1 goes end of life on the 31 December 2025. After this date, known security flaws will no longer be fixed, leaving your sites exposed to significant security vulnerabilities. It is important to update to a newer version of PHP. We recommend upgrading to one of [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fphp-8-1-will-go-end-of-life-31-dec-2025%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dphp-8-1-will-go-end-of-life-31-dec-2025&amp;action_name=PHP%208.1%20will%20go%20end%20of%20life%20%26%238211%3B%2031%20Dec%202025&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/php-8-1-will-go-end-of-life-31-dec-2025/?pk_campaign=feed&#038;pk_kwd=php-8-1-will-go-end-of-life-31-dec-2025">PHP 8.1 will go end of life &#8211; 31 Dec 2025</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="108" data-end="141"><strong data-start="108" data-end="141">PHP 8.1 End of Life – Act Now</strong></p>
<p><a href="https://www.php.net/supported-versions.php">PHP 8.1 goes end of life on the <strong>31 December 2025</strong></a>. After this date, known security flaws will no longer be fixed, leaving your sites exposed to significant security vulnerabilities.</p>
<p data-start="328" data-end="597">It is important to update to a newer version of PHP. We recommend upgrading to one of the latest supported versions — all of which include new features and backward-incompatible changes that <strong data-start="519" data-end="550">should be thoroughly tested</strong> before deployment in a production environment.</p>
<p>You may need to ask your developers to update your codebase, verify plugin compatibility, and ensure your applications are supported on newer PHP versions.</p>
<p data-start="756" data-end="783"><strong data-start="756" data-end="783">Supported PHP Versions:</strong></p>
<ul>
<li><a href="https://www.php.net/manual/en/migration82.php"><strong>PHP 8.2: Supported until 31 December 2026 </strong></a></li>
<li><a href="https://www.php.net/manual/en/migration83.php"><strong>PHP 8.3: Supported until 31 December 2027</strong></a></li>
<li><strong><a href="https://www.php.net/manual/en/migration84.php">PHP 8.4: Supported until 31 December 2028</a></strong>  (<em data-start="936" data-end="1029">Note: PHP 8.4 is still in <a href="https://make.wordpress.org/core/handbook/references/php-compatibility-and-wordpress-versions/">Beta Support</a> for WordPress and may not be fully compatible yet.)</em></li>
</ul>
<p>Want to find out <span data-offset-key="a6uh3-0-0">what your options are and what actions you need to take to stay secure. We can help just</span></p>
<p data-start="1031" data-end="1259"><strong data-start="1031" data-end="1083">Not sure which PHP version your server is using?</strong><br data-start="1083" data-end="1086" />It might be time for a <a href="https://www.dogsbody.com/linux-managed-services/server-audit/">Server Audit</a> to get a complete view of your infrastructure. We provide a <strong data-start="1186" data-end="1210">traffic light report</strong> that highlights the good, the bad, and the ugly.</p>
<p data-start="1261" data-end="1375">Want to know your options and what actions you need to take to stay secure?<br data-start="1336" data-end="1339" /><strong data-start="1339" data-end="1375">We can help – just <a href="https://www.dogsbody.com/contact/" target="_blank" rel="noopener">get in touch.</a></strong></p>
<img decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fphp-8-1-will-go-end-of-life-31-dec-2025%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dphp-8-1-will-go-end-of-life-31-dec-2025&amp;action_name=PHP%208.1%20will%20go%20end%20of%20life%20%26%238211%3B%2031%20Dec%202025&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/php-8-1-will-go-end-of-life-31-dec-2025/?pk_campaign=feed&#038;pk_kwd=php-8-1-will-go-end-of-life-31-dec-2025">PHP 8.1 will go end of life &#8211; 31 Dec 2025</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/php-8-1-will-go-end-of-life-31-dec-2025/?pk_campaign=feed&#038;pk_kwd=php-8-1-will-go-end-of-life-31-dec-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>5 options for Ubuntu 20.04 EOL in April 2025</title>
		<link>https://www.dogsbody.com/blog/5-options-for-ubuntu-20-04-eol-in-april-2025/?pk_campaign=feed&#038;pk_kwd=5-options-for-ubuntu-20-04-eol-in-april-2025</link>
					<comments>https://www.dogsbody.com/blog/5-options-for-ubuntu-20-04-eol-in-april-2025/?pk_campaign=feed&#038;pk_kwd=5-options-for-ubuntu-20-04-eol-in-april-2025#respond</comments>
		
		<dc:creator><![CDATA[Claire Christmas]]></dc:creator>
		<pubDate>Fri, 27 Sep 2024 15:41:01 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[EOL]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=143222</guid>

