{"id":918,"date":"2018-01-15T16:18:20","date_gmt":"2018-01-15T16:18:20","guid":{"rendered":"https:\/\/hostinguk.net\/blog\/?p=918"},"modified":"2018-01-19T13:47:32","modified_gmt":"2018-01-19T13:47:32","slug":"patching-and-securing-against-meltdown-and-spectre","status":"publish","type":"post","link":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/","title":{"rendered":"Patching the Spectre &#038; Meltdown fallout"},"content":{"rendered":"<p>Further to our last <a href=\"https:\/\/hostinguk.net\/blog\/meltdown-spectre-resources\/\">blog post regarding the Intel vulnerabilities Meltdown and Spectre<\/a>, we are now in a position to give more guidance. While it is always important that your operating system is patched and secured, this particular matter is so far-reaching that special note is justified to address the fallout this has caused.<\/p>\n<p>This page has an important foreword on caveats, a section on identifying your OS, patching your OS, and a red part between those two specifically stressing the importance of having a viable backup before making these changes. Of course, if you have any questions &#8211; a theme throughout &#8211; get in touch.<\/p>\n<h2>Foreword<\/h2>\n<p>This article is aimed at customers who manage their own services and have a dedicated server or virtual machine.<\/p>\n<p>At this point <strong>shared services have already been patched<\/strong> &#8211; if you have a Personal Web, or something similar &#8211; you do not have to do anything.<\/p>\n<p>For <strong>VM\/VPS customers running CentOS or Cloud Linux &#8211; it is not advised to reboot with the new kernels<\/strong> in place. We are seeing issues with CentOS6 and CentOS7 kernels not booting after a restart. We have documented the issue for Cloud Linux, CentOS has <a href=\"https:\/\/bugs.centos.org\/view.php?id=14336\">community posting regarding the matter<\/a>. From what we understand at this time, the Xen based platform is not vulnerable to Meltdown already. We are waiting on a tested, stable patch from the platform vendor.<\/p>\n<p>Not covered by the above caveats &#8211; looking for how to proceed? Good. On with the show.<\/p>\n<h2>What Operating System do you Have?<\/h2>\n<p>As some operating systems are now end-of-life it is important that you check what version of Windows or Linux you are running before attempting to patch your operating system. Finding out<\/p>\n<h3>Windows<\/h3>\n<p style=\"padding-left: 30px;\">If you are running Windows on your server simply log in via remote desktop as the <strong>Administrator<\/strong> and click the<strong> Start button or Windows Logo<\/strong> depending on what you have. If you can see a <strong>Run<\/strong> option, click it and type <strong>winver.exe<\/strong> and press enter. If you only see a search field type <strong>winver<\/strong> and then double-click <strong>winver.exe<\/strong> from the results. You can also access the version through control panel under the system properties.<\/p>\n<p style=\"padding-left: 30px;\">If none of these options work, then try visiting <strong><a href=\"http:\/\/whatsmyos.com\/\">http:\/\/whatsmyos.com\/<\/a><\/strong> in a browser from the server desktop and this should be able to determine the Windows version.<\/p>\n<h3>Linux<\/h3>\n<p style=\"padding-left: 30px;\">Log in to the server as root through SSH using Putty or similar and type the command <span style=\"color: #008000;\">uname -a<\/span> and then press enter. This will give you the current kernel version and should also display the operating system be it Centos, Ubuntu, etc. If this doesn\u2019t work try typing one of the following commands instead:<\/p>\n<pre style=\"padding-left: 30px;\"><span style=\"color: #008000;\">lsb_release -a\r\ncat \/etc\/*release\r\ncat \/etc\/issue*\r\ncat \/proc\/version<\/span><\/pre>\n<h2>Can I Patch my Operating System?<\/h2>\n<p>The vast majority of our customers will be able to proceed and patch their servers however if you are running any of the operating systems listed below then they have reached end-of-life and you will not be able to apply the patches:<\/p>\n<blockquote><p>&gt; Any version of Windows 2003 or lower. Windows 2008 and later are fine;<br \/>\n&gt; RHEL4 or lower. Often referred to as Redhat;<br \/>\n&gt; CentOS 5 or lower;<br \/>\n&gt; Ubuntu 17.04 Zesty or lower (excluding\u00a014.04 LTS Trusty,\u00a016.04 LTS Xenial);<br \/>\n&gt; Debian 6 or lower;<br \/>\n&gt; Suse 10 or lower.