Jump to content

Krydos

Chief Executive Officer
  • Posts

    24,215
  • Joined

  • Last visited

  • Days Won

    857

Everything posted by Krydos

  1. Before we can help you with that we need to address your violation of our terms of service. You're only allowed to have 1 account. Please delete all accounts in excess of 1 at http://www.heliohost.org/classic/support/scripts/delete Let us know when you only have 1 active account, and we can assist you further. Failure to delete your excess accounts will result in suspension of all of your accounts for violating our Terms of Service https://wiki.helionet.org/hosting/terms
  2. That account is not suspended, and your domain is working.
  3. Unblocked.
  4. His account is active anyways.
  5. Your account is active, and your domain is working http://jphabs.heliohost.org/
  6. I changed your main domain to man95.heliohost.org and set abduh.us.to as an alias for you.
  7. Could be. I've never used the domain button in cpanel. I've only ever used alias and addon.
  8. The accounts repson and arepson have been deleted. Try adding your domains now.
  9. Edit your .htaccess and try this RewriteEngine On RewriteCond %{HTTP_HOST} !admin.mydomain.com$ [NC] RewriteRule ^/admin/(.*)$ https://admin.mydomain.com/$1 [R=301,L]
  10. No. If you take a look at https://httpd.apache.org/docs/2.4/mod/mod_deflate.html you can see that the DeflateCompressionLevel directive isn't available in the .htaccess context. It can only be set in the server config, or virtual host context. Maybe try something like this https://stackoverflow.com/a/33584050/2336864 No. Probably not anytime soon. We did support http2 on Tommy for a while, but since we last rebuilt Tommy it doesn't come on by default and no one has requested it again yet. I would be willing to set it up on Tommy again though if someone requested it.
  11. Outgoing tcp port 27017 to ip 18.192.74.47 has been opened in Tommy's firewall. This is the second request for mongodb port that I've seen in the last 11 years that I've been an admin at HelioHost.
  12. There are a few domain providers that do things backwards from every other registrar in the world. Normally you buy a domain, set the nameservers, and then once the nameservers are set correctly cpanel allows you to add the domain. 99% of registrars including Namecheap https://www.heliohost.org/partners/namecheap which is where we recommend you buy your domains do it that way. Unfortunately, there are a couple backwards domain registrars like registro.br and eu.org that for whatever nonsensical reason won't set your nameservers for you until the nameservers are already set up for that domain, but there's no way to to set up the nameservers prior to the nameservers being set correctly. It's a circular dependency. The only option then to use that domain is to change your main domain which circumvents the nameserver check that cpanel does. Therefore if this us.to registrar happens to be one of the backwards ones the only way your domain is going to work is if it's your main domain. However, sometimes you can trick their backwards systems by changing your main domain until the domain works, and then change your main domain back to something else, and quickly add the domain again as an alias or addon domain. Sometimes it works, and sometimes it doesn't, but you're welcome to try.
  13. https://abduh.us.to/ is working for me. Is there something else you need help with?
  14. There you go https://krydos.heliohost.org/cgi-bin/modules37.py
  15. It's not a problem. Remote database access is intentionally disabled by default because allowing remote access significantly reduces the security of your database. Most people don't need or want remote access. Once again, it's not a problem. The reason there is no way to enable remote access through cpanel is because cpanel hasn't written the plugin needed to do it. The reason you can enable remote connections to mysql is because cpanel wrote that module, but not one for postgresql. HelioHost has considered writing our own module though. That may happen eventually. Remote access enabled.
  16. Remote access enabled.
  17. Unblocked. They were blocked in the firewall for having 92 connections open to Tommy at the same time.
  18. Looks like blocking the blank user agent bots did the trick. We're almost three hours into the new day, and your account load is basically zero.
  19. Ok, I set up your .htaccess for you. I made it a little more elegant than my simple example above. RewriteEngine On RewriteCond %{HTTP_USER_AGENT} ^-?$ RewriteCond %{REQUEST_URI} !ua.html$ RewriteRule ^(.*)$ http://dl5ark.heliohost.org/ua.html [R=301,L] and ua.html is this Please provide a non-blank user agent to access this site. That way the blank user agent bots will have a useful error, and can change their bot to continue accessing your site if they want to. Thanks for being so responsive, and trying so hard to fix this issue, by the way.
  20. Depends on what the php script does. I could easily write a php script with less than 10 lines of code that gobbles up 512 MB of memory and pegs the cpu at 100% for 60 seconds and then only outputs 15 bytes of bandwidth.
  21. Well, the load is coming from php for sure. Unless you're using a custom error page that points all 404 requests to a php script, that probably isn't the cause of your high load. Without a custom error page apache just handles 404 errors on its own which causes very little load. I think you should block some of the bots, especially the "empty user agent string" bots, using .htaccess like I suggested. Unless you know what they are for sure I would say that wget, fetcher, obot, and old firefox versions should probably be blocked too.
  22. I think those are temporary files that are created when you use phpmyadmin. Have you been using phpmyadmin?
  23. Remote access enabled.
  24. If you want to block the "empty user agent string" bots you can do so by putting this in your .htaccess RewriteEngine On RewriteCond %{HTTP_USER_AGENT} ^$ RewriteRule ^(.*)$ - [F,L]
  25. That's a lot of bot hits. Any idea what "empty user agent string" could be? Unless you know what that is it's probably malicious because respectable bots identify themselves.
×
×
  • Create New...