by Transposh - translation plugin for wordpress
Technical help
(06) 46-79-68-27

Web hosting knowledge base

Tárhely szolgáltatással kapcsolatos szavak, kifejezések magyarázata.


Mi az a DKIM kulcs és hogyan ellenőrizhetem?

The domain key, i.e. the domain key to the DNS record in, (is automatically created when you add a domain name in the control panel) key that serves, the fact that the email recipient can identify the sender. This prevents, false e-mail address from received email.

Check: http://dkimcore.org/tools/ and the control panel DNS zone copy the key so that shouldn't be in the ” ” symbol and copy and paste the http://dkimcore.org/tools/ website Check the dkim Core Key Record section.

You should see this after checking it: This is a valid DKIM key record

The domain keys cPanel and plesk under generated automatically no need for manual, manual update.

The dkim-about ' here: https://support.google.com/a/answer/174124?hl=hu


Joomla security solutions

One of the major disadvantages of content management systems, including the joomla are, that often become the hackers target, and if you do not see it proper protection, then the website is vulnerable.

Every Joomla owner must take care of some basic settings, the website of protect it from the hacked. We are trying to get more and useful ideas, to minimize we can hack risk.

  1. The Admin user name change, and the associated strong passwordt set. A strong password, if you have at least eight characters long, contains small and capital letter, number and special character (*-!+#$).
  2. Joomla! basic system all the latest versionyeah be installed, and the third-party add-ons will also update regularly. It's very important, that only comes from a reliable source, add-ons and template install, avoiding the undesirable as malicious codes containing supplements system integration.
  3. The most commonly attacked /administrator availability protect. I strongly suggest additional extensions of the AdminExile, which using any to change the admin interface URL-je, or unique key=value pairs can be set. As an example: domiannev.hu/system?key=Value to URL.
  4. Behind the admin interface, we protect the /administrator directory with a password. That makes multifactor authentication protect. The password protected library setting another blog to read.
    If this is a 404 error would be caused when you login to the admin interface, then in the /administrator/.htaccess file need to edit, and insert the following line at the end:

    ErrorDocument 401 "Authorisation Required"

    It should look like:

    AuthName "Authorisation Required"
    AuthUserFile "/home/acc/.htpasswds/public_html/administrator/passwd"
    AuthType Basic
    require valid-user
    ErrorDocument 401 "Authorisation Required"
  5. Remove this website source code for the Joomla version of referring to meta members. This simplest way to the ByeByeGenerator with a plugin we can.
  6. The Global configuration the search engine optimization is switched on. Here set Yes value for the Search engine friendly URLS, URL rewriting using, or the Unicode aliases option. This can reduce the Joomla use of signs in the pages of URLS in.
  7. The website root in htaccess.txt-rename it to: .htaccess -Re, if you haven't done. To block unwanted scripts from running, the following lines add editor view, the RewriteEngine On value line after:
    RewriteCond %{REQUEST_URI} ^/images/[NC,OR]
    RewriteCond %{REQUEST_URI} ^/media/[NC,OR]
    RewriteCond %{REQUEST_URI} ^/logs/[NC,OR]
    RewriteCond %{REQUEST_URI} ^/tmp/
    RewriteRule .*\.(phps?|sh|pl|cgi|py)$ - [F]
  8. Disable the user account registration, if it is not required. This can be done in the user management/Settings section.
  9. If you have carried out all Global setting in the Joomla system, the configuration.php file eligibilitythrough change 440 to. Do the same with the .htaccess file with.
  10. Where the user has the option data is recorded on the website, for example, guest book, contracting authority and a contact form, newsletter sign up, registration, etc.. protect the robots against. To do this install captcha protection modulet and adjust to these pages.

How can I reach the storage operating domain name without?