					<description><![CDATA[<p>Ubuntu 20.04 goes End Of Life (EOL) in April 2025. When an operating system goes EOL there is usually a lot to think about so lets break down the options open to you. Do nothing Build new infrastructure (and move to the latest Ubuntu LTS release) Perform an in-place upgrade Buy an annual subscription to [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2F5-options-for-ubuntu-20-04-eol-in-april-2025%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3D5-options-for-ubuntu-20-04-eol-in-april-2025&amp;action_name=5%20options%20for%20Ubuntu%2020.04%20EOL%20in%20April%202025&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/5-options-for-ubuntu-20-04-eol-in-april-2025/?pk_campaign=feed&#038;pk_kwd=5-options-for-ubuntu-20-04-eol-in-april-2025">5 options for Ubuntu 20.04 EOL in April 2025</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ubuntu 20.04 goes End Of Life (EOL) in April 2025. When an operating system goes EOL there is usually a lot to think about so lets break down the options open to you.</p>
<ol>
<li><a href="#anchor-one">Do nothing</a></li>
<li><a href="#anchor-two">Build new infrastructure (and move to the latest Ubuntu LTS release)</a></li>
<li><a href="#anchor-three">Perform an in-place upgrade</a></li>
<li><a href="#anchor-four">Buy an annual subscription to Ubuntu Pro &#8211; Extended Security Maintenance (ESM) &#8211; UPDATED 12 Nov 2024</a></li>
<li><a href="#anchor-five">Just shut it down</a></li>
</ol>
<p>Lets explore the pros and cons of each option.</p>
<div id="anchor-one"></div>
<h3>1) Do Nothing (Not Recommended) <img decoding="async" class="alignright wp-image-43293" src="https://www.dogsbody.com/wp-content/uploads/stone-figure-gea4185e02_640-268x300.png" alt="See hear and speak no evil monkey statues" width="200" height="224" srcset="https://www.dogsbody.com/wp-content/uploads/stone-figure-gea4185e02_640-268x300.png 268w, https://www.dogsbody.com/wp-content/uploads/stone-figure-gea4185e02_640.png 572w" sizes="(max-width: 200px) 100vw, 200px" /></h3>
<p>By far the easiest of the options but could end up costing you more in the long run. We do not recommend this option.</p>
<p>Doing nothing mean you have a ticking time bomb on your infrastructure. Your infrastructure will no longer receive security updates for the Ubuntu base OS, critical software packages and infrastructure components as well as no security maintenance for high and critical CVEs. This will probably also cause Compliance issues (PCI), Software incompatibility and make your whole network more vulnerable.</p>
<p>Using this option will also mean that more work will be required when you upgrade your server in the future costing you more.</p>
<div id="anchor-two">
<div>
<h3>2) Build new infrastructure (and move to the latest Ubuntu LTS release)</h3>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-43295" src="https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-300x300.png" alt="Clipart image of a trophy" width="200" height="200" srcset="https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-300x300.png 300w, https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-80x80.png 80w, https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-36x36.png 36w, https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-180x180.png 180w, https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640.png 640w" sizes="auto, (max-width: 200px) 100vw, 200px" />Dogsbody always recommend this options as a clean and safe way to upgrade. It allows you to upgrade your hardware to the latest tech. (Suppliers may allow you a free cut over period to manage costs).</p>
<p>This options lets everyone involved test things fully without affecting production infrastructure .</p>
<p>Obviously the disadvantage is this is it is one of the more expensive options, not just because of the work involved but as you may have to pay for two set of hardware and support etc until you migrate from your old to your new infrastructure. Dogsbody offer a one month cross over period for all our <a href="https://www.dogsbody.com/in-life-support/server-management-and-monitoring/">maintenance</a> customers <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Also if you have multiple sites on the server (shared hosting) you need to update all sites to the new IP.</p>
<p>Ubuntu 24.04 LTS became available in April 2024 and is supported for 5 years with the end of their standard support in June 2029. We recommend installing the 22.04.1 release especially for production machines.</p>
<div id="anchor-three"></div>
<h3>3) Perform an in-place upgrade</h3>
<p>This may only be an option for certain infrastructure types. It can be cheaper than option 2 (and quicker) but <strong>only</strong> if it upgrades perfectly. This option gives you <strong>zero</strong> testing time which means there is a risk that this will not work and your infrastructure will be off line whilst you or your support services fix it live.</p>
<p>While in-place upgrades will result with you having a new operating system, you will likely inherit the (less secure) defaults from the old operating system. A great example of this is when the default changed in SSH to disable the insecure v1 of the protocol on new operating system installs. Systems that were upgraded via in-place upgrade would inherit the old config keeping SSH v1 turned on.</p>
<p>We would certainly never recommend more than one in-place upgrade. Taking a single system from Ubuntu 16.04 -&gt; 18.04 -&gt; 20.04 and now 22.04 is a bad idea as it just leaves too many loose threads.</p>
<p>It also means your hardware will not be upgraded keeping you potentially on old, less efficient hardware that may also cause you issues at a later date.</p>
<div id="anchor-four">
<h3>4) Buy an annual subscription to Ubuntu Pro &#8211; Extended Security Maintenance (ESM) &#8211; UPDATED 12 Nov 2024</h3>
<p><a href="https://ubuntu.com/security/esm">Extended Security Maintenance (ESM) and Ubuntu Pro</a> are annual subscriptions. They provide Security updates for Ubuntu LTS for an additional 5 years (until April 2030 for Ubuntu 20.04). Including security coverage of the Main and Ubuntu Universe repositories for Critical, High and select Medium CVEs.</p>
</div>
<p>The disadvantages with this option Ubuntu Pro will not cover software from other repositories. If you have installed other software (Nginx, Percona, etc.) from their own official repositories then these repo&#8217;s may decide to drop support for your operating system as it&#8217;s now deemed to be EOL. We have seen this happen multiple times so unfortunately isn&#8217;t the panacea for all Ubuntu users.</p>
<div id="anchor-four">
<p>Additionally, as with the in-place upgrade, it also means your hardware will not be upgraded keeping you potentially on old, less efficient hardware that may also cause you issues at a later date.</p>
</div>
<p><strong>After a extensive discussion with Canonical we finally have a solution for getting Ubuntu Pro on smaller public cloud provider such as Linode, Digital Ocean, Vultr etc.</strong></p>
<p>Ubuntu Pro is an enterprise subscription charged per machine per year. If Ubuntu Pro is something you are interested in please <a href="https://www.dogsbody.com/contact/">contact us.</a></p>
<div id="anchor-four">
<h3>5) Just shut it down<img loading="lazy" decoding="async" class="alignright wp-image-43291" src="https://www.dogsbody.com/wp-content/uploads/shutdown-ubuntu-linux-01612740104-300x190.png" alt="The Ubuntu shutdown screen" width="250" height="158" srcset="https://www.dogsbody.com/wp-content/uploads/shutdown-ubuntu-linux-01612740104-300x190.png 300w, https://www.dogsbody.com/wp-content/uploads/shutdown-ubuntu-linux-01612740104.png 560w" sizes="auto, (max-width: 250px) 100vw, 250px" /></h3>
<p>It&#8217;s good to take stock of your infrastructure sometimes, especially internal/pet projects that may have been left to languish.</p>
<p>Do you actually still need this infrastructure? Has it been replaced by something better? If so then you can always just shut it down.</p>
<p>We had customer who reviewed their hosting infrastructure and made the decision to moving their final customer websites to <a href="https://www.dogsbody.com/linux-managed-services/hosting/plesk-hosting/">our shared hosting platform</a> which saved them both time and money.</p>
<div id="anchor-six"></div>
<h3>About Ubuntu 24.04</h3>
<p>Ubuntu 24.04 LTS release is supported for 5 years with the end of their standard support in June 2029.</p>
<p>Upgrading from Ubuntu 20.04 to Ubuntu 24.04 should, instantly, speed up your sites/infrastructure if you get it right.</p>
<p>It&#8217;s worth considering package changes between operating system versions. Some of the most common are&#8230;</p>
<ul>
<li><strong>Apache 2.4.52 -&gt; Apache 2.4.58</strong></li>
<li><strong> PHP 8.1.2 (default) -&gt; PHP 8.3.6</strong></li>
<li><strong>Nginx 1.24</strong></li>
<li><strong>The docker.io package is version 24.0.7</strong></li>
</ul>
<p>More info in the <a href="https://discourse.ubuntu.com/t/ubuntu-24-04-lts-noble-numbat-release-notes/39890">Noble Numbat Release Notes</a>.</p>
<p>Dogsbody have a lot of customers who run Ubuntu 20.04 who we will be advising and helping move to the best option for their business. If you need help on deciding the best route for your upgrade or more information about getting Ubuntu Pro for smaller public cloud provider please do <a href="https://www.dogsbody.com/contact/">contact us.</a></p>
</div>
</div>
</div>
<img loading="lazy" decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2F5-options-for-ubuntu-20-04-eol-in-april-2025%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3D5-options-for-ubuntu-20-04-eol-in-april-2025&amp;action_name=5%20options%20for%20Ubuntu%2020.04%20EOL%20in%20April%202025&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/5-options-for-ubuntu-20-04-eol-in-april-2025/?pk_campaign=feed&#038;pk_kwd=5-options-for-ubuntu-20-04-eol-in-april-2025">5 options for Ubuntu 20.04 EOL in April 2025</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/5-options-for-ubuntu-20-04-eol-in-april-2025/?pk_campaign=feed&#038;pk_kwd=5-options-for-ubuntu-20-04-eol-in-april-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TLD&#8217;s affected by CentralNic Registry authCode reset</title>
		<link>https://www.dogsbody.com/blog/tlds-affected-by-centralnic-registry-authcode-reset/?pk_campaign=feed&#038;pk_kwd=tlds-affected-by-centralnic-registry-authcode-reset</link>
					<comments>https://www.dogsbody.com/blog/tlds-affected-by-centralnic-registry-authcode-reset/?pk_campaign=feed&#038;pk_kwd=tlds-affected-by-centralnic-registry-authcode-reset#respond</comments>
		
		<dc:creator><![CDATA[Dan Benton]]></dc:creator>
		<pubDate>Mon, 22 Apr 2024 11:08:10 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[domains]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=141442</guid>

