-
Content Count
6,342 -
Joined
-
Last visited
-
Days Won
9
Everything posted by BuffaloHelp
-
Changes to Invision Gallery was made today after finding out TrueFusion and mine were bombarded with spam comments.From now on, GUESTS are not allowed to view/comment on your album/image unless they register with Xisto.com. This will capture at least their registration information and then I can do something to block them from spreading more spam in our board.Please use the REPORT button to notify any spam and inappropriate comments left to your album(s). Only admins can modify the gallery.Thank you all.
-
Invision Gallery Settings have been changed today to prevent unwanted spam comments that have been reported recently.Now guests cannot view your album/image unless they are registered members of Xisto.com. This, at least, will serve the purpose of finding where and who are spamming in our forum.Please report any spam comments left in any given gallery image. Use the REPORT button.If there's anything that is not working correctly please let moderators/admins know.Thank you.
-
My Symantec Anti-Virus Corporate Edition versions 10.0.1, 10.0.2 and 10.1 were not able to pick up the presence of trojans in my computer. I am not exactly sure either. But the way the virus scan is to look "into" the file(s) itself and note the pattern or the program of certains "commands" that are either known to cause malicious behavior or may cause in the future. Some are just picked up using location/filename for lesser threatening virus.
-
Yes. You have two options:1) you can just create a folder "hisname" and grant FTP access with its own login and password just for that folder.2) you can create a sub-domain, i.e. hisname.matak.trap17, and grant FTP access with its own login and password. Both of above method will create a folder called "hisname." The difference between is the way URL is written--matak.trap17/hisname or hisname.matak.trap17. Sub-domain will also work as matak.trap17/hisname. The choice is yours. Some people prefer to have their own sub-domains instead of matak.trap17/hisname.Additional information regarding FTP access:You can also limite the usage space by limiting or unlimiting the space allocation. All this is found under your cPanel. If any question regarding the usage of your cPanel, please look through our Tutorial section--one of our members has written a comprehensive look into our cPanel terms and functions.
-
Hosting Account Terminated - Still Negative Credits?
BuffaloHelp replied to ruijie's topic in Web Hosting Support
I'm sorry. When the termination script is executed it is suppose to connect to the forum database and change your member status from [HOSTED] to Members. The new version from 2.1.4 and higher is not allowing external scripts from modifying remotely.Your status has been corrected.Thanks for your patience. Topic resolved. Please PM a moderator if you would like to continue this discussion. -
You're welcome. This is a different topic. Please stay within one topic at a time. cPanel name cannot be changed by you. If you really desire this change please PM me and I will have to look it up so that it's not taken. As for your forum username, I do not encourage a habit of changing it but you can PM me *AFTER* you searched the forum to see if it's not taken. Please PM me both desired changing names to me. Topic has been resolved and now closed.
-
This post is the continuation of my previous post DNS Hijack SearchAtHand.com Browser Result Removal but deserves its own topic. This trojan, not new but something that's been going around the web for few years, seems to be quite strong and hard to get rid of. The reason is that it randomly changes its full file name when a weak anti-spyware attempts to remove it improperly. I have been using Spybot Search & Destroy and Norton Anti-Virus Corporate Edition for many years and have never seen such a resilient torjan. Recently I have tried AVG Anti-Spyware but it too could not get rid of the following torjan/spyware: Spybot Search & Destory reported as pipas.A AVG Anti-Spyware reported as Downloader.Agent.Uj Multiple attempts to remove this using provided programs only rendered failures. As my frustration grew larger and larger I decided to manually remove these files using REGEDIT (*note: REGEDIT should be used by those who are comfortable editing Windows Registry) And I found something very interesting during my search. Under HKLM my Tcpip had defined NameServer to some weird IP address: 85.255.112.26. This cannot be happening, I thought. For the past 3 years I had someone's IP address as my NameServer. And who knows what's been going on while I was connecting to internet and sending information back and forth. Luckly, all my important typing/information data were on a secure connection but to think that someone had compromised my computer while I was running all these anti-programs and still my computer was infected! I wasn't too worried since I was behind 3 firewalls but still... Anyway, so I performed registry search for "NameServer" and deleted anything that contained data with the value 85.225.*.