karambit_rocks
New member
Please install Heartbleed SSL bug fix ASAP. Your website is still vulnerable as of this posting. Thank you.
lol....its been vulnerable for years dude...and you have 1 post.
That's true, I'm new here. I wasn't interested in joining before but felt I need to hoping my request to Marstar will be accommodated. I usually clear my personal info after I receive each and every order for security reasons. I emailed them to find a way to remove the same personal info from the PastOrders database but their webmaster declined. I understand they are required by law to record transactions involving restricted firearms BUT I think PastOrders should be kept for internal purposes and not available on the internet. Their system bothers me especially now knowing the present situation. Thank you.
You might consider reading this article on how checking for the heartbleed bug is illegal
http://bgr.com/2014/04/11/hearbleed-online-security-checks/
A lot of misinformation here. That tool that shows you if a website is, frankly, retarded.
I pointed it at a couple of my internet facing servers that I know for a fact are not affected and it told me "the ssl certificate is minted blah blah and vulnerable" and "Uses Apache / OpenSSL" (cough, bull####, cough).
Heartbleed affects OpenSSL 1.0.1 ONLY. The other MAJOR deployed version is OpenSSL 0.9.8
Most serious sysadmins don't go randomly upgrading to the latest and greatest unless there is something that is actually needed in that version. Every single one of my 14 linux servers uses a variant of OpenSSL 0.9.8 (g through to z). Pointing that tool at an OpenSSL 0.9.8 server still says it is affected. Never needed to upgrade out of the stable and stil lin development 0.9.8
So.... just because that stupid website says a site is affected means nothing.
Mass media hysteria.
I must be grumpy. I'm going for coffee.
You do realize they do orders by phone right? Or do you forget that there are other types of communication besides internet and cellular phones (wireless). Yeah a 10 year old website isn't going to be super secure. Its a shame things have gotten so far away from common sense and face to face business. If you don't have credit get a certified bank order/cashier check/whatever you want as only you and that person can accept it and its a hard copy for records no paper trail to worry about on the net or outside of business records. As well everything you do is recorded and shared anyways on a much larger scale so its not like there is really anything to complain about with Marstar especially since you are "smart" enough to recognize this. Unless there is a public page that everyone can go to with your personal info your point is mute. Internet security in general is a mute point.
A lot of misinformation here. That tool that shows you if a website is, frankly, retarded.
I pointed it at a couple of my internet facing servers that I know for a fact are not affected and it told me "the ssl certificate is minted blah blah and vulnerable" and "Uses Apache / OpenSSL" (cough, bull####, cough).
Heartbleed affects OpenSSL 1.0.1 ONLY. The other MAJOR deployed version is OpenSSL 0.9.8
Most serious sysadmins don't go randomly upgrading to the latest and greatest unless there is something that is actually needed in that version. Every single one of my 14 linux servers uses a variant of OpenSSL 0.9.8 (g through to z). Pointing that tool at an OpenSSL 0.9.8 server still says it is affected. Never needed to upgrade out of the stable and stil lin development 0.9.8
So.... just because that stupid website says a site is affected means nothing.
Mass media hysteria.
I must be grumpy. I'm going for coffee.
A lot of misinformation here. That tool that shows you if a website is, frankly, retarded.
I pointed it at a couple of my internet facing servers that I know for a fact are not affected and it told me "the ssl certificate is minted blah blah and vulnerable" and "Uses Apache / OpenSSL" (cough, bull####, cough).
Heartbleed affects OpenSSL 1.0.1 ONLY. The other MAJOR deployed version is OpenSSL 0.9.8
Most serious sysadmins don't go randomly upgrading to the latest and greatest unless there is something that is actually needed in that version. Every single one of my 14 linux servers uses a variant of OpenSSL 0.9.8 (g through to z). Pointing that tool at an OpenSSL 0.9.8 server still says it is affected. Never needed to upgrade out of the stable and stil lin development 0.9.8
So.... just because that stupid website says a site is affected means nothing.
Mass media hysteria.
I must be grumpy. I'm going for coffee.
It's not up to them to fix it. You know that, right? Their service provider is on it, I'm sure.
My dogs breath smells like dog food........