					<description><![CDATA[<p>CentralNic Registry was recently informed of a security issue with one of its third-party vendors. There’s no evidence of a compromise or any unauthorised access however there is a risk that domain authCode&#8217;s have been leaked. A domain auth code can be used to steal a domain from you. Any domain owners of the following [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Ftlds-affected-by-centralnic-registry-authcode-reset%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dtlds-affected-by-centralnic-registry-authcode-reset&amp;action_name=TLD%26%238217%3Bs%20affected%20by%20CentralNic%20Registry%20authCode%20reset&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/tlds-affected-by-centralnic-registry-authcode-reset/?pk_campaign=feed&#038;pk_kwd=tlds-affected-by-centralnic-registry-authcode-reset">TLD&#8217;s affected by CentralNic Registry authCode reset</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>CentralNic Registry was recently informed of a security issue with one of its third-party vendors. There’s no evidence of a compromise or any unauthorised access however there is a risk that domain authCode&#8217;s have been leaked.</p>
<p>A domain auth code can be used to steal a domain from you.</p>
<p>Any domain owners of the following TLD&#8217;s are advised to reset the authCode for their domain.</p>
<p>Some registrar&#8217;s are batch voiding and regenerating auth codes for affected domains but not all.</p>
<h2>Affected TLD&#8217;s</h2>
<h3>gTLDs</h3>
<ul>
<li>.art</li>
<li>.bar</li>
<li>.basketball</li>
<li>.best</li>
<li>.college</li>
<li>.ceo</li>
<li>.design</li>
<li>.fans</li>
<li>.feedback</li>
<li>.frl</li>
<li>.fun</li>
<li>.gent</li>
<li>.host</li>
<li>.icu</li>
<li>.ink</li>
<li>.love</li>
<li>.observer</li>
<li>.online</li>
<li>.ooo</li>
<li>.press</li>
<li>.protection</li>
<li>.realty</li>
<li>.reit</li>
<li>.rent</li>
<li>.rest</li>
<li>.security</li>
<li>.site</li>
<li>.space</li>
<li>.storage</li>
<li>.store</li>
<li>.tech</li>
<li>.theatre</li>
<li>.tickets</li>
<li>.website</li>
<li>.wiki</li>
<li>.xyz</li>
</ul>
<h3>Official ccTLDs</h3>
<ul>
<li>.bh, Bahrain</li>
<li>.fm, Federated States of Micronesia</li>
<li>.fo, Faroe Islands</li>
<li>.gd, Grenada</li>
<li>.gl, Greenland</li>
<li>.la, Laos; also borrowed for Los Angeles</li>
<li>.pw, Palau</li>
<li>.sk, Slovakia</li>
<li>.vg, British Virgin Islands</li>
</ul>
<h3>Unofficial ccTLDs</h3>
<ul>
<li>.ae.org, for United Arab Emirates</li>
<li>.ar.com, Argentina</li>
<li>.br.com, Brazil</li>
<li>.cn.com, China</li>
<li>.com.de, Germany</li>
<li>.de.com, Germany</li>
<li>.eu.com, European Union</li>
<li>.gb.com, Great Britain</li>
<li>.gb.net, Great Britain</li>
<li>.gr.com, Greece</li>
<li>.hu.com, Hungary</li>
<li>.jpn.com, Japan</li>
<li>.jp.net, Japan</li>
<li>.kr.com, Korea</li>
<li>.no.com, Norway</li>
<li>.qc.com, Quebec</li>
<li>.ru.com, Russia</li>
<li>.sa.com, Saudi Arabia</li>
<li>.se.com, Sweden</li>
<li>.se.net, Sweden</li>
<li>.uk.com, United Kingdom</li>
<li>.uk.net, United Kingdom</li>
<li>.us.com: United States</li>
<li>.us.org: United States</li>
<li>.uy.com, Uruguay</li>
<li>.za.com, South Africa</li>
</ul>
<p>Any domain owners of these TLD&#8217;s are advised to reset the authCode for that domain.</p>
<p>&nbsp;</p>
<img loading="lazy" decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Ftlds-affected-by-centralnic-registry-authcode-reset%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dtlds-affected-by-centralnic-registry-authcode-reset&amp;action_name=TLD%26%238217%3Bs%20affected%20by%20CentralNic%20Registry%20authCode%20reset&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/tlds-affected-by-centralnic-registry-authcode-reset/?pk_campaign=feed&#038;pk_kwd=tlds-affected-by-centralnic-registry-authcode-reset">TLD&#8217;s affected by CentralNic Registry authCode reset</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/tlds-affected-by-centralnic-registry-authcode-reset/?pk_campaign=feed&#038;pk_kwd=tlds-affected-by-centralnic-registry-authcode-reset/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PHP 8.0 will go end of life &#8211;  26 Nov 2023</title>
		<link>https://www.dogsbody.com/blog/php-8-0-will-go-end-of-life-26-nov-2023/?pk_campaign=feed&#038;pk_kwd=php-8-0-will-go-end-of-life-26-nov-2023</link>
					<comments>https://www.dogsbody.com/blog/php-8-0-will-go-end-of-life-26-nov-2023/?pk_campaign=feed&#038;pk_kwd=php-8-0-will-go-end-of-life-26-nov-2023#respond</comments>
		
		<dc:creator><![CDATA[Claire Christmas]]></dc:creator>
		<pubDate>Wed, 17 May 2023 12:31:22 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[EOL]]></category>
		<category><![CDATA[PHP]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=87838</guid>

					<description><![CDATA[<p>PHP 8.0 goes end of life on the 26 November 2023. Known security flaws will no longer be fixed and sites are exposed to significant security vulnerabilities. It is important to update them to a newer version. We would recommend updating to either: 8.1 supported until 25 November 2024 8.2 supported until 08 December 2025 [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fphp-8-0-will-go-end-of-life-26-nov-2023%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dphp-8-0-will-go-end-of-life-26-nov-2023&amp;action_name=PHP%208.0%20will%20go%20end%20of%20life%20%26%238211%3B%20%2026%20Nov%202023&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/php-8-0-will-go-end-of-life-26-nov-2023/?pk_campaign=feed&#038;pk_kwd=php-8-0-will-go-end-of-life-26-nov-2023">PHP 8.0 will go end of life &#8211;  26 Nov 2023</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.php.net/supported-versions.php">PHP 8.0 goes end of life on the 26 November 2023</a>. Known security flaws will no longer be fixed and sites are exposed to significant security vulnerabilities.</p>
<p>It is important to update them to a newer version. We would recommend updating to either:</p>
<ul>
<li><strong>8.1 supported until 25 November 2024</strong></li>
<li><strong>8.2 supported until 08 December 2025<br />
</strong></li>
</ul>
<p>This new minor version brings with it a number of <a class="link" href="https://www.php.net/manual/en/migration81.new-features.php">new features</a> and a <a class="link" href="https://www.php.net/manual/en/migration81.incompatible.php">few incompatibilities</a> that should be tested for before switching PHP versions in production environments.</p>
<p>You may need to get your developers to update code, check plug-ins and app versions for supportability:</p>
<ul>
<li><a href="https://www.php.net/manual/en/migration81.php">Deprecated Features when migrating from 8.0.x to PHP 8.1.x</a></li>
</ul>
<p>WordPress is <a href="https://make.wordpress.org/core/handbook/references/php-compatibility-and-wordpress-versions/">still only showing &#8220;beta support</a>&#8221; for anything PHP 8.0 or above, as WordPress say:</p>
<blockquote><p>WordPress is not fully compatible with PHP 8.0 or 8.1. All remaining known PHP 8.1 issues are deprecation notices.</p>
<p>Please note, a deprecation notice is not an error, but rather an indicator of where additional work is needed for compatibility before PHP 9 (i.e. when the notices become fatal errors). With a deprecation notice, the PHP code will continue to work and nothing is broken.</p></blockquote>
<p>At the time of writing PHP 8.2 for wordpress was still waiting on the dev notes.</p>
<p>Not sure what version your server is on? Maybe it’s time for a <a href="https://www.dogsbody.com/linux-managed-services/server-audit/">Server Audit</a> so you have a full picture of your infrastructure – We produce a traffic light report telling you the good, the bad and the ugly…</p>
<p>Want a hand with your PHP upgrade? <a href="https://www.dogsbody.com/contact/" target="_blank" rel="noopener">Get in touch!</a></p>
<img loading="lazy" decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fphp-8-0-will-go-end-of-life-26-nov-2023%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dphp-8-0-will-go-end-of-life-26-nov-2023&amp;action_name=PHP%208.0%20will%20go%20end%20of%20life%20%26%238211%3B%20%2026%20Nov%202023&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/php-8-0-will-go-end-of-life-26-nov-2023/?pk_campaign=feed&#038;pk_kwd=php-8-0-will-go-end-of-life-26-nov-2023">PHP 8.0 will go end of life &#8211;  26 Nov 2023</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/php-8-0-will-go-end-of-life-26-nov-2023/?pk_campaign=feed&#038;pk_kwd=php-8-0-will-go-end-of-life-26-nov-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Three Easy Ways To Secure Your WordPress Site</title>
		<link>https://www.dogsbody.com/blog/three-simple-ways-to-secure-your-wordpress-site/?pk_campaign=feed&#038;pk_kwd=three-simple-ways-to-secure-your-wordpress-site</link>
					<comments>https://www.dogsbody.com/blog/three-simple-ways-to-secure-your-wordpress-site/?pk_campaign=feed&#038;pk_kwd=three-simple-ways-to-secure-your-wordpress-site#comments</comments>
		
		<dc:creator><![CDATA[Ashley Holland]]></dc:creator>
		<pubDate>Fri, 14 Oct 2022 09:00:38 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=31210</guid>