<\/p><\/blockquote>\n<p>If you are running any of the operating systems above,\u00a0unfortunately, you will not be able to patch your system as updates are no longer provided. In some cases upgrades are possible, in other cases migrations will be necessary. For further information, or if you are unsure please do raise a ticket with <a href=\"mailto:support@hostinguk.net\">support@hostinguk.net<\/a> or call 01745 586070 and select support.<\/p>\n<p>If you are running VMWare then there are additional requirements outside the scope of this post and you should in the first instance refer to the VMWare security blog which discusses your options further: <a href=\"https:\/\/blogs.vmware.com\/security\/2018\/01\/vmsa-2018-0002.html\">https:\/\/blogs.vmware.com\/security\/2018\/01\/vmsa-2018-0002.html<\/a><\/p>\n<p><strong><span style=\"color: #ff0000;\">BEFORE YOU MAKE ANY CHANGES TO YOUR SERVICE &#8211; ENSURE THAT YOU HAVE CURRENT, VALID, USEABLE BACKUPS OF THE DATA YOU REQUIRE SHOULD THE OPERATING SYSTEM NOT BOOT.<\/span><\/strong><\/p>\n<p><strong><span style=\"color: #ff0000;\">IT IS ADVISED THAT AT THIS POINT CENTOS6 AND CENTOS7 USERS ON VIRTUAL MACHINES SHOULD NOT UPGRADE.<\/span><\/strong><\/p>\n<p>This line is important as you should always have an up to date backup but we cannot take any responsibility for a broken system running the following commands.<\/p>\n<p>If you are running a supported operating system then the process to patch against the vulnerabilities will involve one of the following processes:<\/p>\n<h3>Windows<\/h3>\n<p>Just access Windows Updates and Check for new updates through the control panel. If there any updates to install then you should proceed to install the updates, there might be a few if you haven\u2019t done this for a while or have automatic updating switched off. You may also want to revisit the updates section in a few days to check if any further updates are available.<\/p>\n<h3>Linux Distributions<\/h3>\n<p>There<\/p>\n<h4>CentOS\/RHEL\/Fedora\/Oracle\/Scientific Linux<\/h4>\n<p>Open an SSH session and type yum update and then hit enter. You may see a large number of updates which ideally should all be installed. Once the update is complete you will need to reboot your server after the updates are complete.<\/p>\n<h4>Fedora<\/h4>\n<p>Open a SSH session and type<\/p>\n<pre style=\"padding-left: 30px;\"><span style=\"color: #008000;\"> dnf \u2013refresh update kernel<\/span><\/pre>\n<p>or<\/p>\n<pre style=\"padding-left: 30px;\"><span style=\"color: #008000;\">dnf update<\/span><\/pre>\n<p>and hit enter. As above, install the updates and then reboot<\/p>\n<h4>Debian\/Ubuntu<\/h4>\n<p>You will need to add the testing repository <a class=\"https\" href=\"https:\/\/launchpad.net\/~canonical-kernel-team\/+archive\/ubuntu\/pti\/\">ppa:canonical-kernel-team\/pti<\/a>\u00a0as at the time of writing these are not mainstream releases. More can be found on their response time line\u00a0<a href=\"https:\/\/wiki.ubuntu.com\/SecurityTeam\/KnowledgeBase\/SpectreAndMeltdown\">here<\/a>. Having made good with this &#8211; then the usual of:<\/p>\n<pre style=\"padding-left: 30px;\"><span style=\"color: #008000;\">apt-get update\r\napt-get upgrade\r\nreboot<\/span><\/pre>\n<h2>Conclusion<\/h2>\n<p>Most patches come in two parts &#8211; the kernel itself, and the microcode &#8211; effectively &#8216;CPU firmware&#8217;. These mitigate against Variant 3 Meltdown, and one of the Spectre Variants. The remaining variant cannot be fixed on existing architecture, however, the threat surface it exposes is very very low. Once the reboot has completed you should now be patched and secure.<\/p>\n<p>If you are struggling on unsure then please DO drop us an email to <a href=\"mailto:support@hostinguk.net\">support@hostinguk.net<\/a> or pick up the phone and call 01745 586 070 and select Support so that we can investigate and advise.<\/p>\n<h2>Addendum<\/h2>\n<p><strong>Firday 19th january 2018<\/strong><\/p>\n<p style=\"padding-left: 30px;\"><em>We are seeing CentOS 7 on OnApp now able to restart after recent firmware \/ microcode updates 3.10.0-693.5.2.el7.centos.plus.x86_64. You may wish to press forward with these now with caution, and be ready to roll these back using grub. Cloud Linux at this point should<a href=\"https:\/\/www.cloudlinux.com\/cloudlinux-os-blog\/entry\/intel-cpu-bug-kernelcare-and-cloudlinux\"> hold off until the next set of updates go live<\/a> following CentOS updates, rebuilds, and are currently in testing (despite seeing updates available on Thursday 18th to Firmware).