Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Using and Managing Revive Adserver
    • Documentation
    • Using Revive Adserver
    • Managing Revive Adserver
    • Bugs
  • Advanced Topics
    • Performance, Scalability, and Reliability
    • For Developers
  • Revive Adserver Community
    • Revive Adserver Project News and Announcements
    • Feature Requests
    • Plugins
    • Requests for Consulting
    • Off Topic

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL

Found 8 results

  1. Has anyone set up Revive to work with fail2ban? Does Revive log failed sign-in attempts someplace?
  2. My organization has recently undergone a security incident having to do with our openx server (we use version 2.8.7). What we know - 1. The attacker most probably exploited SQL Injection vulnerability in axmlrpc.php as an enrty point into our organization. 2. From there he went on to modify 2 files in /var/cache to contain malicious code in the "compiledlimitation" key. (This code created a web shell in the plugins directory). 3. Besides the shell created by the malicious files in /var/cache he was also able to create another shell in the plugins directory. This is a publicly availa
  3. I'm always weary of third party software recommending or requiring setting directory permissions to 777. Is it possible to deny direct access to PHP files in these directories or will it break the software? ./var ./var/templates_compiled ./var/plugins ./var/plugins/DataObjects ./var/plugins/recover ./var/cache ./www/images ./www/admin/plugins ./pluginsSpecifically using an Apache configuration like this, which would be fine providing the PHP files are only included and not accessed directly: <Directory ~ /(var|www/images|www/admin/plugins|plugins)/> php_admin_flag engine off <
  4. Seems there are a lot of hacking going on. What are the most common security breaches? What are some best practices to keep it secure?
  5. Hi, somebody stole the password from the Ads manager computer, we were looking into audits in order to see which was the IP and maybe understand better what happened, but there are no IP registered. what's the use of an audit if it doesn't store the IP address of who made an action?
  6. Hi There, I have been using the PHP ads new platform for the last ten years through it metamorphosis to OpenX source and now Revive. In the past it fit the bill, but recently our needs have grown and we need additional features that are offered on the paid platforms. I am running an ad network with about 400 million ad views a day. The network contains several publishers that our company owns as well as additional 3rd party pubs. Some of the sites we own and operate are TNAflix.com, EMPflix.com, ImageFap.com, PornWall.com, Wankspider.com, MovieFap.com and Hulkshare.com I am
  7. Good Morning, the technical department of my service provider (Aruba cloud) says that, in order to avoid security problems, it is mandatory to assign these permissions: 755 - For all directories 644 - For all files I followed the guide for installing/upgrading Revive Adserver, but the provider I use prevents me from assigning 777 permissions to these directories: / plugins / var / www / admin / plugins After logging in, I get this warning: Error: File permission errors detected. These may impact the accurate delivery of your ads, See the debug.log file for the list of fi
  8. ca_mh

    2013 Backdoor

    Hi We are evaluating the Revive platform at the moment , one of our team has done some research and come across this on wikipedia http://en.wikipedia.org/wiki/OpenX_(software)#cite_note-5 I am trying to find out if that security hole has been fixed in revive? Kind Regards Martin
×
×
  • Create New...