					<description><![CDATA[<p>Keeping your WordPress software up to date and safe from vulnerabilities is the most important security tip for any WordPress site. And it&#8217;s super easy to do. Below are three simple ways to secure your WordPress site. 1. Use the latest WordPress Version Whenever WordPress sends out a new update, it means they may have [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fthree-simple-ways-to-secure-your-wordpress-site%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dthree-simple-ways-to-secure-your-wordpress-site&amp;action_name=Three%20Easy%20Ways%20To%20Secure%20Your%20WordPress%20Site&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/three-simple-ways-to-secure-your-wordpress-site/?pk_campaign=feed&#038;pk_kwd=three-simple-ways-to-secure-your-wordpress-site">Three Easy Ways To Secure Your WordPress Site</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Keeping your WordPress software up to date and safe from vulnerabilities is the most important security tip for any WordPress site. And it&#8217;s <strong>super easy</strong> to do.</p>
<p>Below are three <strong>simple</strong> ways to secure your WordPress site.</p>
<h2>1. Use the latest WordPress Version</h2>
<p>Whenever WordPress sends out a new update, it means they may have fixed some bugs, added some features, but most importantly they have added some <b>security features</b> and fixes.</p>
<div  class='avia-button-wrap av-1pghl6y-b26ad1cd2a6626b5c3f61f0b5dd4bb6a-wrap avia-button-center  avia-builder-el-0  el_before_av_button  avia-builder-el-first '><a href='https://wordpress.org/support/article/updating-wordpress/#one-click-update'  class='avia-button av-1pghl6y-b26ad1cd2a6626b5c3f61f0b5dd4bb6a av-link-btn avia-icon_select-yes-left-icon avia-size-small avia-position-center avia-color-theme-color'  target="_blank"  rel="noopener noreferrer"  aria-label="One Click WordPress Update"><span class='avia_button_icon avia_button_icon_left avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='wordpress' data-av_iconset='svg_entypo-fontello'><svg version="1.1" xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" preserveAspectRatio="xMidYMid meet" aria-labelledby='av-svg-title-1' aria-describedby='av-svg-desc-1' role="graphics-symbol">
<title id='av-svg-title-1'>Wordpress</title>
<desc id='av-svg-desc-1'>Wordpress</desc>
<path d="M0 16q0-4.352 2.144-8.032t5.824-5.824 8.032-2.144 8.032 2.144 5.824 5.824 2.144 8.032-2.144 8.032-5.824 5.824-8.032 2.144-8.032-2.144-5.824-5.824-2.144-8.032zM1.248 16q0 4.32 2.304 7.904t6.016 5.376l-7.040-19.296q-1.28 2.848-1.28 6.016zM3.648 7.904h0.96q1.536 0 3.936-0.192 0.384-0.032 0.576 0.256t0.032 0.608-0.512 0.352l-1.696 0.16 5.376 15.968 3.232-9.664-2.304-6.304q-0.768-0.096-1.536-0.16-0.384-0.032-0.512-0.352t0.064-0.608 0.544-0.256l3.872 0.192q1.568 0 3.936-0.192 0.384-0.032 0.576 0.256t0.032 0.608-0.512 0.352l-1.664 0.16 5.312 15.872 1.472-4.928q1.152-3.744 1.152-4.768 0-2.048-1.248-4.096-0.064-0.096-0.384-0.672t-0.448-0.768-0.288-0.608-0.256-0.736-0.064-0.672q0-1.056 0.736-1.856t1.76-0.768q0.032 0 0.096 0t0.096 0.032q-4.192-3.872-9.984-3.872-3.808 0-7.072 1.792t-5.28 4.864zM11.84 30.176q1.984 0.576 4.16 0.576 2.56 0 4.896-0.832l-0.096-0.192-4.544-12.448zM23.424 28.768q3.36-1.952 5.344-5.376t1.984-7.392q0-3.84-1.792-7.072 0.096 0.672 0.096 1.504 0 2.016-1.12 5.28z"></path>
</svg></span><span class='avia_iconbox_title' >One Click WordPress Update</span></a></div>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-31215" src="https://www.dogsbody.com/wp-content/uploads/Out-Of-Date-WordPress-Version-300x111.png" alt="Out of date WordPress verion" width="848" height="314" srcset="https://www.dogsbody.com/wp-content/uploads/Out-Of-Date-WordPress-Version-300x111.png 300w, https://www.dogsbody.com/wp-content/uploads/Out-Of-Date-WordPress-Version-768x285.png 768w, https://www.dogsbody.com/wp-content/uploads/Out-Of-Date-WordPress-Version-705x261.png 705w, https://www.dogsbody.com/wp-content/uploads/Out-Of-Date-WordPress-Version.png 901w" sizes="auto, (max-width: 848px) 100vw, 848px" /></p>
<p>When you see the message above: <b><i>Update it.</i></b></p>
<p>Nowadays, with one-click update, it’s very easy to upgrade your WordPress Version.</p>
<p>Make sure your theme and plugins are compatible with this latest version of WordPress. If an update has been rolled out and it’s not a security update, I suggest you wait for your plugins and themes to become compatible before upgrading.</p>
<h2>2. Keep Your WordPress Plugins Updated</h2>
<p>As I mentioned above, WordPress releases an update to fix bugs and vulnerabilities, and this is the same for plugins. This is a really quick update to make:</p>
<div  class='avia-button-wrap av-11apfje-2bb323db68bef15ca58397cae2f21cd1-wrap avia-button-center  avia-builder-el-1  el_after_av_button  el_before_av_button '><a href='https://wordpress.org/support/article/managing-plugins/#plugin-updates'  class='avia-button av-11apfje-2bb323db68bef15ca58397cae2f21cd1 av-link-btn avia-icon_select-yes-left-icon avia-size-small avia-position-center avia-color-theme-color'  target="_blank"  rel="noopener noreferrer"  aria-label="Guide to updating your WordPress Plugin"><span class='avia_button_icon avia_button_icon_left avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='wordpress' data-av_iconset='svg_entypo-fontello'><svg version="1.1" xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" preserveAspectRatio="xMidYMid meet" aria-labelledby='av-svg-title-2' aria-describedby='av-svg-desc-2' role="graphics-symbol">
<title id='av-svg-title-2'>Wordpress</title>
<desc id='av-svg-desc-2'>Wordpress</desc>
<path d="M0 16q0-4.352 2.144-8.032t5.824-5.824 8.032-2.144 8.032 2.144 5.824 5.824 2.144 8.032-2.144 8.032-5.824 5.824-8.032 2.144-8.032-2.144-5.824-5.824-2.144-8.032zM1.248 16q0 4.32 2.304 7.904t6.016 5.376l-7.040-19.296q-1.28 2.848-1.28 6.016zM3.648 7.904h0.96q1.536 0 3.936-0.192 0.384-0.032 0.576 0.256t0.032 0.608-0.512 0.352l-1.696 0.16 5.376 15.968 3.232-9.664-2.304-6.304q-0.768-0.096-1.536-0.16-0.384-0.032-0.512-0.352t0.064-0.608 0.544-0.256l3.872 0.192q1.568 0 3.936-0.192 0.384-0.032 0.576 0.256t0.032 0.608-0.512 0.352l-1.664 0.16 5.312 15.872 1.472-4.928q1.152-3.744 1.152-4.768 0-2.048-1.248-4.096-0.064-0.096-0.384-0.672t-0.448-0.768-0.288-0.608-0.256-0.736-0.064-0.672q0-1.056 0.736-1.856t1.76-0.768q0.032 0 0.096 0t0.096 0.032q-4.192-3.872-9.984-3.872-3.808 0-7.072 1.792t-5.28 4.864zM11.84 30.176q1.984 0.576 4.16 0.576 2.56 0 4.896-0.832l-0.096-0.192-4.544-12.448zM23.424 28.768q3.36-1.952 5.344-5.376t1.984-7.392q0-3.84-1.792-7.072 0.096 0.672 0.096 1.504 0 2.016-1.12 5.28z"></path>
</svg></span><span class='avia_iconbox_title' >Guide to updating your WordPress Plugin</span></a></div>
<p><strong>My 3 really simple steps:</strong></p>
<ol>
<li>Log into your WordPress Site via wp-admin</li>
<li>Click on &#8216;Plugins&#8217; on the Left hand side</li>
<li>Click the Update Now button for the vulnerable plugin</li>
</ol>
<p>Many times, an out of date plugin or 3rd party script can create a security hole in your WordPress website causing it to become vulnerable.</p>
<p>In general you should always use plugins which are continually updated and have good support.</p>
<p>If you are using a plugin which has not been updated for a while, find an alternative to it. If you have an installed plugin, remove it.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-31216" src="https://www.dogsbody.com/wp-content/uploads/Vulnerable-WordPress-Plugins-300x228.png" alt="Vulnerable WordPress Plugins" width="761" height="578" srcset="https://www.dogsbody.com/wp-content/uploads/Vulnerable-WordPress-Plugins-300x228.png 300w, https://www.dogsbody.com/wp-content/uploads/Vulnerable-WordPress-Plugins-705x536.png 705w, https://www.dogsbody.com/wp-content/uploads/Vulnerable-WordPress-Plugins.png 761w" sizes="auto, (max-width: 761px) 100vw, 761px" /></p>
<h2>3. Keep Your WordPress Themes Updated</h2>
<p>Yes! Even The Themes! Both plugins and themes are built on code. Mostly PHP to be specific. And, that code will eventually be outdated. When a theme (or plugin) is outdated, it’ll still work. Sure. However, it will be more prone to being exploited since it’s an easy way in for attackers.</p>
