-
Content Count
454 -
Joined
-
Last visited
-
Days Won
76 -
Feedback
N/A
Everything posted by NickTheGreek
-
How TO Fix DB Collation Issues [post transfer]
NickTheGreek replied to NickTheGreek's topic in Invision forum
UTF8 Database Converter This tool will convert your IP.Board 3.x database to UTF8 (with a collation of utf8_unicode_ci). This tool has a web interface and a CLI interface which is preferable where permission allows. The download zip contains full instructions inside the "readme.html" document. Your original data is not overwritten until you confirm that the conversion has been successful so you can test this out as many times as you like. Reporting Bugs If you do spot any bugs, please post it to the bug tracker. Requirements Please note that the UTF8 Converter has the following requirements: Minimum of PHP 5.3 Minimum of MySQL 5.0.3 https://invisioncommunity.com/files/file/6823-ips-utf8-database-converter/ -
How TO Fix DB Collation Issues [post transfer]
NickTheGreek replied to NickTheGreek's topic in Invision forum
IPS UTF-8 Database Converter By Matt January 23, 2014 Please note that this entry may be a little technical, if you do have any questions, please post them in the comments below. A little history IP.Board was first released over ten years ago when the web landscape was very different. A lot of emerging technologies were still trying to define new standards. Very early versions of IP.Board allowed one to specify the document character set and had a default of "ISO-8559-1" which is useful for languages that use latin based characters. This meant, for example, that if you needed Chinese characters you would need to change the character set to something more suitable. This disparity between character sets creates many challenges when working with a single code base. UTF-8 Over the past handful of years there has been a push towards a single document character set; UTF-8. UTF-8 is a variable-width encoding that is able to show every character in the Unicode character set. This makes it suitable for latin and Chinese characters (and many many more!). Popular Javascript libraries such as jQuery require that data is sent and received with UTF-8 and many native PHP string functions prefer UTF-8. The future is very much UTF-8 and trying to keep our codebase working with any other character set is going to be more and more challenging. IPS 4.0 Even though IP.Board 3 introduced UTF-8 as the default character set for new installations, we're aware that we still have many clients that are not using UTF-8 currently. IPS 4.0 is going to be strictly UTF-8 only which means we need to convert the data before or as part of the upgrade process. Converting to UTF-8 isn't as simple as changing the database encoding. Merely doing this will simply corrupt the data you have in your database. We need to be a little smarter and use a script to do this work for us. The great news is that even if you choose to convert your data to UTF-8 today, your IP.Board 3.x will run just fine and you may even find it more efficient as it doesn't have to convert lots of data on the fly. The IPS UTF-8 Database Converter We've written a script that can safely convert your database to UTF-8. The script does not overwrite your data until you manually confirm that the conversion process has been successful. This means that there is no risk of corrupting your existing data. Of course, it is good practice to perform a full MySQL back-up before making any changes to the database as a precaution and we recommend that you do this. You can download the converter and its instructions here. How can I tell if I need to convert my database? When you first run the converter, it'll check your database and let you know if you need to convert or not. Even if you are running UTF-8, you may not be using the correct collation (utf8_unicode_ci) so you have the option of changing your collation which is a very fast procedure and does not need a full conversion to complete. If you first used IP.Board with IP.Board 3.0 then you may only need to change your database table collation. This isn't a required step and the IPS 4 upgrade process will perform this task if you'd prefer to wait until IPS 4.0 is released. Support Please note that while we're happy to provide some pointers within the client forums, this release is not officially supported by our technical support department. Beta Release As this is a beta release, please be aware that there may be bugs. If you do spot one, please post it to the IPS Extras bug tracker. https://invisioncommunity.com/news/9625-ips-utf-8-database-converter/ -
FATAL ERROR Your settings could not be read by IP.Board. This is a fatal error and IP.Board cannot function while this issue persists. This issue is generally caused by changing your character set in the ACP to one that does not support data stored in the rest of your settings, or by restoring a database backup/completing a server transfer and importing your database tables using the wrong character set or collation. You should contact IPS Technical Support for further assistance. http://invision-virus.com/forum/index.php/topic/340-help-fatal-error-in-my-forum/
-
also depends on the backup method ! https://www.whitesmith.co/blog/latin1-to-utf8/
-
Available character sets The following character sets are available: mysql> show character set; +----------+-----------------------------+---------------------+--------+ | Charset | Description | Default collation | Maxlen | +----------+-----------------------------+---------------------+--------+ | big5 | Big5 Traditional Chinese | big5_chinese_ci | 2 | | dec8 | DEC West European | dec8_swedish_ci | 1 | | cp850 | DOS West European | cp850_general_ci | 1 | | hp8 | HP West European | hp8_english_ci | 1 | | koi8r | KOI8-R Relcom Russian | koi8r_general_ci | 1 | | latin1 | cp1252 West European | latin1_swedish_ci | 1 | | latin2 | ISO 8859-2 Central European | latin2_general_ci | 1 | | swe7 | 7bit Swedish | swe7_swedish_ci | 1 | | ascii | US ASCII | ascii_general_ci | 1 | | ujis | EUC-JP Japanese | ujis_japanese_ci | 3 | | sjis | Shift-JIS Japanese | sjis_japanese_ci | 2 | | hebrew | ISO 8859-8 Hebrew | hebrew_general_ci | 1 | | tis620 | TIS620 Thai | tis620_thai_ci | 1 | | euckr | EUC-KR Korean | euckr_korean_ci | 2 | | koi8u | KOI8-U Ukrainian | koi8u_general_ci | 1 | | gb2312 | GB2312 Simplified Chinese | gb2312_chinese_ci | 2 | | greek | ISO 8859-7 Greek | greek_general_ci | 1 | | cp1250 | Windows Central European | cp1250_general_ci | 1 | | gbk | GBK Simplified Chinese | gbk_chinese_ci | 2 | | latin5 | ISO 8859-9 Turkish | latin5_turkish_ci | 1 | | armscii8 | ARMSCII-8 Armenian | armscii8_general_ci | 1 | | utf8 | UTF-8 Unicode | utf8_general_ci | 3 | | ucs2 | UCS-2 Unicode | ucs2_general_ci | 2 | | cp866 | DOS Russian | cp866_general_ci | 1 | | keybcs2 | DOS Kamenicky Czech-Slovak | keybcs2_general_ci | 1 | | macce | Mac Central European | macce_general_ci | 1 | | macroman | Mac West European | macroman_general_ci | 1 | | cp852 | DOS Central European | cp852_general_ci | 1 | | latin7 | ISO 8859-13 Baltic | latin7_general_ci | 1 | | cp1251 | Windows Cyrillic | cp1251_general_ci | 1 | | cp1256 | Windows Arabic | cp1256_general_ci | 1 | | cp1257 | Windows Baltic | cp1257_general_ci | 1 | | binary | Binary pseudo charset | binary | 1 | | geostd8 | GEOSTD8 Georgian | geostd8_general_ci | 1 | | cp932 | SJIS for Windows Japanese | cp932_japanese_ci | 2 | | eucjpms | UJIS for Windows Japanese | eucjpms_japanese_ci | 3 | +----------+-----------------------------+---------------------+--------+ https://mediatemple.net/community/products/dv/204403914/default-mysql-character-set-and-collation
-
Μόλις μου έτυχε ξανα σενάριο μεταφοράς βάσης IPB με άλλο collation και βλεπουμε μετά: FATAL ERROR Your settings could not be read by IP.Board. This is a fatal error and IP.Board cannot function while this issue persists. This issue is generally caused by changing your character set in the ACP to one that does not support data stored in the rest of your settings, or by restoring a database backup/completing a server transfer and importing your database tables using the wrong character set or collation. You should contact IPS Technical Support for further assistance. Η λυση ειναι το παρακάτω DB="{your DB name}" ( echo 'ALTER DATABASE `'"$DB"'` CHARACTER SET utf8 COLLATE utf8_general_ci;' mysql "$DB" -e "SHOW TABLES" --batch --skip-column-names \ | xargs -I{} echo 'ALTER TABLE `'{}'` CONVERT TO CHARACTER SET utf8 COLLATE utf8_general_ci;' ) \ | mysql "$DB"
-
Force Non Legacy Backup to Start (WHM/cPanel) Learn backup configuration that will force it to run immediately instead of waiting for the backup schedule. Learn to do it yourself. If you have setup a Backup to run in WHM -> Backup -> Backup Configuration and would like to force it to run immediately instead of waiting for the backup schedule you can do so through SSH. 1. Login to your server via SSH 2. Type: /usr/local/cpanel/bin/backup --force 3. This will report that it is starting the backup and creating a log file. 4. If it does not return with that information after running it, this means that there is most likely already a backup being taken. You can check to see if a backup is being run by typing: ps aux | grep backup If it has been running a long time (e.g. it may be hung) you can kill it by finding the PID from the ps aux output, and typing: kill -9 PID https://www.vpsblocks.com.au/support/Knowledgebase/Article/View/225/11/force-non-legacy-backup-to-start-whmcpanel Force Legacy Backup to Start (WHM/cPanel) /scripts/cpbackup --force
-
Legacy PHP version with cPanel
NickTheGreek replied to NickTheGreek's topic in Server Control panels
The latest versions of EasyApache has removed the ability to compile PHP 5.2 and thus most of the legacy Drupal 6.x fails to run properly (lots of random 404 errors). Here is how you get this back: yum install libcurl-devel libmcrypt libmcrypt-devel aspell aspell-devel tidy libtidy libtidy-devel libxslt libxslt-devel cd /var/cpanel/easy/apache/custom_opt_mods/ You need to get the last mod for EasyApache. You can do this by visiting this link. wget https://documentation.cpanel.net/download/attachments/362562/custom_opt_mod-PHP5217update.tar.gz tar -xzf custom_opt_mod-PHP5217update.tar.gz nano /var/cpanel/easy/apache/rawopts/all_php5 and add these options: --with-curl --with-gd --enable-exif --with-gettext --with-imap=/opt/php_with_imap_client/ --enable-mbstring --with-mysql-sock=/var/lib/mysql/mysql.sock --with-mysqli=/usr/bin/mysql_config --with-openssl=/usr --enable-pdo=shared --with-pdo-mysql=shared --with-pdo-sqlite=shared --with-sqlite=shared --with-mime-magic --enable-soap --with-pspell --enable-wddx --with-xmlrpc --with-xsl=/opt/xslt/ --with-kerberos --with-curl --enable-zip --with-ttf --enable-gd-native-ttf --with-freetype-dir=/usr You can enable there any other relevant PHP modules you need. Then recompile Apache using Easy Apache from WHM. Go to step 3 “Please choose which specific PHP version(s) to build”. Then on the “PHP Versio n” screen chose “None” and continue to step 4, The “Short Options List” page you will see “PHP 5.2.17 support (no FastCGI)” listed. Check that box and continue your EasyApache installation like normal. -
αν και μπορεί κάποιος απλά να παίξει με CloudLinux όπου και διοατηρούνται repo για τόσο παλιές εκδόσεις PHP υπάρχουν και άλλοι τρόποι να έχεις PHP 5.2.17 μέσα από EasyAPache 3 https://www.interserver.net/tips/kb/install-php-5-2-latest-cpanel-server/ https://softescu.com/blog/knowledge-centre/how-install-php-52-cpanelwhm-1140-your-old-drupal-6x-drupal-cpanel-apache
-
Μολις έτυχε να βρω 11GB μεσα στο ~/.cpanel/comet σε VPS και διαβάζω https://kunwardharmesh.wordpress.com/2013/03/31/clean-up-comet-directory-in-cpanel/ root 100% full Strange directory inside /root : Solution: You can safely clean up the comet directory by running the following command that will remove all files in this directory that have not been accessed in more than three days. /usr/local/cpanel/bin/purge_dead_comet_files >> ήδη ξεκίνησε και βλεπουμε root@server [~/.cpanel/comet]# /usr/local/cpanel/bin/purge_dead_comet_files ******Cleaning up comet for root
-
Καλώς ήρθατε στο designhost.gr.
Νιώστε ελεύθερα και πλοηγηθείτε στην κοινότητα μας όπου μπορείτε να βρείτε διάφορες πληροφορίες και να γνωριστείτε με τα υπόλοιπα μέλη.
Μην διστάσετε να μας ρωτήσετε για οποιαδήποτε απορία σας ή διευκρίνηση.
-
MySQL Tuner + Tuning Primer αυτοί είναι οι φίλοι σου
-
Καλημέρα, όλα αυτά που αναφέρεις είναι χρήσιμα αλλά ίσως επωφεληθείς περισσότερο από MySQL tuning ώστε να μπορείς και να ξεπεράσεις τα spikes αλλά και να βελτιωθεί το όλο Performance. Γράφεις restart ο server, φαντάζομαι μόνο το MySQL service και όχι όλο το box / VPS ?