* I then search the web for this IP address and found I wasn't the only one. The first program to get rid of this was rmdlagentuj.exe (I would recommend this first before you do any REGEDIT). And ran another removal tool called FixWareout.exe. My reference article can be found here: http://forums.xisto.com/no_longer_exists/ I based my searches and finding to this article as my guide. Another observation I noticed is that when rmdlagentuj.exe (stands for Remove Download Agent Uj) removed Download.Agent.Uj a trojan called Trojan.Small.fb showed up in AVG Anti-Spyware. This wasn't present in all previous scans. To remove Torjan.Small.fb I used FixWareout.exe. These above mentioned removal programs are easy to use. You simply follow the instruction and you should be very good. So to summarize my steps: 1) run REGEDIT to see if you have registry values that says "NameServer 85.255.*.*" 2) download and run rmdlagentuj.exe 3) download and run FixWareout.exe 4) run 2 searches and look for "cs*.exe" and "dm*.exe" 5) delete ONLY you know that it should not be existing in your computer. These are the mutating files which infected my computer. They mutate to something like csrte.exe to csren.exe each and everytime anti-spyware tried to remove it. That goes the same for dmumt.exe to dmdxg.exe (note that they start with two letters followed by random three letters as their file names) They seem to be reside currently only under WINDOWS\System32 6) empty out your recycle bin 7) run anti-spyware again 8) check your settings, such as DNS to be obtained automatically, registry is free from all known infection and searching your hard drive for any mutating files. Hopefully you are not infected. But if you are you can post "report.txt" from running FixWareout.exe and see if we can identify which file(s) to remove. For your convinence download rmdlagentuj.exe http://forums.xisto.com/no_longer_exists/ download FixWareout.exe http://forums.xisto.com/no_longer_exists/
-
You assumed wrong. This is still illegal. Just because the door was open, it doesn't mean that you can walk into someone else's home. Right? This method is highly illegal. Since when exploiting a site is legal? Read the following terms of service by Google. Isn't exploiting websites considered "unauthorized access"? The question is are you in any way inviolation with this statement? You can achieve the same tutorial by placing screenshots instead of the actual program. To educate does not always means to demonstrate with the live program. You can discuss how to prevent such attach/caching through a presentation. When making a presentation always include the lucid-manual like-introduction to what can be achieved and how to use it. Do not just post a link and say that you hope it helps someone. Remember this is a forum. We discuss and guide all here. All words that are not yours should be QUOTED. If a format is important you can make your own web page and provide a URL. After note: Contrary to popular belief, hacking is very much illegal. The term hacking in technical world means to alter the state of the original device/equipment/program to behave in a way that suits an individual. By altering the original content/setting that is not meant to be altered means breach of the acceptable usage policy and copyright. Unless it was expressed by the originator/author you are not to modify that which was released as honor system. Using Google search engine to find list of passwords (in the past UCLA had their entire password listed under a database file) by search/keyword: ~*.**.?tg.?cz--for example-- is not hacking but just very clever way of utilizing the search engine.
-
This was noted and mentioned before. I believe I have explained it but I'll do it again.It seems like when cPanel was upgraded from two previous versions ago, the value "unlimited" is not recognized by newer versions of cpanel. And therefore I have asked members to report all malfunctioning cpanel features to me.And to solve the issue with "unlimited" I have changed to the value of 99. Why only 99? It's because statistic shows that no member has used over 45. So I just made it 99 for now and PM me when you need more.NDPA, your cpanel issues is not clear when actually happened. Perhaps your information was lost during the lastest upgrade. However it happened, I have fixed your settings under your cPanel. Check it and get back to me via PM.I apologize for your inconvenience
-
To remove manually, you would use REGEDIT command. Run REGEDIT and search for those key values. As you can see, you can look for them according to a registry value. Just scroll down until you find the exact one. But the problem may be even deeper. Although you can remove those registry values, if a spyware is still present in your system the next reboot can cause it to reappear again. This is a normal practice for majority of spyware--since it took a hard/easy try to get into your system, it will hide itself and multiply if one of its clones gets somehow deleted. You can find out where the actual program could be located. When you find a registry value that you're looking for you can right click on the registry value and see its property. Sometimes you get lucky and see the full path where this registry value is calling an executable file. You should delete that file and then work on your registry. CAUTION! Attempting to edit your registry file can cause your computer not to work properly. Always backup your registry before beginning anything and if you're not comfortable editing registry do not attempt it at all.