<p>Make a consistent schedule to regularly check and download the latest updates of themes (and plugins).</p>
<p>These can be found directly on the WordPress dashboard on the “Updates” pages.</p>
<p>For more helpful tips try:</p>
<div  class='avia-button-wrap av-j3m6mi-a5c18201e7cd0bf2464ec51e838774c3-wrap avia-button-center  avia-builder-el-2  el_after_av_button  avia-builder-el-last '><a href='https://www.wpbeginner.com/wp-themes/how-to-update-a-wordpress-theme-without-losing-customization/'  class='avia-button av-j3m6mi-a5c18201e7cd0bf2464ec51e838774c3 av-link-btn avia-icon_select-yes-left-icon avia-size-small avia-position-center avia-color-theme-color'  target="_blank"  rel="noopener noreferrer"  aria-label="Guide to updating your WordPress Theme"><span class='avia_button_icon avia_button_icon_left avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='wordpress' data-av_iconset='svg_entypo-fontello'><svg version="1.1" xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" preserveAspectRatio="xMidYMid meet" aria-labelledby='av-svg-title-3' aria-describedby='av-svg-desc-3' role="graphics-symbol">
<title id='av-svg-title-3'>Wordpress</title>
<desc id='av-svg-desc-3'>Wordpress</desc>
<path d="M0 16q0-4.352 2.144-8.032t5.824-5.824 8.032-2.144 8.032 2.144 5.824 5.824 2.144 8.032-2.144 8.032-5.824 5.824-8.032 2.144-8.032-2.144-5.824-5.824-2.144-8.032zM1.248 16q0 4.32 2.304 7.904t6.016 5.376l-7.040-19.296q-1.28 2.848-1.28 6.016zM3.648 7.904h0.96q1.536 0 3.936-0.192 0.384-0.032 0.576 0.256t0.032 0.608-0.512 0.352l-1.696 0.16 5.376 15.968 3.232-9.664-2.304-6.304q-0.768-0.096-1.536-0.16-0.384-0.032-0.512-0.352t0.064-0.608 0.544-0.256l3.872 0.192q1.568 0 3.936-0.192 0.384-0.032 0.576 0.256t0.032 0.608-0.512 0.352l-1.664 0.16 5.312 15.872 1.472-4.928q1.152-3.744 1.152-4.768 0-2.048-1.248-4.096-0.064-0.096-0.384-0.672t-0.448-0.768-0.288-0.608-0.256-0.736-0.064-0.672q0-1.056 0.736-1.856t1.76-0.768q0.032 0 0.096 0t0.096 0.032q-4.192-3.872-9.984-3.872-3.808 0-7.072 1.792t-5.28 4.864zM11.84 30.176q1.984 0.576 4.16 0.576 2.56 0 4.896-0.832l-0.096-0.192-4.544-12.448zM23.424 28.768q3.36-1.952 5.344-5.376t1.984-7.392q0-3.84-1.792-7.072 0.096 0.672 0.096 1.504 0 2.016-1.12 5.28z"></path>
</svg></span><span class='avia_iconbox_title' >Guide to updating your WordPress Theme</span></a></div>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-31217" src="https://www.dogsbody.com/wp-content/uploads/Vulnerable-WordPress-Themes-300x206.png" alt="Vulnerable WordPress Themes" width="859" height="590" srcset="https://www.dogsbody.com/wp-content/uploads/Vulnerable-WordPress-Themes-300x206.png 300w, https://www.dogsbody.com/wp-content/uploads/Vulnerable-WordPress-Themes-768x526.png 768w, https://www.dogsbody.com/wp-content/uploads/Vulnerable-WordPress-Themes-705x483.png 705w, https://www.dogsbody.com/wp-content/uploads/Vulnerable-WordPress-Themes.png 813w" sizes="auto, (max-width: 859px) 100vw, 859px" /></p>
<h2>But why is this so important?</h2>
<p>Hackers created <a href="https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-aug-2019.pdf">over 65 million new malware in the first quarter of 2019</a> alone!</p>
<p>Plugins are being updated <strong>all the time</strong>. For example, on a single day (24 Aug 2021) the following plugin vulnerabilities were all fixed and were ready to be updated:</p>
<ul>
<li>Contact Form Entries &lt; Version 1.2.1 &#8211; Reflected Cross-Site Scripting</li>
<li>TextME SMS &lt; Version 1.8.9 &#8211; Authenticated Stored XSS</li>
<li>Live Scores for SportsPress &lt; Version 1.9.1 &#8211; Authenticated Local File Inclusion</li>
<li>Live Scores for SportsPress &lt; Version 1.9.1 &#8211; Reflected Cross-Site Scripting</li>
<li>SMTP Mail &lt; Version 1.2 &#8211; Reflected Cross-Site Scripting (XSS)</li>
<li>SMTP Mail &lt; Version 1.2.2 &#8211; Authenticated SQL Injections</li>
<li>Contact List &lt; Version 2.9.42 &#8211; Reflected Cross-Site Scripting</li>
<li>Coupon Affiliates for WooCommerce &lt; Version 4.11.0.2 &#8211; Reflected Cross-Site Scripting</li>
<li>Podlove Podcast Publisher &lt; Version 3.5.6 &#8211; Unauthenticated SQL Injection</li>
<li>Recipe Card Blocks &lt; Version 2.8.1 &#8211; Reflected Cross-Site Scripting</li>
<li>Recipe Card Blocks &lt; Version 2.8.3 &#8211; Contributor+ Stored Cross-Site Scripting</li>
</ul>
<p>As of June 2020 <a href="https://www.wpwhitesecurity.com/statistics-70-percent-wordpress-installations-vulnerable/">over 73% of the most popular WordPress installations were vulnerable</a>. They were vulnerable to exploitable vulnerabilities that can be detected with free automated tools, within seconds.<br />
It only takes a couple of minutes for a malicious attacker to run an automated tool that can discover these vulnerabilities and exploit them. This highlights the importance choosing the right WordPress web host that auto updates both plugins and WordPress.</p>
<h2>The most common vulnerabilities</h2>
<p><a href="https://blog.wpsec.com/contact-form-7-vulnerability/" target="_blank" rel="noopener"><strong>Arbitrary File Upload &amp; File Viewing</strong></a>: Lack of file type and content filtering allows for upload of arbitrary files that can contain executable code which, once run, can do pretty much anything on a site. Instead of allowing only certain file source to be viewed (for example plugin templates) the lack of checks in the code allows the attacker to view the source of any file, including those with sensitive information such as wp-config.php</p>
<p><a href="https://blog.wpsec.com/wordpress-552-security-release/" target="_blank" rel="noopener"><strong>Privilege Escalation</strong></a>: Once the attacker has an account on the site, even if it’s only of the subscriber type, he can escalate his privileges to a higher level, including administrative ones.</p>
<p><a href="https://blog.wpsec.com/woocommerce-unauthenticated-sql-injection-vulnerability-2/" target="_blank" rel="noopener"><strong>SQL Injection</strong></a>: By not escaping and filtering data that goes into SQL queries, malicious code can be injected into queries and data deleted, updated or inserted into the database. This is one of the most common vulnerabilities.</p>
<p><a href="https://blog.wpsec.com/csrf-to-rce-wordpress/" target="_blank" rel="noopener"><strong>Remote Code Execution (RCE)</strong></a>: Instead of uploading and running malicious code, the attacker can run it from a remote location. The code can do anything, from hijacking the site to completely deleting it.</p>
<h2>How Dogsbody can help</h2>
<p>So, you maybe wondering &#8216;How will I know I&#8217;m vulnerable in the first place&#8217;.</p>
<p>The easiest way is to log into your WordPress site and take a look.</p>
<p>&nbsp;</p>
<p><em>Feature image by <a href="https://unsplash.com/@mmayyer" target="_blank" rel="noopener">mmayyer</a> licensed <a href="https://unsplash.com/license">Unsplash</a>.</em></p>
<img loading="lazy" decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fthree-simple-ways-to-secure-your-wordpress-site%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dthree-simple-ways-to-secure-your-wordpress-site&amp;action_name=Three%20Easy%20Ways%20To%20Secure%20Your%20WordPress%20Site&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/three-simple-ways-to-secure-your-wordpress-site/?pk_campaign=feed&#038;pk_kwd=three-simple-ways-to-secure-your-wordpress-site">Three Easy Ways To Secure Your WordPress Site</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/three-simple-ways-to-secure-your-wordpress-site/?pk_campaign=feed&#038;pk_kwd=three-simple-ways-to-secure-your-wordpress-site/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>5 options for Ubuntu 18.04 EOL</title>
		<link>https://www.dogsbody.com/blog/options-for-ubuntu-18-04-eol/?pk_campaign=feed&#038;pk_kwd=options-for-ubuntu-18-04-eol</link>
					<comments>https://www.dogsbody.com/blog/options-for-ubuntu-18-04-eol/?pk_campaign=feed&#038;pk_kwd=options-for-ubuntu-18-04-eol#respond</comments>
		
