Answers to your questions may be found in our Frequently Asked Questions or in our other Help Menu items, located in either the menu items above under Get Support, or in the panels below.

Our customer service specialists are pleased to serve you in both English and French.


Telephone Support

We strive to keep our telephone hold times under 60 seconds!

E-Mail Support

We strive to respond to your e-mail enquiries within 1 business day!

Toll Free Support Line: 1 866 221-7878

Customer Support:

Sales and Volume Pricing: 1 866 976-9835

Sales and Volume Pricing:

Support (Local Vancouver): 604 633-1142

Hosting Technical Support:

Fax number: 604 633-3174

Partner and Affiliates:


For comments regarding the service which you have received, contact the President of

Telephone Support Hours

Monday - Friday: 
6:00 am to 5:00 pm Pacific Time

Saturday, Sunday & Holidays:
8:00 am to 4:00 pm Pacific Time

Office and Mailing Address Inc.
Suite 333 - 333 Terminal Ave
Vancouver, BC
V6A 4C1


RSS Feed
Latest Updates
OpenSSL Heartbleed Bug
Posted by Garrett Saundry on 04/09/14 10:06 AM

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

The OpenSSL vulnerability affects the following branch,

- OpenSSL 1.0.1 through 1.0.1f (inclusive)

All Webnames servers use the OpenSSL 1.0.0 branch which is not vulnerable. The bug was introduced to OpenSSL in December 2011 and has been out in the wild since OpenSSL release 1.0.1 on 14th of March 2012. OpenSSL 1.0.1g released on 7th of April 2014 fixes the bug.


For customers who have purchased SSL certificates through Webnames, and have those certificates installed on non-Webnames servers, we recommend the following actions be taken:


  1. Identify if your web servers are vulnerable (running OpenSSL versions 1.0.1 through 1.0.1f with heartbeat extension enabled). Use the following SSL Toolbox to detect this. If you’re running a version of OpenSSL prior to 1.0.1, no further action is required.

  2. If your server is impacted, update to the latest patched version of OpenSSL (1.0.1g), or recompile OpenSSL without the heartbeat extension.

  3. Generate a new Certificate Signing Request (CSR). SSL Guide - CSR Generation

  4. Reissue any SSL certificates for affected web servers using the new CSR (do this after moving to a patched version of OpenSSL). SSL Guide – Reissuance.

  5. Install the new SSL certificate and test your installation.

  6. After the new certificate is successfully installed, revoke any certificates that were replaced.

  7. Website administrators should also consider resetting end-user passwords that may have been visible in a compromised server memory.

Read more »

Monday, March 3, 1pm – Tuesday, March 4, 2014, 12am

TLD Category: Commerce

Read more »