Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Most Reliable Hosting Company Sites in September 2014

Oct02
by Ike on October 2, 2014 at 1:00 pm
Posted In: Hosting, Performance
Rank Performance Graph OS Outage
hh:mm:ss
Failed
Req%
DNS Connect First
byte
Total
1 Qube Managed Services Linux 0:00:00 0.004 0.086 0.023 0.046 0.046
2 GoDaddy.com Inc Linux 0:00:00 0.013 0.149 0.012 0.200 0.205
3 Memset Linux 0:00:00 0.013 0.111 0.055 0.132 0.217
4 www.dinahosting.com Linux 0:00:00 0.013 0.242 0.080 0.159 0.159
5 Swishmail FreeBSD 0:00:00 0.022 0.124 0.073 0.144 0.186
6 ServerStack Linux 0:00:00 0.022 0.081 0.076 0.151 0.151
7 Datapipe FreeBSD 0:00:00 0.030 0.102 0.016 0.032 0.048
8 EveryCity SmartOS 0:00:00 0.030 0.083 0.054 0.107 0.107
9 Logicworks Linux 0:00:00 0.030 0.143 0.073 0.152 0.340
10 Pair Networks FreeBSD 0:00:00 0.030 0.219 0.082 0.166 0.579

See full table

Qube had the most reliable company site in September with only a single failed request. This is the fourth time this year that Qube has made it to first place, nudging ahead of Datapipe’s track record this year. Qube offers a Hybrid cloud service, where physical servers and equipment are integrated with its cloud hosting with a secure connection between the two networks.

The second most reliable hosting company site belonged to GoDaddy, the world’s largest domain registrar, and had only 3 failed requests in September. Memset and dinahosting also had only 3 failed requests and thus they were ranked by average connection times.

In third place is Memset. Memset was last ranked in the top 10 in June 2013 when it achieved 9th place with 6 failed requests. Memset offers its customers a Perimeter Patrol service, which involves regular scanning of Memset servers to highlight security vulnerabilities.

Linux was still the most popular operating system of choice, used by 6 of the top 10, followed by FreeBSD which was used by 3. EveryCity, however, uses SmartOS, a community fork of OpenSolaris geared towards cloud hosting using KVM virtualisation.

Netcraft measures and makes available the response times of around forty leading hosting providers’ sites. The performance measurements are made at fifteen minute intervals from separate points around the internet, and averages are calculated over the immediately preceding 24 hour period.

From a customer’s point of view, the percentage of failed requests is more pertinent than outages on hosting companies’ own sites, as this gives a pointer to reliability of routing, and this is why we choose to rank our table by fewest failed requests, rather than shortest periods of outage. In the event the number of failed requests are equal then sites are ranked by average connection times.

Information on the measurement process and current measurements is available.

└ Tags: GoDaddy, Hosting, KVM, Performance, Perimeter Patrol, site
 Comment 

Joomla! 3.3.6 Released

Oct01
by Ike on October 1, 2014 at 5:15 pm
Posted In: CMS, Community, Joomla, Project Release News, Releases

Joomla! 3.3 - Do More

Security ReleaseThe Joomla! Project is pleased to announce the immediate availability of Joomla 3.3.6. This is a maintenance release addressing issues with yesterday’s 3.3.5 release. This release addresses an issue related to the core update component, one regression in the user password reset process, and adds a fallback upgrade mechanism for the update component. This release is considered a security release since it includes two resolved security issues associated with 3.3.5. A 3.2.7 release is also available for users who are still using Joomla! 3.2 which addresses the security issues and the upgrade component bug.

If you are currently running a Joomla! release on a server with PHP 5.3.10 or later, we encourage you to update immediately to Joomla! 3.3.6 via either the one-click update or the update downloads available at http://www.joomla.org/download.html.

Note that in order to update directly to 3.3.6 via the core update component, you must be running 3.2.2 or later due to the raised minimum supported PHP version and the update system not supporting checking the server’s PHP version in older releases. Older 3.x releases will be prompted to update to 3.2.7 before being presented the 3.3.6 update.

Special Download Instructions

Because of the issue with the update component, users who are running 3.2.6 or 3.3.5 will be unable to update to the next release using Joomla’s update component. These users will be required to update their Joomla! installation via the Extension Manager. Instructions for updating via the Extension Manager can be found on the Joomla! Documentation Wiki. Users who are running Joomla! 3.3.0 through 3.3.4 and 3.2.5 or earlier will be able to update using the update component. The Joomla! Documentation wiki contains full instructions on how to update your site.