-
I believe OpaQue modified the hosting credit script so that the re-animation of your suspended hosting kicks back in 1 hour *AFTER* obtaining 4 hosting credits.This information is not varified for Xisto since I am not hosted here. However, the likelihood of having the same hosting credit system as Xisto is very high.This topic has been resolved and now closed. If you would like to continue this discussion, please PM a moderator.Thank you.
-
Just a word of caution...Depending on a browser extension is risky these days with all those spyware going around. Make sure you are protected at all times. Check your firewall settings and status to see any unknown connection while the computer is unattended.Firefox has been known to be hijacked due to insecure coding with browser extensions.
-
Anonymous FTP is disabled for all Xisto hosting accounts. You must login using authenticated procedure. Unless you have authentication profile set under your browser (which is very dangerous these days due to browser hijack and spyware) you cannot login anonymous, which is a default login procedure for all browsers.The simplest way to solve this issue is to have FTP client rather than FTP via a browser. Xisto Readme has two tutorials about how to set FTP client using FileZilla and WsFTP.You can also upload and download files using your cPanel.
-
Is SmartFTP a particular software you prefer to use? Any function that you would get compare to other programs?Well, I wrote a tutorial about using FileZilla with Xisto hosting account. The link can be found in Xisto Readme.I guess what I'm suggesting is FileZilla instead of SmartFTP. They both work similar to Windows Explorer style--click, drag and drop. CuteFTP was the choice before but I don't know I just got frustrated with CuteFTP when it went from free to purchase.
-
Login Bug Keeps asking me to input a password
BuffaloHelp replied to darran's topic in Web Hosting Support
Ah, so now we're getting somewhere.Try to read the manual help regarding the internet security program you have. By basic you can add a rule to accept cookies with listed sites that you ADD to your trusted internet site.If this solution does not help, modify your security setting of your firewall to accept cookies for Xisto, etc. If you set your cookie setting to be deleted immediately change this so that it can survive for 1 day, etc.The idea is to allow your internet security program to accept and trust Xisto cookies and such. When you do this you can have your security program running AND login however you'd like at the same time. -
Would you like to know it by hand so that you can calculate it anywhere or would you like to have a reference so that you can look it up? The detailed converting technique can be summarized here http://www.permadi.com/tutorial/numHexToBin/index.html Online conversion calculator can be found here http://www.statman.info/conversions/hexadecimal.html The basic idea is this: when we count as decimal world (Base10) we don't "carry the number" until the 10th count. That is, by simpler words, we don't add to the next digit place until all 9 boxes are filled (counted). Why only 9? ZERO is not filled with anything. The amazing discovery of digit ZERO is for another story, but for counting it is very important. Assuming you understand the concept and importance of ZERO we continue... Let's say you have 16 items. You have 10 boxes to fill in Base10 where each box is numbered from ONE to NINE. The box marked ZERO is omitted. You start to fill in and you notice that all nine boxes are filled with 6 items still in your hands. To make it easier, you empty out NINE boxes, add one more item from your hands to 9 items taken out and place it on the side. You've just counted 10 items and you continue to fill empty boxes with remaining items in your hands. This is what we call the "carry the one" and add the remainder. Therefore we get the usual number 16--ONE complete set was filled and still had 6 left over. This "carry the one" does not happen in Base16 until the box number 15 (counting from ZERO to FIFTEEN will result in 16 counts, counting formula = (15 - 0) + 1 OR (n2-n1)+1 ). So you don't "carry the one" until 16th count. The number 17 means "carry the one" and still have remainder of 1. This is represented as 11 in Base16. 20 is represented as 14 in Base16. What's up with letters? Since counting only consists of a single digit representation, letters A, B, C, D, E, F were added as digits beyone 10 in Base10 world. So what we understand as 11 in decimal would be A in hexadecimal. It's like having 16 fingers A quck counting exercise you can do at home: Use both hands and one foot to count objects. To make it easier mark your toes with letters A thru E. When you count up to letter F, instead of counting, write it as "1" on a piece of paper. Do try this exercise only if you want to... Basice decimal to hexadecimal calculation by hand: Pick a decimal. If decimal is larger than 16, divide decimal (d) by 16. Take the integer of dividend (h) and multiply by 16. Subtract this result from decimal (d) and find the remainder. Match the remainder as Base16. d = 100 100 / 16 = 6.25 6 * 16 = 96 100 - 96 = 4 (hex for 4 is 4) result = 64 Base16 So to convert from hexadecimal to decimal, all you have to do is multiply 16 with second digit and to left, plus the remainder. For example: hexadecimal (h) = 5A 16 * 5 = 80 A in decimal = 10 80 + 10 = 90 in decimal I hope this helped.
