Content: Slate Blackcurrant Watermelon Strawberry Orange Banana Apple Emerald Chocolate Marble
Background: Slate Blackcurrant Watermelon Strawberry Orange Banana Apple Emerald Chocolate Marble
Pattern: Blank Waves Notes Sharp Wood Rockface Leather Honey Vertical Triangles
Welcome to Design Host

Κάντε εγγραφή τώρα εντελώς δωρεάν για να αποκτήσετε πλήρη πρόσβαση στην κοινότητα μας. Μετά την ολοκλήρωση της εγγραφής θα μπορείτε να συνδεθείτε και να δημιουργήσετε νέα θέματα ή να απαντήσετε στα υπάρχοντα. Επίσης θα μπορείτε να αλλάξετε τις πληροφορίες του προφίλ σας και παράλληλα να επικοινωνείτε με άλλα μέλη μέσω προσωπικών μηνυμάτων και πολλά ακόμα! Αυτό το μήνυμα θα αφαιρεθεί αυτόματα μετά την σύνδεση σας στην κοινότητα μας.

NickTheGreek

Administrators
  • Content count

    241
  • Joined

  • Last visited

  • Days Won

    61
  • Feedback

    N/A

Community Reputation

134 Excellent

2 Followers

About NickTheGreek

  • Rank
    Design - Host

Recent Profile Visitors

1,835 profile views
  1. Few times have there been technologies so reviled and celebrated at the same time as Adobe Flash. Since its introduction as Macromedia Flash Player in the mid-’90s, the technology has helped shape what the web has become today. At the same time, few internet technologies have united so many wanting to kick it to the curb. In 2020, in collaboration with Apple, Facebook, Google, Microsoft and Mozilla, Adobe will retire the much maligned Flash Player. A large part of the problem, experts say, despite progress in hardening its attack surface, is that it’s not secure enough. Flash continues to be a massive attack target that needs to go, they said. Since 2005, it has amassed 1,033 unique CVE entries, above, more than Microsoft’s Windows XP or Internet Explorer, according to CVEDetails.com. “Given the sheer amount of time I’ve focused on Flash, I might get a little teary eyed when it’s finally gone,” said Jasiel Spelman, a senior vulnerability researcher with Zero Day Initiative. Replacing it will be open standards such as HTML5, WebGL and WebAssembly. “These browser-based alternatives to Flash offer the same capabilities and functionalities. The trend is less helper apps and modern browsers with built-in capabilities that match those plugins of yesteryear,” Spelman said. Gateway to Exploits, Malware For more than a decade, the ubiquitous Flash Player has been a favorite target for attacks that attempted to trick users via a browser pop-up to install and run a bogus Flash Player that actually installed malware. Flash has been also abused by hackers who exploit vulnerabilities in the legitimate Flash Player to run malware. Its appeal has been that a single Flash exploit could target multiple browsers, since most of them were running the program. Adobe Flash Player has offered hackers endless fertile ground for use in exploit kits, phishing schemes, zero-day attacks and backdoor programs, said Steve McGregory, research director at security firm Ixia. Most of those attacks lead to remote code execution because of a litany of vulnerabilities in legacy code leading to buffer overflows, or memory corruption issues. Its trail of carnage has included terabytes of lost intellectual property and industrial secrets, along with stolen passwords and credit card numbers. For those reasons, technology leaders such as Alex Stamos, chief security officer for Facebook, declared in a 2015 tweet that has since been deleted: “It is time for Adobe to announce the end-of-life date for Flash and to ask the browsers to set killbits on the same day.” Add to that Steve Jobs’ famous trashing of Flash in a longwinded 2010 manifesto explaining why Apple wouldn’t support it and arguing it should cease to exist. “Adobe Flash has been heavily leveraged in advertising, media and eLearning spaces, but unfortunately Adobe has not kept pace with the necessary security updates in order to outweigh the benefits of using the product,” said Mark Butler, CISO for Qualys. “If Flash wasn’t good enough for Steve Jobs to include in iOS software, it definitely shouldn’t be OK for us to use now. Flash has only increased in vulnerabilities since that time, and its patching cycles have lengthened,” he said. Transition Challenge Today, Adobe Flash security holes still dominate the threat landscape. So far this year there have been 60 unique CVEs associated with Flash, 53 rated high-severity allowing attackers to remotely execute code. Earlier this month Adobe patched a serious a local sandbox escape bug in its Flash Player after researchers failed to fix the bug completely in a previous patch. However, despite indicators pointing to a swift death and depreciation of Flash over the next three years, the transition could present challenges for companies. Experts say dependence on Adobe Flash will create legacy issues similar to those of Windows XP. “This is just the first step, once Flash is retired, we will all be facing the reality of older versions of Flash installed and being used without any security update support similar to what we have with Microsoft Windows XP. We all still have more work to do to make the retirement not just effective but safe,” said Christopher Budd, senior threat communications manager, Unit 42, Palo Alto Networks. Percentage of users who have encountered at least one page w/ Flash Player content in a day. Courtesy Chromium.org Three years ago, 80 percent of desktop Chrome users visited a site with Flash each day. Today usage is only 17 percent and continues to decline, according to Chromium, the open-source web browser project founded by Google. Budd said the biggest issue with Flash after 2020 is the risk of security vulnerabilities affecting Flash with no patches available for those issues. Zero Day Initiative’s Spelman says about 75 percent of the enterprise companies he works with are still dependent on Flash in some way. “We tell everyone that currently hosts Flash content that they should heed the guidance from Adobe and look to migrate to supported solutions. However, a number of those organizations have legacy Flash applications that can’t be disabled immediately because of dependency issues,” he said. Enterprises’ Flash Problems Won’t Subside There are no hard numbers on Flash usage inside and outside the enterprise. But, security experts say there are many firms that are using custom-built Flash applications that will be expensive to replace after the 2020 depreciation deadline. “Similar to Windows XP end-of-life, there is going to be a time when there are Flash ‘forever day’ [vulnerabilities] that will be known, but just never patched by Adobe,” Spelman said. Those companies are going to have to redevelop those apps from scratch. “It’s going to take time and convincing them that finding a Flash replacement is a cheaper alternative to a security breach.” For its part, Adobe stated in July it will “continue to support Flash on a number of major OSes and browsers that currently support Flash content through the planned EOL (end of life). This will include issuing regular security patches, maintaining OS and browser compatibility and adding features and capabilities as needed.” In 2015, Adobe began the process when it announced that it had renamed Flash Professional CC to Animate CC and deemed it Adobe’s preferred tool for developing HTML5 content. In the meantime, developer Juha Lindstedt