Jump to content

MikeJ

Members
  • Posts

    2,369
  • Joined

  • Last visited

Everything posted by MikeJ

  1. phpBB can handle it. However, depending on your traffic, you will need to keep an eye on your account resources and consider upgrading if needed (or you may be asked to upgrade if the usage starts to use too many resources). According to Gaia Online's phpBB board (which I'm sure is on dedicated hardware though): While phpBB isn't the most efficient for high traffic forums (vBulletin, a non-free forum, is one that tends to dominate in that space), I imagine it should handle 600 members just fine.
  2. The script is meant to be run under a cron, so it doesn't have any output unless you turn debug on, or it produces an error. You should have received an email, however, at your $notifyemail address if you defined it, from the cpanel backup process.
  3. No need to post twice. http://www.totalchoicehosting.com/forums/i...showtopic=10046
  4. An easy way to transfer that db would be just to download the db to your PC through cpanel, then upload it to the new host. That'll give you a gzipped (compression that cPanel uses) database backup. A script to automate db backups on cPanel is still on my plate. I still have to write the part that does the actual FTP (shouldn't take too long). Just keeps getting bumped by other priorities.
  5. Have you had any luck figuring out where it went wrong? If you are still having trouble, feel free to open a ticket, and ask them to forward it to me.
  6. Rookies..... I made a 1,036 flight within my first 5 tries.
  7. About the best you can do is save any email bounces you get. The email headers will contain the address where the emails were generated, but if the person is using a compromised host (or hosts) and/or open relays, it will be difficult to track him down for proof. If they all show in the Received headers that they are originating from the same place, you'll have a better chance at tracking the person down.
  8. On an account that is just created, and before DNS is properly propogated, the only email you would get is email that originated on the same server (like if you sent email from one domain to another on the same server). No one else's mail system would have knowledge of the domain.
  9. There is very little you can do about the viruses claiming to be coming from your domain. The problem is that the machines sending them aren't the person who created the virus, but rather machines that are infected. The viruses will spoof other domains randomly for the most part, when they send out copies of itself. Your best bet is to set your default mail routing to :blackhole: and just make sure you have aliases or mailboxes for all the addresses you do want to receive mail on. I've seen very rare instances where a provider would block mail from a domain because of these virus emails (since they are so prominent, pretty much every provider knows what's going on). As for SPEWS, that is an incident where a non-TCH system that utilizes IP space adjacent to TCH's network was apparantly flagged as sending spam or referenced in spam sent. SPEWS has a tendency to make wide sweeping blocks which in this case affected your server. TCH is looking into it. Fortunately, due to SPEWS aggressive collateral blocking, I believe a lot of the larger ISPs avoid using their blocklist.
  10. I'm looking into it. The only thing I've found so far is this seems to be a "problem" unique to Outlook (and possibly Outlook Express) when leave mail on server is enabled, at least as far as what I've seen with mention of cases where inbox.pop does not empty. If I turn up more details, I'll be sure to update here.
  11. Only v2.2 has the vulnerability. If you are already running v2.3.1 you don't need to do anything. I don't use guestbooks, so I'm not sure what else is out there.
  12. Found some more tables needed to be altered... I have corrected the original message, but if you only did the query I orginally had up there, then go back into phpmyadmin and run the following query the same way you did the original: >ALTER TABLE `book_auth` CHANGE `LAST_VISIT` `last_visit` int(11) NOT NULL DEFAULT '0'; ALTER TABLE `book_data` DROP `image`; ALTER TABLE `book_private` DROP `image`; ALTER TABLE `book_smilies` CHANGE `width` `width` smallint(6) unsigned NOT NULL default '0'; ALTER TABLE `book_smilies` CHANGE `height` `height` smallint(6) unsigned NOT NULL default '0'; ALTER TABLE `book_ip` ADD KEY guest_ip (guest_ip); You should be set then.
  13. mail/user1/inbox and mail/domain.com/user1/inbox are the same file (even though they look like 2) so it's only taking up the space of one of them. inbox.pop is used for pop3 operations and I'm not certain exactly what cases this file gets created/used. As far as default email address, make sure you set the default email address for ALL domains and subdomains you have parked/created on that account to what you want.