-
Corporate website hosting For a strong internet presence! Today, in order to communicate with your clients effectively you must have an internet presence. The more essential communication method is via the corporate website. WIND gives you the ability to host your corporate website on the Internet for free, using the Microsoft IISplatform, for a constant internet presence, securely and without limitations. Information is being managed from a modern, user-friendly panel that offers full control over your corporate website. In addition, as your needs grow, you may add extra services, in order to have the flexibility to make your own package. Below, you will find details on the main features of the hosting platform. Service features Capacity 1 GB Traffic 1 GB Web Technologies ASP, ASP.NET, Frontpage Extensions, Perl, Python, PHP4, PHP5, CGI-BIN Password Protected directories √ File manager √ FTP Account √ Shared SSL Certificate √ Site management Control Panel √ Flash √ Data Backup (from within the panel) √ Content Management Umbraco, Dotnetnuke, mojoportal, Drupal, Silverstripe, Joomla Blogs Wordpress, Blogengine.net, DasBlog, Subtext Galleries Photo Gallery Wikis Screwturn Wiki, FlexWiki, kbwiki Extra DNS Hosting (per domain)s √ (extra cost) Extra Web Storage 1GB √ (extra cost) Extra Traffic 1 GB √ (extra cost) Extra Domain Name (.gr) - 2 years √ (extra cost) MySQL Database √ (extra cost) Sql Server 2005/2008 √ (extra cost) https://www.wind.gr/en/gia-tin-epiheirisi/smart-combinations/wind-business-cloud-services/wind-business-communication-/description-of-services/filoxenia-etairikis-istoselidas/
-
Hello glouk,
Welcome to designhost.gr.
Feel free to browse our community accessing all sorts of information and getting to know our members.
Do not hesitate to ask anything in our forums.
designhost.gr
-
hol web hosting Εμπιστευτείτε την εταιρική σας ταυτότητα στο Internet στην hellas on line Τα πακέτα hol web hosting προσφέρουν την πλέον αξιόπιστη επιλογή φιλοξενίας για την παρουσία σας στο Internet αλλά και την υποστήριξη του εταιρικού σας e-mail. Όλα τα πακέτα προσφέρουν: Δωρεάν domain name .gr και .eu και εξυπηρέτηση domain (Primary DNS) Επαρκή χώρο για αποθήκευση σελίδων Απεριόριστους e-mail λογαριασμούς στο δικό σας domain name Online στατιστικά επισκεψιμότητας 24ωρη τεχνική υποστήριξη. Τεχνικά χαρακτηριστικά Windows OS Basic Plus Power Plus Χώρος για τη φιλοξενία εταιρικού website 500 MB 1 GB 3 GB Χώρος για βάσεις δεδομένων,MSSQL 10 MB 50 MB 100 MB Windows File Manager, FTP, AWStats Web Statistics & Web Site Builder App ASP , ASP.NET 2.0, 4.0, Active Perl , SSI, SSL Proxy, PHP IIS Web Sites 1 1 1 Traffic Unlimited Unlimited Unlimited Linux OS Basic Plus Power Plus Χώρος για τη φιλοξενία εταιρικού website 500 MB 1 GB 3 GB Χώρος για βάσεις δεδομένων, MySQL5 10 MB 50 MB 100 MB Linux File Manager, FTP, Log files access, Web Site Builder App CGI, WAP, SSI, SSL, PHP 4, PHP 5, Webalizer Apache Web Sites 1 1 1 Traffic Unlimited Unlimited Unlimited Επιπλέον υπηρεσίες Κατοχύρωση επιπλέον ονομάτων χώρου .gr και .eu ή μεταφορά από άλλους καταχωρητές και ανακατεύθυνση στο βασικό web site Εταιρικό e-mail της μορφής name@mycompany.gr με δωρεάν 5GB χώρο και απεριόριστα mailboxes Πρόσθετος χώρος για υπηρεσία e-mail : αναβάθμιση σε 10 GB ή 15 GB συνολικά για όλο το domain. Σημειώσεις: 1. Η χρήση των υπηρεσιών ηλεκτρονικού ταχυδρομείου προϋποθέτει ότι ο πελάτης διατηρεί δικούς τους DNS διακομιστές (DNS servers) ή εναλλακτικά χρησιμοποιεί τους διακομιστές της hellas online ή κάποιου Internet παρόχου, προϋποθέτει δηλαδή την παροχή υπηρεσιών εξυπηρέτησης domain name. 2. Δεν υποστηρίζονται ονόματα χώρου με εληνικούς χαρακτήρες. Τιμοκατάλογος Κατεβάστε τον αναλυτικό κατάλογο εδώ. Αν είστε ενεργοποιημένοι στο hol web hosting πριν τις 20/05/2013, κατεβάστε τον αναλυτικό τιμοκατάλογο για την προγενέστερη υποδομή εδώ Ενεργοποίηση και επικοινωνία Για να ενεργοποιήσετε τη συνδρομή σας στην hellas online ακολουθήστε τα παρακάτω βήματα: 1. Κατεβάστε και τυπώστε την αίτηση ενεργοποίησης 2. Συμπληρώσετε την αίτηση 3. Στείλτε την υπογεγραμμένη στην hellas online μαζί με αντίγραφο της ταυτότητας σας (και τις δύο όψεις) μέσω ταχυδρομείου στην παρακάτω διεύθυνση: hellas online Αδριανείου 2 & Παπαδά, 115 25 Αθήνα Υπόψη: Direct Telesales ή μέσω fax: 213 000 5769 ή μέσω e-mail στο sales@hol.gr Για πληροφορίες και τεχνική υποστήριξη καλέστε στο 13845 https://statheri.vodafone.gr/page-accordion/6418/hosting-e-mail