└ Tags: Joomla, PHP, Project Release News, Special Download Instructions, update
 Comment 

Joomla! 2.5.27 Released

Oct01
by Ike on October 1, 2014 at 5:15 pm
Posted In: CMS, Community, Joomla, Project Release News, Releases

Security ReleaseThe Joomla! Project is pleased to announce the immediate availability of Joomla 2.5.27. This is a maintenance release addressing issues with yesterday’s 2.5.26 release. This release addresses an issue related to the core update component. This release is considered a security release since it includes two resolved security issues associated with 2.5.26.

Special Download Instructions

Because of the issue with the update component, users who are running 2.5.26 will be unable to update to 2.5.27 using Joomla’s update component. These users will be required to update their Joomla! installation via the Extension Manager. Instructions for updating via the Extension Manager can be found on the Joomla! Documentation Wiki. Users who are running Joomla! 2.5.25 or earlier will be able to update using the update component. The Joomla! Documentation Wiki contains full instructions on how to update your site.

2.5 End of Life Update

As previously noted, the 2.5 series will reach end of life at the end of 2014, which will mark the end of support for this series. At this time, we project that 2.5.28 will be the last scheduled maintenance release, due in approximately six to eight weeks, the typical timeframe between Joomla! releases.

Download

New Installations: Download Joomla 2.5.27 (Full package) »

Update Package: Download Joomla 2.5.27 (Update packages) »

Note: Please read the update instructions before updating.

Instructions

  • New installation and technical requirements
  • Update instructions*
  • Migration from Joomla! 1.5.x

*Please clear your browser’s cache after upgrading

Want to test drive Joomla? Try the online demo. Documentation is available for beginners.

Release Notes

Check the Joomla 2.5.27 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.

Statistics for the 2.5.27 release period

  • 4 tracker issues fixed

See the Joomla! 2.5.26 Milestone on GitHub for details of the items fixed.

Security Issues Fixed

  • High Priority – Core – Remote File Inclusion More information »
  • Medium Priority – Core – Denial of Service More information »

How can you help Joomla! development?

There are a variety of ways in which you can get actively involved with Joomla! It doesn’t matter if you are a coder, an integrator, or merely a user of Joomla!. You can contact the Joomla! Community Development Manager, David Hurley, to get more information, or if you are ready you can jump right into the Joomla! Bug Squad.

The Joomla! Bug Squad is one of the most active teams in the Joomla! development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla!, and also a great way to meet new people from all around the world.

If you are interested, please read about us on the Joomla! Documentation Wiki and, if you wish to join, email Nick Savov, our Bug Squad coordinator.

You can also help Joomla! development by thanking those involved in the many areas of the process. In the past year, for example, over 1,000 bugs have been fixed by the Bug Squad.

Contributors

Thank you to the community members who were active in the testing and resolution of the issues addressed in this release:

Constantin Romankiewicz, Dmitry Rekun, Jean-Marie Simonet, Johannes S-F, Michael Babker, Nicholas Dionysopoulos, Paulos Matos, Tobias Zulauf.

Joomla! Bug Squad

Thank you to the Joomla! Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla!, please report it on the Joomla! Issue Tracker.

Active members of the Joomla! Bug Squad during past 3 months include: A. Booij, Achal Aggarwal, Anja Hage, Beat , Benjamin Trenkle, Bernard Saulme, Brian Teeman, Christiane Maier-Stadtherr, Constantin Romankiewicz, David Jardin, Dennis Hermacki, Elijah Madden, George Wilson, Hans Kuijpers, Hilary Cheyne, Jean-Marie Simonet, Jelle Kok, Jisse Reitsma, Joe Steele, Josien Verreijt, Leo Lammerink, Marcel van Beelen, Marco Richter, Matt Thomas, Max Sarte, Michael Babker, Mikhail M, Nick Savov, Nicholas Dionysopoulos, Niels van der Veer, Peter Lose, Peter Wiseman, Piotr Mocko, Robert Dam, Robert Gastaud, Roberto Segura, Roland Dalmulder, Sander Potjer, Sergio Manzi, Stefania Gaianigo, Thomas Hunziker, Thomas Jackson, Tobias Zulauf, Todor Iliev, Valentin Despa, Viktor Vogel.

Bug Squad Leadership: Nick Savov, Coordinator.

Joomla! Security Strike Team

A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla! secure. Members include: Airton Torres, Alan Langford, Beat, Bill Richardson, Claire Mandville, David Hurley, Don Gilbert, Gary Brooks, Jason Kendall, Javier Gomez, Jean-Marie Simonet, Marijke Stuivenberg, Mark Boos, Mark Dexter, Matias Griese, Michael Babker, Nick Savov, Pushapraj Sharma, Roberto Segura, Rouven Weßling, Thomas Hunziker.

