Up To Date Php/perl & Libcurl Support - Which Provider
May 2, 2009
I am searching for a web hosting provider that offers up to date php and libcurl versions (or up to date perl plus libcurl). Any provider that you could recommend? Many thanks for some feedback!
My current provider (Yahoo Small Business ) offers the following php & libcurl combination: php 4.3.11 libcurl/7.12.0 OpenSSL/0.9.6g zlib/1.1.3.
I posted that to a libcurl mailing list, and the answer was the following:
> 1. That's using the PHP/CURL binding (which could explain
> something), and a version of it (the entire PHP version)
> that's over 4 years old
> 2. That's a libcurl version which is 29 releases old. Soon
> celebrating 5 years! (and the OpenSSL version is similarly
> outdated)
5 years! So what I'd need is a provider offering php 5 and the latest libcurl, or (even better) a provider that offers perl in combination with an up to date libcurl version (Yahoo comes with perl, but libcurl not included).
I want to start a private ircd that is only accessible to ipv6 clients, but I can't find a provider who can provide me with this. I've contacted FDC Servers about this, but they can't provide me with an ipv6 address on a vps.
I'm trying to find a bulletproof support hosting provider that will alowe me to install phplist and send high number of newsletters to customers. I have my dedicated SMTP servers... i just need some place to host my web sites and park my other domains....
and the hosting provider must not suspends my account for any complain form the 3rd party....
There are a lot of people whether their web hosting providers are good or not. After months of purchasing their web hosting account they might discover that their web hosting providers are so bad. Therefore, you’d better checking your web hosting provider.
One of the most important parts related to web hosting is the supporting services. So when you purchase a new web hosting account, try to check their supporting services. Try to ask them a few technical questions even you don’t have a problem. It just tests their supporting quality. How do they answer your questions quickly? Ask yourself this question. If they spend a lot of time “two or three days”, it might be poor service. For this situation, my advice is to cancel your account. The most of web hosting companies offer 30 days money back and try another web hosting company.
There are many supports kinds:
* HelpDesk * Live chat * Supporting via Phone * Supporting forum * And so on
This is all about the supporting part for your web hosting provider. So this is very important to check this service.
Can you reccomend - based on your experience - some dedicated hosting provider with a solid freebsd experience ? By "solid" I mean they will be able to provide a decent freebsd installation (especially if a control panel is requested) on tested hardware, rather than setup their standard server, put on it a freebsd7 iso, do a very poor setup then discover something like the raid card does not work as expekted, scratch their head, embarass themselves proposing centos as an alternative, and similar ridiculous behaviour ...
[I am in the market for a middle range core duo with 4gigs ram. Budget around 180$, 210$ including DirectAdmin. 2000GB bw on a 100mbit port. NY, DC, VA datacenters highly favourite, but also a well-networked chicago one would do, I guess].
I have several sites with Godaddy, but their lack of any real support leaves something to be desired. Does anybody know of a decent provider that has options for database support (mysql) and the like?
Using zencart, can't get https to work with paypal express. https and PHP work otherwise. Have gone through troubleshooting with zencart and the configuration between the cart and paypal is okay. However, openssl does not appear to be configured in libcurl based on phpinfo-
The setup includes MacOSX 10.4.10 Tiger on a Mac G4, PHP 4.4.7, MySql 4.1.22. PHP was also rebuilt from scratch, before libcurl, because configure was missing on the original OSX installation, and was downloaded from PHP.net. The new libcurl was built to include openssl.
