Berend de Boer is spot on, I have just spent my spare time over the last 
three weeks moving 35 of my client sites to a new server, also 
as the server IP had been blacklisted it became a no-brainer of a decision 
to take this quite extreme step, rather than clean up the existing server. 
As a part of this exercise I discovered that PLESK backup and restore in 
concept is nice, but in practice it doesnt work between versions, 
and I found myself manually entering domain info, FTP accounts, generating 
databases, database users, email accounts, and going through 
each and every page using diffmerge to make sure that there was no backdoor 
the hacker had left behind. I even found myself manually backing 
up and restoring a series of databases that PLESK had 'forgotten'.

Good luck...

Joe

On Monday, 20 August 2012 07:54:50 UTC+1, GarethNZ wrote:
>
> Hopefully someone here is very conversant with the Plesk control panel. I 
> was running 8.3 on my server. Some a**hole using the Black Hole Stealth Kit 
> hacked my server getting in through the large holes left by plesk. I have 
> now updated to Plesk 9.5.4 plus the "security" update. Am I now safe from 
> this exploit? 
>
> Since the update I have been getting logwatch emails several times a day 
> and Dr Web cannot update. I can provide a copy of the logwatch emails if 
> required.
>
> Any ideas would be appreciated.
>
> Cheers
> Gareth
>

-- 
-- 
NZ PHP Users Group: http://groups.google.com/group/nzphpug
To post, send email to [email protected]
To unsubscribe, send email to
[email protected]
--- 
You received this message because you are subscribed to the Google Groups "NZ 
PHP Users Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to