Own computer you need to perform a simple modification:

Under Windows route: C:\windowssystem32driversetchosts

Mac OS X Leopard & Snow Leopard below: Terminal: sudo /Applications/TextEdit.app/Contents/MacOS/TextEdit /etc/hosts

Under Windows:

1, file manager find this file C:\WindowsSystem32driversetchosts

2, once click the file, then right mouse click and select edit with notepad (or that you use a text editor to pl. notepad) from the menu

(Probably administrator-level permission will be needed, so this can only be carried out who is the computer admin rights, compatibility has)

You will see this:

Copyright (c) 1993-2009 Microsoft Corp.
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
# This file contains the mapping of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# in place in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denon by the ‘#’ symbol.
# For example:
# rhino.acme.com # source server
# x.acme.com # x client host

# localhost name resolution is also handle you within DNA itself.
# localhost
# ::1 localhost

The next line, type the ip address and the domain name, that registered.

For example: ujdomain name.en

3, So this is how it will look in the hosts file:

Copyright (c) 1993-2009 Microsoft Corp.
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
# This file contains the mapping of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# in place in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denon by the ‘#’ symbol.
# For example:
# rhino.acme.com # source server
# x.acme.com # x client host

# localhost name resolution is also handle you within DNA itself.
# localhost
# ::1 localhost I want to.en

4, This save and clear your browser history, after that, open the browser and enter the domain name that you set in the hosts file in.

Any domain name you set up on the server and the hosts file in the doesn't matter ... , if domain is not registered, it doesn't exist! This method works even, of course, only on the computer where this is set.

Storage space for restore

  • The hosting You can also download and save back to the cPanel>> data recovery menu (Hosting full save)
  • If you want to, to restore a previous hosting company time, Please send us the exact date.
  • Weekly or monthly backup to restore the tárhelyadatokat.
  • We do not see the process into, We do not know what it contains.
  • If you save the space was empty at the moment, After the restore I get back, so empty.
  • Since the correspondence and the databases will be restored, restore lost data after the date, as appropriate.
  • The hosting costs of restoration 5000 HUF + VAT.

PHP. INI show errors Display error

If you want to, that website development mode, show PHP errors generated by you must do the following:

Create a URphp.ini file and include the following:
error_reporting = E_ALL & ~ E_NOTICE;
display_error = On

When you're done upload it to the root directory, and from that point on the page showing php errors. If you have to turn off debugging mode, It will only take a ; the first line so:

;error_reporting = E_ALL & ~ E_NOTICE;

If you want to display only alerts you to this change in the first line:

error_reporting = E_WARNING

If you want to make these errors are loggolva the following line to the URphp.ini file, put:

turn log_errors = On
error_log =/home/username/public_html/error_log

The user name of the user you!


Control of Joomla and WordPress attack!

ID 10088163

In recent weeks a lot of brute force attack of the type we have seen WordPress and Joomla Admin pages.

Unfortunately we cannot fully eliminate because there are many hundreds of different IP coming from the attack and there is no clear pattern of attack. The creator of this website must be resolved and secure website.

How to notice if there is a problem? The case is almost certain to attack website:
-If it is significantly slowing down website
-a lot of registration, I forgot my password email to arrive
-suddenly fills up the space
-If you already have installed the security component may indicate
-cPanel-in the left pane of the Statistics the cpu, memory and entry process is already in the Red, because of greatly increased the hosting resource the need for

What can you do in such a case?
Update the framework to be always up to date. Securing the admin interfaces, only the right to have access to.

In the case of the control for Joomla: The/administrator directory to password protection, This cpanelbe the passwordwith proprietary menu you can. Another solution might be to use the htacess you only trusted ip addresses allow the/administrator directory. If neither appropriate, then you can choose to FTP cpanel file manager, or simply disable the/administrator directory (0755-available from the 0000 law takes off) and when you need it will let you edit it back to the right until. This solves the problem.

