As of the 1st November 2013, the Netcraft Anti-Phishing community has helped to block over 6.9 million phishing attacks worldwide. We incentivise phishing reports from the community, and have now added a Netcraft USB Flash Drive to our list of incentives: Prize
When Netcraft USB Flash Drive
after 100 validated phishing reports Netcraft Mug
after 250 Netcraft Polo Shirt
after 500 Targus Laptop […]
Archive for November 14th, 2013
On Linux:
plesk bin pleskrestore --restore .... -async
On Windows:
"%plesk_dir%inpleskrestore.exe" --restore .... -async
-async Restore a backup asynchronously. Works with “–restore” only. This will return the task ID to stdout.
Use –get-restore-task-status to check the task status:
On Linux:
plesk bin pleskrestore --get-restore-task-status <task-id><br><br><task-status task-id="9516"><br><mixed status=""><br><restore status=""><br><conflict-resolve task-id="2147483640"><br><finished status="success"><br><execution-result status="success"/><br></finished><br></conflict-resolve><br><deploy task-id="9570"><br><working><br><deploy total-domains="1" total-accounts="0" completed-domains="0" completed-accounts="0"><br><current-object type="domain"><![CDATA[<br>domain.com]]></current-object><br></deploy><br></working><br></deploy><br></restore><br></mixed><br></task-status>
pleskrestore –get-restore-task-status exit codes:
Code Description
200 Restore in progress
201 Restore is failed (any task has error status)
202 Restore is finished with warnings (any task has warnings status)
203 Restore is finished with infos
204 Restore is successfully finished
[+] Roundcube webmail was updated to version 0.9.5.
The following issues were resolved:
[-] Domain backups did not work if web server configuration files contained German umlaut characters. (PPPM-867)
[-] Users were unable to log in to Plesk because of issues with the apskeyhandler.exe process.
[-] Administrators received duplicate subscription expiration notices. (PPPM-1002)
[-] Server restart could take about 10-20 minutes due to recreation of web server configuration files for all sites. (PPPM-896)
(Nov 11) Libav could be made to crash or run programs as your login if it opened aspecially crafted file.
(Nov 12) Apache XML Security for Java could be tricked into validating spoofedsignatures.
(Nov 13) Several vulnerabilities have been discovered in the lighttpd web server. CVE-2013-4508 [More…]