  14. Advanced Guestbook v2.2, the version available in cPanel, has a vulnerability that allows anyone to gain admin access to your guestbook. Since admin access also allows the ability to modify all of the php templates the guestbook uses, I strongly recommend upgrading or removing Advanced Guestbook from your account. If you have it installed, but are not using it, simply delete the directory you installed it in and delete the MySQL database. If you are using it, you can get the new version from http://proxy2.de/scripts.php. However, the permissions on the author's download when extracted will not allow the web server to read the files, so I have repackaged it and attached it to this post. To upgrade: (Notes: This will overwite any template changes you have done. Also, I can't guarantee these instructions will work for all users. Proceed with caution.) Go to your cPanel backup screen and select to download your guestbook database (this is a backup, just to be safe). In your current guestbook directory, open the file admin/config.inc.php. Write down or copy the database settings (you will need them later). The lines you need look like: >$GB_DB["dbName"] = "account_agbook1"; $GB_DB["host"] = "localhost"; $GB_DB["user"] = "account_agbook1"; $GB_DB["pass"] = "4fSurhKJzW"; Upload the attached file (tch-gbookphp.tar.gz) to your guestbook directory. Using cPanel File Manager, extract the contents of tch-gbookphp.tar.gz. In cPanel File Manager, edit the file admin/config.inc.php and change the Database Settings to what you copied from your old config (the 4 lines you copied down above) and save. Go to phpmyadmin in cPanel. Select Databases. Select the appropriate database (should match the dbName above). Click on the SQL tab. Copy and paste the following SQL query into the query window and select Go. You should get a response back that says "Your SQL-query has been executed successfully". >CREATE TABLE book_pics ( msg_id int(11) NOT NULL default '0', book_id int(11) NOT NULL default '0', p_filename varchar(100) NOT NULL default '', p_size int(11) unsigned NOT NULL default '0', width int(11) unsigned NOT NULL default '0', height int(11) unsigned NOT NULL default '0', KEY msg_id (msg_id), KEY book_id (book_id) ) TYPE=MyISAM; ALTER TABLE `book_config` ADD `thumbnail` SMALLINT(1) NOT NULL, ADD `thumb_min_fsize` INT(10) NOT NULL; ALTER TABLE `book_auth` CHANGE `LAST_VISIT` `last_visit` int(11) NOT NULL DEFAULT '0'; ALTER TABLE `book_data` DROP `image`; ALTER TABLE `book_private` DROP `image`; ALTER TABLE `book_smilies` CHANGE `width` `width` smallint(6) unsigned NOT NULL default '0'; ALTER TABLE `book_smilies` CHANGE `height` `height` smallint(6) unsigned NOT NULL default '0'; ALTER TABLE `book_ip` ADD KEY guest_ip (guest_ip); At that point, your guestbook should be working on the new version. You will need to reapply any template changes you had done before. If you have any trouble, feel free to post here. tch_gbookphp.tar.gz
  15. You would have to be on a dedicated server to install your own skin. As for can you create your own (if you are on a dedicated server), yes it is possible, but rather difficult as the cPanel API isn't really documented, and you would have to update them whenever cpanel made any API changes. Unless you are up for a major project, you would be better off looking at 3rd party supplied cpanel skins, some of which include slim versions. From what is available on the TCH servers, you may want to use Monsoon for your dialup clients. It has relatively minimal graphics compared to the x skins.
  16. Well, your header image and the page titles alone made it highly questionable. With page titles like that, since I can't read the languge on the pages or at the time see the videos, I had to exercise caution.
  17. Sorry, had to remove your link. You will probably have to select "Allow direct requests" with the hotlink protection in order for it to work due to the way Save as and media players access them.
  18. The easiest if it's just a temporary issue, might be just to grab your raw access_log and see what IP address accessed your formmail script at the time the mail was sent. But doesn't formmail include the IP anyway? You don't need to do a trace to figure out their ISP. Just do a whois on the IP address to find out what ISP the address belongs to. http://www.geektools.com/whois.php is one whois service that should give you that info.
  19. Yes, but I believe that's been the case for awhile. You should be able to use any ID location as a destination for a link on any modern browser (I even checked IE 5.2 and it works). So <a id="blah">, or an ID in other tags as well, should work as a link destination. w3c.org has some more info here.
  20. I'm not intimately familiar with all of the AWStats configuration options, but as these are shared resources, I don't see any way to have awstats display different timezones based on domains as I take a cursory look through it. About the only way I think you could really do that is to grab the raw log files, and use a local log analysis program that would adjust the times for you. Maybe that would be a good feature request for a future version of AWStats. Btw, VI, the only timezone plugin I found for AWStats is only to correct a timezone issue with a processing a certain Microsoft IIS logformat.
  21. You can't run htpasswd directly really, because that would require shell access which TCH doesn't provide. However, you can use the control panel to create htpasswd files through it's web interface to secure your pages. cPanel allows it on a directory tree basis (and even modifies your .htaccess files for you), but I also made a suggestion here on how to do it for your entire site if you choose as well. I should add that cPanel allows you to manage the users in the htpasswd files as well after you have created it.
  22. Those 3 lines you will have to add. That is normal. Add them directly after the Datasource line. And make sure to uncomment (remove the #) and modify the StaticWebPath line which does exist.
  23. Thanks for the kind words, all. Hopefully I'll help maintain TCH's standard of quality. System administration... doing work on the servers.
  24. Just fill in something like "unknown" for the password.
  25. Btw, I should mention that "AddHandler cgi-script .cgi .pl" or something very similar is probably already in your httpd.conf. You probably just need to uncomment it.
×
×
  • Create New...