Posts by ojahosting

    for me adding

    global $configLevel

    at line 414 in



    (or maybe move the $configLevel part in front of file)


    @@ -411,6 +411,7 @@



    customerHasFeature('php') or showNotFoundErrorPage();

    +global $configLevel;

    $configLevel = (new iMSCP_Config_Handler_File(

    iMSCP_Registry::get('config')['CONF_DIR'] . '/php/'


    I use with ipset/iptables with confidenceMinimum=49 and i block all tor exit nodes and the spamhaus drop list

    A lot less problems with spammer/hacked websites/...

    Against the wp-login.php brute force i use sometimes mod_qos (not at all sites - webdesigner could run into this qos too)

    SetEnvIf Request_URI ^/xmlrpc.php LimitWpXmlRpc

    QS_ClientEventLimitCount 10 120 LimitWpXmlRpc

    SetEnvIf Request_URI ^/wp-login.php LimitWpLogin

    QS_ClientEventLimitCount 10 120 LimitWpLogin

    If i have a customer whos a real target of a botnet than only a hetzner/ovh VM behind cloudflare is a solution and the hope thats the botnet is fast switching to the new target...

    I fixed it for me in the template
    not really looked deeper into this problem but this works for me.

    /var/www/imscp/gui/plugins/PhpSwitcher/themes/default/view/client# diff page.phtml


    < columnDefs: [{sortable: false, searchable: false, targets: [1]}]


    > columnDefs: [{sortable: false, searchable: false, targets: [1, 2]}]

    and restart the panel

    /etc/init.d/imscp_panel restart