-
Posts
24,880 -
Joined
-
Last visited
-
Days Won
886
Everything posted by Krydos
-
Bruteforcing a password is illegal unless you are bruteforcing your own password, or you have permission from the account holder. The first step to take is checking the whois of the domain https://who.is/whois/ogtrk.net As you can see they have things locked down as tight as they can to prevent anyone from finding out who they are You can try calling that number or contacting them, but since the address is Panama I wouldn't bother with it too much. A lot of countries that aren't US, Canada, Australia, England, Germany, etc don't really care about illegal activity like this and would probably ignore you or stall indefinitely. Cloudflare is different. https://www.crunchbase.com/organization/cloudflare#/entity They operate out of San Francisco, California, USA so you're likely to get a much faster response from them. Fill out their abuse form https://www.cloudflare.com/abuse/ and then ogtrk.net will at least not be able to hide behind cloudflares nameservers anymore. Once they use their actual hosting companies nameservers contact that hosting company, and the company who owns the IP that they are using and work your way up the chain until you get a hold of someone who cares, and you can maybe get their IP nullrouted. Anyways, I'm going to unlock this thread if you have any follow up questions on how to accomplish your ends legally.
-
[Solved] Phpmyadmin Maximum File Size Exceeds
Krydos replied to sagnik's topic in Escalated Requests
Please post the following information: Your cPanel username Your main domain The server that you are on -
I just tested https://www.heliohost.org/renew/ on a Tommy account that was inactive and it worked for me. Were you trying to renew your account in some other way?
-
Deployed http://ostudio.heliohost.org/portfolio/
-
# ./deploy_java wochnikm portfolio User wochnikm found. Unable to find file: portfolio.war Usage: deploy_java <username> <.war file>
-
Deployed http://hkaldane.heliohost.org/Website/
-
Also, holy crap, you dug up a thread from 2011! I'll split that for you.
-
It really depends on what language you're using and what your database name is, etc. Here's an example though $dbconn = pg_connect("dbname=pcmq_db user=pcmq_user password=2secure4u"); $result = pg_query($dbconn, "select * from test_table"); $row = pg_fetch_all($result); echo $row['0']['data'];
-
Yeah, I've read about the railgun thing. Seems like a lot of work and a lot of stuff needs to be installed on the server for not that much improvement.
-
Cool, thanks for the information.
-
Thanks for the updates. In order to use "Always use HTTPS" do you have to have an SSL certificate installed on Heliohost's servers or can the connection between Heliohost to Cloudflare be http, and then the connection from Cloudflare to the visitor viewing the site uses https?
-
Deployed http://hkaldane.heliohost.org/Website/
-
Yes, if it is successful it will immediately update in cpanel in the sidebar where it says "general information" under the header "primary domain".
-
You can't change a domain to your main domain without removing it from cpanel first. It just gives an error if the domain already exists in the system.
-
Sorry, I forgot to remove one record. Try now.
-
If you move your account http://wiki.helionet.org/Moving_your_account to Tommy let us know in this thread and we can see about getting the discordrb gem installed for you.
-
You should now be able to create a new account at https://www.heliohost.org/signup/ using your same email address, and the main domain ilovehm.heliohost.org
-
The postgresql database prdev_prdev01 should now be accessible remotely from any IP address.
-
I wasn't aware of any partner program, mainly because none of our users have told us about it prior to you just now. I signed up for it now though so we'll see what they have to say. Ah, here's why we aren't listed:
-
I highly recommend using SFTP for the encryption because the world in general seems to be moving towards the idea that any company or ISP or government is entitled to snoop on all of our data traffic, but that's just my personal politics I suppose. Just be aware that if you do use unencrypted FTP it's fairly trivial to intercept your data to sell it or use it against you. Regarding the file permissions, I implemented a permission mask that would force the files to be uploaded with more sensible permissions but it ended up breaking a lot of other things so I put it back the way it was. Most FTP clients you can just right click and change the permissions. I just tested it with filezilla (a very commonly used ftp client) and you can even right click a directory and set the permissions to 644 for all files recursively in the directory. So you could just do that on your public_html each time you upload something. It's only a few extra mouse clicks.
-
No, she doesn't need to go elsewhere if she doesn't want to. I'm convinced she didn't install the malware intentionally or maliciously. As wolstech already said the existing account is too corrupted to be unsuspended, and we must keep the data intact for law enforcement to research the illegal activity if they need to. We can remove the domain(s) from the account though so you can use them to create a new account. Let us know how you'd like to proceed.
-
Well, like I said before I'm not too familiar with cloudflare and it's multitude of options. If anyone knows more about it they might chime in. Otherwise you can figure it out and let us all know how it works so people who search these forums in the future will be able to find the information without going through the whole process as you currently are. I'm always leery of free services like this because they have a tendency to get a ton of users over a year or two while taking big monetary losses and then switch to paid services once they have everyone hooked on their service suckering people into paying them to get what was once free. I've seen it dozens of times. Pingdom was one that annoyed me the most recently because our uptime images were based on pingdom API, and we lost years of uptime reports when they switched to pay scheme. I wasn't aware of any partner program, mainly because none of our users have told us about it prior to you just now. I signed up for it now though so we'll see what they have to say.
-
In order to provide ruby on rails support on Johnny through cpanel we cannot change the ruby version or the rails version. Since Tommy doesn't support ruby on rails it's possible we could upgrade the ruby version on that server.
-
The easiest way to set up cloudflare is to use the cloudflare plugin we have in your cpanel https://tommy.heliohost.org:2083/frontend/paper_lantern/cloudflare/index.live.php As far as whether you should use cloudflare for each and every cname, that's up to, and what your purpose for using cloudflare is. If you're just trying to speed up your site a bit then all of those cnames don't really matter. If you expect your site to get targetted by DDoS attacks, then first of all maybe you should host your site somewhere else so your account doesn't cause downtime for the rest of our users, but yeah you should probably run ALL of your subdomains and cnames and everything through cloudflare so your attackers can't find the originating server, but if you don't expect all of that to happen then it's probably overkill. Regarding the forced https I would just use .htaccess myself. I'm not familiar with cloudflare forced ssl settings, but rewrite rules are pretty straight forward. Just put this in your .htaccess file RewriteEngine On RewriteCond %{HTTPS} !=on RewriteRule ^ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301]