<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Further to our last blog post regarding the Intel vulnerabilities Meltdown and Spectre, we are now in a position to give more guidance. While it is always important that your operating system is patched and secured, this particular matter is so far-reaching that special note is justified to address the fallout this has caused. This&#8230; <a class=\"moretag\" href=\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/\">Keep Reading<\/a><\/p>\n","protected":false},"author":6,"featured_media":919,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Patching Spectre & Meltdown","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2,13],"tags":[187,191,186,202,190,131,39,121,189,203,35,201,124],"class_list":["post-918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcements","category-support","tag-amd","tag-dell","tag-intel","tag-linux","tag-meltdown","tag-patching","tag-security","tag-server","tag-spectre","tag-vm","tag-vps","tag-windows","tag-xen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Patching the Spectre &amp; Meltdown fallout - Hosting UK<\/title>\n<meta name=\"description\" content=\"Dedicated and Virtual Machine patching for Spectre and Meltdown. All shared hosting has been covered (Personal Web, cPanel Lite etc.), this is relevant to those who manage their own platforms. If in doubt - do get in touch.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patching the Spectre &amp; Meltdown fallout - Hosting UK\" \/>\n<meta property=\"og:description\" content=\"Dedicated and Virtual Machine patching for Spectre and Meltdown. All shared hosting has been covered (Personal Web, cPanel Lite etc.), this is relevant to those who manage their own platforms. If in doubt - do get in touch.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/\" \/>\n<meta property=\"og:site_name\" content=\"Hosting UK\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-15T16:18:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-19T13:47:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1002\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anthony Hogbin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony Hogbin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/\"},\"author\":{\"name\":\"Anthony Hogbin\",\"@id\":\"https:\/\/hostinguk.net\/blog\/#\/schema\/person\/e7707cd2857ef38b31f396b1bf878707\"},\"headline\":\"Patching the Spectre &#038; Meltdown fallout\",\"datePublished\":\"2018-01-15T16:18:20+00:00\",\"dateModified\":\"2018-01-19T13:47:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/\"},\"wordCount\":1101,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg\",\"keywords\":[\"amd\",\"dell\",\"intel\",\"linux\",\"meltdown\",\"patching\",\"security\",\"server\",\"spectre\",\"vm\",\"vps\",\"windows\",\"xen\"],\"articleSection\":[\"Announcements\",\"Support\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/\",\"url\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/\",\"name\":\"Patching the Spectre & Meltdown fallout - Hosting UK\",\"isPartOf\":{\"@id\":\"https:\/\/hostinguk.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg\",\"datePublished\":\"2018-01-15T16:18:20+00:00\",\"dateModified\":\"2018-01-19T13:47:32+00:00\",\"author\":{\"@id\":\"https:\/\/hostinguk.net\/blog\/#\/schema\/person\/e7707cd2857ef38b31f396b1bf878707\"},\"description\":\"Dedicated and Virtual Machine patching for Spectre and Meltdown. All shared hosting has been covered (Personal Web, cPanel Lite etc.), this is relevant to those who manage their own platforms. If in doubt - do get in touch.\",\"breadcrumb\":{\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#primaryimage\",\"url\":\"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg\",\"contentUrl\":\"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg\",\"width\":1002,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hostinguk.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patching the Spectre &#038; Meltdown fallout\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hostinguk.net\/blog\/#website\",\"url\":\"https:\/\/hostinguk.net\/blog\/\",\"name\":\"Hosting UK\",\"description\":\"Hosting UK | Domain names | Web hosting | Dedicated Servers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hostinguk.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/hostinguk.net\/blog\/#\/schema\/person\/e7707cd2857ef38b31f396b1bf878707\",\"name\":\"Anthony Hogbin\",\"url\":\"https:\/\/hostinguk.net\/blog\/author\/huk-ant\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Patching the Spectre & Meltdown fallout - Hosting UK","description":"Dedicated and Virtual Machine patching for Spectre and Meltdown. All shared hosting has been covered (Personal Web, cPanel Lite etc.), this is relevant to those who manage their own platforms. If in doubt - do get in touch.