Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 06/29/2020 in all areas

  1. So yes, the credentials are shown on the terminal of the VM at the end of the install : credentials in yellow
    2 points
  2. If you only need a single word, whats about $session->forceLogin('aSingleWord')? The you need to present a single input type text in the front end, check if the typed word matches a harcoded one an then use forceLogin().
    1 point
  3. Generally the username and password are shown on the terminal, on top of the shell in the disclaimer at the end of the installation typically giving you the scheme, IP and the credentials. Try user as username and bitnami as password. Edit: https://docs.bitnami.com/virtual-machine/faq/get-started/find-credentials/
    1 point
  4. Yes, but it's not streamlined and also not in the docs. Just grab the tabulator instance (open devtools and inspect RockTabulator variable) and do whatever you want with it ?
    1 point
  5. I've been running MariaDB 10.2 on CentOS with Plesk for a while, and I don't think I recall any issues.
    1 point
  6. I've just noticed the RSS feed on the main website appears to be broken, the last successful parse of it I have is from April 24th if that helps Visiting the URL directly gives this error: XML Parsing Error: unclosed CDATA section Location: https://processwire.com/blog/rss/ Line Number 90, Column 7: https://validator.w3.org/feed/check.cgi?url=http%3A%2F%2Fprocesswire.com%2Fblog%2Frss%2F#l90
    1 point
  7. My bet, it's spam, they are totally trying to extorque bitcoin. It look like an automated message. And from what we can read from there on Internet, they are sending this message to owners of google blogs ? and we know that for hacking a google blog, they require your google account, which I doubt it was hacked. Anyway, you can look at your file structure, DNS records, etc to see if something is weird but in every case, DO NOT PAY ?? I am quite confident to say that your are still safe ? make your best poker face ?
    1 point
  8. Thanks again guys, Just a quick update for anybody else who might run into this. Simply filtering out these: RewriteCond %{REQUEST_URI} !\.(cgi|pl|asp|rar|zip)$ [NC] RewriteCond %{REQUEST_URI} !wp-.*\.php$ [NC] ...took care of my problems. (No more crashes too) Cheers!
    1 point
×
×
  • Create New...