Web Hosting, VPS Hosting Support Technical Forum

Welcome, Guest
You have to register before you can post on our site.



Search Forums

(Advanced Search)

Forum Statistics
» Members: 46
» Latest member: Joshuashato
» Forum threads: 116
» Forum posts: 445

Full Statistics

Online Users
There are currently 6 online users.
» 0 Member(s) | 6 Guest(s)

Latest Threads
Favorite Mobile Game
Forum: Games
Last Post: Heatman
11-05-2018, 06:25 AM
» Replies: 3
» Views: 1,124
Question about Bitcoin Se...
Forum: Beginners / Misc Questions
Last Post: NoviceNinja
11-05-2018, 06:16 AM
» Replies: 4
» Views: 1,066
Your Favorite Game
Forum: Games
Last Post: NoviceNinja
11-04-2018, 08:50 AM
» Replies: 7
» Views: 2,425
Slow computer
Forum: Hardware
Last Post: chameli
11-04-2018, 02:26 AM
» Replies: 9
» Views: 1,732
Linux and the GNU system
Forum: GNU Linux / UNIX
Last Post: NoviceNinja
10-31-2018, 11:04 AM
» Replies: 1
» Views: 507
Decline in Phablet and Ta...
Forum: Telecommunication
Last Post: chameli
10-31-2018, 12:42 AM
» Replies: 5
» Views: 901
Using PHP 5 Becomes Dange...
Forum: Advisories
Last Post: Xz3r0
10-30-2018, 05:17 PM
» Replies: 0
» Views: 333
Quantum Computers
Forum: Hardware
Last Post: NoviceNinja
10-30-2018, 06:22 AM
» Replies: 1
» Views: 397
PS4 pro or Xbox One
Forum: Games
Last Post: Heatman
10-28-2018, 07:24 AM
» Replies: 2
» Views: 532
PC Coin Mining
Forum: Hardware
Last Post: chameli
10-28-2018, 03:15 AM
» Replies: 4
» Views: 725

  Favorite Mobile Game
Posted by: NoviceNinja - 11-02-2018, 06:21 AM - Forum: Games - Replies (3)

My favorite mobile game of all time is CLASH OF CLANS. It is a freemium mobile strategy video game developed and published by Finnish game developer Supercell. The objective is to upgrade your buildings and gain loots from enemy bases by attacking them. There are tons of things to do in-game like interacting with other players, joining war events, enhancing your heroes, and a whole lot more. I was addicted to it two years ago, and I must say that it is one of the most enjoyable periods of my life.

How about you guys? What is your favorite mobile game? Please do share your thoughts. Thanks!

Print this item

  Using PHP 5 Becomes Dangerous in 2 Months
Posted by: Xz3r0 - 10-30-2018, 05:17 PM - Forum: Advisories - No Replies

PHP version 5 is widely used by WordPress and many other web applications today.

PHP 5 will reach end-of-life in 2 months. 

That means it will no longer receive security updates. 

A new vulnerability could be catastrophic for sites that do not migrate to the newer version of PHP. 

WordPress, Joomla, Drupal and many other popular website CMSs were written in a programming language called PHP. PHP version 5 is about to reach end-of-life and will stop receiving security updates in two months. Many WordPress and other PHP websites remain on version 5.6 or older. Once support for PHP 5 ends in two months, these sites are in a precarious position and will become exploitable as new PHP 5 vulnerabilities emerge without security updates.

What is End-Of-Life or ‘EOL’ in Software?

When a software product reaches EOL, it is no longer supported by software developers. That means that, even if someone finds a security hole in the software, the developers will not fix it.

If a development team is productive, they will release many versions of the software they work on over time. It becomes impractical to support every version of the code ever released. 

So a compromise needs to be made.

This compromise is that the development team will only support their software for a certain amount of time. After that time has elapsed, the development team suggests that the user community upgrade to a newer version of the same software, which usually does things better than the old versions and is fully supported.

Is PHP Version 5  going to be EOL soon?

Yes. PHP version 5 will be declared End-Of-Life on January 1st, 2019. That is, in approximately two months at the time of writing.

