Accéder au contenu principal

SQLite - Display Errors - Magic Quotes GPC

Hello,


Thank you for contacting cPanel support! To activate SQLite you would need to do so using EasyApache - some documentation on this can be found here: https://documentation.cpanel.net/display/EA/PHP+Module%3A+SQLite3

I can run EasyApache for you if you would like for me to, I would just need your permission to do so as it will recompile httpd and php.

For Magic Quotes and Display errors these changes can be made in the global php.ini located at /usr/local/lib/php.ini in the sections:

; Print out errors (as a part of the output). For production web sites,
; you're strongly encouraged to turn this feature off, and use error logging
; instead (see below). Keeping display_errors enabled on a production web site
; may reveal security information to end users, such as file paths on your Web
; server, your database schema or other information.
display_errors = Off

and

; Magic quotes for incoming GET/POST/Cookie data.
magic_quotes_gpc = Off

I've modified display_errors=On and removed the ; from magic_quotes_gpc you may need to remove the Off and set it to On should your application need it but this can cause issues with other applications. I tested enabling Magic Quotes and received a 500 error when trying to view the site, because the software is only "recommending" this I would suggest leaving it disabled as it doesn't appear that it will fail to install without it.

If you do modify the php.ini file ensure that you restart apache subsequent to your changes to ensure that they are saved.

Commentaires

Posts les plus consultés de ce blog

Open Media Vault NAS change password

Known Root Password Login to the OMV using the root user and the current password via SSH or Console enter the following command passwd root The new password is now active. Unknown Root Password, but Admin Access to OMV GUI is Available In this scenario we still can help ourselves with the GUI. The method we use is, that we create a cron job for the root user which then resets the password. Navigate to System -> Cron Jobs Press the +Add button UN-tick the enabled box, so that the cronjob does not run automatically. put into the command field the following line, replace newpasswd with your password: echo "root:newpasswd" | chpasswd press okay select the newly created cron job Click the run button. in the opening window click the start button. It will shortly deactivate and activate again. open ssh or console and login as root with your new password. Root and Admin Password Unknown If you do not know the root password, you need to boot with a Li...

Joomla! Anti-Malware Scan Script

  Le fichier jamss.php Il faut le mettre sur la racine du site web et ouvrir le fichier via le navigateur https://github.com/btoplak/Joomla-Anti-Malware-Scan-Script--JAMSS-/blob/master/jamss.php <?php /**  * JAMSS - Joomla! Anti-Malware Scan Script  * @version 1.0.7  *  * @author Bernard Toplak [WarpMax] <bernard@orion-web.hr>  * @link http://www.orion-web.hr  *  * This script should be used for searching the infected or malware/backdoor  * files in Joomla! installations.  *  * ALL COMMENTS AND SUGGESTIONS ARE WELCOME!  *  *  * @license http://opensource.org/licenses/gpl-3.0.html GNU Public License, version 3 (GPL-3.0)  * This program is free software; you can redistribute it and/or modify it under  * the terms of the GNU General Public License as published by the Free Software  * Foundation; either version 3 of the License, or (at your option) any later  * version.  *  * Th...

cPanel DDOS attack - Mitigate Slowloris Attacks - mod_qos

Apache mod_evasive Mod_evasive is a module available for the Apache HTTP server that can automatically block attacks by rate-limiting any IP that sends too many requests in a short time. Start by installing the module from WHM’s  EasyApache 4  interface. Select the  Currently Installed Packages  profile, search for  mod_evasive  in the  Apache Modules  section, and then install it. The default settings are good for most servers, but you can tweak them further by editing the configuration file  /etc/apache2/conf.d/300-mod_evasive.conf . You can also whitelist specific IP addresses or classes, so legitimate requests are not blocked. Configure CSF to block attacks While  mod_evasive  works very well, it only protects the Apache webserver. In order to harden other services as well, you can install the free  ConfigServer Security & Firewall  (CSF), which also includes a WHM plugin. As the  root  user, install CSF ...