-
Posts
24,146 -
Joined
-
Last visited
-
Days Won
848
Everything posted by Krydos
-
Before you can deploy servlets your must have java/jsp enabled on your account. To get java/jsp enabled you must make a new request by following the instructions at the top of the page located here http://www.helionet.org/index/forum/74-java-requests/
-
[Solved] Confirming Payment For Johnny Ssl Account
Krydos replied to zeldafan's topic in Escalated Requests
Dedicated IP granted. -
[Solved] Johnny Ssl Payment Confirmation
Krydos replied to Custos_Aeternam's topic in Escalated Requests
Dedicated IP granted.- 4 replies
-
- Johnny SSL
- payment
-
(and 1 more)
Tagged with:
-
You could also scan your files before you upload them.
-
I disabled roundcube and horde on Stevie to avoid further confusion from users. They will be reenabled when they are once again working.
-
Since it's been over a month with no response from the original poster we're going to have to assume that the issue has been resolved. Let us know if you're having any other problems with your account.
-
[Solved] Apache Error With Softaliscious Upgrade
Krydos replied to condell's topic in Escalated Requests
Sharetronix located at http://condellprojex.org/share is already upgraded to version 3.4. I'm unsure why you got an error about mod_rewrite being unavailable because it's available on both servers and has been forever as far as I know. The second error you encountered looks like it temporarily couldn't connect to mysql. That error should have fixed itself after a few minutes. Is the sharetronix install working properly? Did you try upgrading it again after your last post and it worked this time? Do you need help with anything else? -
/home/furious/public_html/[aeroblax] HiraniRO Patcher.zip
-
Your account is showing up as clean now. Thank you for taking care of this.
-
We have received a complaint about your account. Please investigate and fix within 24 hours. Hurricane Electric Abuse Department support@he.net From support@he.net Fri Jul 4 06:36:25 2014 Return-Path: <support@he.net> X-Original-To: report@abuse.he.net Delivered-To: report@abuse.he.net Received: from he.net (he.net [iPv6:2001:470:0:76::2]) by abuse.he.net (Postfix) with SMTP id 697B05405CC for <report@abuse.he.net>; Fri, 4 Jul 2014 06:36:25 -0700 (PDT) Received: from he.net ([127.0.0.1]) by he.net for <report@abuse.he.net>; Fri, 4 Jul 2014 06:37:29 -0700 Received: from relayn.net4sec.com ([62.67.240.20]) by he.net for <support@he.net>; Fri, 4 Jul 2014 06:37:28 -0700 Received: from relayn.net4sec.com (localhost [127.0.0.1]) by relayn.net4sec.com (Postfix) with ESMTP id 0F10F1EB00E5 for <support@he.net>; Fri, 4 Jul 2014 15:36:19 +0200 (CEST) Dkim-Signature: v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:cc:mime-version:message-id:date:content-type; s=sel; bh=Xm6IEkRjux8t4ikhKRQrKMErFqg=; b=QjS39vULQqceSBFzzsuMmSwY59ns gU6rkTkWSENIupm2C2tWJ1470BHtecUnFSwT5baBler/MWxhiWN0oqw61AAvuZLi sjlpcSQZZlMBVxq7+tW6+gxR8KzrxOZ5TZi5qmioNLogCRznCHflYhZFXoFNLzoh aFaoCc9bIaT7oQc= Domainkey-Signature: a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:cc:mime-version:message-id:date:content-type; q=dns; s= sel; b=epHQSmQplx+t/mCE4BlxUGLJuVaXGgLpd7lw4LSpTqhPUjCvGL6AOz2HO Lu7C5K/Yb46CGRArGNrck+pmpJlphVu3M92djNe3kJnWrW2HX10PjHCAWQHmTozY y6eL+sDZgRLSalSR3lRqfElsHH9JM3PQwVN1Jip55Xm7mvTfEc= Received: from dbserv (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id E3AEF1EB00F7 for <support@he.net>; Fri, 4 Jul 2014 13:36:18 +0000 (UTC) From: abuse@clean-mx.de To: support@he.net Subject: [clean-mx-viruses-32651242](216.218.192.170)-->(abuse@he.net) viruses sites (1 so far) within your network, please close them! status: As of 2014-07-04 15:35:58 CEST CC: soc@us-cert.gov Precedence: bulk Auto-Submitted: auto-generated