What Are The Common Scams
Jan 24, 2008What are the common scams or abuse, that beginning resellers need to be weary of? and how do you reduce exposure to these problems?
View 2 RepliesWhat are the common scams or abuse, that beginning resellers need to be weary of? and how do you reduce exposure to these problems?
View 2 RepliesGigenoc.com // ServerMoment.com SCAMS
These two hosts are scams. i was with gigenoc for a few and then there website shutdown with a lovely blank white index and today i just got a email from a employe from gigenoc. heres the email:
Quote:
Gigenoc is a ****ing **** Service, Tim wanted to scamm you over
he made a new site www.servermoment.com ALL SPREAD THE WORD
TIM IS AT SERVERMOMENT UNDER THE NAME MARK
Tell people not to sign up its HIM!
So basically, Tim likes to scam people i guess. bad idea because now i can dispute the orders i had with them and so are all my friends that have gotten hosting from them.
good thing webhostingtalk is viewed by thousands of people everyday
A While back I found a great deal for SSL certficates so I purchased a bulk package of about 10 of them and used several of them at the time. Now when I went back to use the rest of my pre-purchased SSL certificates (more than a year later), the "contracts" have apparently EXPIRED and the money that was put into those contracts has been frozen along with the contracts! WHAT THE F#$@!
That is such BS! When you pay money for something you should get something in return.
What have I learned... That to me seems extremely manipulative of RapidSSL and Geotrust...
I WILL NEVER PURCHASE AN SSL FROM Rapid SSL or Geo Trust AGAIN! and I hope this post inspires others to select one of the many other certificate sellers out there that are more upfront about their business.
I have contacted both of them and both are telling me that they cannot help me.
Now that I am looking for a new SSL provider can someone give me a good respectable company.
Why do most VPS servers have CentOS as the default/most common OS for linux?
View 14 Replies View RelatedI am writing an article about managed colocation (what it is, what are the benefits, how is it different from other hosting options, etc.).
What are some common questions you get from your customers regarding your managed colocation or managed services?
Do they see the value right away? Why are the hesitant? Is it clear to them which aspect of their server is under the control of the hosting company and which is still their responsibility?
I want to have a static server for my website which runs on the same machine as the dynamic server. I have read on the internet that port 8080 is a good alternative port to use.
Is common enough that it will work in all cases like port 80? And that it won't be blocked by firewalls and so on since it's not a service port (port < 1024).
Is it common for 10-15$+/month to provide only 1 database?
View 12 Replies View RelatedThe most common hosting platform is linux correct?
View 9 Replies View RelatedI just installed mod_security and would like to test some common attack to see if it's blocking it
I tried passing "cmd=uname -a" as parameter to a .php, but it didn't block it
any other test I can try?
I'm using almost all rules from gotroot
What are the ./configure parameters commonly used for Apache (2.2) and PHP (5.2) installations on web hosting servers?
View 5 Replies View RelatedAfter install yum on my centOS 4.4 VPS, I ran yum update and got this error:
Error: Missing Dependency: glibc-common = 2.3.4-2.25 is needed by package glibc-dummy-centos-4
When I tried to install glibc-common, I got this error:
error: Failed dependencies:
glibc-common = 2.3.4-2.25 is needed by (installed) glibc-2.3.4-2.25.i686
glibc-common = 2.3.4-2.25 is needed by (installed) glibc-dummy-centos-4-2.3.4-2.25.swsoft.i386
When trying to install these other things, I get more dependency errors. I noticed that glibc-dummy-centos-4-2.3.4-2.25.swsoft.i386 was mentioned. I'm not sure what this is, but it's by SwSoft? Is this something I have to contact my provider about? Thanks.
I want to use something like PHPBB forums and using one MySQL user and database. Just wondering, what are common user permissions I should set for the user? I want to try to minimize any permissions that can cause big risk to the server security.
Here is a full list of permissions I can grant to the user (via Webmin):
-Select table data
-Insert table data
-Update table data
-Delete table data
-Create tables
-Drop tables
-Grant privileges
-Reference operations
-Manage indexes
-Alter tables
-Create temp tables
-Lock tables
Is data theft common in dedicated industry? such as source code theft, especially in fully managed hosting situation?
View 14 Replies View RelatedThis is part 1 of a personal tragic-comic narrative starring myself, a simple, unassuming end-user of value-based web hosting services, and the supreme villain of this pathetic tale, the Iago to my Othello, would be a verminous, sub-human parasite collective disguised as a professional web-hosting company in the vicinity of Columbus, Ohio.
Speaking of Shakespeare, it seems to this humble WHT supplicant that the comedy of errors authored by the entities in question, a craven crew of possum-bellied, pigeon-brained menagerie of cubicle-dwelling subhuman troglodytes masquerading as ethical business-persons and capable hosting providers, is so egregious that if a scale of measurement is ever devised for web-hosting incompetence, it should be named after this company, in recognition of their utter incompetence and arbitrary imbecilic buffoonery disguised as reasonable technical support and customer service.
Apparently this company thinks it's more important to use their scale-encrusted rat-tails to cover up their own mistakes instead of giving reasonable responses to customer questions regarding apparent server issues.
Which brings me to my initial question:
MySQL's docs say that Error Code 28 results from lack of disk space or write permissions.
What are the common causes of this? Who has the power to control it from happening, the web host or the end user?( in this arrangement, the host is running an overloaded server and controls all of the configurations and aspects of the server while the user is using secure software with moderate usage of bandwidth and database queries).
I have additional questions in regards to a more general issue regarding failure to write/open to directories as well, but I'll wait for some responses first.
Excellent forum, by the way.
I use Basic Auth to limit access to a web site. This seems to work ok. I noticed though in the logs that the logged in user is not logged:
80.....188 - - [16/Jul/2013:09:56:29 +0200] "GET ..." 200 1844 "...." " ...
I would expect the second - to be replaced by the logged in user. The doc says, the user is logged if the document is protected. I do protect the whole directory using directory match. Without log in I fail to retrieve the document in question.