RSS Feed
News
Jan
25
RightMX (EnterpriseMail) Server Migration on Jan 30, 2021 (Saturday)]
Posted by Mohit S :: WIPL on 25 January 2021 06:56 PM
Dear Customers,

In order to provide you with better performance & more stable servers, we would be upgrading our mail server RightMX (Enterprise) to heavy-duty servers with Intel Hexacore Processors & Superfast SSD Drives.

The migration details for the servers are given below:

Servers Impacted: RightMX.DNSRACKS.COM (RightMX Enterprise Mail Server)

Why the need of Migration? : As a part of our quality assurance policy, we regularly upgrade our infrastructure to meet the Industry standards & to protect the servers from any possible signs of crashes/downtimes. Since the hard drive of the servers are mechanical devices hence, we have a time frame of upgrading the hardware the moment it reaches its 5 years running phase. 

Migration Description: During this time, we will be migrating the mail data to a new & powerful server with the following configuration:
  • Latest generation Intel Processors with Hex Core Compute
  • 128 GB ECC Ram
  • SuperFast Enterprise SSD Drives
  • High-Capacity Enterprise Storage Systems
=====================================================
Migration Date: Jan 30, 2021 (Saturday)
Time: The Migration would start at the Evening at 8.00 PM GMT 5.30 + (IST) time.
ETA for Completion: Migration would be completed in approx 12 - 18 hours.
=====================================================

Maintenance Impact:


1. As a result of this move, you will not able to access the mail service but none of the mails would be continue queuing up on the backupMX servers
2. Actual amount of downtime will depend on how fast the data between both servers get resynced.
3. The Mail Server IP remains the same on the new server hence you don't need to change any IP in DNS file.

Communications Plan:

Our helpdesk will be fully functional and staffed during the migrations. We will also be posting periodic updates in the announcements section to keep you fully informed of the status of all migrations. Please do not use our emergency contact numbers during the migration, as this will just slow our work.

We appreciate your business and will do everything in our power to minimize downtime while safely and securely moving servers.

Warm Regards,

Team WIPL 
 
 

Read more »



Jan
8

Update 2

 

Dear  Customers, 

HyperV Server outage issue has been resolved Which was occurred due to auto-update and fix the patches.  

Kindly connect with our support team on "support@mywipl.com" if you are experiencing any issue.

=========================

 

Update 1 

 

Dear Customers,

 

One of our HyperV HyperVSSD-S2-New - 103.20.214.20 base machine is facing some issues and unresponsive. 

The Concerned Team is already working on the reported issue. The ETA would be 30 minutes for same.


Read more »



Dec
28
Dear Customer,

Aligning to industry best practices and standards of providing the best services to you, we publish security advisories that are designed to provide timely information to all our esteemed customers.

Threat Summary:

WordPress Plugin Contact Form 7 is prone to a vulnerability that attackers can upload arbitrary files because the application fails to properly sanitize user-supplied input.

An unrestricted file upload vulnerability has been found in Contact Form-7 5.3.1 and older versions. Utilizing this vulnerability, a form submitter can bypass Contact Form 7’s filename sanitization, and upload a file that can be executed as a script file on the host server.

Impact:

An attacker can upload a web shell and inject malicious scripts.

An attacker can execute arbitrary code and completely take over the website.

An attacker can compromise the web server also.

An attacker can put a phishing page into the website and deface the website.

Vulnerable Versions:
Contact Form 7 -  5.3.1 and older versions

Note: Sites having Contact Form 7 installed without the file upload functionality are not vulnerable.

How to Protect Yourself:
Update to plugin version 5.3.2 or the latest.

If you have Bitninja installed on your servers, enable your WAF 2.0 module on the dashboard, sit back, and enjoy the ultimate server security protection.

How to resolve this Contact Form 7 vulnerability:

NOTE - Take a complete backup before upgrading the plugin, You can take a local backup as well.

Plugin Upgrade -> https://blog.wpsec.com/contact-form-7-vulnerability/

Read more »