		<dc:creator><![CDATA[Claire Christmas]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 08:00:46 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[EOL]]></category>
		<category><![CDATA[ubuntu]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=43280</guid>

					<description><![CDATA[<p>Ubuntu 18.04 goes end of life in April 2023. Our usual EOL blog posts tend to be quite short and sharp, making sure that people are aware of software becoming insecure. When an operating system goes EOL there is usually a lot more to think about. Here we look at your 5 options for Ubuntu [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Foptions-for-ubuntu-18-04-eol%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Doptions-for-ubuntu-18-04-eol&amp;action_name=5%20options%20for%20Ubuntu%2018.04%20EOL&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/options-for-ubuntu-18-04-eol/?pk_campaign=feed&#038;pk_kwd=options-for-ubuntu-18-04-eol">5 options for Ubuntu 18.04 EOL</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ubuntu 18.04 goes end of life in April 2023. <a href="/blog/tag/eol/">Our usual EOL blog posts</a> tend to be quite short and sharp, making sure that people are aware of software becoming insecure. When an operating system goes EOL there is usually a lot more to think about.</p>
<p><strong>Here we look at your 5 options for Ubuntu 18.04 EOL.</strong></p>
<ol>
<li><a href="#anchor-one">Do nothing (Not recommended)</a></li>
<li><a href="#anchor-two">Build new infrastructure and move to the latest Ubuntu LTS release (Recommended)</a></li>
<li><a href="#anchor-three">Perform an in-place upgrade</a></li>
<li><a href="#anchor-four">Buy an annual subscription to Ubuntu Pro &#8211; Extended Security Maintenance (ESM)</a></li>
<li><a href="#anchor-five">Just shut it down</a></li>
</ol>
<p>Lets explore the pros and cons of each option.</p>
<div id="anchor-one"></div>
<h3>1) Do Nothing (Not Recommended) <img loading="lazy" decoding="async" class="alignright wp-image-43293" src="https://www.dogsbody.com/wp-content/uploads/stone-figure-gea4185e02_640-268x300.png" alt="Options for Ubuntu 18.04 EOL" width="200" height="224" srcset="https://www.dogsbody.com/wp-content/uploads/stone-figure-gea4185e02_640-268x300.png 268w, https://www.dogsbody.com/wp-content/uploads/stone-figure-gea4185e02_640.png 572w" sizes="auto, (max-width: 200px) 100vw, 200px" /></h3>
<p>By far the easiest of the options but could end up costing you more in the long run.  Dogsbody do not recommend this option.</p>
<p>Doing nothing mean you have a ticking time bomb on your infrastructure. Your 18.04 Infrastructure will no longer receive security updates for the Ubuntu base OS, critical software packages and infrastructure components as well as no security maintenance for high and critical CVEs. This will probably also cause Compliance issues (PCI), Software incompatibility and make your whole network more vulnerable.</p>
<p>Using this option will also mean that more work will be required when you upgrade your server in the future costing you more.</p>
<div id="anchor-two">
<h3>2) Build new infrastructure and move to the latest Ubuntu LTS release (Recommended)</h3>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-43295" src="https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-300x300.png" alt="Options for Ubuntu 18.04 EOL" width="200" height="200" srcset="https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-300x300.png 300w, https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-80x80.png 80w, https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-36x36.png 36w, https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640-180x180.png 180w, https://www.dogsbody.com/wp-content/uploads/win-g7bffad35a_640.png 640w" sizes="auto, (max-width: 200px) 100vw, 200px" />Dogsbody always recommend this options as a clean and safe way to upgrade. It allows you to upgrade your hardware to the latest tech. (Suppliers may allow you a free cut over period to manage costs).</p>
<p>This options lets everyone involved test things fully without affecting production infrastructure .</p>
<p>Obviously the disadvantage is this is it is one of the more expensive options, not just because of the work involved but as you may have to pay for two set of hardware and support etc until you migrate from your old to your new infrastructure. Dogsbody offer a one month cross over period for all our <a href="https://www.dogsbody.com/in-life-support/server-management-and-monitoring/">maintenance</a> customers <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Also if you have multiple sites on the server (shared hosting) you need to update all sites to the new IP.</p>
<p>Ubuntu 22.04 LTS became available in April 2022 and is supported for 5 years with the end of their standard support in April 2027. We recommend installing the 22.04.1 release especially for production machines.</p>
<div id="anchor-three">
<h3>3) Perform an in-place upgrade</h3>
<p>This may only be an option for certain infrastructure types. It can be cheaper than option 2 (and quicker) but <strong>only</strong> if it upgrades perfectly. This option gives you <strong>zero</strong> testing time which means there is a risk that this will not work and your infrastructure will be off line whilst you or your support services fix it live.</p>
<p>While in-place upgrades will result with you having a new operating system, you will likely inherit the (less secure) defaults from the old operating system. e.g. Networking in Ubuntu 14.04 is typically configured via the /etc/network/interfaces file.  Networking in Ubuntu 16.04 is typically configured via the netplan configuration files. An in-place upgrade from 16.04 to 18.04 would leave the old interfaces configuration in place which may work or may not depending on the setup you have.</p>
<p>We would certainly never recommend more than one in-place upgrade. Taking a single system from Ubuntu 14.04 -&gt; 16.04 -&gt; 18.04 and now 20.04 is a bad idea as it just leaves too many loose threads.</p>
<p>It also means your hardware will not be upgraded keeping you potentially on old, less efficient  hardware that may also cause you issues at a later date.</p>
<div id="anchor-four">
<h3>4) Buy an annual subscription to Ubuntu Pro &#8211; Extended Security Maintenance (ESM)</h3>
</div>
<p><a href="https://ubuntu.com/security/esm">Ubuntu Pro and Ubuntu Pro (infra-only)</a> are annual subscriptions from Canonical. They provide Security updates for Ubuntu LTS for an additional 5 years (April 2028). Including security coverage of the Main and Ubuntu Universe repositories (Ubuntu Pro only) for Critical, High and select Medium CVEs.</p>
<div id="anchor-four">
<p>There is a possibility that other software and packages will drop their support for Ubuntu 18.04 so you may cause yourselves problems down the line if you plan to leave it the full 5 years.</p>
</div>
<p>Ubuntu Pro is an enterprise subscription charged per machine per year. <a href="https://ubuntu.com/pricing/pro">Annual costs</a> depend on your infrastructure type (desktop or server) and support requirements.</p>
</div>
<table class="UbuntuPro">
<tbody>
<tr>
<th><strong>Security Patching</strong></th>
<th><strong>Ubuntu LTS</strong></th>
<th><strong>Ubuntu Pro (INFRA-ONLY)</strong></th>
<th><strong>Ubuntu Pro</strong></th>
</tr>
<tr>
<th>Ubuntu Main Repo</th>
<td>5 years</td>
<td>10 years</td>
<td>10 years</td>
</tr>
<tr>
<th>Ubuntu Universe Repo</th>
<td>Best effort</td>
<td>Best effort</td>
<td>10 years</td>
</tr>
</tbody>
</table>
<div id="anchor-three">
<div id="anchor-four">
<div id="anchor-five">
<h3>5) Just shut it down<img loading="lazy" decoding="async" class="alignright wp-image-43291" src="https://www.dogsbody.com/wp-content/uploads/shutdown-ubuntu-linux-01612740104-300x190.png" alt="Options for Ubuntu 18.04 EOL" width="250" height="158" srcset="https://www.dogsbody.com/wp-content/uploads/shutdown-ubuntu-linux-01612740104-300x190.png 300w, https://www.dogsbody.com/wp-content/uploads/shutdown-ubuntu-linux-01612740104.png 560w" sizes="auto, (max-width: 250px) 100vw, 250px" /></h3>
<p>It&#8217;s good to take stock of your infrastructure sometimes, especially internal/pet projects that may have been left to languish.</p>
<p>Do you actually still need this infrastructure? Has it been replaced by something better? If so then you can always just shut it down.</p>
<p>&nbsp;</p>
<div id="anchor-six">
<h3>About Ubuntu 22.04</h3>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-43307 alignleft" src="https://www.dogsbody.com/wp-content/uploads/2204-300x169.jpg" alt="" width="300" height="169" srcset="https://www.dogsbody.com/wp-content/uploads/2204-300x169.jpg 300w, https://www.dogsbody.com/wp-content/uploads/2204-1030x579.jpg 1030w, https://www.dogsbody.com/wp-content/uploads/2204-768x432.jpg 768w, https://www.dogsbody.com/wp-content/uploads/2204-705x397.jpg 705w, https://www.dogsbody.com/wp-content/uploads/2204.jpg 1200w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>Ubuntu 22.04 LTS release is supported for 5 years with the end of their standard support in April 2027.</p>
<p>Upgrading from Ubuntu 18.04 to Ubuntu 22.04 should, instantly, speed up your sites/infrastructure if you get it right.</p>
<p>It&#8217;s worth considering package changes between operating system versions. Some of the most common are&#8230;</p>
<div class="update__content">
<ul>
<li>Apache 2.4.29 -&gt; Apache 2.4.52</li>
<li>MySQL 5.7 -&gt; MySQL 8.0</li>
<li>PHP  7.2 -&gt; PHP 8.1.2 (default)</li>
</ul>
<p>More info in the <a href="https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668">Jammy Jellyfish Release Notes</a>.</p>
</div>
<p>Dogsbody have a lot of customers who run Ubuntu 18.04 who we will be advising and helping move to the best option for their business. If you need help on deciding the best route for your upgrade please do <a href="https://www.dogsbody.com/contact/">contact us.</a></p>
</div>
</div>
</div>
</div>
</div>
<img loading="lazy" decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Foptions-for-ubuntu-18-04-eol%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Doptions-for-ubuntu-18-04-eol&amp;action_name=5%20options%20for%20Ubuntu%2018.04%20EOL&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/options-for-ubuntu-18-04-eol/?pk_campaign=feed&#038;pk_kwd=options-for-ubuntu-18-04-eol">5 options for Ubuntu 18.04 EOL</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/options-for-ubuntu-18-04-eol/?pk_campaign=feed&#038;pk_kwd=options-for-ubuntu-18-04-eol/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PHP 7.4 will go end of life on 28 November 2022</title>
		<link>https://www.dogsbody.com/blog/php-7-4-will-go-end-of-life-on-28-november-2022/?pk_campaign=feed&#038;pk_kwd=php-7-4-will-go-end-of-life-on-28-november-2022</link>
					<comments>https://www.dogsbody.com/blog/php-7-4-will-go-end-of-life-on-28-november-2022/?pk_campaign=feed&#038;pk_kwd=php-7-4-will-go-end-of-life-on-28-november-2022#respond</comments>
		
