![]() |
People with webair Dedi - in here now!
Some might remember a few months back, there was always an iframe in my index that apeared by itself causing surfers to see get viruses or trojans..
then it came out that many users had this problem.. i check the site regularly to see if the problem occurs, and i usually dont see anything. Yesterday i applied to sapphic cash ( i cant wait to start promoting them btw ), and they emailed me this morning saying they cant have me as a webmaster because my site has a virus.. i them emailed webair and they said they removed two lines at the bottom.. the two lines were the iframes that installs itself to my index.. so im wondering, are you guys still getting this problem? and if not, how did you stop it from reoccurring? |
I've never had any virus issues from my boxes at webair. IMO it tends to not be hosts in general, but rather scripts you might be running.
I know the last major outbreak of people's sites getting hacked, was because the attacker was exploiting the template files for well known scripts. So the trick there, is to rename your template files to something that can't be guessed. For example in comus I use random generated template names. Like in4f-tgh.tpl stuff like that. One thing I do notice and it seems true with most hosts, is they are slow at doing updates. So you should always contact your hosts and make sure you are running the latest stable versions of PHP, zend,mysql and all that kinda stuff. |
i still got this problem at the moment, i have advised webair but its not fixed yet :(
i will try the comus advice, cheers crockett :) |
Probably wouldn't hurt to get a third party to give your server the occasional once over, the only problem is finding someone you can trust.
Removing the lines from your HTML file will do virtually nothing if the exploit that allowed them to appear isn't fixed. |
I have my first site ever made on webair, its a tgp with zero scripts all my other sites on a different server have scripts but 0 virus/trojan outbreakes
im doing things over on this site, so before i upload it back to the server, ill ask some one to look over to see anything unusual |
Quote:
Hosts should update their systems to the latest stable OS and functions, but clients should also update their scripts ( like Wordpress, joomla, drupal, and so on ... ). Also, before installing a " module" or " component" or " plug-in ", it would be a good idea to check the security of such add-on. Also, clients should make sure that permissions on their files are set to the lowest possible. I encounter many config.php that are left at 777 ... Might as well leave the door open and put a billboard up .... |
I'm WebAir dedicated and I've never even heard of this... Not sure if that's good or bad, but I'm clean so far!
|
You probably have some root shell access installed on your server.
A while back, someone used a hole in my search.php function and installed r57shell script. Took me a week to figure things out |
its likely a script you have installed on the box that's compromising security, not something specific to the hosting company.
WG |
I've had a webair box for a while, no worries, I take precautions that some don't with my TGP's, but never had a virus pop up
|
All times are GMT -7. The time now is 03:40 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123