Generator Test – BOL2
Today’s routine generator test passed as expected. The generator was started manually, then run off-load 11:21 – 11:42 All measured values were within their normal ranges.
Today’s routine generator test passed as expected. The generator was started manually, then run off-load 11:21 – 11:42 All measured values were within their normal ranges.
Today’s routine generator test passed as expected. The generator was started manually, then run off-load 10:50 – 11:11 All measured values were within their normal ranges.
We apologise for any problems that customers may have experienced whilst trying to telephone us on 01204 900700 this morning between 8:00 am and 9:30 am. Our own internal VOIP server shutdown after suffering a multiple fan failure (We blame big Bolton moths!) Only our casual published telephone contact number… Continue reading
‘DROWN’ – Decrypting RSA with Obsolete and Weakened eNcryption Various products may be affected by this vulnerability, given the common vulnerability and exposures designation of CVE-2016-0800. A cross-protocol attack was discovered that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites. Traffic… Continue reading
Today’s routine generator test passed as expected. The generator was started manually, then run off-load 11:12 – 11:33 All measured values were within their normal ranges.
Today’s routine generator test passed as expected. The generator was started manually, then run off-load 10:42 – 11:03 All measured values were within their normal ranges.
Today’s routine generator test passed as expected. The generator was started manually, then run off-load 10:42 – 11:03 All measured values were within their normal ranges.
Today’s routine generator test passed as expected. The generator was started manually, then run off-load 10:10 – 10:30 All measured values were within their normal ranges.
‘Skeleton’ Buffer Overflow Vulnerability Various products may be affected by this vulnerability, given the common vulnerability and exposures designation of CVE-2015_7547. Multiple vulnerabilities in the ‘libresolv’ library of the ‘GNU C Library’ (aka ‘glibc’), could allow a remote attacker to remotely execute code. This typically affects systems based on Linux… Continue reading
Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability Various Cisco ASA products may be affected by this vulnerability, given the common vulnerability and exposures designation of CVE-2016-1287. A vulnerability in the Internet Key Exchange (IKE) version 1 (v1) and IKE version 2 (v2) code of Cisco ASA Software could… Continue reading