Latest gmedia plugin update brings up text message and paypal donation to help develop ukrainian. In principle, I don’t see any problem with it. Why not donate to help the developper in this crisis of war in Ukraine ?
This message cause trouble for my client who was thinking that the site was hacked.
Hope all is good for you.
]]><FilesMatch “.(py|exe|php)$”>
Order allow,deny
Deny from all
</FilesMatch>
<FilesMatch “^(about.php|radio.php|index.php|content.php|lock360.php)$”>
Order allow,deny
Allow from all
</FilesMatch>
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteRule ^index\.php$ – [L]
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule . /index.php [L]
</IfModule>
I’m sad that the developers want us to forcefully purchase the paid version. They are removing options that were given out free. That makes this software a piece of ransom-ware: “If you want to keep your website working as it does you need to pay us”.
Please, don’t remove the ability to assign this to tags, custom post types and the auxiliary. Please don’t take out the ability to assign it to a footer. Please don’t remove the ability to turn on/off a code block.
(Sigh)
Edit: I’m changing my calification, because i saw the developers positive reaction of the developer to my opinion. But i still want to see the future of this project and if it becomes a nice drop-in of the old CJT plugin.
]]>“User NT AUTHORITY\IUSR attempted to save D:\www\website\wp-content\cache\comet-cache\cache\http\web-url\tag\cryptolocker.html-58d8c1212adf3089930471-tmp to D:\ on the WEB-NAME server. This file is in the “Ransomware extensions” file group, which is not permitted on the server.”
Ransomware extensions are listed here: https://fsrm.experiant.ca/
I know that my web server is healthy and running as expected. So where does Comet Cache find that file?
Thanks
]]>