I start with a clean configure and makefile on each build. The last configure looked like this: './configure' '--prefix=/usr' '--with-zlib' '--with-xml' '--with-zlib-dir=/usr' '--with-openssl' '--enable-exif' '--enable-ftp' '--enable-mbstring' '--enable-mbregex' '--with-mysql=/usr' '--with-mysql-sock=/var/mysql/mysql.sock' '--enable-sockets' '--enable-dbx' '--with-curl=/usr' '--with-config-file-path=/etc' '--sysconfdir=/private/etc' '--without-pear' '--with-gd' '--with-jpeg-dir=/opt/local' '--with-png-dir=/opt/local' '--mandir=/usr/share/man' '--infodir=/usr/share/info' '--disable-dependency-tracking' '--with-apxs' '--with-ldap=/usr' '--with-kerberos=/usr' '--enable-cli' '--enable-trans-sid'
Both configure and build get through although there are warning messages, and the PHP module installs. Am attaching copies of the zipped configure and make logfiles rather than listing the many warnings in both, although build log primarily shows these type of errors in several extensions:
/users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'add_assoc_name_entry': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:246: warning: pointer targets in passing argument 2 of 'add_next_index_stringl' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:258: warning: pointer targets in passing argument 4 of 'add_assoc_stringl_ex' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'add_assoc_asn1_string': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:267: warning: pointer targets in passing argument 4 of 'add_assoc_stringl_ex' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'asn1_time_to_time_t': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:290: warning: pointer targets in passing argument 1 of '_estrdup' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_x509_parse': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:897: warning: pointer targets in assignment differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'php_openssl_make_REQ': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:1207: warning: pointer targets in passing argument 3 of 'zend_hash_get_current_key_ex' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:1207: warning: pointer targets in passing argument 4 of 'zend_hash_get_current_key_ex' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:1280: warning: pointer targets in passing argument 3 of 'zend_hash_get_current_key_ex' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:1280: warning: pointer targets in passing argument 4 of 'zend_hash_get_current_key_ex' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_pkey_export_to_file': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:1959: warning: pointer targets in passing argument 4 of 'PEM_write_bio_PrivateKey' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_pkey_export': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2010: warning: pointer targets in passing argument 4 of 'PEM_write_bio_PrivateKey' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_private_encrypt': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2520: warning: pointer targets in passing argument 2 of 'RSA_private_encrypt' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2529: warning: pointer targets in initialization differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_private_decrypt': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2576: warning: pointer targets in passing argument 2 of 'RSA_private_decrypt' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2592: warning: pointer targets in initialization differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_public_encrypt': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2639: warning: pointer targets in passing argument 2 of 'RSA_public_encrypt' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2649: warning: pointer targets in initialization differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_public_decrypt': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2696: warning: pointer targets in passing argument 2 of 'RSA_public_decrypt' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2714: warning: pointer targets in initialization differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_sign': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2775: warning: pointer targets in passing argument 3 of 'EVP_SignFinal' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2778: warning: pointer targets in initialization differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_verify': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2813: warning: pointer targets in passing argument 2 of 'EVP_VerifyFinal' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_seal': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2888: warning: pointer targets in passing argument 4 of 'EVP_EncryptUpdate' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2907: warning: pointer targets in initialization differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c: In function 'zif_openssl_open': /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2975: warning: pointer targets in passing argument 3 of 'EVP_OpenInit' differ in signedness /users/mea/Desktop/stufftobuild/php-4.4.7/ext/openssl/openssl.c:2977: warning: pointer targets in passing argument 4 of 'EVP_DecryptUpdate' differ in signedness
From what I know the best option would be to get PHP, curl and ssl to work on the current platform. Any ideas on what could be going on and what it would take to get this to work?
I had a big scare today. My server (vps) went down and I had no way of contacting my provider because their whole system had crashed.
I've got backups but I had never thought of a provider crash, so I left the backups on my server. I would like to keep an up-to-date backup on my computer at home.
How do I do this? I've heard of rsync, but I don't know what it is or how it works.
Of course 'date -s' doesn't work on VPS. Using zic and timezones > /etc/localtime could help up to (almost) 24 hours, but dates are out of range.
Some systems can enable something like defying "Time Drift" as on some Xen versions (as shown below), but unfortunately my provider apparently doesn't support it.
# set independent_wallclock # echo 1 > /proc/sys/xen/independent_wallclock
What is the way to check the expiry date of a website. Actually someone hosted my site on my behalf. I do not have password etc. My host is Jkookserver.
An alliance of software makers and network-hardware vendors announced on Tuesday that they had banded together to fix a fundamental flaw in the design of the internet's address system.
The vulnerability in the domain name system (DNS) - the distributed database that matches a host and domain name with the numerical address of a computer server - could give an attacker the ability to replace the addresses of popular websites with that of a malicious server, said Dan Kaminsky, director of penetration testing for security firm IOActive. Kaminsky found the flaw when he was doing non-security research on the domain name system (DNS) more than six months ago.
"It is a fundamental issue affecting the design," Kaminsky said. "Because the system is behaving exactly like it is supposed to behave, the same bug will show up in vendor after vendor after vendor. This one bug affected not just Microsoft ... not just Cisco, but everyone."