For more tips, see the joomla admin control here: http://anything-digital.com/blog/security-updates/3-joomla-security-tips-to-protect-against-brute-force-attacks.html

Other add-ons joomla protection: http://extensions.joomla.org/extensions/access-a-security/site-security/login-protection

In the case of the WordPress control: In the URwp-login.php file are almost always attack, This can protect you, to simply remove all right about it and when you need it by setting the rights back to 0644-re. We do not recommend the installation of the Wordfence Security application! One method of ip restrictions, the htaccess Defense. Create a .htaccess file and put in the following code:

RewriteEngine on
RewriteCond %{REQUEST_URI} ^/wp-login.php(.*)$ [Or]
RewriteCond %{REQUEST_URI} ^/wp-admin $
RewriteCond %{REMOTE_ADDR} !^ $
RewriteRule ^(.*)$ – [R = 4, L]

The last line before the 123 your ip address or ip range, I replace the pictures, so only you can access the admin section.

From here you can download the htaccess file, just rename it to .htaccess name after uploading!

In such a case, the Council of WordPress.org: http://codex.wordpress.org/Brute_Force_Attacks

The WP Admin Protection (by SiteGuarding.com) plugin for wp-login attack works well, because the wp-login cannot be called direct will be able to change the wp-login to access!

Other forms of attack against the worpress the URxmlrpc.php post attack, in this case the htaccess file put in the following code:

The Files/Files and before there is a break, I clear out!

< Files “URxmlrpc.php”>
Order Allow,Deny
Deny from all
< /Files>

From here you can download the htaccess file, just rename it and then after uploading the .htaccess name!

You can install the xmlrpc attack against the following plugin: Remove XMLRPC.PHP Pingback Ping

For more solutions to be found in the Forum: http://wordpress.org/support/topic/xmlrpcphp-attack-on-wordpress-38

as well as this site: http://blog.spiderlabs.com/2014/03/wordpress-xml-rpc-pingback-vulnerability-analysis.html

Another useful site: http://perishablepress.com/wordpress-xmlrpc-pingback vulnerability/comment-page-1/

The best, in order to optimize the operation always update your applications, frame system, speed up your website, This may be the solutions: cache, gzip, CSS compression, pictures, video(k) to optimize web etc.….Dramatically accelerate the website and ease the resource when.

Their own WP pages use these plugins, In addition to the appropriate setting, without any problem:
Country Code Failed Login
Wordfence Security

Please note that the application is running on your space, You must provide for the safe operation of, If this does not happen, then without, immediately suspend page, to protect our, our users.

If you have additional questions you may have, Please call us and we'll help you.


550 Sender verify failed

The sender verify function is an important setting for server side, because if this would not be active, then anyone can send false, not working email address letter to you, so many hundreds of daily spam Letter to deliver! Therefore, globally we will not switch off, It's in your interest to!

Why can't I get my mail xy.com domain to be able to, email address? This error is returned to the sender: 550 Sender verify failed

This happens, When the sender's email address, domain name, DNS not appropriate, Server hostname, etc.. is not configured correctly, It is not possible to check back, because the host server is not able to visszaellenőrizni the sender's e-mail address, to be real, is there a.

Solution: The sending party, ask your provider, to correct your dns, MX errors! So the error is not on the receiver side, This can be checked by using the below mentioned two.

We recommend a tool to verify the MX record: http://mxtoolbox.com/diagnostic.aspx
Another tool is the DNS settings: http://www.intodns.com/

Unfortunately it happens, to send an email newsletter from, which is not a fully traceable, for example, does not work. noreply@akarmi.hu in this case, we recommend, to specify the sender's IP We caught the address and.


How to set up Windows Mail under the mail simply?

The Cpanelben is an application, which set up You mail account Windows mail under.

Go to Cpaneljébe, and click on the email mailboxes (email accounts) icon! Here you select the mailbox, and then the MORE drop-down menus, click the Configure button in the Email Client!





The mail user agents select the Windows Live Mail program after one of the offered options! (Leírásunkban POP3 over SSL/TLS protocol.)


Click the Proceed button!








Save the file as!