-
Χαρακτηριστικά Forthnet Web Hosting For All Αξιόπιστη φιλοξενία σε Windows ή Linux. Συνολικός διαθέσιμος χώρος 1GB! Εύκολη και γρήγορη κατασκευή απεριόριστων σελίδων σε 5 απλά βήματα. Εύκολη και άμεση παραμετροποίηση του πακέτου φιλοξενίας σας μέσω φιλικού control panel. Απεριόριστος αριθμός e-mail λογαριασμών. Απεριόριστη μεταφορά δεδομένων. Δωρεάν στατιστική ανάλυση του website σας. Φιλοξενία σε ιδιόκτητα Data Centers της Forthnet, με αξιοπιστία, ασφάλεια και υψηλή διαθεσιμότητα. 24ωρη τεχνική υποστήριξη από εξειδικευμένο τεχνικό προσωπικό στο 13832. 'Αμεση εξυπηρέτηση από τα Καταστήματα Forthnet σε όλη την Ελλάδα. Μόνο με 117,55 €/χρόνο ! Σημειώσεις Στις παραπάνω τιμές περιλαμβάνεται ΦΠΑ 24%. Ελάχιστη διάρκεια συνδρομής: 1 έτος. Οι υπηρεσίες απαιτούν την προπληρωμή της συνδρομής τους. Σε περίπτωση που επιθυμείτε επιπλέον χώρο στην υπηρεσία: 50ΜΒ: 30,24€ /χρόνο, 200ΜΒ: 50,40€ /χρόνο, 1GΒ: 80,64€ /χρόνο. O χώρος ειδικά για MSSQL βάση δεδομένων δεν περιλαμβάνεται στο συνολικό αποθηκευτικό χώρο του 1GB. Αναλυτικότερα τεχνικά χαρακτηριστικά: Συνολικός διαθέσιμος χώρος 1GB που μπορεί εύκολα, ανά πάσα στιγμή και ανάλογα με τις εκάστοτε ανάγκες σας να κατανεμηθεί σε web, e-mail και database χώρο. Επιλογή από 500+ προκαθορισμένα πρότυπα (templates) για εύκολη και γρήγορη κατασκευή του δικού σας website σε 5 απλά βήματα και από οπουδήποτε μέσω της web εφαρμογής Sitebuilder. Control Panel Plesk για την παραμετροποίηση του πακέτου φιλοξενίας ανάλογα με τις δικές σας ιδιαίτερες ανάγκες. Υποστήριξη .NET 4, PHP 5.4.20, PERL 5.10 Υποστήριξη MSSQL, MySQL, MS Access βάσεων δεδομένων (Για την ενεργοποίηση MSSQL βάσης δεδομένων απαιτείται η επιλογή extra χώρου ειδικά για το σκοπό αυτό). Απόλυτη συμβατότητα με τη χρήση των Windows (πιστοποιημένο από τη Microsoft ως Windows Certified). Υποστήριξη Δυναμικών Εργαλείων (Blog, Forums, Photo Gallery, Community). Δημιουργία απεριόριστων subdomains. Στατιστική ανάλυση μέσω Webalizer 2.21 και AWstats 7.1. Παρακολούθηση του bandwidth και της χρήσης του χώρου (GB). Apache 2.2.15 με παραμετροποιήσιμους κανόνες firewall, διασφαλίζοντας από custom web attacks. Δυνατότητα δημιουργίας πολλαπλών χρηστών με διαφορετικό ρόλο - FTP user, mail user, internet user, upload user (Windows). Διαχείριση της βάσης δεδομένων MySQL (χώρος και δεδομένα με PHP Myadmin). Υψηλά επίπεδα ασφάλειας: H ανανεωμένη έκδοση βασίζεται στην αρχιτεκτονική Virtual Private File System, η οποία εξασφαλίζει τα υψηλότερα επίπεδα ασφάλειας για τα δεδομένα των χρηστών (Linux). http://www.forthnet.gr/ServicesDefault.aspx?a_id=1411
-
COSMOTE Web Hosting Τεχνικά Χαρακτηριστικά & Πρόσθετες Υπηρεσίες Παρακάτω μπορείς να δεις αναλυτικά χαρακτηριστικά για κάθε πλατφόρμα, υπηρεσίες που απολαμβάνεις δωρεάν ή και υπηρεσίες που θα ήθελες να προσθέσεις στο πακέτο Web hosting της επιλογής σου. Πακέτα και Χαρακτηριστικά COSMOTE Web Hosting Μ COSMOTE Web Hosting L Παρεχόμενη Πλατφόρμα Linux / Windows Linux / Windows Domain Name Services (DNS) Hosting Διαθέσιμες Βάσεις 1 1-5 Web Hosting Space 500MB 2GB Database Hosting Space 100MB 500MB Πρόσθετα χαρακτηριστικά πλατφόρμα Windows Πρόσθετα χαρακτηριστικά πλατφόρμα Windows: 1 Free Domain Name .gr" ή ".eu" 1 FTP Accounts (24X7) Audio-Video Files (Not Streaming - Flash,MP3, Wav, Wmv, Real audio, Quick Time, Midi etc) Static Pages (HTML, WML, Java Script, DHTML, XML) Dynamic Pages: ASP, ASPX Supported Language Versions: ASP.ΝΕΤ 2.0, ASP.ΝΕΤ 3.0, ASP.ΝΕΤ 3.5, ASP.ΝΕΤ 4.0 Razor Supported CMS: DotNetNuke Umbraco SSL support (with exclusive IP) Protection through ACLs on Network Devices DDOS Protection/Prevention Next-Generation Firewall Protection Host-Based Firewall Protection Backup 24x7 network monitoring Δωρεάν Sitebuilder PDF Indexing Password Protected Pages Frontpage Extensions Server Side Includes (SSI) Antivirus Software Daily & Monthly Statistics Log Files DLL Support σε ASP.