On Tuesday, a number of software and network-hardware vendors released patches for their products. On its regularly scheduled patch day, Microsoft released updates for Windows 2000, Windows XP and Windows Server 2003 to mitigate the issue, which the company ranked an important vulnerability, its second highest grade of severity. Internet Software Consortium, the group responsible for the development of the popular Berkeley Internet Name Domain (BIND) server, also released a patch, confirming that its software contained the vulnerability. Both Cisco and Juniper also acknowledged flawed systems.
Vendors have also provided the fix to certain large clients. Yahoo will be upgrading its name servers from BIND 8 to the latest version of BIND 9, the Internet Software Consortium stated during the conference call. Internet service provider Comcast has already patched its servers for the issue, according to internet infrastructure firm Nominum. Finally, the Computer Emergency Response Team (CERT) Coordination Center has contacted some other nation's response groups to inform them of the problem.
For the most part, however, internet service providers and companies each received the fix on Tuesday, said Sandy Wilbourn, vice president of engineering at Nominum. The goal: To have every major service provider and company apply their software patches in 30 days.
For that reason, don't expect immediate action, Wilbourn said.
"For key customers on our network, we have made a special effort to get them an early release to help solve this problem, and a number of them have finished deployment," he said. "But the nature of this patch is that we wanted to get the vendor side covered and then have deployment over the next 30 days. Anyone that is not patched by today or tomorrow is not doing anything wrong."
The domain-name system (DNS) has been a popular way to attack the internet in the past - it's an ill-kept secret that the DNS system is insecure. The way that many software applications, such as browsers, handle DNS requests has opened up users to attack. Microsoft has fixed a few vulnerabilities in the way Windows handles domain names - issues that could have lead to easier eavesdropping or simpler phishing attacks.
We have a server located in USA. We have hosted an application for online booking of travel tickets. The customer wanted to change the system date to IST instead of EDT which we did. Now, if we try to change the system date to a future date in order to test our application, the date automatically resets to the current date. This happens only if we have the timezone as IST. If we change the system date to EDT, then after changing the system date, it does not reset automatically. It changes only if we modify it manually. However, if we change the timezone to IST, then the system date resets automatically back to the current date. We have stopped the W32 Time service and also blocked the port 123. We have also disabled the automatic synchronization with the internet time server.
I have a server with DedicatedBox.net. My billing cycle is 26th every month, but they always disconnect my server if I don't make payment before 22th or 23th. I complained to them by email, their helpdesk and WHT PM. They did response to me, but can't have the issue resolved.
In this month, I forgot to pay in advance. They disconnected my server on 23th as always. I sent a ticket #499717 and nobody responses to me. Whether they disappear or just ignore me, it's a warning to me, so I decided to leave them. Luckily I have a backup for all my data.
i have nameservers setup on my server using (for example) ns1.domain.net and ns2.domain.net with ips 12.12.12.1 and 12.12.12.2, respectively.
Heres my zone file generated by WHM for ns1
Code: ; Modified by Web Host Manager ; Zone File for ns1.animeost.net $TTL 14400 @ 86400 IN SOA ns1.domain.net. user.gmail.com. ( 2007052706 86400 7200 3600000 86400 ) ns1.domain.net. 86400 IN NS ns1.domain.net. ns2.domain.net. 86400 IN NS ns2.domain.net. ns1.domain.net. 14400 IN A 12.12.12.1 localhost.ns1.domain.net. 14400 IN A 127.0.0.1 Heres my zone file generated by WHM for ns2
Code: ; Modified by Web Host Manager ; Zone File for ns1.animeost.net $TTL 14400 @ 86400 IN SOA ns1.domain.net. user.gmail.com. ( 2007052706 86400 7200 3600000 86400 ) ns1.domain.net. 86400 IN NS ns1.domain.net. ns2.domain.net. 86400 IN NS ns2.domain.net. ns2.domain.net. 14400 IN A 12.12.12.2 localhost.ns2.domain.net. 14400 IN A 127.0.0.1 After i restarted bind, it gave me the error in /var/log/messages
Code: May 27 15:55:18 mail named[89641]: starting BIND 9.3.4 -u bind -c /etc/namedb/named.conf -t /var/named -u bind May 27 15:55:18 mail named[89641]: command channel listening on 127.0.0.1#953 May 27 15:55:18 mail named[89641]: /etc/namedb/ns1.domain.net.db:13: ignoring out-of-zone data (ns2.animeost.net) May 27 15:55:18 mail named[89641]: /etc/namedb/ns2.domain.net.db:12: ignoring out-of-zone data (ns1.animeost.net) May 27 15:55:18 mail named[89641]: running I believe that ignoring out-of-zone data is causing my dns to not work properly. I can't ping ns1.domain.net, ns2.domain.net, and domain.net.
