Author: Tony Howden

  • Using WWW or your naked Domain Name

    Using WWW or your naked Domain Name is something that has been a hot topic for debate over a number of years.

    The literal or naked domain is the domain name that you probably use in your email address to the right of the @ symbol. Like wrenmaxwell.com.au

    Personally, I have always tried to use and recommend that default business web sites should have www. Using the domain name only just creates issues with Domain Name Service management, particularly when the website resides on a server separate from other services for the same domain, like email. This view is supported by this response to the question at ServerFault https://serverfault.com/questions/145777/what-s-the-point-in-having-www-in-a-url

    http://www.yes-www.org/why-use-www/ presents an excellent review of the main reasons and I will not repeat them here.

    Suffice to say,

    • YES, use www.yourdomain as your website URL
    • AND, make that your preferred address for Google / Bing webmaster tools
    • AND, redirect your naked domain so that end users who enter your domain name manually get redirected to www. This is important to ensure that you do not have duplicated content references to your pages.
    • AND, finally, get an SSL / TLS certificate installed so that you are using https:// for your website
  • Microsoft Releases Critical Patch

    Microsoft Releases Critical Patch

    [vc_row full_width=”” parallax=”” parallax_image=””][vc_column width=”1/2″ css=”.vc_custom_1436352853341{margin-top: 100px !important;}”][vc_column_text]

    Microsoft Releases Critical Patch

    Bulletin No MS15-078

    KB Number 3079904

    [/vc_column_text][/vc_column][vc_column width=”1/2″][vc_single_image image=”799″ alignment=”center” border_color=”grey” img_link_large=”” img_link_target=”_self” img_size=”full”][/vc_column][/vc_row][vc_row full_width=”” parallax=”” parallax_image=””][vc_column width=”1/1″][vc_column_text]Microsoft has released an emergency out-of-band patch for a critical flaw, affecting all supported versions of Windows.

    Microsoft stated in a security bulletin on Monday that the vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts.

    “An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights,” the advisory added.

    Users running Windows Vista, Windows 7, 8, 8.1 and Windows RT are all affected, including those running Windows Server 2008 and later.

    This “critical” software update is an emergency patch release, coming after the normally scheduled Patch Tuesday which released 14 bulletins fixing numerous patches

    The patch is available using normal Windows Update processes.


    [/vc_column_text][/vc_column][/vc_row][vc_row full_width=”” parallax=”” parallax_image=””][vc_column width=”1/4″][vc_single_image image=”767″ alignment=”” style=”” border_color=”grey” img_link_large=”” img_link_target=”_self” css_animation=”” img_size=”224×149″][/vc_column][vc_column width=”3/4″][vc_column_text]If you need assistance in deploying this emergency security patch then contact WrenMaxwell on 1300 595 484


    [/vc_column_text][vc_row_inner css=”.vc_custom_1436411542497{margin-top: -15px !important;}”][vc_column_inner el_class=”” width=”1/1″][vc_single_image image=”766″ alignment=”” style=”” border_color=”grey” img_link_large=”” img_link_target=”_self” css_animation=”” img_size=”full”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]