ΝΕΤ Web Server Specs: Windows 2008, IIS 7.0, FPSE 2002, AJAX EXT., Silverlight, .NET full trust, Isolated Application Pool, ASPSMARTUPLOAD, CDONTS & CDOSYS Βάσεις Δεδομένων: MSSQL 2008, Microsoft Access (OLEDB connection) Gigabit Ethernet Σελίδες Λάθους Πρόσθετα Χαρακτηριστικά - Cloud Hosting σε Linux πλατφόρμα Η λύση cloud hosting, στην linux υποδομή, παρέχει υψηλή διαθεσιμότητα, σταθερότητα, ασφάλεια και υψηλά πρότυπα ποιότητας υπηρεσιών. Το περιβάλλον είναι clustered και load-balanced, δηλαδή ένα website εξυπηρετείται από πολλούς web servers ταυτόχρονα. Με αυτόν τον τρόπο επιτυγχάνεται καλύτερη απόδοση (optimal performance) καθώς οι επισκέπτες διαμοιράζονται σε πολλούς web servers. Επιπλέον, αυξάνεται η διαθεσιμότητα και η σταθερότητα ενός website (redundancy) καθώς σε περίπτωση οποιασδήποτε δυσλειτουργίας ενός server, αναλαμβάνουν την εξυπηρέτηση του website οι υπόλοιποι με αποτέλεσμα να μην υπάρχει downtime. Για την ασφάλεια της web hosting υποδομής (linux και windows) χρησιμοποιούνται οι πιο εξελιγμένες τεχνολογικά λύσεις. Η περιμετρική ασφάλεια περιλαμβάνει next-generation firewalls, intrusion prevention systems , routers ACLs και antivirus λογισμικά τα οποία θωρακίζουν τα websites από πιθανές επιθέσεις. Επίσης, τα δεδομένα σας αποθηκεύονται σε δίσκους SAN/NAS υψηλής διαθεσιμότητας και αξιοπιστίας. Σε συνδυασμό με υψηλού επιπέδου τεχνολογίες backup-αντιγράφων ασφαλείας διασφαλίζεται πως δεν θα υπάρξει καμία απώλεια δεδομένων. Χαρακτηριστικά: 1 Free Domain Name .gr" ή ".eu" 1 FTP Accounts (24X7) Audio-Video Files (Not Streaming - Flash,MP3, Wav, Wmv, Real audio, Quick Time, Midi etc) Static Pages (HTML, WML, Java Script, DHTML, XML) Dynamic Pages: PHP Supported Language Versions: PHP 5.6.7 Custom PHP.ini Support Supported .htaccess files Supported CMS:Joomla Wordpress Drupal SSL support (with exclusive IP) Protection through ACLs on Network Devices DDOS Protection/Prevention Next-Generation Firewall Protection Host-Based Firewall Protection Backup Cron management 24x7 network monitoring Δωρεάν Sitebuilder Password Protected Pages CGI-BIN (Preinstalled cgi scripts για mail forms και counter) Antivirus Software Firewall/Access Lists Daily & Monthly Statistics Log Files Web Server Specs: Linux Kernel 2.6.x, Apache 2.2.x, Zend, Optimizer, GD, XML, Pear, TTF, Mail PHP Functions Βάσεις Δεδομένων: MySQL 5.5.x Gigabit Ethernet Σελίδες Λάθους Εργαλεία διαχείρισης database COSMOTE Web Hosting Εργαλεία διαχείρισης database MSSQL 2008 Web GUI: myLittleAdmin MySQL Web GUI: phpmyadmin Δωρεάν επιπλέον υπηρεσίες Στα πλαίσια της συνεχούς βελτίωσης των παρεχόμενων υπηρεσιών μας, προχωρήσαμε σε αναβάθμιση της πλατφόρμας Φιλοξενίας Ιστοσελίδων. Oι επιπλέον δυνατότητες των νέων υποδομών Web Hosting περιλαμβάνουν: Nέες δυνατότητες στο Web Hosting Control Panel: Πλήρως εξελληνισμένο περιβάλλον και δυνατότητα παραμετροποίησης του, σύμφωνα με τις ανάγκες σου όπως δυνατότητα start- stop του site / ftp κ.α. και νέες επιμέρους δυνατότητες στους τελικούς χρήστες όπως διαχείριση αρχείων, δικαιωμάτων, βάσεων δεδομένων, χρηστών FTP. Επιπλέον νέες δυνατότητες εγκατάστασης λογισμικού, ενεργοποίησης framework, ενεργοποίηση CMS εργαλείων (drupal, wordpress κ.α.), ενεργοποίηση στατιστικού εργαλείου, ενεργοποίηση και εγκατάσταση πιστοποιητικών, δυνατότητα backup & restore κ.α Δυνατότητα κεντρικής διαχείρισης πολλών sites ταυτόχρονα (Group Site Management) Νέες ενσωματωμένες δυνατότητες για το Εργαλείο κατασκευής site (Site Builder). Web Hosting Control Panel Με συνδρομή σε οποιοδήποτε πακέτο COSMOTE Web Hosting έχεις δωρεάν άμεση πρόσβαση στο νέο Web Hosting Control Panel, ένα δυναμικό εργαλείο διαχείρισης και παρακολούθησης του λογαριασμού σου και του web site σου, που πέρα από τις παραπάνω δυνατότητες που προστέθηκαν με την αναβάθμιση της πλατφόρμας , οι βασικές λειτουργίες του περιλαμβάνουν: Πληροφορίες Λογαριασμού: συλλογικές πληροφορίες για τον λογαριασμό σου και το πακέτο COSMOTE Web Hosting που έχεις επιλέξει, όπως είναι η πλατφόρμα υλοποίησης, ο χρησιμοποιούμενος Web Server, το βασικό Domain κ.α Αξιοποίηση Δυνατοτήτων Web Server: δυνατότητες όπως έλεγχος και διαχείριση της πρόσβασης στους καταλόγους του δικτυακού τόπου (Lock Directories), διαχείριση εικονικών καταλόγων (Virtual Directories), Directory browsing, έλεγχος ενεργοποίησης των front page extensions, κ.