		<dc:creator><![CDATA[Claire Christmas]]></dc:creator>
		<pubDate>Thu, 26 May 2022 13:36:33 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[EOL]]></category>
		<category><![CDATA[PHP]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=44222</guid>

					<description><![CDATA[<p>PHP 7.4 goes end of life (EOL) on the 28 November 2022 meaning known security flaws will no longer be fixed and sites are exposed to significant security vulnerabilities. It is important to update them to a newer version. We would recommend updating to either: 8.0 supported until 26 November 2023 8.1 supported until 25 [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fphp-7-4-will-go-end-of-life-on-28-november-2022%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dphp-7-4-will-go-end-of-life-on-28-november-2022&amp;action_name=PHP%207.4%20will%20go%20end%20of%20life%20on%2028%20November%202022&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/php-7-4-will-go-end-of-life-on-28-november-2022/?pk_campaign=feed&#038;pk_kwd=php-7-4-will-go-end-of-life-on-28-november-2022">PHP 7.4 will go end of life on 28 November 2022</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="entry-content">
<p><a href="https://www.php.net/supported-versions.php" target="_blank" rel="noopener noreferrer">PHP 7.4 goes end of life (EOL) on the 28 November 2022</a> meaning known security flaws will no longer be fixed and sites are exposed to significant security vulnerabilities.</p>
<p>It is important to update them to a newer version. We would recommend updating to either:</p>
<ul>
<li><strong>8.0 supported until 26 November 2023</strong></li>
<li><strong>8.1 supported until 25 November 2024</strong></li>
</ul>
<p>New major PHP versions bring with it a number of new features and some incompatibilities. These should be tested before switching PHP versions in production environments.  You may need to get your developers to update some code, check plug-ins and app versions for the new PHP supportability:</p>
<ul>
<li><a href="https://www.php.net/manual/en/migration80.deprecated.php">Deprecated Features when migrating from 7.4.x to 8.0.x</a></li>
</ul>
<p><a href="https://make.wordpress.org/core/handbook/references/php-compatibility-and-wordpress-versions/">WordPress</a> 5.6 to 5.9 state that they have added “beta support” for PHP 8.0 and 8.1 however no one know when it will be out of beta status. Beta support means that the compatibility of WordPress with PHP is still being tested. We would usually advise not to use it on a production server until it is fully supported by WordPress.</p>
<p>Not sure what version your server is on? Maybe it’s time for a <a href="https://www.dogsbody.com/linux-managed-services/server-audit/">Server Audit</a> so you have a full picture of your infrastructure – We produce a traffic light report telling you the good, the bad and the ugly…</p>
<p>Otherwise want a hand with your PHP upgrade? <a href="https://www.dogsbody.com/contact/" target="_blank" rel="noopener">Get in touch!</a></p>
</div>
<img loading="lazy" decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fphp-7-4-will-go-end-of-life-on-28-november-2022%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dphp-7-4-will-go-end-of-life-on-28-november-2022&amp;action_name=PHP%207.4%20will%20go%20end%20of%20life%20on%2028%20November%202022&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/php-7-4-will-go-end-of-life-on-28-november-2022/?pk_campaign=feed&#038;pk_kwd=php-7-4-will-go-end-of-life-on-28-november-2022">PHP 7.4 will go end of life on 28 November 2022</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/php-7-4-will-go-end-of-life-on-28-november-2022/?pk_campaign=feed&#038;pk_kwd=php-7-4-will-go-end-of-life-on-28-november-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Debian 9 “Stretch” goes End of Life (EOL) June 2022</title>
		<link>https://www.dogsbody.com/blog/debian-9-stretch-goes-end-of-life-eol-june-2022/?pk_campaign=feed&#038;pk_kwd=debian-9-stretch-goes-end-of-life-eol-june-2022</link>
					<comments>https://www.dogsbody.com/blog/debian-9-stretch-goes-end-of-life-eol-june-2022/?pk_campaign=feed&#038;pk_kwd=debian-9-stretch-goes-end-of-life-eol-june-2022#comments</comments>
		
