This morning we are seeing intermittent network connectivity to our GRID2 hosting platform. We are working with our netops staff to resolve the issue. Updates will be posted here.
On Sunday December 21st we will be performing a scheduled power maintenance. The specific time will be updated soon. This maintenance is not expected to affect any servers or services located at our self-hosted data center. It is a necessary maintenance to update a transfer switch on one of the main power transformers at our building.We have done previous tests using a backup generator to operate our servers and network hardware and expect to switch over to our backup power generation...
This is a notice for customers who use Wordpress to check their installations and be sure they do not have a vulnerable version of Revolution Slider Plugin. Today it was announced that Google will delist and block some 11,000 websites who have vulnerable versions of this plugin.While Dytek has done a basic scan to look for the plugin on our customer sites you should also review your own site. If you have questions or would like to have us schedule a deeper scan for your website let us...
Due to an automatic update our DV1 web services are offline at this time. We are working with technicians on a resolution. Check back here for updates.Update: We are performing backups to complete an emergency upgrade of this service. Updates will be posted.Resolution: We were able to work with our datacenter and software vendor to resolve this issue and Apache is now back up and running correctly. The config was restored from backup however please be advised we will need to...
Over the next few days we will be upgrading our Barracuda Spam filter appliance. Some customers subscribe to this service to add a better layer of email filtering protection as well as email based virus scanning.As the new hardware goes into operation we may be making some tweaks or modifications to it. We will be migrating most of the settings over from our old Barracuda hardware.
Our offices will be closed for meetings and walk-in traffic from December 22 - January 5th.During this time we will be providing Tier 1 support by our online ticketing system or by email to support@dytek.netTier 1 phone support will also be available but the recommended method to gain access to support is via our support site at http://support.dytek.net where you can create a ticket and be assisted in the most effective manner.We do monitor our systems and servers 24/7/365.
11/9/2014 6pm: This evening we were alerted that customers who have mail filtered via our barracuda were not receiving incoming email. We have since applied a bypass and are working on a resolution with our software vendor. Check back here for updates.Saturday and into Sunday customers via this service may have had mail that was not delivered to them or requested that the sender try again later 421 errors. Mail should deliver as normal now however we have bypassed some functionality...
currently investigating mail delivery issue for customers using SmarterMail. Check here for updates.Update 1: We have determined that a customer's email address was hacked due to using a simple password. This caused our server to be over-ran with unsolicited mail. We are currently working to clear these messages out of our spool to resume normal server operations. This process could take a few hours.Update 2: We are bringing the mail spool back online. Most of your incoming...
RESOLVEDOct 9, 3:30pm: We are looking into a current server issue affecting Plesk Server DV1. We have administrators looking into it currently.4:00pm: The latest update on this incident is that it is a broader hardware issue that is affecting server DV1 and currently has it inaccessible. Server administrators are looking at the issue.5:00pm: We have been notified that the affected servers are now back online and working properly. Sorry for any inconvenience that this...
As a valued Dynamic Technologies customer, we would like to inform you of a vulnerability in the Bash command shell application that was very recently discovered and the actions we have taken to protect you. This exploit can be used against servers or other Unix and Linux devices via web and shell applications that use Bash to execute scripts.**What versions of Bash are affected?** This vulnerability affects versions 1.14 through 4.3 of GNU Bash. Our Plesk Servers are using either...
Trouble logging in? Simply enter your email address OR username in order to reset your password.
For faster and more reliable delivery, add info@dytek.net to your trusted senders list in your email software.