MIME-Version: 1.0 X-Mailer: clean mx secure mailer X-Virus-Scanned: by net4sec UG at clean-mx.de Message-ID: <20140704.1404480958@dbserv.netpilot.net> Date: Fri, 04 Jul 2014 15:35:58 +0200 Content-Type: multipart/signed; boundary="----------=_1404480112-26317-149137"; micalg="pgp-sha1"; protocol="application/pgp-signature" Received-SPF: pass (clean-mx.de: 62.67.240.20 is authorized to use 'abuse@clean-mx.de' in 'mfrom' identity (mechanism 'mx' matched)) receiver=he.net; identity=mailfrom; envelope-from="abuse@clean-mx.de"; helo=relayn.net4sec.com; client-ip=62.67.240.20 X-SPF-RESULT: pass This is a multi-part message in MIME format. It has been signed conforming to RFC3156. Produced by clean-mx transparent crypt gateway. Version: 2.01.0619 http://www.clean-mx.de You need GPG to check the signature. ------------=_1404480112-26317-149137 Content-type: multipart/mixed; boundary="----=_NextPart" This is a multi-part message in MIME format. ------=_NextPart Content-Type: text/plain; charset="iso-8859-1" Dear abuse team, please help to close these offending viruses sites(1) so far. status: As of 2014-07-04 15:35:58 CEST Please preserve on any reply our Subject: [clean-mx-viruses-32651242](216.218.192.170)-->(abuse@he.net) viruses sites (1 so far) within your network, please close them! status: As of 2014-07-04 15:35:58 CEST http://support.clean-mx.de/clean-mx/viruses.php?email=abuse@he.net&response=alive (for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below. You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatch This information has been generated out of our comprehensive real time database, tracking worldwide viruses URI's If your review this list of offending site, please do this carefully, pay attention for redirects also! Also, please consider this particular machines may have a root kit installed ! So simply deleting some files or dirs or disabling cgi may not really solve the issue ! Advice: The appearance of a Virus Site on a server means that someone intruded into the system. The server's owner should disconnect and not return the system into service until an audit is performed to ensure no data was lost, that all OS and internet software is up to date with the latest security fixes, and that any backdoors and other exploits left by the intruders are closed. Logs should be preserved and analyzed and, perhaps, the appropriate law enforcement agencies notified. DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITY PROBLEM, THEY WILL BE BACK! You may forward my information to law enforcement, CERTs, other responsible admins, or similar agencies. +----------------------------------------------------------------------------------------------- |date |id |virusname |ip |domain |Url| +----------------------------------------------------------------------------------------------- |2014-07-03 21:48:41 CEST |32651242 |Mal/FBScam-A |216.218.192.170 |wapvideo.us |http://wapvideo.us/download/ClxaTlxT_Eg/I-Dare-You-ft-Jeremy-Lin--Kevjumba.html +----------------------------------------------------------------------------------------------- Your email address has been pulled out of whois concerning this offending network block(s). If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available... If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed case explanation of virusnames: ========================== unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injection unknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injection unknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evals unknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injection unknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positive unknown_exe not yet detected by scanners as malware, but high