└ Tags: Download Joomla, Project Release News, Release Notes, Security Issues Fixed, Special Download Instructions
 Comment 

Joomla! 3.3.5 Released

Sep30
by Ike on September 30, 2014 at 7:00 pm
Posted In: CMS, Community, Joomla, Project Release News, Releases

Joomla! 3.3 - Do More

Security ReleaseThe Joomla! Project and the Production Leadership Team are proud to announce the release of Joomla! 3.3.5. This is a security release for the 3.x series of Joomla! and addresses two security issues in addition to several regressions introduced in the 3.3.4 release. A 3.2.6 release is also available for users who are still using Joomla! 3.2 which addresses the security issues.

If you are currently running a Joomla! release on a server with PHP 5.3.10 or later, we encourage you to update immediately to Joomla! 3.3.4 via either the one-click update or the update downloads available at http://www.joomla.org/download.html.

Note that in order to update directly to 3.3.5 via the core update component, you must be running 3.2.2 or later due to the raised minimum supported PHP version and the update system not supporting checking the server’s PHP version in older releases. Older 3.x releases will be prompted to update to 3.2.6 before being presented the 3.3.5 update.

└ Tags: Joomla, PHP, Project Release News, security, update
 Comment 

[20140904] – Core – Denial of Service

Sep30
by Ike on September 30, 2014 at 7:00 pm
Posted In: CMS, Joomla, security, Security Center
  • Project: Joomla!
  • SubProject: CMS
  • Severity: Low
  • Versions: 2.5.4 through 2.5.25, 3.2.5 and earlier 3.x versions, 3.3.0 through 3.3.4
  • Exploit type: Denial of Service
  • Reported Date: 2014-September-24
  • Fixed Date: 2014-September-30
  • CVE Number: CVE-2014-7229

Description

Inadequate checking allowed the potential for a denial of service attack.

Affected Installs

Joomla! CMS versions 2.5.4 through 2.5.25, 3.2.5 and earlier 3.x versions, 3.3.0 through 3.3.4

Solution

Upgrade to version 2.5.26, 3.2.6, or 3.3.5

Contact

The JSST at the Joomla! Security Center.

Reported By: Johannes Dahse

└ Tags: 3.4, Affected Installs, Fixed Date, Joomla Security Center, Security Center
 Comment 
  • Page 2,362 of 2,975
  • « First
  • «
  • 2,360
  • 2,361
  • 2,362
  • 2,363
  • 2,364
  • »
  • Last »

What’s New?

  • Fedora 41: Apptainer CVE-2025-65105 Security Fix Advisory
  • Fedora 43: Apptainer 1.4.5 Important Fix CVE-2025-65105
  • Ubuntu 18.04: USN-7907-5 Linux Kernel Important Security Flaws
  • Debian: Chromium Important DSA-6080-1 Code Exec DoS Issues
  • Fedora 42: SingularityCE Important Upgrade 4.3.5 – FEDORA-2025-54d78b9fed
  • Fedora 43: perl-Alien-Brotli Critical Security DoS Fix 2025-d93200cf16
  • Fedora 42: Wireshark 4.6.1 Critical Issue Advisory – FEDORA-2025-f810869906
  • Fedora 42: yarnpkg Command Injection Fix CVE-2025-64756 Advisory
  • Ubuntu 25.10: Linux Kernel Critical Flaws Security Patch USN-7906-3
  • Ubuntu 22.04: USN-7889-6 Linux Kernel Important Security Patch
  • Ubuntu 22.04 LTS: Linux Kernel Critical Security Issues USN-7928-3
  • Ubuntu 22.04: 7928-2 Linux Kernel FIPS Security Updates
  • Ubuntu 22.04 LTS: USN-7928-1 Linux Kernel Critical Security Issues
  • Debian: Important DoS Vulnerabilities in FFmpeg DSA-6080-1 Advisory
  • Ubuntu 20.04 LTS: USN-7922-1 Linux Kernel Important Security Issues
  • Ubuntu 24.04 LTS: Kernel Important Security Fixes USN-7921-1 CVE-2025-39946
  • Debian: firefox-esr Critical Privilege Escalation DSA-6078-1 CVE-2025-14321
  • 2026 Global Partner Program Announcement
  • Debian: pdns-recursor Critical Denial of Service Vulnerability DSA-6077-1
  • Debian: libpng1.6 Critical Info Leak & DoS Vulnerabilities DSA-6076-1
  • Fedora 43: python3-docs Update 2025-e235793f10 – Maintenance Release
  • Fedora 43: python3.14 Critical Update Addresses Quadratic Complexity Bug
  • Debian: WordPress Important XSS and Info Disclosure DSA-6075-1
  • Ubuntu 22.04 LTS: fontTools Important Path Traversal Risk CVE-2025-66034
  • Debian: webkit2gtk Critical Info Exfiltration DSA-6074-1 CVE-2025-13947

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

50 queries. 8.75 mb Memory usage. 0.269 seconds.