reacted to Adobe’s end of life verdict for Flash and turned to GitHub to petition users there to save Adobe Flash. His goal is to convince Adobe to turnover its Flash code to the open-source community. In his petition, Lindstedt calls Flash “an important piece of internet history and killing Flash means future generations can’t access the past. Games, experiments and websites would be forgotten.” The petition has received mixed reviews within the software development and security communities. While some see Flash as bloated insecure code that needs to go away fast, others see handing it over to the open source community as a way to make it more secure and ensure that any legacy instances of Flash—after it sunsets—can be addressed with an emergency patch. So far Lindstedt’s petition has garnered 6,650 digital signatures. “I think it would be a great idea. Flash is already partially open source,” Spelman said. “From a preservation point of view, I think it would be important to save a snapshot of what the internet looked like when Flash was around.” Adobe declined to comment for this story with the exception of stating it had no intention to make Adobe Flash open source. “I can tell you we don’t have any plans to do that at this time,” according to an Adobe spokesperson.
  2. In enterprise environments, documents and other file types are often located on central file server and users open their documents directly from there. Sometimes, server administrators need to update such files, but can’t because at least one user is using it and locking the file. You could of course just reboot the server and the file would be unlocked, but that might be overkill as you are throwing everybody out. Luckily, there is a tool on the server, that lets you selectively unlock files, here is how to do it: On Windows 2008 R2 Server, click Start and type Share and Storage Management and press Enter In the right pane, click Manage Open Files Click Close Selected Click Yes to confirm Be aware that users of that file might lose data. https://basics.net/2010/04/30/unlocking-shared-files-on-windows-2008-r2-server/
  3. >> The last few days we notice that email reports from cxs if reporting a virus now say: WARNING: Quarantine disabled - Directory [/cxscgi] missing, run cxs --qcreate --quarantine WARNING: Quarantine disabled - Directory [/cxsuser] missing, run cxs --qcreate --quarantine WARNING: Quarantine disabled - Directory [] has incorrect permissions [0644 instead of 0755], run cxs --qcreate --quarantine We have our quarantine directory in /home/quarantine since script install a few years ago and so not sure what's going on here. Also the last line above about permissions is confusing as we have ( per the original instructions) set permissions to 1777 cxs is v4.06 >> Please see the changelog. The quarantine permissions requirements have changed. To fix this you need to rename the old quarantine directory out of the way, for instance to /home/quarantine.old. Then run this command: Code: Select all cxs --qcreate --quarantine /home/quarantine https://forum.configserver.com/viewtopic.php?t=7192
  4. Running a .ps1 PowerShell script will sometimes result in the following message: “<script>.ps1 is not digitally signed. The script will not execute on the system.” The fix is to run Set-ExecutionPolicy and change the Execution Policy setting. Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass This command sets the execution policy to bypass for only the current PowerShell session After the window is closed, the next PowerShell session will open running with the default execution policy. “Bypass” means nothing is blocked and no warnings, prompts, or messages will be displayed. Possible values for the -ExecutionPolicy parameter: — Restricted: The default setting which does not load configuration files or run scripts. — AllSigned: Requires that all scripts and configuration files be signed by a trusted publisher, including scripts that you write on the local computer. — RemoteSigned: Requires that all scripts and configuration files downloaded from the Internet be signed by a trusted remote publisher. — Unrestricted: Loads all configuration files and runs all scripts. If you run an unsigned script that was downloaded from the Internet, you are prompted for permission before it runs. — Bypass: Nothing is blocked and there are no warnings or prompts. — Undefined: Removes the currently assigned execution policy from the current scope, returning the session to the default. This parameter will not remove an execution policy that is set in a Active Directory Group Policy. See the Microsoft Set-ExecutionPolicy cmdlet details here http://tritoneco.com/2014/02/21/fix-for-powershell-script-not-digitally-signed/
  5. Version Certification 2017 Study Guide Prepare for the cPanel & WHM 2017 Version Certification exam, available only at this year's cPanel Conference in Fort Lauderdale, FL. Register free today by using discount code CERTIFIED. Register for cPanel Conference 2017 http://university.cpanel.net/study.php
  6. This article demonstrates how to stop receiving e-mail notifications from cron jobs. By default, when a cron job is run, cron sends e-mail notifications to the user account. To disable e-mail notifications, append >/dev/null 2>&1 to the command in the cron job. This redirects all output from the cron job to the /dev/null device. For example, the following cron job does not send e-mail notifications: 15 * * * Sun /home/username/bigtask.sh > /dev/null 2>&1 To resume receiving e-mail notifications from cron jobs, simply remove >/dev/null 2>&1 from the command. https://www.a2hosting.com/kb/developer-corner/linux/disabling-e-mail-notifications-from-cron-jobs
  7. *If you have access to the commandline, and read access to /etc/ssh/sshd_config, run grep Port /etc/ssh/sshd_config * Run nmap -sV <hostname/ip> - which is nmap with service detection, meaning it works out what's actually listening on the port, rather than guessing the service based on the port it's using. This will give you output that looks something like: PORT STATE SERVICE VERSION 666/tcp open ssh OpenSSH 5.3p1 Debian 3ubuntu4 (protocol 2.0) If it still doesn't find the port, run nmap -p- -sV <hostname/IP> - this will scan all 65k ports - it's slower, but it will find it if it's running on a high up port. https://superuser.com/questions/152877/figure-out-non-standard-ssh-port
  8. το είχα αμελήσει και είπα σήμερα να ασχοληθώ καθως τον Ιανουάριο που μεταπτωθηκε το forum σε WHM + CloudLinux είχα αφήσει μονη επιλογη EasyApache4 και τότε δεν υπήρχε άλλη λυση απο custom compile το αμέλησα τότε για να δω ποτε θα το υιοθετήσει και η cPanel μια και ήταν production server και είπα να αποφύγω τις δοκιμές σήμερα λοιπόν που το ξαναείδα τα πράγματα είναι αρκετά απλά: yum install memcached chkconfig memcached on service memcached start service memcached status /opt/cpanel/ea-php56/root/usr/bin/pecl install memcache service httpd restart προσθέτεις και το memcache.so στο php.ini ( local.ini για EA4) και βλεπεις stats εδώ: watch 'php -r '"'"'$m=new Memcache;$m->connect("127.0.0.1", 11211);print_r($m->getstats());'"'" μετά απλά το δηλώνεις και στο ACP που έχει λογικά ανάψει η σχετική επιλογή: επειδή κάνω χρήση memcached από IPB 2.3.x παρακαλώ και με τεράστια βελτίωση σε απόδοση κάπου έπρεπε να γίνει και εδώ, κάνει διαφορά
  9. Πρόβλημα με emails

