Plesk and Node.js

During the last few years, Node.js has been steadily growing in popularity. On top of that, according to StackOverflow, JavaScript is today’s most popular programming language. If you are a Node.js developer, you may be curious whether it is possible to host Node.js apps on Plesk. The short answer is Continue Reading

Inside ImageTragick: The Real Payloads Being Used to Hack Websites

Last week multiple vulnerabilities were made public in the popular image manipulation software, ImageMagick. These were quickly named ImageTragick. Although a vulnerability in image manipulation software might not seem like a problem for web site owners it is in fact a genuine security concern. CloudFlare quickly rolled out a WAF Continue Reading

Dan Kaminsky Will Be Taking Your Questions At Our DNS Meetup Next Week In San Francisco

Our last DNS meetup was a packed house with Paul Mockapetris, the original inventor of DNS. We learned why DNS answers have a question count but always only one question, why underscores aren’t allowed in domain names, and the history of how DNS came to be. Our next meetup is Continue Reading

IETF Hackathon: Getting TLS 1.3 working in the browser

Over the last few years, the IETF community has been focused on improving and expanding the use of the technical foundations for Internet security. Part of that work has been updating and deploying protocols such as Transport Layer Security (TLS), with the first draft of the latest version of TLS, Continue Reading

GitLab 8.5.8, 8.4.6, 8.3.5, and 8.2.4 Released

Mar 21, 2016 Last Friday, we released versions 8.5.8, 8.4.6, 8.3.5, and 8.2.4 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions raise the minimum required Git version to 2.7.4 (!692) to address the recent Git vulnerabilities. The Omnibus packages have been updated to include this new version. Continue Reading

400Gbps: Winter of Whopping Weekend DDoS Attacks

Over the last month, we’ve been watching some of the largest distributed denial of service (DDoS) attacks ever seen unfold. As CloudFlare has grown we’ve brought on line systems capable of absorbing and accurately measuring attacks. Since we don’t need to resort to crude techniques to block traffic we can Continue Reading