Jump to content
[MUST READ] Forum Rules ×

Burke Knight

Moderators
  • Posts

    812
  • Joined

  • Last visited

  • Days Won

    4

Posts posted by Burke Knight

  1. I've seen a lot of debates recently about the average age of people running websites, and I'd like to get some actual numbers from here.

    Please note: I can't see what you voted, and I'm only interested in broad data. There are parallel polls with the same groupings over on other forum sites and I'll share the overall results when I'm done. I suspect I know what the outcome would be, but I'm curious.

  2. 42 minutes ago, Anna said:

    Where do you find the IP address of the server? What to list for the domain? Thanks so much! 🙂 -Anna

    You can setup custom nameservers, the IP addresses will be the IP addresses of the nameservers provided in your Account Information e-mail.

    You can find out the IP address of a server by opening a command prompt on your pc and typing:

    ping <servername>

    So if your nameservers were ns1.byethost.org and ns2.byethost.org

     

    ping ns1.byethost.org

    PING ns1.byethost.org (31.22.4.21) 56(84) bytes of data.

    This shows that ns1.byethost.org has an IP address of 31.22.4.21

    If you have setup custom nameservers in your domain registrar control panel please raise a support ticket with us to ensure your DNS configuration is all working correctly.

    If you require any assistance on configuring your own custom nameservers please raise a support ticket.

     

  3. 1. Moved to the correct board. This is a support issue, not a feature request.

    2. Please sign up and file a support ticket at https://support.ifastnet.com/

    3. Since support issue that can't be dealt with via the forum, this topic is now locked.

  4. GoDaddy: Hackers stole source code, installed malware in multi-year breach

    Web hosting giant GoDaddy says it suffered a breach where unknown attackers have stolen source code and installed malware on its servers after breaching its cPanel shared hosting environment in a multi-year attack.

    While GoDaddy discovered the security breach in early December 2022 following customer reports that their sites were being used to redirect to random domains, the attackers had access to the company's network for multiple years.

    "Based on our investigation, we believe these incidents are part of a multi-year campaign by a sophisticated threat actor group that, among other things, installed malware on our systems and obtained pieces of code related to some services within GoDaddy," the hosting firm said in an SEC filing.

    The company says that previous breaches disclosed in November 2021 and March 2020 are also linked to this multi-year campaign.

    The November 2021 incident led to a data breach affecting 1.2 million Managed WordPress customers after attackers breached GoDaddy's WordPress hosting environment using a compromised password.

    They gained access to the email addresses of all impacted customers, their WordPress Admin passwords, sFTP and database credentials, and SSL private keys of a subset of active clients.

    After the March 2020 breach, GoDaddy alerted 28,000 customers that an attacker used their web hosting account credentials in October 2019 to connect to their hosting account via SSH.

    GoDaddy is now working with external cybersecurity forensics experts and law enforcement agencies worldwide as part of an ongoing investigation into the root cause of the breach.

    Links to attacks targeting other hosting companies

    GoDaddy says it also found additional evidence linking the threat actors to a broader campaign targeting other hosting companies worldwide over the years.

    "We have evidence, and law enforcement has confirmed, that this incident was carried out by a sophisticated and organized group targeting hosting services like GoDaddy," the hosting company said in a statement.

    "According to information we have received, their apparent goal is to infect websites and servers with malware for phishing campaigns, malware distribution and other malicious activities."

    GoDaddy is one of the largest domain registrars, and it also provides hosting services to over 20 million customers worldwide.


    Source: Bleeping Computer

  5. On 2/16/2023 at 10:24 PM, HostBuddy said:

    Please anyone tell me whats wrong happened to my site.

    https://hostbuddy.xyz

    Your site comes up for me now, after hitting to deal with expired SSL:

     

    Quote

    This server could not prove that it is hostbuddy.xyz; its security certificate expired 71 days ago. This may be caused by a misconfiguration or an attacker intercepting your connection. Your computer's clock is currently set to Saturday, February 18, 2023. Does that look right? If not, you should correct your system's clock and then refresh this page.

     

  6. CloudFlare have unfortunately stopped supporting the cPanel plugin... you need to sign up at cloudflare.com to use their service, then go to your domain registrar to change/use CloudFlare's named servers,
    see: https://dash.cloudflare.com/login

    RailGun will automatically be enabled once your domain name servers are changed to use CloudFlare and your domain is set to resolve to an IP address in CloudFlare.

  7. 2 hours ago, SpookyKipper said:

     

    it's a modified version of Xera that is closed-source

    Xera is licensed under the

    GNU General Public License v2.0
    The GNU GPL is the most widely used free software license and has a strong copyleft requirement. When distributing derived works, the source code of the work must be made available under the same license. There are multiple variants of the GNU GPL, each with different requirements.

     

    This means it is not legal to make a closed source project from an open source project.

×
×
  • Create New...