Berend de Boer is spot on, I have just spent my spare time over the last three weeks moving 35 of my client sites to a new server, also as the server IP had been blacklisted it became a no-brainer of a decision to take this quite extreme step, rather than clean up the existing server. As a part of this exercise I discovered that PLESK backup and restore in concept is nice, but in practice it doesnt work between versions, and I found myself manually entering domain info, FTP accounts, generating databases, database users, email accounts, and going through each and every page using diffmerge to make sure that there was no backdoor the hacker had left behind. I even found myself manually backing up and restoring a series of databases that PLESK had 'forgotten'.
Good luck... Joe On Monday, 20 August 2012 07:54:50 UTC+1, GarethNZ wrote: > > Hopefully someone here is very conversant with the Plesk control panel. I > was running 8.3 on my server. Some a**hole using the Black Hole Stealth Kit > hacked my server getting in through the large holes left by plesk. I have > now updated to Plesk 9.5.4 plus the "security" update. Am I now safe from > this exploit? > > Since the update I have been getting logwatch emails several times a day > and Dr Web cannot update. I can provide a copy of the logwatch emails if > required. > > Any ideas would be appreciated. > > Cheers > Gareth > -- -- NZ PHP Users Group: http://groups.google.com/group/nzphpug To post, send email to [email protected] To unsubscribe, send email to [email protected] --- You received this message because you are subscribed to the Google Groups "NZ PHP Users Group" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/groups/opt_out.
