Jump to content

stapel_eliz

Approved members
  • Content Count

    25
  • Joined

  • Last visited


Reputation Activity

  1. Upvote
    stapel_eliz got a reaction from andrewatfornax in Rename Main Folder   
    I'd wanted to rename the Revive directory, while leaving it in the same location on the same server under the same domain name.
     
    I'm not sure what the change (noted in the quote above) in the "default.conf.php" file is meant to accomplish; I left this file unchanged, as it already contained my domain name.
     
    However, I did make the changes in the "domain_name.conf.php" file, which meant the following lines were adjusted in the highlighted ways:
     
    old:
     
    [webpath]
    admin="www.domain_name.com/old_name/www/admin"
    delivery="www.domain_name.com/old_name/www/delivery"
    deliverySSL="www.domain_name.com/old_name/www/delivery"
    images="www.domain_name.com/old_name/www/images"
    imagesSSL="www.domain_name.com/old_name/www/images"
     
    [store]
    mode=0
    webDir="/home/account_name/public_html/old_name/www/images"
     
    new:
     
    [webpath]
    admin="www.domain_name.com/new_name/www/admin"
    delivery="www.domain_name.com/new_name/www/delivery"
    deliverySSL="www.domain_name.com/new_name/www/delivery"
    images="www.domain_name.com/new_name/www/images"
    imagesSSL="www.domain_name.com/new_name/www/images"
     
    [store]
    mode=0
    webDir="/home/account_name/public_html/new_name/www/images"
     
    I can confirm that this appears to work. Ads have continued to be served on the pages, and statistics are being logged.
     
    Thank you!
     
    Eliz.
  2. Upvote
    stapel_eliz got a reaction from andrewatfornax in New Way To Hack Database?   
    Today, I discovered another hack of my adserver. I'd had version 3.1, with the usual precautions, file permissions, etc.
     
    The new hack appended a Javascript to the text in the "htmlcache" field. There was nothing in the "append" or "prepend" fields. The script was tacked onto the intended text. It put an iframe (calling an undesired URL) at an absolute position, did something with cookies (?), and then put another absolute-position iframe with another undesired different URL.
     
    I've forwarded specific details to the proper e-mail address for this issue; I haven't yet heard back. I have been unable to locate any other instances of this particular hack, either here on through Google in general. I know that details, etc, are not to be posted here, but I wanted to post something, so people would be aware of the issue.
     
    If you've got unintended ads being served up on your site, and if you can't find anything in the "prepend" or "append" fields, check in "banners" for coding in "htmlcache" that doesn't match what you'd intended.
     
    Eliz.
×
×
  • Create New...