risk! all other names malwarename detected by scanners ========================== yours Gerhard W. Recher (CTO) net4sec UG (haftungsbeschraenkt) Leitenweg 6 D-86929 Penzing GSM: ++49 171 4802507 Geschaeftsfuehrer: Martina Recher Handelsregister Augsburg: HRB 27139 EG-Identnr: DE283762194 w3: http://www.clean-mx.de e-Mail: mailto:abuse@clean-mx.de PGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552 Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc ------=_NextPart-- ------------=_1404480112-26317-149137 Content-Type: application/pgp-signature; name="signature.asc" Content-Disposition: inline; filename="signature.asc" Content-Transfer-Encoding: 7bit Content-Description: Digital Signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJTtqpwAAoJEBTGcx9kwGtzSwMH+QGi2fprUjcBmUkv0xJcBRpo sanpn3mz4NUaI0OKb6y9RNdZQDhdHQhfbAlbvxYFkajLsHk9SWE3Dx7jGyb8Yj7r Pw3r309uscCMsjq4dCelvR8wUc0SvrTVqzi7bYJXbA6pv3G/WYt599N3qV0XkCkX mwNOOJR9wRNUR+yUtlHVZ0P2pIaU8OMLb9+3Dfw6WJp0u1afAda0uKsNIopHDSZz XeLvDEQQz1EM1iFnFArZekMCg52YLiNpfvN1wFiB74zLHrwN8Qv+Bd6GZLJMRy0U Xs3lIdh+FzvIDi7hA2xuITGRf5N+PSJLqf/lUEOm6IM+VCTu24Z9JmAQPch6dwo= =/TIp -----END PGP SIGNATURE----- ------------=_1404480112-26317-149137-- Please fix the problem quickly.
-
We don't provide support through PM.
-
Your account is showing up as clean now. Thank you for taking care of this.
-
[Solved] Failing To Send And Receive Mail :c3.mw
Krydos replied to jddalo's topic in Escalated Requests
Does it work now? -
[Solved] Confirming Payment For Stevie Ssl Account
Krydos replied to Kaoru's topic in Escalated Requests
Dedicated IP granted. -
Yeah, I really don't know. Maybe it's because it's been a few days since you were suspended on the 30th, but the log files don't really say much of anything about your account. You don't have any proxies, file sharing, or curl based scripts do you? The only reason I ask as those are the usual culprits for people seeing high load suspensions.
-
Python 3.4.1 (released May 18th, 2014) has been installed on Johnny. To access it use this shebang in your scripts: #!/usr/local/bin/python3.4
-
Is it working now?
-
Is it working now?
-
Please post the following information: Your cPanel username Your main domain The server that you are on
-
[Solved] I Can't Sign Up For New Account
Krydos replied to HELIOHOSTUsername's topic in Escalated Requests
He successfully created his account on Johnny with a different username. -
[Solved] Perl / Ruby Cgi - 500 Internal Server Error
Krydos replied to dagger's topic in Escalated Requests
test_ruby.rb is giving a 500 error because you're missing the closing double quote on line 13: 1 #!/usr/bin/ruby 2 3 puts "Content-type: text/html" 4 puts 5 puts "<?xml version=\"1.0\" encoding=\"UTF-8\"?>" 6 puts "<!DOCTYPE html>" 7 puts "<html>" 8 puts "<head>" 9 puts "<title>Ruby CGI test</title>" 10 puts "</head>" 11 puts "<body>" 12 puts "<p>Hello, world!</p>" 13 puts "<br> 14 puts "Ruby is amazing! " 15 puts "</body>" 16 puts "</html>" test.cgi is giving a 500 error because your shebang line is wrong. There is no # ls -la /usr/local/bin/ruby /bin/ls: /usr/local/bin/ruby: No such file or directory Use the shebang as your other working ruby script and you should be fine on that one too. test.pl isn't giving a 500 error for me so just fix the error that is reported. -
/home/ananay/public_html/vb6.rar
-
I was running a command on Johnny at the time of the original post that had the unfortunate effect of filling the root partition quite quickly. When I noticed what was happening I started another command to keep the root partition cleaned up, but for about 12 hours this error popped up occasionally. Let us know if you're still having any issues with full partitions.
-
The domain planetonwire.com is not hosted on Heliohost.