α Διαχείριση Αρχείων: εύκολη και εύχρηστη διαχείριση των αρχείων του δικτυακού σου χώρου με δυνατότητα επισκόπησης, δημιουργίας καινούργιου αρχείου, αναζήτησης αρχείου, αντιγραφής, μετακίνησης, διαγραφής αρχείου, ανέβασμα" (Upload), "κατέβασμα" (Download Τροποποίηση (Edit) αρχείου. Επίσης, πλήρης ενημέρωση σχετικά με το συνολικό χώρο που καταλαμβάνουν τα αρχεία στο χώρο φιλοξενίας μας καθώς και δυνατότητα δημιουργίας back-up αρχείων. Βάσεις Δεδομένων: άρτια διαχείριση της βάσης δεδομένων σου (MS SQL, MySQL, PostgreSQL, ODBC) μέσω web, ανάλογα με την προεπιλεγμένη πλατφόρμα (Microsoft, LINUX) Στατιστικά: αναλυτικές στατιστικές πληροφορίες σχετικά με τo Δικτυακό Τόπο του πελάτη, αλλά και παρακολούθηση των τελευταίων ημερολογιακών εγγραφών (πρόσφατων αλλά και παλαιότερων) Το μόνο που χρειάζεσαι για την πρόσβαση σου, είναι username και password (τα οποία είναι αντίστοιχα το όνομα πρόσβασης και ο κωδικός πρόσβασης που χρησιμοποιείς για την είσοδο σου στην FTP υπηρεσία). Αν είσαι ήδη συνδρομητής σε κάποιο από τα πακέτα φιλοξενίας πάτησε εδώ για να εισέλθεις στο Web Hosting Control Panel. Εργαλείο Κατασκευής Site Δημιουργήσε τώρα εύκολα, γρήγορα και οικονομικά το εταιρικό σου web site, χρησιμοποιώντας το εργαλείο κατασκευής site. Το εργαλείο κατασκευής site απευθύνεται σε εκείνους που επιθυμούν να έχουν μια πρώτη παρουσία στο Internet αλλά δεν έχουν ακόμα προετοιμαστεί τεχνολογικά για κάτι μεγάλο και δεν έχουν προβλέψει αντίστοιχα τον σχετικό προϋπολογισμό τόσο για τη δημιουργία, όσο και για τη συντήρηση ενός προγράμματος προβολής και διαφήμισης της εταιρίας τους στο Web. Με το εργαλείο κατασκευής site η παρουσία της εταιρίας σου στο Internet γίνεται απλή γιατί: Δεν απαιτείται γνώση HTML προγραμματισμού. Επιλέγεις μέσα από ένα μεγάλο αριθμό τυποποιημένων προτάσεων εκείνη που εκφράζει καλύτερα τη φιλοσοφία της εταιρίας σας. Η εισαγωγή του περιεχόμενου του site (κείμενα, τίτλοι και φωτογραφίες) στο επιλεγμένο layout είναι πολύ εύκολη διαδικασία. Περιέχει περιληπτικές οδηγίες αλλά και δυνατότητα αναλυτικής βοήθειας ανά πάσα στιγμή κατά τη διάρκεια δημιουργίας του site. Η δυνατότητα δημοσιοποίησης αυτής της παρουσίας είναι άμεση και απλή σε διεύθυνση της μορφής www.etairia.gr. Σημείωση: Η υπηρεσία παρέχεται από την ΟΤΕ A.E Πρόσθετες Υπηρεσίες Μηνιαίο τέλος Επιπλέον DNS Services 1,51€ Επιπλέον χώρος Φιλοξενίας Ιστοσελίδας 1GB 0,81€ Επιπλέον χώρος βάσης δεδομένων 500 MB 1,51€ Για να αποκτήσεις οποιαδήποτε πρόσθετη υπηρεσία από τις παραπάνω, επικοινώνησε με την Εξυπηρέτηση Εταιρικών Πελατών COSMOTE στο 13818. https://www.cosmote.gr/cs/cosmote/gr/web_hosting.html
-
Η υπηρεσία Φιλοξενίας Ιστοσελίδων της Cyta σου προσφέρει τον απαραίτητο διαδικτυακό χώρο που χρειάζεσαι για τη φύλαξη των επαγγελματικών σου ιστοχώρων. Επιπρόσθετα με την υπηρεσία σου προσφέρουμε το εργαλείο Plesk για διαχείριση των ιστοσελίδων σου. Επίλεξε το πακέτο με τα χαρακτηριστικά που ικανοποιούν τις ανάγκες της επιχείρησής σου και επωφελήσου τις δωρεάν διευκολύνσεις που σου προσφέρονται. Για να γίνεις συνδρομητής στην υπηρεσία τηλεφωνήστε στο 8000-8080, χωρίς χρέωση, ή στο email: cytanet@call-centre.cyta.com.cy Χωρητικότητα 150ΜΒ 5GB 100GB Μηνιαία Συνδρομή €4,65 €9,33 €26,88 Τέλος σύνδεσης €11,90 €11,90 €11,90 Κίνηση / Traffic 100GB ανά μήνα απεριόριστη απεριόριστη Domain 1 1 1 Subdomains 1 10 20 Alias domains - 5 20 Databases 1 10 20 Διαθέσιμες εφαρμογές για εγκατάσταση WordPress Drupal Joomla Περισσότερο από 50 άλλες εφαρμογές - Ssh - Δυνατότητα εγκατάστασης SSL Scheduled tasks - Αριθμός δωρεάν ηλεκτρονικών διευθύνσεων 10 30 30 Υποστήριξη τεχνολογιών html, cgi, και php Διευκόλυνση δυναμικών ιστοσελίδων FTP account 1 1 1 Πρόσβαση με FTP Ημερήσια Back ups Δωρεάν τεχνική υποστήριξη DNS διαχείριση Εργαλείο διαχείρισης Plesk WEB statistics management Log rotation management Πρόσβαση στο WordPress Toolkit Custom error documents Σημειώσεις: Οι τιμές συμπεριλαμβάνουν το ΦΠΑ. Δωρεάν Τεχνική Εξυπηρέτηση στο 8000-8080, καθημερινά Δευτέρα μέχρι Παρασκευή από τις 08.00 – 24.00 και το Σάββατο και Κυριακή από τις 10.00 – 24.00. Για περισσότερες πληροφορίες μπορείς να επισκεφθείς ένα από τα cytashop, ή κάλεσε το Κέντρο Τηλεφωνικής Εξυπηρέτησης στο τηλέφωνο 132. https://www.cyta.com.cy/web-hosting/el
-
πιστεύεις θα γινεται inACP upgrade ?
