Jump to content

Krydos

Chief Executive Officer
  • Posts

    25,180
  • Joined

  • Last visited

  • Days Won

    900

Everything posted by Krydos

  1. Everything has a chance of being hacked. Even if you only wrote your code in html someone could find a vulnerability in the web server or something to allow access to change your files. Just do your best to minimize the chances and take care of the issue quickly if it does happen.
  2. Using Joomla should reduce the chance of being hacked considerably.
  3. There you go https://www.raxsoft.com/temp/fsock.php
  4. You may have been completely up to date and did nothing wrong at all. All I was saying was your wordpress install was the entry point for the hacker. Your wordpress site gets the most traffic of any wordpress site hosted on our servers so of course it's going to attract the most hackers.
  5. What ip is it trying to connect to?
  6. https://tommy.heliohost.org:2083/frontend/paper_lantern/java/index.live.php and then if it stops working on ssl ask for it to be moved back to ssl.
  7. Want me to delete it?
  8. There's quite a bit of stuff that you didn't delete yet.
  9. It looks like metals was the first wordpress hacked externally, and then he used a scanner on that account to look for other wordpress installs. If you don't remember metals was the account that was causing massive issues on Tommy and was banished to Johnny for quite a while because of it.
  10. There you go https://secege.heliohost.org/test.jsp I also moved your deployed servlet to https https://secege.heliohost.org/HelioSecureRest/ but if you deploy a new .war it will likely revert back to http as the deployment script only deploys to non-ssl.
  11. If your account was affected please delete everything in public_html and restore from a backup that is known to be good, or better yet start over without using wordpress at all.
  12. That error is likely because an httpd.conf rebuild was already in progress. Cpanel locks the file so multiple scripts can't try to edit it at a time, and generally the script that doesn't own the lock tries for 300 seconds and then errors out. Since there are so many virtualhosts on Johnny it definitely takes more than 300 seconds to do a full httpd.conf rebuild. Everything seems to have straightened itself out on its own though. Let us know if your site still isn't working for you after you clear your browser cache and flush your os dns records. It's loading fine for me.
  13. You can delete your entire cpanel account and recreate it if you want.
  14. Just use cmh. You said it works.
  15. Which is the spam account then? I'm trying to find the full text, including headers, from a message that was routed incorrectly.
  16. There you go http://ejweb.tk/test.aspx
  17. I'm not seeing any email at all on that account. Did you delete it all already?
  18. Do your stored procedures work if you use the mysql user cmh?
  19. You scribbled out the one piece of information I needed from that screenshot. Is it info@?
  20. Postgis extension has been created on the database alank_backloader.
  21. No, you may not have access to view/modify/delete everyone's databases on the entire server. I can run the command for you though. Remote access enabled.
  22. Does postgis work now? We'll need to know what user and database you want remote access from.
  23. Tommy is on django 1.11.6 https://krydos.heliohost.org/cgi-bin/modules36.py and we're not going to be downgrading to 1.9.
×
×
  • Create New...