Search results

  1. Invader Zim

    Unable to set redirects from DA menu

    Like I said, the error occurs wether or not there is an .htaccess file.
  2. Invader Zim

    Unable to set redirects from DA menu

    When a specific user tries to use 'Site Redirection' from the da menu he gets the following error: An error has occurred Details Unable to get Lock on /home/$USER/domains/$DOMAIN/public_html/.htaccess He's the only user with this problem on the server, the .htaccess file exists and is owned...
  3. Invader Zim

    Roundcube: connection reset by peer

    Thnx for the reply. However, those are as they should be.
  4. Invader Zim

    Roundcube: connection reset by peer

    Hi all, I've got problems on one of our servers when users want to change their email password in roundcube. "New password could not be saved. There is a connection error. Recv failure: Connection reset by peer" Can't find any error in any logfile (or perhaps I'm missing which log file I...
  5. Invader Zim

    DirectAdmin 1.50.1 has been released

    I did read his response. "If anyone notices otherwise, please let us know, preferably via email or ticket". the bit about "best to notify the coder", I think, was meant in response to the guy publically posting this before contacting DA about the issue, as is customary. Since it's already out...
  6. Invader Zim

    DirectAdmin 1.50.1 has been released

    The guy posted a new alert, now because of XSS. http://seclists.org/bugtraq/2017/Jan/12 Comments?
  7. Invader Zim

    DirectAdmin 1.50.1 has been released

    Can anyone confirm or deny this? Directadmin ControlPanel 1.50.1 denial of service Vulnerability
  8. Invader Zim

    virtual_localdelivery defer (13): Permission denied: stat()

    Renamed user to include a letter. Problem has been solved.
  9. Invader Zim

    virtual_localdelivery defer (13): Permission denied: stat()

    We've got a user whose username is completely numerical (5 digits, although I doubt this really matters). When email comes for one of the domains in this user account we see the following in /var/log/exim/mainlog [email protected] R=virtual_user T=virtual_localdelivery defer (13): Permission...
  10. Invader Zim

    Replace contents of files

    Tried it on another account, no luck, so I went back to the script. Forsaking sed for perl. Cleaned 2400+ files in one go. #!/usr/local/bin/bash # Find files with offending content for FILE in `grep -r base64_decode * | grep POST | awk -F : '{print $1}'` ; do # Print file name and...
  11. Invader Zim

    Replace contents of files

    You'd think so, but I searched the script and there was no mention af a path in it. And sed's location is in the PATH environment variable. Turns out that it did work, only the file I just happened to check was not cleaned. What are the odds?
  12. Invader Zim

    Replace contents of files

    I had to make a few modifications to get it to work with freebsd and it did find the files in question. However, when it comes to cleaning... maldet(69188): {clean} trying to clean /home/user/domains/domainname/public_html/wp-content/plugins/visual-form-builder/images/ini.php with...
  13. Invader Zim

    Replace contents of files

    I'd much rather use a small script but I'll take a look.
  14. Invader Zim

    Replace contents of files

    Because base64_decode lines are not considered malware. At least not by clam. All I need is a string substitution that makes use of regexps, which, unfortunately, is not my forte.
  15. Invader Zim

    Replace contents of files

    A client has a website with a huge amount of php files where base64_decode lines were inserted. It usually looks like this: <?php...
  16. Invader Zim

    Options * http/1.0, apache 2.4, freebsd

    I've read the same documentation. However, dummy connections are not supposed to significantly raise the load on a server. So, even though it looks like it's a dummy connection (I can see the same lines in the access_logs on all the servers) this is the only server where they cause high load...
  17. Invader Zim

    Options * http/1.0, apache 2.4, freebsd

    Then why the high load and it being the only server out of 21 that has this? And this wasn't so until a week ago (check the differences in top).
  18. Invader Zim

    Options * http/1.0, apache 2.4, freebsd

    Normally this is what I see on any given server in top (only displaying active processes): last pid: 86235; load averages: 0.39, 0.43, 0.46 up 169+06:02:53 19:30:06 268 processes: 1 running, 267 sleeping CPU: 16.7% user, 0.0% nice, 7.0% system, 0.0%...
Back
Top