2 Click to launch the file t!










6. step:
Click the Open button!











Enter the password for the mailbox.









You can now use the windows mail mailt.

If for any reason the auto option does not work, You can try the following alternative solutions:

The mail client SMTP You can change this under!
1, port 25 If your internet service provider to enable. If it does not work, you can use the internet service provided by server
2, port 1025 This without SSL can use, normal passwordwith. The certificate should be accepted.
3, port 465 STARTTLS, normal password
4, port 587 STARTTLS, normal password



Telnet licensing, use under windows

What good is the Telnet?

If a particular service, We reach the port, not the server example. correspondence of the 465 you want to find the cause of the port and, You can use the telnet program. So we can conclude, that the computer can connect to the server on port problem, If not then it is probably your firewall or router will not let me out of the server, in this case, you can use another port or the firewall to add this port as an exception.

How to use the telnet program?

The first step is to enable the telnet client for windows on your computer:

1, Start menu>Control Panel>Programs menu, and then click programs and features, menu, locate the windows features on- on and off menu.


2, click it, before long to bring up a window that lists windows services, Locate the telnet client service, and select and then press ok to activate the service.


3, If you have not already done so, You can open the URcmd.exe program: Start menu>run>You must type, to URcmd.exe and enter.

4, To bring up a window and type, that: Telnet and then use the following command: Open IP address port such as: Open 465


If the following message appears, the connection successful, so your host can communicate with the specified port on the specified server:


If you receive a failed message, You can try a different port such as. 587 or send an e-mail in this matter.



Scan for viruses on your space. CPanel

1. Go to CPanelbe (www.ondomainneve.hu/cpanel)

2. Navigate to the applications installed on the Virus Scanner icon, and then click on it.

3. The next option, you can choose, that you want to control what parts of your space!

4. After the scan selection.

If the scanner shows no infected files, then space is not infected.

5. The scan after running the program will show you the infected files.

6. In the next window, You can choose what you want to do in that infected file!

Quarantines, delete, you replace it.

IT is IMPORTANT to! If you move to quarantine, delete a file that can have serious consequences!

(PL; if you delete a website .index.html side, because infected then side are unavailable!)

In any case the infected file, You must remove the space! You may want to backup the entire page and upload again!

Manual Backup creation CPanelben.

Website for viruses – Site Inspector!


Manual Backup creation CPanelben.

Hacked website, the following procedure:

When an order is send to the email address provided in the activation of the new access data.

You are entering the Cpanelbe(www.ondomainneve.hu/cpanel) automatically save the contents of the website, change email passwords.

Save the contents of the website is down:

Enter the cpanel to. Click the file manager option











Create a root directory "/backup"folder











The file manager click on the public_html folder.











The entire contents of the folder, select and copy it to the root directory of your space, created backup folder.











Then, check the website, If you are sure you are not infected with the side fill up again!

Email password change here.





Website for viruses – Site Inspector!

Do you want to, that website is a continuous investigation and immediately get a message, If you have any virus is infected with?

Egy ingyenes online megoldást kínál a siteinspector.comodo.com.

The service 365 days free 1 website. Other services in public areas of the site!

To register, és az ellenőr beállításhoz tekintse meg a lent található képes segítségünket!

Click on the current image.

1. step:


2/1. step:


2/2. step:


3. step:





SMTP: (Simple Mail Transfer Protocol = simple mail transfer Protocol) on the network, the leaves are responsible for providing the. Via SMTP, from sender to recipient to the letter.



Cookie: use the following program Web sites, the hard drive is often undetected. An information file, which is used to identify the user.


IP address

IP address: (Internet Protocol Address) unique identifier of the devices connected to the Internet (address). So you can communicate with two devices. Currently 4 notated piece figures, the numbers 0 and 255 value can



DNS: (domain Name System) a server, which Ip addresses and domain names connect provides sheets back and forth. So instead of Ip address (PL. enough for a domain (PL. origo.hu) Note.