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Patching the Spectre & Meltdown fallout - Hosting UK","og_description":"Dedicated and Virtual Machine patching for Spectre and Meltdown. All shared hosting has been covered (Personal Web, cPanel Lite etc.), this is relevant to those who manage their own platforms. If in doubt - do get in touch.","og_url":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/","og_site_name":"Hosting UK","article_published_time":"2018-01-15T16:18:20+00:00","article_modified_time":"2018-01-19T13:47:32+00:00","og_image":[{"width":1002,"height":534,"url":"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg","type":"image\/jpeg"}],"author":"Anthony Hogbin","twitter_misc":{"Written by":"Anthony Hogbin","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#article","isPartOf":{"@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/"},"author":{"name":"Anthony Hogbin","@id":"https:\/\/hostinguk.net\/blog\/#\/schema\/person\/e7707cd2857ef38b31f396b1bf878707"},"headline":"Patching the Spectre &#038; Meltdown fallout","datePublished":"2018-01-15T16:18:20+00:00","dateModified":"2018-01-19T13:47:32+00:00","mainEntityOfPage":{"@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/"},"wordCount":1101,"commentCount":0,"image":{"@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#primaryimage"},"thumbnailUrl":"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg","keywords":["amd","dell","intel","linux","meltdown","patching","security","server","spectre","vm","vps","windows","xen"],"articleSection":["Announcements","Support"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/","url":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/","name":"Patching the Spectre & Meltdown fallout - Hosting UK","isPartOf":{"@id":"https:\/\/hostinguk.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#primaryimage"},"image":{"@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#primaryimage"},"thumbnailUrl":"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg","datePublished":"2018-01-15T16:18:20+00:00","dateModified":"2018-01-19T13:47:32+00:00","author":{"@id":"https:\/\/hostinguk.net\/blog\/#\/schema\/person\/e7707cd2857ef38b31f396b1bf878707"},"description":"Dedicated and Virtual Machine patching for Spectre and Meltdown. All shared hosting has been covered (Personal Web, cPanel Lite etc.), this is relevant to those who manage their own platforms. If in doubt - do get in touch.","breadcrumb":{"@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#primaryimage","url":"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg","contentUrl":"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg","width":1002,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/hostinguk.net\/blog\/patching-and-securing-against-meltdown-and-spectre\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hostinguk.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Patching the Spectre &#038; Meltdown fallout"}]},{"@type":"WebSite","@id":"https:\/\/hostinguk.net\/blog\/#website","url":"https:\/\/hostinguk.net\/blog\/","name":"Hosting UK","description":"Hosting UK | Domain names | Web hosting | Dedicated Servers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hostinguk.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/hostinguk.net\/blog\/#\/schema\/person\/e7707cd2857ef38b31f396b1bf878707","name":"Anthony Hogbin","url":"https:\/\/hostinguk.net\/blog\/author\/huk-ant\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/hostinguk.net\/blog\/wp-content\/uploads\/2018\/01\/meltdown_spectre_fallout.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p63y3g-eO","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/posts\/918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/comments?post=918"}],"version-history":[{"count":11,"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/posts\/918\/revisions"}],"predecessor-version":[{"id":930,"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/posts\/918\/revisions\/930"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/media\/919"}],"wp:attachment":[{"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/media?parent=918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/categories?post=918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hostinguk.net\/blog\/wp-json\/wp\/v2\/tags?post=918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}