-
OpenVZ: Stop an unstoppable openvz container
NickTheGreek replied to NickTheGreek's topic in Διαχείριση Linux server
θα δοκιμασω κι αυτο καποια στιγμη https://gist.github.com/pavel-odintsov/3e7351ba4ceca33b8cc6 vzprocess: ps with CTID filtration for OpenVZ -
Q: I have an openvz container that is NOT stopping with the standard vz tools. How can I kill it? I tried a VZ destory but that wont work. A: It's a little harsh, but the best way I've found to stop a stubborn container is to forcefully kill the container's processes. Command vzpid with grep makes it easy to find: ps ax | awk '{print $1}' | xargs vzpid | grep <container ID> | awk '{print $1}' | xargs kill -9 https://serverfault.com/questions/318711/stop-an-unstoppable-openvz-container
-
Heatmap showing Symantec detections for WannaCry, May 11 to May 15 https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware
-
Ransomware: An executive guide to one of the biggest menaces on the web Everything you need to know about ransomware: how it started, why it's booming, how to protect against it, and what to do if your PC's infected. By Danny Palmer | March 7, 2017 -- 12:01 GMT (12:01 GMT) | Topic: Security All you need to know about ransomware in 60 seconds What is a ransomware attack? Ransomware is one of the biggest problems on the web right now. It's a form of malware which encrypts documents on a PC or even across a network. Victims can often only regain access to their files and PCs by paying a ransom to the criminals behind it. A ransomware infection often starts with someone clicking on what looks like an innocent attachment, and it can be a headache for companies of all sizes. Cybercriminals didn't use to be so obvious. If hackers infiltrated your corporate network, they would do everything possible to avoid detection. It was in their best interests not to alert a victim that they'd fallen victim to cybercrime. But now, if you are attacked with file-encrypting ransomware, criminals will brazenly announce they're holding your corporate data hostage until you pay a ransom in order to get it back. It might sound too simple, but it's working: cybercriminals pocketed over $1bn from ransomware attacks during 2016 alone. What is the history of ransomware? While ransomware exploded last year, increasing by an estimated 748 percent, it's not a new phenomenon; the first instance of what we now know as ransomware appeared in 1989. Known as AIDS or the PC Cyborg Trojan, the virus was sent to victims -- mostly in the healthcare industry -- on a floppy disc. The ransomware counted the number of times the PC was booted: once it hit 90, it encrypted the machine and demanded the user 'renew their license' with 'PC Cyborg Corporation ' by sending $189 or $378 to a post office box in Panama. The AIDS demand for payment - by post. Image: Sophos How did ransomware evolve? This early ransomware was a relatively simple construct, using basic cryptography which mostly just changed the names of files, making it relatively easy to overcome. But it set off a new branch of computer crime, which slowly but surely grew in reach -- and really took off in the internet age. Before they began using advanced cryptography to target corporate networks, hackers were targeting general internet users with basic ransomware. One of the most successful variants was 'Police ransomware', which tried to extort victims by claiming to be law enforcement and locking the screen with a message warning the user they'd committed illegal online activity, which could get them sent to jail. However, if the victim paid a fine, the 'police' would let the infringement slide and restore access to the computer. Of course, this wasn't anything to do with law enforcement -- this was criminals exploiting innocent people. An example of 'Police ransomware' threatening a UK user. Image: Sophos While somewhat successful, these forms of ransomware often simply overlaid their 'warning' message on the user's display -- and rebooting the machine could get rid of the problem. Criminals learned from this and now the majority of ransomware schemes use advanced cryptography to truly lock down an infected PC. What are the main types of ransomware? Ransomware is always evolving, with new variants continually appearing in the wild and posing new threats to businesses. However, there are certain types of ransomware which have been much more successful than others. Perhaps the most notorious form of ransomware is Locky, which terrorised organisations across the globe throughout 2016. It infamously made headlines by infecting a Hollywood hospital. The hospital gave into the demands of cybercriminals and paid a $17,000 ransom to have its networks restored. Locky remained successful because those behind it regularly update the code with changes which allow it to avoid detection. They even update it with new functions, including the ability to make ransom demands in 30 languages, helping criminals more easily target victims in around the world. Locky became so successful, it rose to become most prevelant forms of malware in its own right. Cryptowall is another form of ransomware which has found great success for a prolonged period of time. Starting life as doppleganger of Cryptolocker, it's gone onto become one of the most successful types of ransomware. Like Locky, Cryptowall has regularly been updated in order to ensure its continued success and even scrambles file names to make it harder for victims to know which file is which, putting additional pressure on the victim to pay. While some ransomware developers -- like those behind Locky or Cryptowall -- closely guard their product, keeping it solely for their own use, others happily distribute ransomware to any wannabe hacker keen to cash in on cyber extortion - and it's proved to be a very successful method for wide distribution. One of the most common forms of ransomware distributed in this way is Cerber, which has been known to infect hundreds of thousands of users in just a single month. The original creators of Cerber are selling it on the dark web, allowing other criminals to use the code in return for receiving 40 percent of each ransom paid. Cerber has become so successful that after it has surpassed Locky - which appeared to mysteriously disappear over Christmas, although remerged in April with new attack techniques - to become the most dominant form of ransomware on the web - accounting for 90 percent of ransomware attacks on Windows as of mid-April 2017. In exchange for giving up some of the profits for using Cerber, wannabe cyber fraudsters are provided with everything they need in order to successfully make money through extortion of victims. Indeed, now some criminal groups offer this type of ransomware-as-a-service scheme to potential users at no cost at the point of entry. Instead of charging a fee for the ransomware code, they want a 50 percent cut. How much will a ransomware attack cost you? Obviously, the most immediate cost associated with becoming infected with ransomware -- if paid -- is the ransom demand, which can depend on the type of ransomware or the size of your organisation. Recent research revealed that a quarter of companies which paid a ransom paid over £5,000 to retrieve their data, while a further quarter paid hackers between £3,000 and £5,000. The most common ransom paid amongst small and medium-sized businesses was between £500 and £1500, proving that there's still easy money to be made from targeting organisations of this size. There are also examples of high-profile targets paying five-figure fees in order to regain access to their networks, especially in cases where criminals threaten to delete data if they're not paid. Ultimately, whatever the size of the company, time is money and the longer your network is down, the more it's going to cost your business. Even if you regain access to your networks by paying a ransom, there will be additional costs on top of that. In order to avoid future attacks -- especially if you've been marked as an easy target -- be prepared to invest in additional cybersecurity software and to pay for additional staff training. There's also the risk of customers losing trust in your business because of poor cybersecurity and taking their custom elsewhere. Why should businesses worry about ransomware? To put it simply: ransomware could ruin your business. Being locked out of your own network for even just a day will impact on your revenue. But given that ransomware takes most victims offline for at least a week, or sometimes months, the losses can be significant. Systems go offline for so long not just because ransomware locks the system, but because of all the effort required to clean up and restore the networks. And it isn't just the immediate financial hit of ransomware which will damage a business; consumers become wary of giving their custom to organisations they believe to be insecure. How does ransomware infect your PC? It's the modern enterprise's reliance on the internet which is enabling ransomware to boom. Everyday, every employee receives hundreds of emails and many roles require these employees to download and open attachments, so it's something which is often done on autopilot. Taking advantage of employees' willingness to open attachments from unknown senders is allowing cybercriminals to successfully run ransomware campaigns. Like other forms of malware, botnets send ransomware out en masse, with millions