Hehe ;-). Better be honest, dzchimp didn't get it working. So it's not for everyone it seems
Sent from my GT-I9300 using Tapatalk 2
Hehe ;-). Better be honest, dzchimp didn't get it working. So it's not for everyone it seems
Sent from my GT-I9300 using Tapatalk 2
A security update for phpMyAdmin has been released and it's adviced to update as soon as possible.
Statement from the phpMyAdmin team:
QuoteDisplay MorephpMyAdmin 3.5.8.1 has been released to fix a number of security
problems. Also, the third release candidate for phpMyAdmin 4.0.0 has
been released, containing normal bug fixes for 4.0, along with security
fixes.
For more details, see the upcoming PMASA-2013-2, PMASA-2013-3,
PMASA-2013-4 and PMASA-2013-5.
With version 4.0, the HTML frames are gone and the navigation panel now
presents a tree. This version requires Javascript.
Version 4.0 contains many bug fixes and smaller new features; moreover,
the documentation has a new look and contains an index.
Details will appear on http://phpmyadmin.net. In a hurry? you can visit
https://sourceforge.net/projects/phpmyadmin/files to download.
No problem, drop a line if you experience any issues - We don't support it, but this does not mean we wont try to help, or someone in the community might have a solution to a problem you might experience.
Best of luck.
I've done a small write up on how to get it working, you can use this till Nuxwin has made an addon, if it's not already done
http://www.c0urier.net/2013/i-mscp-nginx-proxy
There is no guarantee it will work for you, but it works for me and I know Nuxwin has tested it as well.
Mine works fine behind NAT, why should it cause problems?
It might not be supported, since we don't want to offer support for configuration of Soho routers etc.
But it is without doubt easy to get working.
Sent from my GT-I9300 using Tapatalk 2
Or check this previous post for HELO disabling:
Security advisory from the Roundcube team - Primary for those of our users running a customer version.
QuoteDisplay MoreAfter getting reports about a possible vulnerability of Roundcube
which allows an attacker to modify its users preferences in a way that
he/she can then read files from the server, we now published updated
packages as well as patches that fix this security issue.
Please update all your Roundcube installations with the new versions
(0.9-rc2, 0.8.6, 0.7.4) or patch them with the published patches.
Download the latest version from http://roundcube.net/download
Patch for 0.9.x: http://ow.ly/jtQD0
Patch for 0.8.x: http://ow.ly/jtQHM
Patch for 0.7.x: http://ow.ly/jtQK0
Patch for 0.6: http://ow.ly/jtQNd
In order to find out whether one of your users has vulnerable
preferences, you can run the following query on the Roundcube user
database:
SELECT * FROM users WHERE preferences LIKE '%generic_message_footer%'
If this returns any results, you should at least clear the
'preferences' field of that user entry. Or better: entirely block the
user because he or she most likely tried to exploit your system.
And here's some background about the vulnerability:
http://lists.roundcube.net/pip…ev/2013-March/022328.html
Why don't you use the panel for it?
The Apache config for the domain should look like this:
Screen of where to add it:
Remember to open passive ports or run the ftp client in active mode.
#PassivePorts 49152 65534
to
PassivePorts 49152 65534
Restart proftpd.
And forward those ports UDP if u want to be able to use passive mode like most FTP clients use as default.
I-mscp install sendmail ?
I'm pretty sure it's installed as default on some debian machines, all depending on your selections during installation. And if it's a VPS they prob. use a standard mirror with sendmail as a standard package.