(Nov 13) Multiple security issues have been found in Icedove, Debian’s version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, and other implementation errors may lead to the execution of arbitrary code. [More…]
(Nov 13) An updated Adobe Flash Player package that fixes two security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More…]
(Nov 13) Updated kernel packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6.2 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More…]
As of the 1st November 2013, the Netcraft Anti-Phishing community has helped to block over 6.9 million phishing attacks worldwide. We incentivise phishing reports from the community, and have now added a Netcraft USB Flash Drive to our list of incentives:
Prize | When |
---|---|
Netcraft USB Flash Drive | after 100 validated phishing reports |
Netcraft Mug | after 250 |
Netcraft Polo Shirt | after 500 |
Targus Laptop Backpack | after 1,000 |
iPad | after 5,000 |
On reaching 5,000 validated reports you become eligible for a monthly competition to incentivise large reporters.
To report phishing sites to us, please use the form at http://toolbar.netcraft.com/report_url, or forward any phishing URLs or emails you receive to [email protected].
The Netcraft Extension, which is available for Firefox and Google Chrome™, serves as a giant neighbourhood watch scheme for the Internet. Members who encounter a phishing site can act to defend the larger community of users against the attack. Once the first recipients of a phishing mail have reported the attack URL, it is blocked for community members as they subsequently access the URL. Widely disseminated attacks simply mean that the phishing attack will be reported and blocked sooner.
On Linux:
plesk bin pleskrestore --restore .... -async
On Windows:
"%plesk_dir%inpleskrestore.exe" --restore .... -async
-async Restore a backup asynchronously. Works with “–restore” only. This will return the task ID to stdout.
Use –get-restore-task-status to check the task status:
On Linux:
plesk bin pleskrestore --get-restore-task-status <task-id><br><br><task-status task-id="9516"><br><mixed status=""><br><restore status=""><br><conflict-resolve task-id="2147483640"><br><finished status="success"><br><execution-result status="success"/><br></finished><br></conflict-resolve><br><deploy task-id="9570"><br><working><br><deploy total-domains="1" total-accounts="0" completed-domains="0" completed-accounts="0"><br><current-object type="domain"><![CDATA[<br>domain.com]]></current-object><br></deploy><br></working><br></deploy><br></restore><br></mixed><br></task-status>
pleskrestore –get-restore-task-status exit codes:
Code Description
200 Restore in progress
201 Restore is failed (any task has error status)
202 Restore is finished with warnings (any task has warnings status)
203 Restore is finished with infos
204 Restore is successfully finished
[+] Roundcube webmail was updated to version 0.9.5.
The following issues were resolved:
[-] Domain backups did not work if web server configuration files contained German umlaut characters. (PPPM-867)
[-] Users were unable to log in to Plesk because of issues with the apskeyhandler.exe process.
[-] Administrators received duplicate subscription expiration notices. (PPPM-1002)
[-] Server restart could take about 10-20 minutes due to recreation of web server configuration files for all sites. (PPPM-896)