-
When you say "hacking" is the term actually exploiting Google's service to perform that is against Google's terms of use? Or "hacking" as in found out how to use Google, still under TOS, with commands that are public information yet not many know of this technique?If you say it's the first one, absolutely no. Xisto forum shall not contain any material that is harmful to any site no matter how easy to exploit.If you're saying the second, that's not hacking but a hidden trick or "Easter Egg." If so you are free to share your knowledge with us--and grately appreciated.
-
Can't Able To Access "frequently Asked Questions" Area
BuffaloHelp replied to niran's topic in Web Hosting Support
phpFAQ script was compromised to redirect all coming traffic to some other site.Thanks to miCRoSCoPiC^eaRthLinG we now have Xisto FAQ back.Topic resolved; closed. -
I am thinking about rewriting the HIDE bbcode tag all over. This HIDE code will not require to enter the option as the current one, i.e. HIDE=option.I will consider without the quote format. Who knows... maybe forum members would actually adhere to our forum rules and not cheat with credit system.
-
Hosting your own server requires both upload and download speed. Most ISP will offer fast download speed but the upload speed, sometimes, is only a third of the download speed.Furthermore, majority of ISP terms of service is that residential members will not host their own hosting service. If you ignore this contract your service will be terminated immediately and they may be reluctant to restore your service.So first check with your ISP if you are allowed to host your own server. If everything goes right you can search our tutorial section for tips and tools for making your own hosting server.In my opinion hosting your own server is not practical. Imagine your computer turned on 24/7/365.25 constantly--the electricity cost will be huge. If you're not paying for your electric bill help your parents not to spend more :)And you have to maintain your server by yourself or with someone...and that's something I think I can do without, you know what I mean?Good luck.
-
Looks like the combination of Tool Tip (jhaslip as written a topic about this) and image layer code to combine two sets of images to form one.The photo would behave as the background and the Tool Tip overlay acts as the item description.It would be nice to see if Xisto master coders can manufacture something similar and post it under Programming section.
-
Login Bug Keeps asking me to input a password
BuffaloHelp replied to darran's topic in Web Hosting Support
I have tried both arrow#1 and arrow#2 method to log in and I had no trouble with the issue you presented. Perhaps your firewall is preventing the board's cookie set with header? If you do have firewall try turning it off and repeat the process. Another thing you can try is to log in from another computer. This can isolate where the problem might come about. -
United States congress passed to encourage energy conservation and have made changes to Daylight Saving Time (DST) as follows. This will reflect accordingly if you set your Windows to update the time automatically. It will begin Spring of 2007. For more articles visit https://support.microsoft.com/en-us/kb/928388
-
Have you checked your BULK or SPAM folder? If you are using AOL, YAHOO, MSN, HOTMAIL or GMAIL emails sent from Xisto mail server will land in your bulk or spam folder initially.PLEASE PLEASE be sure to check *NOT SPAM* and move it to your inbox folder.If none exists in your bulk or spam folder, post it here further and we can isolate the next issue you might have.