The PHP development team’s policy with regards to end-of-life is as follows: each release of PHP is fully supported for two years from the date of release. Then it is supported for an additional year for critical security issues only. Once three years has elapsed from the date of release, the version of PHP is no longer supported.

PHP 7.0, the very first PHP 7 release, was released on 3 December, 2015, almost three years ago. PHP version 5 is rapidly approaching end-of-life and will no longer be supported starting on 1 January, 2019.

The final branch of PHP version 5 that is still supported is PHP 5.6. Because this is the final PHP 5 branch, the PHP team chose to extend the security fix period from the usual one years, to two years. That extended security support will end on 1 January 2019.

The following table includes the important dates for PHP 5 and PHP 7 branches. You can find this table on this page on the PHP website.

Why Should I Upgrade to PHP 7?

As mentioned above, PHP 5 will no longer be supported with security fixes, starting on 1 January 2019. That means that even if a vulnerability is discovered, it won’t be fixed, leaving your website vulnerable.

PHP 7 has many improvements over PHP version 5. These include performance improvements. PHP 5 has many known bugs that relate to performance, memory usage and more. PHP 7 is actively supported and developers are therefore able to implement those improvements and make your website run faster, be more stable and use your expensive resources more efficiently.

As an added benefit, PHP 7 also allows the use of more modern programming structures, which is a nice benefit for software developers.

Which specific version of PHP 7 should I upgrade to?

Ideally, you should upgrade to PHP 7.2 which is the newest version of PHP. This version will be fully supported for another year and will receive security updates for a year after that.

If you are unable to upgrade to 7.2, then at a minimum you should upgrade to PHP 7.1. Full support for PHP 7.1 will end in 1 month. However, you will continue to receive security updates for another year after that.

Do not upgrade to PHP 7.0. This version will also become end-of-life in one month.

Does PHP 5 have any vulnerabilities?

Security vulnerabilities are continuously reported in PHP. Some of these are serious. Viewing this page on CVEDetails.com will give you an idea of the volume and severity of PHP vulnerabilities that have recently been reported.

Many of the vulnerabilities reported in PHP were discovered this year. Many more will be discovered in PHP version 5 next year, after security support for all versions of PHP 5 have ended. That is why it is critically important that you upgrade to a version of PHP 7 that is supported and is receiving security updates.

Will anything break if I update to PHP 7.2?

You may discover incompatibilities that need to be fixed by a developer if you update to PHP 7.2. PHP has undergone some changes since version 5 which has improved the language and made it more secure, but may result in warnings or errors for code that has not been made compatible with PHP 7.

If you are a WordPress user, WordPress core is fully compatible with PHP 7.2 and greater.

However, it is very important that you make sure that your themes and plugins are also compatible with PHP 7.2. If you are using an unmaintained theme or plugin, you may encounter warnings or errors due to incompatibilities. For this reason, we recommend you test your website on a hosting account or server that is running PHP 7.2. If you encounter any problems, contact the developer of the theme or plugin and ask them for an urgent fix. Remind them that PHP 5.6 reaches end-of-life in just two months and that you must update to PHP 7.2 by then.

This page has a migration guide for PHP developers who are migrating code from PHP 5.6 to PHP 7.
This page has a list of deprecated functions under PHP 7.2 and will be helpful to a developer that is migrating code from PHP 5 to PHP 7.

Print this item

Brick Log in with an SSH private key on Linux and Mac
Posted by: Xz3r0 - 10-26-2018, 07:27 AM - Forum: Linux Servers - No Replies

This example below demonstrates how to use a private key to log in to a Linux server by using a private key by using a Terminal session on OS X.

However, you can follow the same process to use a private key when using any terminal software on Linux.

To complete this process, you need the following software applications:

  • ssh - SSH client software is installed on your Linux or OS X operating system by default

  • text editor - This example uses the vim text editor.
Log in with a private key
  1. Using a text editor, create a file in which to store your private key. This example uses the file key.txt.

