11
pAraN0iD
Re: Proposal for new forum structure on xoops.org: Comments invited.
  • 2007/9/8 7:53

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


Thanks for that, I am glad someone take responsibility for making happen.



12
pAraN0iD
Re: Proposal for new forum structure on xoops.org: Comments invited.
  • 2007/9/8 1:37

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


Just wondering what will be done with the results / who will decide what to do / who will implement the changes?

What is the procedure for this?



13
pAraN0iD
Re: Paid work for Module patches...
  • 2007/9/7 1:38

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


Hi Brash

Have you tried Pico from GIJOE (the evolution of TinyD, which came from Tiny Content)? I think it has a function to import directly from Tiny Content. Plus, it seems to work well on PHP5 (at least, I have found no problem with it).

Might save you a bit of cash :) But the downside is that GIJOE may not support further XOOPS development of his modules.



14
pAraN0iD
Re: Admin Hash exposed
  • 2007/9/2 0:51

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


Backup your site before anything happens to it!

If they have your admin hash it implies that someone probably had access to your database. I suggest that you change your database (MySQL) password (and all others, FTP, hosting account etc) immediately using *strong* passwords).

I also suggest you install the Protector module, and make sure you implement all the security enhances it provides (especially in this case change the prefix of your database tables. It has a function to let you do this).

Another possibility is that your database server is busted. Or that there's a crook in your hosting company. The list goes on and on :(

Check the permissions of your mainfile.php as well, read only. (Probably this was not the way, but doesn't hurt to check it).

What modules are you running? Are they the latest versions? You might want to check there have been no security patches for your modules lately.



15
pAraN0iD
Re: xoops-end-user.com Hacked by Anonymous
  • 2007/8/20 14:37

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


Quote:
and the reason for this hacking is nothing but to let the owner know how venerable his site is and the way he configured it. If any anonymous is allowed to edit your sites content why would he be so honest ?


You really are an idiot. If you seriously wanted to let the admin know about a security problem why didn't you just TELL them instead of wasting people's time screwing up their site.

Pathetic. Get out of here.



16
pAraN0iD
Re: Serious 2.0.16 hack risk
  • 2007/6/10 3:52

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


Thanks for the report, perhaps I'd better look into this thing!

Just noticed there is a XOOPSFAQ on PHPsuexec



17
pAraN0iD
Brute force attacks: How much noise is normal?
  • 2007/6/4 2:19

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


I rented a server recently to host my XOOPS sites. Pretty soon I started seeing attempted logins to SSH and FTP, testing long lists of common user names, presumably for common and default passwords.

After a couple of weeks there were hundreds of attempted logins per day. Then more than a thousand. Yesterday it was more than 6,600 (say one attempt every 4.5 seconds!) and I started getting brute force attack warnings from the server.

I know that a certain amount of random probing is normal, but at what point do you start to think it may be a targetted attack? Appreciate any feedback from other server admins.

I have disabled password authentication on SSH and shut down the FTP service as a precaution, when not in use.



18
pAraN0iD
Re: Look better, and more sexure
  • 2007/5/31 15:13

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


Quote:
2. Security, I have seen jokes on other peoples websites about security on XOOPS I have lost 2 sites to hackers. IS XOOPS secure? How secure compared to other boards/cms products?


The XOOPS core has been around for a fair while now and yes, it has proven to be quite secure compared to similar systems.

If you are getting hacked then it is likely that you i) didn't keep up to date with patches and/or ii) were using old, unmaintained modules (right?). If you are actually *losing* sites to hackers then where were your regular backups? These things are responsibility of webmaster.

Protector adds another layer of protection to your website, which can help guard against flaws in both the core and modules. I agree some of the functionality would be good in the core, but in the meantime, its a good module to have.



19
pAraN0iD
Re: WARNING! someone may be systematically attacking unpatched xoops sites!
  • 2007/5/12 4:15

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


This is a very old thread, don't worry.

It is quite normal for script kiddies to use automated tool to troll the net for unpatched sites (if you look through your logfiles you will see all kinds of attempts). If you do leave your site unpatched when there is a known vulnerability, then sooner or later you will get hit (fact of life of the internet).

Just keep your site patched and backup regularly. If you have a backup then a hack is just a temporary inconvenience (rather than a disaster).



20
pAraN0iD
Re: List of Xoops core and modules vulnerabilities and bugs
  • 2007/4/16 12:09

  • pAraN0iD

  • Just popping in

  • Posts: 24

  • Since: 2007/4/16


I think temporarily removing modules with known vulnerabilities from the module repository is a good idea (just until they are fixed).

I don't know if there a way to kick people into patching their sites. Have to learn the hard way.




TopTop
« 1 (2) 3 »



Login

Who's Online

146 user(s) are online (109 user(s) are browsing Support Forums)


Members: 0


Guests: 146


more...

Donat-O-Meter

Stats
Goal: $100.00
Due Date: Apr 30
Gross Amount: $0.00
Net Balance: $0.00
Left to go: $100.00
Make donations with PayPal!

Latest GitHub Commits