		<dc:creator><![CDATA[Claire Christmas]]></dc:creator>
		<pubDate>Wed, 05 Jan 2022 14:05:41 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[debian]]></category>
		<category><![CDATA[EOL]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=40284</guid>

					<description><![CDATA[<p>On the 30 June 2022, Debian 9 “Stretch” goes End of Life (EOL). We recommend you upgrade to Debian 11 “Bullseye” (skipping Debian 10 if possible) which is supported until June 2026. After this date there will be no security updates released for Debian 9 and servers will not be patched for any new vulnerabilities [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fdebian-9-stretch-goes-end-of-life-eol-june-2022%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Ddebian-9-stretch-goes-end-of-life-eol-june-2022&amp;action_name=Debian%209%20%E2%80%9CStretch%E2%80%9D%20goes%20End%20of%20Life%20%28EOL%29%20June%202022&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/debian-9-stretch-goes-end-of-life-eol-june-2022/?pk_campaign=feed&#038;pk_kwd=debian-9-stretch-goes-end-of-life-eol-june-2022">Debian 9 “Stretch” goes End of Life (EOL) June 2022</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On the 30 June 2022, Debian 9 “Stretch” goes <a href="https://wiki.debian.org/LTS">End of Life</a> (EOL). We recommend you upgrade to Debian 11 “Bullseye” (skipping Debian 10 if possible) which is supported until June 2026.</p>
<p>After this date there will be no security updates released for Debian 9 and servers will not be patched for any new vulnerabilities discovered.</p>
<h4>Leaving old Debian 9 “Stretch” systems past 30 June 2022 leaves you at risk to:</h4>
<ul>
<li>Security vulnerabilities of the system in question</li>
<li>Software incompatibility</li>
<li>Compliance issues (PCI)</li>
<li>Poor performance and reliability<br />
and</li>
<li>Making your network more vulnerable as a whole</li>
</ul>
<h4>Debian 11 “Bullseye” Supports:</h4>
<ul>
<li>Apache 2.4.48 <span id="line-67" class="anchor"></span></li>
<li>MariaDB 10.5 <span id="line-78" class="anchor"></span></li>
<li>MySQL 8.0</li>
<li>PHP 7.4 <span id="line-81" class="anchor"></span></li>
<li>Python 3, 3.9.1 <span id="line-83" class="anchor"></span></li>
</ul>
<p>Not sure where to start? <a href="https://www.dogsbody.com/contact/">Contact us</a> to find out how we can help you.</p>
<img loading="lazy" decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fdebian-9-stretch-goes-end-of-life-eol-june-2022%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Ddebian-9-stretch-goes-end-of-life-eol-june-2022&amp;action_name=Debian%209%20%E2%80%9CStretch%E2%80%9D%20goes%20End%20of%20Life%20%28EOL%29%20June%202022&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/debian-9-stretch-goes-end-of-life-eol-june-2022/?pk_campaign=feed&#038;pk_kwd=debian-9-stretch-goes-end-of-life-eol-june-2022">Debian 9 “Stretch” goes End of Life (EOL) June 2022</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/debian-9-stretch-goes-end-of-life-eol-june-2022/?pk_campaign=feed&#038;pk_kwd=debian-9-stretch-goes-end-of-life-eol-june-2022/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>CVE-2021-44228 &#8211; Log4j2 vulnerability</title>
		<link>https://www.dogsbody.com/blog/cve-2021-44228-log4j2-vulnerability/?pk_campaign=feed&#038;pk_kwd=cve-2021-44228-log4j2-vulnerability</link>
					<comments>https://www.dogsbody.com/blog/cve-2021-44228-log4j2-vulnerability/?pk_campaign=feed&#038;pk_kwd=cve-2021-44228-log4j2-vulnerability#respond</comments>
		
		<dc:creator><![CDATA[Dan Benton]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 11:15:32 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.dogsbody.com/?p=40363</guid>

					<description><![CDATA[<p>This weekend, a very serious vulnerability in the popular Java-based logging package Log4j was disclosed. This vulnerability allows an attacker to execute code on a remote server; a so-called Remote Code Execution (RCE). Because of the widespread use of Java and Log4j, as well as the relative ease with which the vulnerability can be exploited, [&#8230;]<img src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fcve-2021-44228-log4j2-vulnerability%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dcve-2021-44228-log4j2-vulnerability&amp;action_name=CVE-2021-44228%20%26%238211%3B%20Log4j2%20vulnerability&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /></p>
<p>The post <a href="https://www.dogsbody.com/blog/cve-2021-44228-log4j2-vulnerability/?pk_campaign=feed&#038;pk_kwd=cve-2021-44228-log4j2-vulnerability">CVE-2021-44228 &#8211; Log4j2 vulnerability</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This weekend, a very serious vulnerability in the popular Java-based logging package <a href="https://logging.apache.org/log4j/2.x/security.html">Log4j was disclosed</a>. This vulnerability allows an attacker to execute code on a remote server; a so-called Remote Code Execution (RCE). Because of the widespread use of <strong>Java</strong> and Log4j, as well as the relative ease with which the vulnerability can be exploited, this is likely one of the most serious vulnerabilities on the Internet since both <a href="https://www.dogsbody.com/blog/cve-2014-0160-heartbleed/">Heartbleed</a> and <a href="https://www.dogsbody.com/blog/cve-2014-6271-shellshock/">ShellShock</a>.</p>
<p>This was a &#8220;zero day exploit&#8221;, meaning that the bad guys found this vulnerability and started exploiting it before that vulnerability could be fixed. The NIST has catalogued this as <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">CVE-2021-44228</a> with a 10/10 severity (the most severe).</p>
<h2>Who&#8217;s affected</h2>
<p>Put simply &#8211; Java applications that use the log4j package. It is almost impossible to conclusively list all affected software and services, given such widespread use and the multiple versions and implementations that affects the ability to exploit the vulnerability.</p>
<p>An attempt to list responses from as many vendors and service suppliers can be found <a href="https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592">here</a>, though this list shouldn&#8217;t be taken as authoritative.</p>
<h2>What you can do</h2>
<p>Most importantly you should take immediate action to do the following:</p>
<ul>
<li>Identify usage of affected log4j versions within your infrastructure.</li>
<li>Apply available patches from your software vendors, or consider disabling elements of your infrastructure/services until patches are available.</li>
<li>Monitor your systems/logs for signs of previous and ongoing exploit attempts.</li>
<li>Take immediate steps to restore any affected systems to a known good state.</li>
</ul>
<h2>Our Customers</h2>
<p>We are actively following the steps above and triaging those affected. Those most severely affected will have already been contacted and we will continue to proactively monitor all infrastructure to ensure all systems are patched as soon as possible.</p>
<img loading="lazy" decoding="async" src="https://analytics.dogsbody.com/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.dogsbody.com%2Fblog%2Fcve-2021-44228-log4j2-vulnerability%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dcve-2021-44228-log4j2-vulnerability&amp;action_name=CVE-2021-44228%20%26%238211%3B%20Log4j2%20vulnerability&amp;urlref=https%3A%2F%2Fwww.dogsbody.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" /><p>The post <a href="https://www.dogsbody.com/blog/cve-2021-44228-log4j2-vulnerability/?pk_campaign=feed&#038;pk_kwd=cve-2021-44228-log4j2-vulnerability">CVE-2021-44228 &#8211; Log4j2 vulnerability</a> appeared first on <a href="https://www.dogsbody.com">Dogsbody Technology</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.dogsbody.com/blog/cve-2021-44228-log4j2-vulnerability/?pk_campaign=feed&#038;pk_kwd=cve-2021-44228-log4j2-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: www.dogsbody.com @ 2026-04-13 16:23:54 by W3 Total Cache
-->