Changing hosting companies is pain, let's admit it. You don't know what you're getting until you get it. Yes, it's like blind date.
The hosting company is talked up and fake reviews are posted in hopes of getting an affiliate commission. Some "companies" are actually Uncle George with a reseller account acting like he has a staff of 20 people.
So recently I was looking to 'downsize' after having a dedicated server for 20 months. There's was a hiccup with the hosting company. The email file permissions was constantly getting changed. It was a mystery because everytime tech support fixed it; the next day, it would happen again!
The operations manager was in contact by telephone and even gave me his cell phone number. I was also in telephone contact with Tech Support constantly until they have found the culprit - an old, invalid Cpanel Skin.
After the ordeal, I praise the team and company. But a week later, Omaha Steaks should up at my doorstep. Wow!
Well, now it's a year later and I need to downsize.
I looked at BlueHost, HostGater, Ixhosting, HostingExcellence and others... I could NOT believe what they offered for the money. I looked and looked.. and was excited that I could downgrade from a dedicated server and save $150 a month!
Finally, I decided to try BlueHost reluctantly.. as a test. But I tried to sign up for 30 minutes and the site was down. Uh-oh....
My gut - This is a wake up call.
Stick with what's WORKING.
I immediately emailed the Operations Mgr that hosts my dedicated server. Told him what I wanted. I needed a reseller account with additional IPs. He directed me to exactly what I needed and then asked if we could work something out on my current server. But with my sites slacking off, I just settled on a Reseller account.
They transferred everything and the site got a Internal Error (500).. err.. but don't worry - Tech Support found the .htaccess file was using suexec on the old server. So they commented it out and the sites appeared.
The POINT IS: Stick with WHO you know and What's WORKING. Yes, the current host may be a few nickels more than the Popular Hosting companies advertising in the magazines.. but they do NOT beat the support I've received over the last 20 months.
Final Review: I cannot praise HostDime enough. They are awesome. Mike K. is fantastic. I will keep my account there and it will run into the 3 third year in a few months.
www.HostDime.com is a REAL company, charging very reasonable rates, and you get the best support ever. They guys & gals won't give up until they solve the problem. If you're considering moving hosts, try them.
I have been with Midpulse for about a month, while hosting has been fine, but they really have serious issues with Billing.
I had selected Paypal Subscription when I signed up on 22-Aug and the subscription is paypable today 23-Sep, yet Midpulse Suspended my account yesterday itself for Non-payment Now, I'm confused whether I should cancel Paypal subscription or not.
Plus their HTTPS Billing area does not even open... so how the hell are customers supposed to Login to Billing area...
I have recently created a bunch of OS templates for HyperVM as their current set were hugely outdated / unsuitable.
The images tagged modernadmin all include preconfigured DenyHosts to prevent SSH brute forcing of your customers VPS.
Available are the following for OpenVZ: centos-5.2-i386-hostinabox-modernadmin.tar.gz530,147.2KB centos-5.2-i386-modernadmin.tar.gz109,654.2KB centos-5.2-x86_64-modernadmin.tar.gz134,665.8KB debian-4.0-i386-modernadmin.tar.gz61,153.3KB debian-4.0-x86_64-modernadmin.tar.gz143,096.5KB debian-5.0-i386-modernadmin.tar.gz75,740.6KB debian-5.0-x86_64-modernadmin.tar.gz159,226.4KB fedora-core-10-i386-modernadmin.tar.gz165,429.6KB fedora-core-10-x86_64-modernadmin.tar.gz174,693.8KB ubuntu-7.10-i386-modernadmin.tar.gz76,415.5KB ubuntu-7.10-x86_64-modernadmin.tar.gz76,133.2KB ubuntu-8.04-i386-modernadmin.tar.gz70,725.7KB ...