of malicious phishing emails sent every single second. Criminals use a variety of lures to encourage targets to open a ransomware email, ranging from offers of financial bonuses, fake online purchase receipts, job applications from prospective employees, and more. A spam email claiming the target has purchased a flight - complete with fake invoice containing the ransomware. Image: Symantec While some messages give away clues to their malicious nature with poorly-worded messages or strange return addresses, others are specially tailored to look as convincing as possible, and appear no different from any other message the victim might be sent. Once the malicious attachment has been opened, the user is encouraged to enable macros in order to view and edit the document. It's when this is enabled that the ransomware code hidden within the macros strikes. It can encrypt files in seconds, leaving the victim with a ransom note demanding a payment ranging from a few hundred dollars to tens of thousands of dollars in order to get them back. Which organisations are targets for ransomware? Any business can find itself a victim of ransomware, but perhaps the most high-profile incident occurred when the Hollywood Presbyterian Medical Center in Los Angeles became infected with Locky ransomware. The infection left doctors and nurses unable to access patient files for days, until the hospital opted to give into the ransom demands of hackers in order to restore services. "The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key," Allen Stefanek, CEO of the hospital, said at the time. Locky is one of the most successful forms of ransomware. Image: F-Secure Hospitals and other healthcare organisations are popular targets for ransomware attacks, because they are often willing to pay. Losing access to data is a life-or-death matter for them -- and hospitals don't want to be held responsible for letting people die due to poor cybersecurity. However, there are even cybercriminals who think attacking hospitals is too despicable an activity. But there are plenty of other sectors criminals will happily target, including educational institutions, such as the University of Calgary, which paid a ransom of $20,000 to hackers. Any large business is at threat and there's even the prospect of ransomware infecting industrial systems. Why are small businesses targets for ransomware? Small and medium -ized businesses are a popular target because they tend to have poorer cybersecurity than large organisations. Despite that, many SMEs falsely believe they're too small to be targeted -- but even a 'smaller' ransom of a few hundred dollars is still highly profitable for cybercriminals. Why is ransomware so successful? You could say there's one key reason why ransomware has boomed: because it works. Organisations can have the best antivirus software in the world, but all it takes for ransomware to infect the network is for one user to slip up and launch a malicious attachment. If organisations weren't giving in to ransom demands, criminals would stop using ransomware. But businesses do need access to data in order to function so many are willing to pay a ransom and get it over and done with. Meanwhile, for criminals it's a very easy way to make money. Why spend time and effort developing complex code or generating fake credit cards from stolen bank details if ransomware can result in instant payments of hundreds or even thousands of dollars from large swathes of infected victims at once? There are even ransomware-as-a-service schemes available on the dark web which allow the most technically inept wannabe cybercriminals to start sending out ransomware -- in exchange for a percentage of their ill-gotten gains going directly into the pockets of the creators. What does Bitcoin have to do with the rise of ransomware? The rise of crypocurrencies like Bitcoin has made it easy for cybercriminals to secretly receive extorted payments, without the risk of the authorities being able to identify the perpetrators. The secure, untraceable method of making payments makes it the perfect currency for criminals who want their financial activities to remain hidden. Cybercriminal gangs are becoming more professional -- some even offer customer service and help for victims who don't know how to acquire or send Bitcoin, because what's the point of making ransom demands if users don't know how to pay? Globe3 ransom demand for 3 Bitcoin - including a 'how to ' guide for those who don't know how to buy it Image: Emsisoft Lab How do you prevent a ransomware attack? With email being by far the most popular attack vector for ransomware, you should provide employees with training on how to spot an incoming attack. Even picking up on little indicators like poor formatting or that an email purporting to be from 'Microsoft Security' is sent from a obscure address which doesn't even contain the word Microsoft within it might save your network from infection. There's also something to be said for enabling employees to learn from making mistakes while within a safe environment. For example, one firm has developed an interactive video experience which allows its employees to make decisions on a series of events then find out the consequences of those at the end. This enables them to learn from their mistakes without suffering any of the actual consequences. On a technical level, stopping employees from being able to enable macros is a big step towards ensuring that they can't unwittingly run a ransomware file. Microsoft Office 2016 -- and now Microsoft 2013 -- both carry features which allow macros to be disabled. At the very least, employers should invest in antivirus software and keep it up-to0date, so that it can warn users about potentially malicious files. How do I get rid of ransomware? The 'No More Ransom' initiative -- launched by Europol and the Dutch National Police in collaboration with a number of cybersecurity companies -- offers free decryption tools for ransomware variants to help victims retrieve their data without succumbing to the will of cyber extortionists. The portal offers decryption tools for ransomware varients including Crypt XXX, MarsJoke, Teslacrypt, and Wildfire. It's updated as often as possible in an effort to ensure tools are available to fight the latest forms of ransomware. The No More Ransom portal offers free ransomware decryption tools. Image: Europol Another way of working around a ransomware infection is to ensure your organisation regularly backs up data offline. It might take some time to transfer the backup files onto a new machine, but if a computer is infected and you have backups, it's possible just to isolate that unit then get on with your business. Should I pay a ransomware ransom? There are those who say victims should just pay the ransom, citing it to be the quickest and easiest way to retrieve data -- and many organisations do pay. But be warned: if word gets out that your organisation is an easy target for cybercriminals because it paid a ransom, you could find yourself in the crosshairs of other cybercriminals who are looking to take advantage of your weak security. And remember that you're dealing with criminals here and their very nature means they may not keep their word. There are stories of victims paying ransoms and still not having files returned. What's the future of ransomware? Ransomware is continually evolving, with an increasing number of variants now engaging in additional activities such as stealing data or weakening infected computers in preparation for future attacks. Researchers even warn that ransomware could soon hold whole operating systems hostage, to such an extent that the only two options available to the user would be to pay, or to lose access to the entire system. And ransomware isn't just a problem for Windows PCs; Apple Macs are vulnerable to it too. Can you get ransomware on your smartphone? Absolutely. Ransomware attacks against Android devices have increased massively, as cybercriminals realise that many people aren't aware that smartphones can be attacked. In fact, any internet-connected device is a potential target for ransomware, which has already been seen locking smart TVs. Researchers demonstrate ransomware in an in-car infotainment system. Image: Intel Security Ransomware and the Internet of things Internet of things devices already have a poor reputation for security. As more and more of these make their way onto the market, they're going to provide billions of new attack vectors for cybercriminals, potentially allowing hackers to hold your connected home or connected car hostage. There's even the potential that hackers could infect medical devices, putting lives directly at risk. As ransomware continues to evolve, it's therefore crucial for your employees to understand the threat it poses, and for organisations to do everything possible to avoid infection, because ransomware can be crippling. http://www.zdnet.com/article/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web/
-
IPS Community Suite 4.1.19.4 Released 05/10/2017 This is a security release and we recommend all clients upgrade as soon as possible. Key Changes We know security updates can be distracting but we take security very seriously and do not want to delay getting you the latest enhancements. As we continue to audit security hardening, we will do these focused update releases. This release addresses two possible XSS scenarios.