  2. To edit the file in vim, type the following command
  1. vim key.txt
  2. After the editor starts, press i to turn on insert mode.
  3. Paste the private key into the file. Be sure to include the BEGIN and END lines.

  1. To save your changes, press Esc.
  1. Type :wq to write the file and return to the command line.
  1. Run the following command to change the file permissions to 600 to secure the key. 
  1. You can also set them to 400. This step is required: 

chmod 600 key.txt

  1. Use the key to log in to the SSH client as shown in the following example, which loads the key in file key.txt, and logs in as user demo, to addess gigebox.com:

ssh -i key.txt demo@gigebox.com

  1. When the prompt to confirm the connection request is displayed, type yes and then press Enter.
  1. If your SSH key requires a password, enter it when prompted to complete the connection.

Print this item

  3rd Telco in the Philippines
Posted by: kakashi2020 - 10-24-2018, 06:08 PM - Forum: Telecommunication - Replies (1)

Streamtech Systems Technologies owned by Manny Villar was given the green light by President Rodrigo Duterte by granting the new telco company a 25 year telco operating franchise.  It seems the Villar Group is gunning for the grand prize which is to win in the bid to become the Philippines third Telco company and that translates into billions of dollars of earnings per year.  Streamtech is now looking for a foreign telco partner which has a minimum of 10 years operational track record as it is one of the requirements.

Print this item

  Gaming in the Future
Posted by: kakashi2020 - 10-23-2018, 03:53 PM - Forum: Games - Replies (1)

I think that virtual reality would play a big part / a major role in the future of gaming.  The recent film Ready Player One which deals with virtual augmented reality is a good film that could very well predicted what gaming would be in the next 20 years.  

What kind of innovations do you think the future of gaming would have?

Print this item

  Hosting for ecommerce site
Posted by: chameli - 10-21-2018, 03:52 PM - Forum: Web Hosting - Replies (1)

What kind of hosting package would I need for an ecommerce site? In case it is a new site, would shared hosting suffice? I am asking thos question because I am planning an ecommerce site. The site I am planning is a dropshipping site.

Print this item

  Telco Monopoly
Posted by: kakashi2020 - 10-17-2018, 02:21 PM - Forum: Telecommunication - Replies (2)

In my country The Philippines it seems that even the government can't do anything to destroy the telco Monopolies of 2 companies Globe and Smart which basically controls the whole country's telco industry.  These two telco giants are earning billions per day with their high charges and unreasonably priced offers.  What's worst is their employees are downright arrogant and their customer service is so snail paced that it'll take days to get a straight answer or an issue resolved.

Print this item

  How to start a reseller hosting business
Posted by: chameli - 10-15-2018, 03:07 AM - Forum: Web Hosting - No Replies

In the place I live there is a great demand for web hosting solutions, however, there aren't any local web hosting companies. Therefore, since some time I am toying with this idea, to launch a web hosting company. I do not have a lot of money to invest, therefore, I believe reseller hosting is a better alternative as I do not have to spend a lot of money to start a business. So, how do I get started. Please guide me through the step by step process.

Print this item

Wink Developments
Posted by: lexi - 10-12-2018, 03:04 AM - Forum: Announcements - No Replies

Hello Everyone,

I’m working hard to deliver you excellent support.

We have been busy over the summer months refreshing our website and improving the look and feel of your online experience.

I will be releasing some new promotions and services over the new year so stay tuned and wrap up warm for the winter.

Print this item

Brick Two Factor Authentication with your Debit / Credit Card!
Posted by: Xz3r0 - 08-01-2018, 10:31 AM - Forum: Advisories - No Replies

  • Extra level of security means you'll be asked by your bank to verify your identity

  • Typically, this will involve typing a unique code into the retailer's web page

  • Each bank will offer a variety of ways of getting hold of this vital new code

  • Most are expected to offer to send it as a text message to your mobile phone 
Shoppers will be asked for a special code when they use a debit or credit card to buy online under a major shake-up to be brought in next year to protect against fraudsters.

The extra level of security means you'll be asked by your bank to verify your identity before you can complete a purchase.