    για τον ορισμό των RDNS / PTR θα πρέπει να ρωτήσεις τον hosting provider, συνήθως γίνεται από το Panel που παρέχεται ή μετά από συνεννόηση μαζί τους.
  10. ωραίο άρθρο αυτο και με πολλαπλές λύσεις, για παράδειγμα: find . -type d -print0 | while read -d '' -r dir; do files=("$dir"/*) printf "%5d files in directory %s\n" "${#files[@]}" "$dir" done αλλά αυτό είναι το πιο ενδιαφέρον: du -a | cut -d/ -f2 | sort | uniq -c | sort -nr https://stackoverflow.com/questions/15216370/how-to-count-number-of-files-in-each-directory
  11. Πρόβλημα με emails

    βλεπεις την διαφορα με το εδω πχ box ? https://mxtoolbox.com/SuperTool.aspx?action=ptr%3a85.25.237.104&run=toolpage
  12. Πρόβλημα με emails

    για να μην βαζεις τις Ip εδώ ή να το παμε σε private messaging δες αν εισαι οκ αρχικα: https://mxtoolbox.com/ReverseLookup.aspx
  13. Πρόβλημα με emails

    επειδη ο παραλήπτης ειναι η Google όμως λογικά αλλού είναι το θέμα γιατί αυτοί δεν έχουν σχέση με Symantec reputation έχεις προσθέσει τα PTR/RDNS στον IP provider ? τυπικά αυτός που σου νοικιάζει τις IP
  14. Πρόβλημα με emails

    ριξε μια ματια κι εδω: http://ipremoval.sms.symantec.com/lookup/
  15. IPS Community Suite 4.2.1 Released 07/26/2017 4.2.1 is a maintenance release to fix minor issues.