![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
Confirmed User
Join Date: Sep 2006
Location: MTL
Posts: 5,755
|
People with webair Dedi - in here now!
Some might remember a few months back, there was always an iframe in my index that apeared by itself causing surfers to see get viruses or trojans..
then it came out that many users had this problem.. i check the site regularly to see if the problem occurs, and i usually dont see anything. Yesterday i applied to sapphic cash ( i cant wait to start promoting them btw ), and they emailed me this morning saying they cant have me as a webmaster because my site has a virus.. i them emailed webair and they said they removed two lines at the bottom.. the two lines were the iframes that installs itself to my index.. so im wondering, are you guys still getting this problem? and if not, how did you stop it from reoccurring? |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
in a van by the river
Industry Role:
Join Date: May 2003
Posts: 76,806
|
I've never had any virus issues from my boxes at webair. IMO it tends to not be hosts in general, but rather scripts you might be running.
I know the last major outbreak of people's sites getting hacked, was because the attacker was exploiting the template files for well known scripts. So the trick there, is to rename your template files to something that can't be guessed. For example in comus I use random generated template names. Like in4f-tgh.tpl stuff like that. One thing I do notice and it seems true with most hosts, is they are slow at doing updates. So you should always contact your hosts and make sure you are running the latest stable versions of PHP, zend,mysql and all that kinda stuff.
__________________
In November, you can vote for America's next president or its first dictator. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Confirmed User
Join Date: Aug 2002
Location: UK
Posts: 3,198
|
i still got this problem at the moment, i have advised webair but its not fixed yet
![]() i will try the comus advice, cheers crockett ![]()
__________________
Take it Easy !!! ![]() ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 |
Too lazy to set a custom title
Join Date: Mar 2002
Location: Australia
Posts: 17,393
|
Probably wouldn't hurt to get a third party to give your server the occasional once over, the only problem is finding someone you can trust.
Removing the lines from your HTML file will do virtually nothing if the exploit that allowed them to appear isn't fixed. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 |
Confirmed User
Join Date: Sep 2006
Location: MTL
Posts: 5,755
|
I have my first site ever made on webair, its a tgp with zero scripts all my other sites on a different server have scripts but 0 virus/trojan outbreakes
im doing things over on this site, so before i upload it back to the server, ill ask some one to look over to see anything unusual |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 | |
Too lazy to set a custom title
Industry Role:
Join Date: Oct 2002
Location: Montreal, Quebec
Posts: 29,679
|
Quote:
Hosts should update their systems to the latest stable OS and functions, but clients should also update their scripts ( like Wordpress, joomla, drupal, and so on ... ). Also, before installing a " module" or " component" or " plug-in ", it would be a good idea to check the security of such add-on. Also, clients should make sure that permissions on their files are set to the lowest possible. I encounter many config.php that are left at 777 ... Might as well leave the door open and put a billboard up ....
__________________
I know that Asspimple is stoopid ... As he says, it is a FACT ! But I can't figure out how he can breathe or type , at the same time .... |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 |
Confirmed User
Join Date: Jun 2002
Location: Fort Lauderdale, FL
Posts: 1,195
|
I'm WebAir dedicated and I've never even heard of this... Not sure if that's good or bad, but I'm clean so far!
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 |
Confirmed User
Industry Role:
Join Date: Jun 2004
Location: Europe
Posts: 3,055
|
You probably have some root shell access installed on your server.
A while back, someone used a hole in my search.php function and installed r57shell script. Took me a week to figure things out
__________________
My Network Is Waiting For Your Fuckin' Trade! ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#9 |
Pounding Googlebot
Industry Role:
Join Date: Aug 2002
Location: Canada
Posts: 34,482
|
its likely a script you have installed on the box that's compromising security, not something specific to the hosting company.
WG
__________________
I play with Google. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#10 |
Biker Gnome
Industry Role:
Join Date: Mar 2004
Location: cell#324
Posts: 23,200
|
I've had a webair box for a while, no worries, I take precautions that some don't with my TGP's, but never had a virus pop up
__________________
Carbon is not the problem, it makes up 0.041% of our atmosphere , 95% of that is from Volcanos and decomposing plants and stuff. So people in the US are responsible for 13% of the carbon in the atmosphere which 95% is not from Humans, like cars and trucks and stuff and they want to spend trillions to fix it while Solar Panel plants are powered by coal plants think about that |
![]() |
![]() ![]() ![]() ![]() ![]() |