Typically, this will involve typing a unique security code into the retailer's web page after you have entered your card details and clicked 'complete purchase'.

This will be required in addition to the last three digits of the so-called CVV number on the back of your card.

Money Mail understands that each bank will offer a variety of ways of getting hold of this vital new code, which will be different for each purchase.

Most are expected to offer to send it as a text message to your mobile phone. But if you use a mobile banking smartphone app, you may also be able to generate a code there.

Other banks may enable you to obtain a code on a handheld device similar to the card readers customers of some banks use to log into their online banking.

Alternatively, banks could offer an automated call to your landline, where the code is read out by a machine.

Another possibility is a new type of credit and debit card where the CCV security code on the back changes every 90 seconds. 

These devices are still being developed, but if they are rolled out widely, customers will simply enter the three-digit CCV on the card — as they do now — to complete a purchase.

The type of verification you require may vary depending on whether you are shopping on your PC, tablet or mobile phone.

Under the new EU rules, banks have until September 14, 2019 to introduce these changes and are still finalising plans. However, many are expected to launch their new security protection for online shopping much sooner than that.

First Direct, the online and telephone division of HSBC, has already written to customers to explain they will soon have to enter a one-time passcode sent by text to complete certain online transactions using their Visa debit and credit cards.

Fewer than 2 per cent of online purchases currently require shoppers to enter a password before the sale is completed, according to Mastercard.

When this happens, a window pops up asking you to enter a password that you set up with Visa (through its Verified by Visa service) or Mastercard (whose scheme is called Secure Code), depending on which firm processes your bank's card payments.

Last year fraudsters stole a total of £310.2 million from victims by using illegally-obtained credit and debit card details to make online purchases, according to UK Finance, the industry trade body.

Money Mail revealed last week that the full financial details of a British person — including their bank account number, sort code and card information — could be bought for as little as £27 on the internet.

Under the new secure scheme, the number of online payments requiring verification is expected to increase to one in four.

However, some transactions will not require a verification code thanks to a few exceptions to the new rules. For example, you won't need a code for purchases of up to €30 (around £27).

You will then be able to make five payments of up to this amount — or spend €100 (£89) in total — before being asked for extra verification. 

Many banks will also allow you to set up a 'white list' of trusted shops and payees. You will need to prove your identity with a code when setting up or amending this list, but then you can make purchases without restriction.

Regular payments such as subscriptions, memberships or direct debits and standing orders will not require a verification code.

Banks that keep fraud levels low will be able to allow larger payments through without customers needing to go through an extra identity check.

For example, banks that keep fraud levels below 0.1 per cent of all their online payments will be permitted to allow their customers to make payments of up to €500 (£444) without a second check.

City regulator, the Financial Conduct Authority, will assess fraud levels every three months to ensure firms stick to the rules.

Even if a bank has low levels of fraud, it could still ask for a verification code for unusual purchases that do not fit your normal spending behaviour, or if you are shopping from an unusual place, such as via an internet cafe or hotel wifi on holiday.

The new fraud protections are being called Strong Cus- tomer Authentication by the banking industry.

Almost all electronic payments will go through this system, including card and contactless payments made face-to-face and online shopping on computers or smartphones.

The rules specify that customers can only use their cards when they provide two of three different forms of verification.

The first is using something you know, such as a Pin or passcode.

The second is using something you have, such as a mobile phone or card reader. The third is using something unique to you, such as a fingerprint or voice recognition.

That means no changes when you make Chip and Pin transactions, as these already use two types of verification — the card, which you have, and the Pin, which you know.

The £30 contactless payment limit will stay the same but you'll be asked for a Pin after five contactless payments or once you've spent €150 (£133).

Industry sources assured Money Mail that banks will ensure all customers who shop online can find a way of getting hold of the codes they will need to complete purchases. Typically that will mean selecting one of a variety of different verification methods, from text messages to automated calls.

A spokesman for UK Finance, the industry body, says: 'These changes are aimed at further enhancing payment security and reducing fraud.'

Source: A Murray Daily Mail a.murray@dailymail.co.uk


Print this item